Northeastern Illinois University. Authors Salwa Abdelrahim Samia Nur Eldayim Supervisor Prof. Cafatori.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Advertisements

Filtering and Security By Mohammad Shanehsaz June 2004.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
Module 6.6 Networking. Internet Connectivity By default, new computers typically come with the network cards installed, the proper drivers installed,
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
1 Chapter Overview Wireless Technologies Wireless Security.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Wireless Networking.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Sybex CCNA Chapter 12: Wireless Networks.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—-3-1 Wireless LANs Implementing a WLAN.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Wireless LANs Configuring Cisco WLAN Clients. Cisco a/b/g WLAN Client Adapters a/b/g dual-band client adapters Supports all three current.
Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Lecture 11 Wireless security
Presented by: Dr. Munam Ali Shah
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
PRESENTATION ON WI-FI TECHNOLOGY
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
IWD2243 Wireless & Mobile Security Chapter 1 : Wireless Fundamentals Prepared by : Zuraidy Adnan, FITM UNISEL1.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Wireless Networking Chapter 12. Chapter Objectives Identify wireless networking Compare wireless and wired network Explain the different wireless standards.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Cisco Aironet 350 Series: The Right Choice for the Enterprise.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Wireless Access Point Product Overview
Wireless Ethernet Programming
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Access Point Product Overview
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Local Area Network (WLAN)
Presented by: Jeffrey D. Bombell, American Computer Technologies
Chapter 4: Wireless LANs
Wireless Networking Chapter 23.
On and Off Premise Secure Access
Wireless LAN Security 4.3 Wireless LAN Security.
LM 5. Wireless Network Security
Presentation transcript:

Northeastern Illinois University

Authors Salwa Abdelrahim Samia Nur Eldayim Supervisor Prof. Cafatori

Introduction  Who are we ?  What is the project about?  Presentation highlights.

Wireless Networking  What is Wireless Local Area Network (WLAN)?

Differences between WLANs and LANs  Privacy issues.  Connectivity issues.  Mobility.  National regulatory requirements.

Similarities between LAN and WLAN  Same Ethernet standard.  Share common network Protocols.

Why Wireless?  Mobility  Flexibility  Ease and Speed of Deployment  Cost Saving  Scalability

Wireless Local Area Network (WLAN) Standards  IEEE Standard.  What Exactly Does Define?  IEEE WLAN Standards.  Decision on Which WLAN Hardware is Best.  Update on New Standards.

802.11b802.11a802.11g Frequency2.4 GHz5 GHz2.4 GHz Maximum link speed11 Mbps54 Mbps Typical link speed4-5 Mbps20 Mbps Optimal throughput6 Mbps32 Mbps Coverage (inside) ft ft ft StrengthsLess expensive, most widely installed base Faster than b, less interference Faster than and compatible with b, price going down WeaknessesLimited bandwidth, interference Expensive, not compatible with b and g, shorter range Less devices to choose from, more expensive, interference a/b/g

Security options  MAC filtering  Disabled clients  Local authentication  Radius authentication  Access control list

Security strategy  open Authentication  pre- shared key authentication (WEP)  web authentication  public key infrastructure (PKI)  802.1X  WI-FI protected access authentication: WPA WPA2 (802.11i)

WEP vs WPA WEPWPA EncryptionFlawed, cracked by scientist and hackers Fixes all WEP flaws 40-bit keys128-bit keys Static- same key used by every one on the network. Dynamic session keys. Per user, per session, per packet keys. Manual distribution of keys- hand typed into each device. Automatic distribution of keys AuthenticationFlawed, used WEP key itself for authentication Strong user authentication, utilizing 802.1x and EAP.

