© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.

Slides:



Advertisements
Similar presentations
WLAN SECURITY TEAM NAME : Crypto_5 TEAM MEMBERS: Rajini Ananthoj Srimani Reddy Gatla Ishleen Kour Pallavi Murudkar Deepagandhi Vadivelu.
Advertisements

CSG357 Dan Ziminski & Bill Davidge 1 Effective Wireless Security – Technology and Policy CSG 256 Final Project Presentation by Dan Ziminski & Bill Davidge.
無線區域網路安全 Wireless LAN Security. 2 Outline  Wireless LAN – b  Security Mechanisms in b  Security Problems in b  Solutions for b.
Implementing Wireless LAN Security
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
MITP | Master of Information Technology Program Securing Wireless LAN using Cisco-based technology Campus Crew Study Group Paul Matijevic Ed McCulloch.
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
802.1x EAP Authentication Protocols
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
KIRAN CHAMARTHI NETWORK SECURITY
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
WLAN What is WLAN? Physical vs. Wireless LAN
Windows 2003 and 802.1x Secure Wireless Deployments.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 7 City College.
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
WIRELESS LAN SECURITY Using
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless Networking.
A History of WEP The Ups and Downs of Wireless Security.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Securing your wireless LAN Paul DeBeasi VP Marketing
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Wireless Technology x: Wi-Fi Standards - Cutting Through The Confusion Rob Karnbach Wireless ME May 2003.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless security Wi–Fi (802.11) Security
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Authentication and handoff protocols for wireless mesh networks
Wireless Protocols WEP, WPA & WPA2.
On and Off Premise Secure Access
Wireless LAN Security 4.3 Wireless LAN Security.
IEEE i Dohwan Kim.
Presentation transcript:

© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability

© 2006 Cisco Systems, Inc. All rights reserved. Module 6: Implement Wireless Scalability Lesson 6.2: Introducing Wireless Security

© 2006 Cisco Systems, Inc. All rights reserved. Objectives  Describe the need for WLAN security.  Describe the evolution of WLAN security methods.  Identify common authentication and encryption technologies used in WLANs.  Explain the benefits and weaknesses of the common security methods used in WLANs.

© 2006 Cisco Systems, Inc. All rights reserved. The Need for WLAN Security  Vulnerabilities: War driving Non-secret SSID MAC filtering Automatic DHCP Man-in-the middle attacks Cracking WEP Initialization Vector attacks Password Cracking DoS attacks  WLAN Security requires: Authentication: Proves the user belongs on the network Encryption: Protects the data traversing the network

© 2006 Cisco Systems, Inc. All rights reserved. Evolution of WLAN Security

© 2006 Cisco Systems, Inc. All rights reserved WEP  WEP aims at providing Wired Equivalent Privacy  WEP is an optional IEEE standard for encryption  Keys can be static and shared among many clients  Uses RC4 algorithm—known vulnerabilities  Keys can be dynamic and unique for each client (as with 802.1x) per session RC4 Plain text Cipher text IV + key seed keystream

© 2006 Cisco Systems, Inc. All rights reserved Open Authentication 1.Client sends probe request. 2.Access points (A/B) send probe response. Client evaluates access point response and selects the best access point. 3.Client sends authentication request to selected access point (A). 4.Access point A confirms authentication and registers client. 5.Client sends association request to selected access point (A). 6.Access point A confirms association and registers client. Access Point A Access Point B

© 2006 Cisco Systems, Inc. All rights reserved Shared Key Authentication 4.Access point A sends authentication response containing the unencrypted challenge text. 5.Client encrypts the challenge text using one of its WEP keys and sends it to access point (A). 6.Access point A compares the encrypted challenge text to its copy of the encrypted challenge text. If the text is the same, access point A will allow the client onto the WLAN. Access Point A Access Point B Steps 1-3 are the same as with open authentication.

