2006 02 01 Wireless Seminar
2006 02 01 Wireless Seminar
Introduction
Adam Worthington Network Consultant Adam.Worthington@euroele.com
802.11b
First widely ado(ted commercially a)ailable *+,.-- wireless technology 'ata rates u( to --mb(s. .(erates in ,./"h0 wa)eband 1 non2o)erla((ing channels "ood Signal %ro(agation
802.11g
3ackward com(atible with *+,.--b 'ata rates u( to 4/5b(s .(erates in ,./"h0 wa)eband 1 non2o)erla((ing channels "ood signal (ro(agation
802.11a
6east ado(ted o the three standards in the 78 'ata rates u( to 4/5b(s .(erates in the cleaner 4"h0 wa)eband * non2o)erla((ing channels Worst signal (ro(agation
#tandalone A$
(isco) *co") $ro+i" "ood< Flexible Feature Set @ighest 5anagement .)erhead Worst (hysical security &eAuires additional management so tware?a((liance or network &F awareness
A''liance,-$N #olution
-ernier,.$) (isco Central security management 9xcellent $% layer security "ood (hysical security 6imited su((ort or 3roadcast?5ulticast?non2 $% No conce(t o &F. Channel< (ower and layer , security must be managed on A%< (ossibly assisted by external management so tware.
802.1+ Authentication
Su((licant Authenticator Authentication Ser)er
AP
/i I0m Adam* here0s my )etwork Access Identity %)AI* includes my username* my random num1er and a list of cryptographic algorithms I support+"
:ot it" I0ll decrypt the pre-master secret with my pri'ate key" I0ll deri'e the keying material" It0s the same as your keying material" )ow we can 1idirectionally encrypt and integrity check the session"
2kay* here0s my random num1er" I0'e looked at your list and we0ll use #!81it 3C4 encryption and 5D6 message integrity checking" I0ll also send you my certificate"
2kay* I0'e checked your certificate and you0re authenticated" )ow I0ll generate and send you the premaster secret encrypted with your pu1lic key" 8ith this we can each deri'e keying material to 1e used to encrypt this 9(S session"
Client
I0'e told you once;;I0m Adam" 2kay* I0m 3ADI7S#" 8e0ll use 5SC/AP'! for authentication* here0s a challenge for you"
2kay* I0ll use my password and a hash function to create a response to your challenge" I0'e also got a challenge for you"
I0m happy with your response to my challenge* here0s a response to your challenge" 3ADI7S ser'er sends the access point a 3ADI7S accept message including any configured authorisation attri1utes %<(A) ID etc"+
Authentication complete
!ncry'tion
*+,.--i =also known as W%A,> using counter2mode?C3C25AC (rotocol =CC5%> Wi2Fi %rotected Access =W%A> using T8$% 'ynamic W9% 'ynamic W9% with 3roadcast?5ulticast 8ey &otation
8ireless Client
Corporate Network
9ug4Light A$
3ogue P&AP 8ith )etwork Stage ! # Access
3ogue AP
(egitimate AP
(egitimate Client
3ADI7S Ser'er
To (atch a 5ogue
'etection 6ocation Action
#a"'le To'ology
+ri,-in+ri,-in-
*ccess (oint
*ccess (oint
()
()
.ire#e'' Switch
Main Unit VLAN FroDo Guest Wireless VLAN VLAN Trunk Carrying All VLANs Wireless Hardware VLAN
(onclusion
Security is key 5any o(tions< choose the one that its best.