Securing Your Wireless LAN

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Securing Your Wireless LAN"

Transcription

1 Securing Your Wireless LAN Pejman Roshan Product Manager Cisco Aironet Wireless Networking Session Number 1

2 Agenda Requirements for secure wireless LANs Overview of 802.1X and TKIP Determining which EAP type best suits your needs What lies ahead 2

3 Requirements for Secure Wireless LANs Encryption and Data Privacy Encryption Algorithm Message Integrity Authentication and Access Control Authentication Framework Authentication Algorithm 3

4 Requirements for Secure Wireless LANs Encryption Algorithm Mechanism to provide data privacy Message Integrity Ensures data frames are tamper free and truly from the source address Authentication Framework Framework to facilitate authentication messages between clients, access point, and AAA server Authentication Algorithm Mechanism to validate client credentials 4

5 Requirements for Secure Wireless LANs Encryption and Data Privacy Encryption Algorithm Message Integrity Authentication and Access Control TKIP-PPK or AES-CCM Authentication Framework 802.1X/EAP TKIP-MIC or AES-CBC-MAC Authentication Algorithm LEAP, PEAP, or EAP-TLS 5

6 Agenda Requirements for secure wireless LANs Overview of 802.1X and TKIP Determining which EAP type best suits your needs What Lies Ahead 6

7 Overview of 802.1X Link layer (layer 2) support for Extensible Authentication Protocol (EAP) Securely facilitates authentication message exchanges between: Wireless Client Access Point AAA Server Allows the use of numerous authentication algorithms WLAN implementations of 802.1X must support mutual authentication 7

8 Overview of 802.1X Client Start Request Identity Access Point RADIUS Server AP Blocks all Requests until Authentication Completes Identity Identity RADIUS Server Authenticates Client Client Authenticates RADIUS Server Success Success 8

9 Overview of the Cisco Temporal Key Integrity Protocol (TKIP) WEP is broken AirSnort attack, among others render WEP ineffective TKIP is designed to patch WEP not the long term WLAN encryption solution Allows existing devices to be upgraded 9

10 Cisco Wireless Security Suite Cisco Aironet offers a complete end-to-end WLAN security solution 802.1X Support LEAP, PEAP, and EAP-TLS Temporal Key Integrity Protocol (TKIP) Per Packet Keying (PPK) for encryption Message Integrity Check (MIC) Broadcast Key Rotation Centralized Management 10

11 Per Packet Keying Overview IV Base WEP Key Plaintext Hash XOR Ciphertext IV Packet Key WEP Key Stream Initialization Vector (IV) A counter that increments with each frame IV is hashed with base WEP key Result is a new Packet WEP key The Packet WEP key changes per IV 11

12 MIC Overview MIC is calculated from Random Seed Value MAC Header Seed DA SA LLC SNAP SEQ Payload Sequence Number Data Payload Components are hashed to derive a 32 bit MIC SEQ number must be in order, or frame is dropped MMH Hash 4 Byte MIC 12

13 Message Integrity Check (MIC) Standard WEP Frame Header IV LLC SNAP Payload ICV WEP Encrypted MIC Enhanced WEP Frame Header IV LLC SNAP MIC SEQ Payload ICV WEP Encrypted 13

14 Broadcast Key Rotation Overview Broadcast key is required in 802.1X environments Re-keying of broadcast key is necessary, just as with unicast key Key is delivered to client encrypted with client s dynamic key 14

15 Agenda Requirements for secure wireless LANs Overview of 802.1X and TKIP Determining which EAP type best suits your needs What Lies Ahead 15

16 EAP Type Criteria Must support mutual authentication Network authenticates client Client authenticates network Must support user based, dynamic key generation 16

17 What EAP types are available? LEAP EAP-TLS EAP-PEAP Server Authentication Password Certs/PKI Certs/PKI Client Authentication Password Certs/PKI Password 1 Single Sign On Yes Yes No 2 Vulnerable to Password Attack No 3 No No OTP/LDAP Support No N/A Yes Additional Infrastructure No Yes/CA Yes/CA 1 Not limited to password schemes, but that is what is currently available 2 MS native supplicant supports SSO w/eap-ms-chapv2 3 Requires strong passwords 17

