1.11k likes | 1.29k Views
Welcome to Fluke Network’s Wireless Networking Workshop!. Who are you? Who is Fluke Networks? Why bother with this stuff at all ?. Your Presenter. Name: Dan Hernandez, Fluke Network Systems Engineer Office: 973.948.7386 Cell: 973.222.8151 Email: Dan.Hernandez@flukenetworks.com
E N D
Who are you? Who is Fluke Networks? Why bother with this stuff at all ?
Your Presenter • Name: Dan Hernandez, Fluke Network Systems Engineer • Office: 973.948.7386 • Cell: 973.222.8151 • Email: Dan.Hernandez@flukenetworks.com • Located in Hampton Twp, New Jersey
Your Fluke Networks Account Manager • Name: Perry Romano (White Plains Workshop Contact) • Office: +1 203 452 8386 • Cell: 203 5201702 • Email: Perry.Romano@flukenetworks.com • Located in Trumbull, CT
Survey and Prize Drawing • Fill out customer information survey • How did you find out about the workshop? • What were your expectations? • Help us improve our workshops! • Comments? • We’ll pick these up at the end for the drawing!
Wireless Growth - Where are YOU headed? Wireless- The Standards 802 Standards, Terminology, Frequencies A look at 802.11a, b, g Wireless- The A, B, C’s Choose a PHY Layer Choose a Topology Choose a Security Method Wireless- Site Survey with InterpretAir Wireless- Troubleshooting with Etherscope Agenda
Why Even Listen to us? Partnerships, products and best practices that lead to high-performance networks – and enterprises
Installation Verification Wireless Life Cycle – All phases, all users Pre-Deployment and Expansion Planning Interpret Air Management / Optimization • OptiView and Wireless ES find rouges, test performance, and verify security configs. • InterpretAir can visualize rogues on floorplan Troubleshooting • OptiView and Wireless ES standard tools • InterpretAir has “spot check” feature
Growing Excellence and Innovation 2005 - $261M In the last 12 years, Fluke Networks products have won more awards for excellence than any other company in the industry—launching key industry firsts and leading the way in every category we serve. 2000 - $178M Fluke Networks becomes a stand-alone company within the Danaher Corporation. 1998 - $109M Danaher Corporation, a $5 billion company with headquarters in Washington, D.C purchases Fluke Corporation. 1993 Fluke Networks was founded as a division of Fluke Corporation, the world’s leading name in industrial test and measurement solutions.
Fluke Networks Today • Part of a $7B premiere global enterprise • Continuously profitable company since its inception • Over 500 associates worldwideEverett, WA: Worldwide Headquarters, Infrastructure Design CenterColorado Springs: Enterprise Networks Design CenterSales Offices & Associates: Worldwide
Market Trends / Dynamics - Number of Units UP 20% in Q1 O5’ –infonetics) - Equipment Spending UP 31.8 percent in 2004 to $4.35 billion. - Equipment Spending Expected to total $7 billion in 2008! (12.6% Compound Annual Increase!)
Market Trends / Dynamics (contd) • Wireless adoption will continue to be strong • The number of hot spots in the United States is expected to increase from 32,800 in 2005 to 64,200 in 2008, growing at a 25.5% CAGR. (TIA, May 2005)
Share some issues you have had? • Site Survey & Expansion • Did you do it? Did you contract it out? • Problems? • Install & troubleshoot • What tools do you use? (Laptop-NIC card?) • Problems? • Security Audit & Management • How do you locate Rogue Devices and AD-Hoc networks? • Optimization • Have you done this? • Do you need to? • What tools will you use?