WPAWPA2 Enterprise mode (Business and Government) Authentication: IEEE 802.1x /EAP Encryption: TKIP /MIC Authentication: IEEE 802.1x /EAP Encryption: AES-CCMP Personal Mode (SOHO/personal) Authentication: PSK Encryption: TKIP /MIC Authentication: PSK Encryption: AES-CCMP WPA vs WPA2

Open Area Vs Closed area.  signal range in a free space incur minimum or no loss e.g. a warehouse.  Caution is needed when there are some obstructions in the area e.g. campus buildings.  Loss of 3 db means half of the transmission has been lost.

Obstruction loss of 3.0 DB or more PartitionLoss (DB) Fixed walls3.00 Metal partitions5.00 Exterior walls10.00 Basement walls20.00

WLAN Setup steps  Define Requirements.  Design.  Perform site survey.  Deployment.  Improve the network based site survey results.  Periodic site survey.

Deployment

Site Survey  Preliminary plan.  System requirements.  Analysis features: - Access point location. - Signal strength. - Strongest Access point. - SNR. - Interference. - Transmission Speed. - Signals at channels. - Access point placement tips. - Access point count.

Received signal strength intensity

Campus Project  Available Technologies in the market e.g. Cisco, Alcatel, Aruba, etc.  Why did we choose Alcatel Technologies.  Components Required: -Existing network infrastructure. DHCP, AAA,DNS,VPN. -Clients (PC, PDA, Handset, etc). -Access points. - WLAN switches.

Access points (AP) mounting considerations  Mount AP standing or hanging either straight up or down and above obstructions.  Consider the antenna gain when mounting for proper radio orientation.  Mount AP in the same location as clients.

Continue AP mounting  Position AP in the center of covered area.  Do not position the AP more than 140 feet apart or higher than 16 feet.  Do not mount the AP within 3 feet of any metal obstruction e.g. metal ducts, electric conduit, water pipes, elevator shafts and metal walls.

AP Approach to contain Vulnerability and unauthorized access  Avoid placing AP against exterior walls or windows to avoid leak.  Reduce the broadcast strength of AP to keep within the area of coverage and avoid parking lot coverage.  Change the default SSID and allow AP’s to broadcast their SSID.  Change default management password on AP’s.

Steps and tools for WPA and WPA2 Deployment 1.Security mechanism and credentials. 2.User authentication database. 3.Client operating system. 4.Supplicants. 5.EAP types. 6.Authentication server. 7.Access points and clients NIC card.

Switch administration  Switch features.  Switch configuration management. Using CLI. Using switch web interface.

Monitor Menu

Wlan Menu  New SSID being created

Conclusion Designing a wireless network is not an easy task. Many wireless attributes should be considered throughout the design process:  Following the steps needed to setup a wireless local area network.  Making the right decision in choosing the appropriate hardware and software which are suitable to the coverage area.

Cont,  As wireless regulations continually change it is important to reference the activities of the regularity committees before designing WLAN, nationally this include the Federal Communications Commission (FCC) and National Telecommunications and Information Administration (NTIA).

Cont,  WPA enhances data protection and access control on existing and future WI-FI wlan.  WPA2 provides improved encryption with AES and a high level of assurance.  WPA2 able to meet government and enterprise security requirements.

Recommendations  Alcatel with POE.  Deploy Wlan in NEIU using WPA and WPA2.  Periodic site survey.  Documentations for deployment and trouble shouting.  Implement the complete site survey recommendations for AP count.

References  Alcatel internetworking,Inc. Omni Access 4000/4100 introduction, installation, administration and maintenance Student guide  Arunesh Mishra, William A.Arbaugh, An initial security Analysis of the IEEE802.1x standard, 6 Feb 2002  Jeffrey Wheat, Designing a wireless network Mattbews.Gast, wireless network  wi fi protected access,WPA2 and IEEE i  Deploying wi fi protected access (WPA) and (WPA2) IN THE Enterprise, March  Enterprise solutions for wireless LAN security, wi-fi Alliance Feb  wi-fi protected access, strong standards-based, interoperable security for today wi-fi networks, wi-fi Alliance April 29,  15 section/secure.asp TID = 2 wi-fi securitywww.wi-fi.org/open section/secure.asp

Questions?