18 Deployment Considerations Types of Clients Laptops/PDAs have more CPU available to support PKI (for PEAP/EAP-TLS) End-user Operating System Existing User Authentication Database and Authentication Server Management Overhead Management of digital certificates is required with PEAP/EAP-TLS Security Policy Reliance on password based schemes may violate security policy Centralized Deployment Large scale deployment across many central sites may add to authentication latency 18

19 Agenda Requirements for secure wireless LANs Overview of 802.1X and TKIP Determining which EAP type best suits your needs What lies ahead 19

20 What Lies Ahead Enhanced encryption schemes WEP is ineffective and TKIP is designed as a temporary solution Ubiquitous authentication for multi-client environments OS/Client support should be non-issue 20

21 Advanced Encryption Standard (AES) Mandatory for i compliance Rijndael Algorithm Block Cipher 128,192, and 256 bit key support 3DES successor Sponsored by National Institute of Standards and Technology (NIST) 21

22 Cisco Wireless LAN Security Links Cisco Wireless LAN Security website Cisco Aironet Wireless LAN Security Overview Wireless LAN Security White Paper Configuring the Cisco Wireless Security Suite SAFE: Wireless LAN Security in Depth EAP-TLS Deployment Guide for Wireless LAN Networks Authentication with 802.1X and EAP Across Congested WAN Links Cisco Mobile Office: At Work (Click on - Technology Overview) 22

23 23

FAQ on Cisco Aironet Wireless Security

FAQ on Cisco Aironet Wireless Security FAQ on Cisco Aironet Wireless Security Document ID: 68583 Contents Introduction General FAQ Troubleshooting and Design FAQ Related Information Introduction This document provides information on the most

More information

Configuring Cipher Suites and WEP

Configuring Cipher Suites and WEP 10 CHAPTER This chapter describes how to configure the cipher suites required to use WPA authenticated key management, Wired Equivalent Privacy (WEP), Temporal Key Integrity Protocol (TKIP), and broadcast

More information

Wireless LAN Security. Gabriel Clothier

Wireless LAN Security. Gabriel Clothier Wireless LAN Security Gabriel Clothier Timeline 1997: 802.11 standard released 1999: 802.11b released, WEP proposed [1] 2003: WiFi alliance certifies for WPA 2004: 802.11i released 2005: 802.11w task group

More information

Security Setup CHAPTER

Security Setup CHAPTER CHAPTER 8 This chapter describes how to set up your bridge s security features. This chapter contains the following sections: Security Overview, page 8-2 Setting Up WEP, page 8-7 Enabling Additional WEP

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE

More information

Securing a Wireless LAN

Securing a Wireless LAN Securing a Wireless LAN This module describes how to apply strong wireless security mechanisms on a Cisco 800, 1800, 2800, or 3800 series integrated services router, hereafter referred to as an access

More information

ECHONET Lite SPECIFICATION. ECHONET Lite System Design Guidelines 2011 (2012) ECHONET CONSORTIUM ALL RIGHTS RESERVED

ECHONET Lite SPECIFICATION. ECHONET Lite System Design Guidelines 2011 (2012) ECHONET CONSORTIUM ALL RIGHTS RESERVED Part V ECHONET Lite System Design Guidelines i 2011 (2012) ALL RIGHTS RESERVED The specifications published by the ECHONET Consortium are established without regard to industrial property rights (e.g.,

More information

Network Access Flows APPENDIXB

Network Access Flows APPENDIXB APPENDIXB This appendix describes the authentication flows in Cisco Identity Services Engine (ISE) by using RADIUS-based Extensible Authentication Protocol (EAP) and non-eap protocols. Authentication verifies

More information

Configuring WEP and WEP Features

Configuring WEP and WEP Features CHAPTER 9 This chapter describes how to configure Wired Equivalent Privacy (WEP), Message Integrity Check (MIC), and Temporal Key Integrity Protocol (TKIP). This chapter contains these sections: Understanding

More information

Open System - No/Null authentication, anyone is able to join. Performed as a two way handshake.