Wireless Standards (or 802.X Hell) Welcome back to the IEEE 802 Standard for LAN Technologies: • 802.3/ 802.5 defines the MAC/PHY layer for Ethernet and TR LANS • 802.1 defines Management (e.g. 802.1d, 802.1Q, 802.1X**) • 802.2 defines LLC • 802.11defines the MAC/PHY for Wireless! • 802.11a/b/g define PHY Layer standards for wireless transmission • 802.11i defines robust WLAN security protocols (TKIP, CCMP, AES)
Wireless A-B-CA-Pick a PHY LayerB- Pick a TopologyC- Choose Security
Wireless- PHY Basics Four PHY Layers Defined for WLAN Transmission • FHSS ( Frequency Hopping Spread Spectrum) • DSSS & HRDSS ((High-Rate)) Direct Sequence Spread Spectrum) • OFDM (Orthogonal Frequency Division Multiplexing) • PBCC (Packet Binary Convolution Coding)
Wireless- PHY Basics (contd) PHY Layer Divided into Two Sub-Components • PLCP (Physical Layer Convergence Procedure) - Maps MAC Frames onto the Medium • PMD (Physical Medium Dependent) - Transmits the Frames
UHF ISM S-Band S-Band ISM C-Band C-Band satellite downlink C-Band Radar (weather) C-Band ISM C-Band satellite uplink X-Band X-Band Radar (police/weather) Ku-Band Ku-Band Radar (police) PHY Details: ISM Frequencies 902.928 MHz 2-4GHz 2.4-2.5 GHz 4-8 GHz 3.7-4.2 GHz 5.25-5.925 GHz 5.725-5.875 GHz 5.925-6.425 GHz 8-12 GHz 8.5-10.55 GHz 12-18 GHz 13.4-14 GHz
802.11b • Uses 2.4GHz band • Industrial, Scientific, Medical (ISM) band • Shared with microwave ovens and 2.4GHz cordless telephones • 14 channels (11 in U.S.) • 3 non-overlapping channels • Channels 1, 6, and 11 • Maximum speed is 11Mbps • 1, 2, 5.5, and 11 Mbps speeds
802.11g • Uses same 2.4GHz band as 802.11b • Industrial, Scientific, Medical (ISM) band • Shared with microwave ovens and 2.4GHz cordless telephones • 14 channels (11 in U.S.) • 3 non-overlapping channels • Channels 1, 6, and 11 • Maximum speed is 54Mbps (raw) • 1, 2, 5.5, and 11 Mbps speeds (802.11b) • 6, 9, 12, 18, 24 Mbps speeds (required) • 36, 48, and 54 Mbps speeds (optional)
802.11a • Uses 5GHz band • Unlicensed National Information Infrastructure (U-NII) band • 12 channels • NO overlapping channels • Maximum speed is 54Mbps • 6, 12, and 24Mbps (mandatory) • 9, 18, 36, and 54Mbps (optional)
Range vs Rate Typical Indoor Application Benefit comparison: 802.11a • Fewer sources of interference • Easily scalable • Maximum cell overlap 802.11g • Greater range • Backwards compatibility with 802.11b
Trends • 802.11g is by far the leading WLAN technology in enterprise (new install), followed by 802.11b (largest installed base) • Both are 2.4GHz. • 802.11a is still around, but growth is slow. • 802.11n in development for 100Mb/s speeds • 300 Mb/s and 600 Mb/s also in the queue
Wireless A-B-CA-Pick a PHY LayerB- Pick a TopologyC- Choose Security
Wireless- Choose a Topology • Basic Service Set (BSS) - A group of stations communicating with each other • Independent Basic Service Set (IBSS) - BSS communicating in Ad-Hoc Mode • Infrastructure Basic Service Set (Infrastructure BSS) - BSS communicating in Infrastructure (AP) Mode • Extended Service Set (ESS) - BSS’s connected together through a backbone network
Wireless- Choose a Topology • BSSID (Basic Service Set Identifier) - Usually the MAC address of the AP hosting the BSS clients - Used by all BSS Stations in the Frame Header • SSID (Service Set Identifier) - Name given to all AP’s in an ESS - Transmitted in non-encrypted management frames
Wireless- Choose a Topology • Beacons - Announce the existence of a network and it’s parameters - Define the basic service area for a BSS • Probe Requests - Used by stations to scan an area for existing 802.11 networks - Include the SSID and rates supported by the station • Probe Responses - Sent in response to Probe Requests by the AP or assigned Ad-Hoc Station - Contain all information found in the Beacon Frame
Wireless- Choose a Topology • 802.11 Authentication (Two-Step) - The process of a station identifying itself before being allowed to transmit frames • Association (Two-Step) - The process of a station “registering” with a chosen AP AFTER 802.11 authentication. The AP registers the station on the network. Association is the equivalent of “plugging in” to a wired network.