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Enhanced WEP Security  Cisco prestandard enhancements  Implemented in 2001 and 2002  Authentication: 802.1x and Extensible Authentication Protocol (EAP) protocols User, token, and machine credentials Dynamic encryption key generation  Encryption: CKIP CMIC

© 2006 Cisco Systems, Inc. All rights reserved. Enhanced Security  Authentication: 802.1x and Extensible Authentication Protocol (EAP) protocols User, token, and machine credentials Dynamic encryption key generation IEEE i  Encryption: TKIP and MIC Wi-Fi Protected Access (WPA)—TKIP encryption WPA2—Advanced Encryption Standard (AES)

© 2006 Cisco Systems, Inc. All rights reserved. Encryption—TKIP and MIC  TKIP: Key hashing for unique seed values per packet to protect against WEP initialization vector vulnerabilities MIC from Michael algorithm Broadcast key rotation  MIC: Provides more protection than Integrity Check Value (ICV) by protecting the header and the payload Protects against man-in-the-middle or replay attacks

© 2006 Cisco Systems, Inc. All rights reserved. WPA2 and AES  WPA2 offers the following: Authenticated key management Key validation mechanisms for unicast and broadcast keys TKIP is used, which for WPA includes both per-packet keying and MIC Expanded IV (defeats AirSnort) Broadcast key rotation  AES Encryption: 128-bit block cipher—cryptographically more robust than RC4 Requires new radio cards on clients and access points because more CPU power is required

© 2006 Cisco Systems, Inc. All rights reserved x Authentication Overview  The wireless client must be authenticated before it gains access to the network  Extensible and interoperable supports: Different EAP authentication methods or types May be used with multiple encryption algorithms Depends on client capability  Supported by Cisco since December 2000

© 2006 Cisco Systems, Inc. All rights reserved x Authentication Key Benefits  Mutual authentication between client and authentication (RADIUS) server  Encryption keys derived after authentication  Centralized policy control

© 2006 Cisco Systems, Inc. All rights reserved x and EAP Authentication Protocols  LEAP—EAP Cisco Wireless  EAP-FAST  EAP-TLS  PEAP: PEAP-GTC PEAP-MSCHAPv2

© 2006 Cisco Systems, Inc. All rights reserved. Components Required for 802.1x Authentication  Authentication server is an EAP-capable RADIUS server: Cisco Secure ACS, Microsoft IAS, Meetinghouse Aegis Local authentication service on Cisco IOS access point May use either local RADIUS database or an external database server such as Microsoft Active Directory or RSA SecurID  Authenticator is an 802.1x-capable access point.  Supplicant is an EAP-capable client: Requires 802.1x-capable driver Requires an EAP supplicant—either available with client card, native in operating system, or from third-party software

© 2006 Cisco Systems, Inc. All rights reserved. Cisco LEAP  Client support: Windows 98-XP-Vista, Windows CE, Macintosh OS 9.X or 10.X, and Linux Kernel 2.2 or 2.4 Cisco Compatible Extensions Clients (CCXv1)  RADIUS server: Cisco Secure ACS and Cisco Access Registrar Meetinghouse Aegis Interlink Merit  Microsoft domain or Active Directory (optional) for back- end authentication (must be Microsoft format database)  Device support: Cisco autonomous access points and bridges Cisco lightweight access points and WLAN controllers Cisco Unified Wireless IP Phone 7920 (VoIP) handset

© 2006 Cisco Systems, Inc. All rights reserved. Cisco LEAP Authentication

© 2006 Cisco Systems, Inc. All rights reserved. EAP-FAST: Flexible Authentication via Secure Tunneling  Considered in three phases: Protected access credential is generated in Phase 0 (Dynamic PAC provisioning): Unique shared credential used to mutually authenticate client and server Associated with a specific user ID and an authority ID Removes the need for PKI A secure tunnel is established in Phase 1. Client is authenticated via the secure tunnel in Phase 2.

© 2006 Cisco Systems, Inc. All rights reserved. EAP-FAST Authentication

© 2006 Cisco Systems, Inc. All rights reserved. EAP-TLS  Client support: Windows 2000, XP, and Windows CE (natively supported) Non-Windows platforms: Third-party supplicants (Meetinghouse) User certificate required for each client  Infrastructure requirements: EAP-TLS-supported RADIUS server Cisco Secure ACS, Cisco Access Registrar, Microsoft IAS, Aegis, Interlink RADIUS server requires a server certificate Certificate authority server (PKI)  Certificate management: Both client and RADIUS server certificates to be managed

© 2006 Cisco Systems, Inc. All rights reserved. EAP-TLS Authentication

© 2006 Cisco Systems, Inc. All rights reserved. EAP-PEAP  Hybrid authentication method: Server-side authentication with TLS Client-side authentication with EAP authentication types EAP-GTC EAP-MSCHAPv2  Clients do not require certificates.  RADIUS server requires a server certificate: RADIUS server has self-issuing certificate capability. Purchase a server certificate per server from PKI entity. Set up a simple PKI server to issue server certificates.  Allows for one-way authentication types to be used: One-time passwords Proxy to LDAP, Unix, Microsoft Windows NT and Active Directory, Kerberos