Open System - No/Null authentication, anyone is able to join. Performed as a two way handshake. Five components of WLAN Security 1. Data Privacy 1. Privacy is important because transmission occurs over the air in freely licensed bands. The Data can be sniffed by anyone within range. 2. Eavesdropping

More information

Appendix E Wireless Networking Basics

Appendix E Wireless Networking Basics Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical

More information

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

Procedure: You can find the problem sheet on the Desktop of the lab PCs. University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Advance Networks Laboratory 907529 Lab.3 WLAN Security Objectives 1. Configure administrator accounts.

More information

Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients

Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients Document ID: 64067 Contents Introduction Prerequisites Requirements Components Used Conventions Microsoft Certificate Service Installation

More information

Configuring 802.1X Settings on the WAP351

Configuring 802.1X Settings on the WAP351 Article ID: 5078 Configuring 802.1X Settings on the WAP351 Objective IEEE 802.1X authentication allows the WAP device to gain access to a secured wired network. You can configure the WAP device as an 802.1X

More information

Security and Authentication for Wireless Networks

Security and Authentication for Wireless Networks University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 5-21-2004 Security and Authentication for 802.11 Wireless Networks Michel Getraide

More information

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

Configuring EAP for Wireless Network Connectivity By Victor Zapata

Configuring EAP for Wireless Network Connectivity By Victor Zapata Configuring EAP for Wireless Network Connectivity By Victor Zapata Requirements: 1. Windows 2000 Domain Controller Service Pack 2 with hotfixes Q306260 and Q304347 OR Service Pack 3 2. Enterprise Certificate

More information

Configuring Funk RADIUS to Authenticate Cisco Wireless Clients With LEAP

Configuring Funk RADIUS to Authenticate Cisco Wireless Clients With LEAP Configuring Funk RADIUS to Authenticate Cisco Wireless Clients With LEAP Document ID: 44900 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration Configuring the Access

More information

accounting (SSID configuration mode) through encryption mode wep accounting (SSID configuration mode) through

accounting (SSID configuration mode) through encryption mode wep accounting (SSID configuration mode) through accounting (SSID configuration mode) through encryption mode wep accounting (SSID configuration mode) through encryption mode wep 1 accounting (SSID configuration) accounting (SSID configuration mode)

More information

EAP Authentication with RADIUS Server

EAP Authentication with RADIUS Server EAP Authentication with RADIUS Server Document ID: 44844 Refer to the Cisco Wireless Downloads in order to get Cisco Aironet drivers, firmware and utility software. Contents Introduction Prerequisites

More information

802.1X: Deployment Experiences and Obstacles to Widespread Adoption

802.1X: Deployment Experiences and Obstacles to Widespread Adoption 802.1X: Deployment Experiences and Obstacles to Widespread Adoption Terry Simons University of Utah; open1x.org Terry.Simons@utah.edu Jon Snyder Portland State University jon@pdx.edu 802.1X Adoption Ratified

More information

Cross-organisational roaming on wireless LANs based on the 802.1X framework Author:

Cross-organisational roaming on wireless LANs based on the 802.1X framework Author: Cross-organisational roaming on wireless LANs based on the 802.1X framework Author: Klaas Wierenga SURFnet bv P.O. Box 19035 3501 DA Utrecht The Netherlands e-mail: Klaas.Wierenga@SURFnet.nl Keywords:

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server Document ID: 112175 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Windows

More information

IP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask

IP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask Network Requirements, page 1 Wireless LAN, page 2 Wi-Fi Network Components, page 3 802.11 Standards for WLAN Communications, page 6 Security for Communications in WLANs, page 9 WLANs and Roaming, page