Wireless LAN Topology Basic Service Set(BSS) Ad-hoc Mode (IBSS) Infrastructure Mode (Infrastructure BSS) BSSID
Wireless LAN Topology Extended Service Set (ESS)Shared SSID ------------ Different BSSID’s SSID “Students/Teachers” BSSID #1 SSID “Teachers” BSSID #2 Distribution System
Wireless LAN Topology Bridge Mode (Internal and Outdoor) Distribution System
802.11 State Transitions (The Minimum) State 1 Unauthenticatedand unassociated Can send only Control, Probe, Beacon and Authentication frames Can now send Association frames Can now send all frames, including Data State 2 Authenticatedand unassociated State 3 Authenticatedand associated
Identify Your Coverage Locations • Keep the antenna away from metal obstructions such as heating and air-conditioning ducts, large ceiling trusses, building superstructures, and major power cabling runs. If necessary, use a rigid conduit to lower the antenna away from these obstructions. • The density of the materials used in a building's construction determines the number of walls the signal must pass through and still maintain adequate coverage. Consider the following before choosing the location to install your antenna: • Paper and vinyl walls have very little affect on signal penetration. • Solid and pre-cast concrete walls limit signal penetration to one or two walls without degrading coverage. • Concrete and wood block walls limit signal penetration to three or four walls. • A signal can penetrate five or six walls constructed of drywall or wood. • A thick metal wall causes signals to reflect off, causing poor penetration. • A chain link fence or wire mesh spaced between 1 and 1 1/2 in. (2.5 and 3.8 cm) acts as a harmonic reflector that blocks a 2.4 Ghz radio signal. • Install the antenna away from microwave ovens and 2-GHz cordless phones. These products can cause signal interference because they operate in the same frequency range as the device to which your antenna is connected. • Install the antenna horizontally to maximize signal propagation.
Choose Your Antenna • This choice will be limited to application • Indoor vs outdoor • Point to Point vs multipoint • Omnidirectional • Directional • Yagi • Panel • Sectoral • Parabolic Grid • Remember that the Higher the Gain (dbi), doesn’t increase the range
Wireless A-B-CA-Pick a PHY LayerB- Pick a TopologyC- Choose Security
WLAN Security Q&A Key Questions: • How can I protect against war drivers? • Are there rogue devices in my network? • How does wireless relate to my other security solutions? Challenges: • The rogue user (war drivers) Challenge (Geek, thief, or both?) • The User Policy Challenge • The Authentication + Encryption Challenge Result: • Secured wireless network
“The War Driver” Their goal “to map out the wireless world for all to use!”
The User Policy Challenge Challenge:How do I ensure users aren’t bringing in rogue equipment from home? Fact 1: You have wireless, whether you know it or not... • Home APs cost <$50 and are widely available • Home equipment may not respond to SNMP queries • All home equipment is a security hole out of the box Design Approaches: • Outlaw private wireless LAN equipment • Enforce the policy with periodic walkthroughs
The Authentication + Challenge Challenges: My authentication methods are top-notch so I’m safe, right? My WLAN data is encrypted so I’m safe, right?
WLAN Security = Authentication + Encryption Early Security “Solutions” • Don’t Send Beacons? • Don’t Broadcast my SSID? • Filter MAC addresses? • How about a VPN?