© 2006 Cisco Systems, Inc. All rights reserved. EAP-PEAP Authentication

© 2006 Cisco Systems, Inc. All rights reserved. Wi-Fi Protected Access  WPA introduced in late 2003  Prestandard implementation of IEEE i WLAN security  Addresses currently known security problems with WEP  Allows software upgrade on deployed equipment to improve security  Components of WPA: Authenticated key management using 802.1x: EAP authentication and preshared key authentication Unicast and broadcast key management Standardized TKIP per-packet keying and MIC protocol Initialization vector space expansion: 48-bit initialization vectors Migration mode—coexistence of WPA and non-WPA devices (optional implementation that is not required for WPA certification)

© 2006 Cisco Systems, Inc. All rights reserved i and WPA Authentication and Key Management Overview

© 2006 Cisco Systems, Inc. All rights reserved. WPA Issues  WPA uses TKIP, which uses the same base encryption algorithm, RC4, as WEP.  WPA cannot entirely avoid the design flaws of WEP.  WPA is a compromise solution.  Software upgrade is required for clients and access points, which gives no guarantee that all vendors will support the solution.  Operating system support or a supplicant client is required.  WPA is susceptible to a new type of DoS attack.  WPA is susceptible to a recently discovered weakness when preshared keys are used.

© 2006 Cisco Systems, Inc. All rights reserved. IEEE i—WPA2  i: Ratified in June 2004 Standardizes: 802.1x for authentication AES encryption—Facilitates U.S. government FIPS compliance Key management  WPA2: Supplement to WPA “version 1”—Wi-Fi Alliance interoperable implementation of i Provides for AES encryption to be used Proactive Key Caching Third-party testing and certification for WLAN device compatibility

© 2006 Cisco Systems, Inc. All rights reserved. Wireless Intrusion Detection Systems  Address RF-related vulnerabilities: Detect, locate, and mitigate rogue devices Detect and manage RF interference Detect reconnaissance if possible  Address standards-based vulnerabilities: Detect management frame and hijacking-style attacks Enforce security configuration policies  Complementary functionality: Forensic analysis Compliance reporting

© 2006 Cisco Systems, Inc. All rights reserved. WPA and WPA2 Modes WPAWPA2 Enterprise mode (business, education, government) Authentication: IEEE 802.1x/EAP Encryption: TKIP/MIC Authentication: IEEE 802.1x/EAP Encryption: AES-CCMP Personal mode (SOHO, home, personal) Authentication: PSK Encryption: TKIP/MIC Authentication: PSK Encryption: AES-CCMP

© 2006 Cisco Systems, Inc. All rights reserved. WPA2 Issues  Client (supplicant) must have a WPA2 driver that supports EAP.  RADIUS server must understand EAP.  PEAP carries EAP types within a channel secured by TLS and so requires a server certificate.  WPA2 is more computationally intensive with optional AES encryption.  WPA2 may require new WLAN hardware to support AES encryption.

© 2006 Cisco Systems, Inc. All rights reserved. Self Check 1.What does WEP stand for? 2.Which is considered more secure, shared key authentication or open authentication? 3.What is MIC? 4.What RF-related vulnerabilities does an Intrusion Detection System (IDS) system address?

© 2006 Cisco Systems, Inc. All rights reserved. Summary  With increased reliance on WLANs, businesses are becoming more concerned about network security. Network managers need to provide end users with freedom and mobility without offering intruders access to the WLAN or the information sent and received on the wireless network.  Authentication and encryption are the two primary facilities for securing the WLAN. While encryption using static WEP keys is very vulnerable, WLANs can now be configured to support EAP and the 802.1x standards including LEAP, EAP-FAST, EAP-TLS, PEAP, WPA, and WPA2.

© 2006 Cisco Systems, Inc. All rights reserved. Q and A

© 2006 Cisco Systems, Inc. All rights reserved. Resources  Addressing Wireless Threats with Integrated Wireless IDS and IPS ucts_white_paper0900aecd804f155b.shtml  Five Steps to Securing Your Wireless LAN and Preventing Wireless Threats etworking_solutions_white_paper0900aecd8042e23b.shtml  Wireless LAN Security White Paper etworking_solutions_white_paper09186a00800b469f.shtml  Security of the WEP algorithm

© 2006 Cisco Systems, Inc. All rights reserved.