More information

WLAN Roaming and Fast-Secure Roaming on CUWN

WLAN Roaming and Fast-Secure Roaming on CUWN 802.11 WLAN Roaming and Fast-Secure Roaming on CUWN Contents Introduction Prerequisites Requirements Components Used Background Information Roaming with Higher-Level Security WPA/WPA2-PSK WPA/WPA2-EAP

More information

A Comparison of Data-Link and Network Layer Security for IEEE Networks

A Comparison of Data-Link and Network Layer Security for IEEE Networks A Comparison of Data-Link and Network Layer Security for IEEE 802. Networks Group #8 Harold L. McCarter, Ryan Calme, Hongwu Zang, Wayne Jones INFS 62 Professor Yih-Feng Hwang July 7, 2006 Abstract This

More information

Using the Cisco Unified Wireless IP Phone 7921G Web Pages

Using the Cisco Unified Wireless IP Phone 7921G Web Pages 4 CHAPTER Using the Cisco Unified Wireless IP Phone 7921G Web Pages This chapter describes how to set up your PC to configure a Cisco Unified Wireless IP Phone 7921G by using a USB connector and how to

More information

802.1x Port Based Authentication

802.1x Port Based Authentication 802.1x Port Based Authentication Johan Loos Johan at accessdenied.be Who? Independent Information Security Consultant and Trainer Vulnerability Management and Assessment Wireless Security Next-Generation

More information

Using the Cisco Unified Wireless IP Phone 7921G Web Pages

Using the Cisco Unified Wireless IP Phone 7921G Web Pages CHAPTER 4 Using the Cisco Unified Wireless IP Phone 7921G Web Pages You can use the Cisco Unified Wireless IP Phone 7921G web pages to set up and configure settings for the phone. This chapter describes

More information

Protected EAP (PEAP) Application Note

Protected EAP (PEAP) Application Note Revision 4.0 June 2004 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Text Part

More information

Cisco Systems, Inc. Aironet Access Point

Cisco Systems, Inc. Aironet Access Point RSA SecurID Ready Implementation Guide Partner Information Last Modified: November 18, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description Cisco Systems,

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 300-208 Exam Questions & Answers Number: 300-208 Passing Score: 800 Time Limit: 120 min File Version: 38.4 http://www.gratisexam.com/ Exam Code: 300-208 Exam Name: Implementing Cisco Secure Access

More information

Cisco 440X Series Wireless LAN Controllers Deployment Guide

Cisco 440X Series Wireless LAN Controllers Deployment Guide Cisco 440X Series Wireless LAN Controllers Deployment Guide Cisco customers are rapidly adopting the Cisco Unified Wireless Network architecture for next generation wireless LAN performance and advanced

More information

Configuring FlexConnect Groups

Configuring FlexConnect Groups Information About FlexConnect Groups, page 1, page 3 Configuring VLAN-ACL Mapping on FlexConnect Groups, page 8 Information About FlexConnect Groups To organize and manage your FlexConnect access points,

More information

CHAPTER SECURITY IN WIRELESS LOCAL AREA NETWORKS

CHAPTER SECURITY IN WIRELESS LOCAL AREA NETWORKS CHAPTER SECURITY IN WIRELESS LOCAL AREA NETWORKS Mohammad O. Pervaiz, Mihaela Cardei, and Jie Wu Department of Computer Science &Engineering, Florida Atlantic University 777 Glades Road, Boca Raton, Florida

More information

New Windows build with WLAN access

New Windows build with WLAN access New Windows build with WLAN access SecRep 24 17-18 May 2016 Ahmed Benallegue/Hassan El Ghouizy/Priyan Ariyansinghe ECMWF network_services@ecmwf.int ECMWF May 19, 2016 Introduction Drivers for the new WLAN

More information

Configuring OfficeExtend Access Points

Configuring OfficeExtend Access Points Information About OfficeExtend Access Points, page 1 OEAP 600 Series Access Points, page 2 OEAP in Local Mode, page 3 Supported WLAN Settings for 600 Series OfficeExtend Access Point, page 3 WLAN Security

More information

Temporal Key Integrity Protocol: TKIP. Tim Fielder University of Tulsa Tulsa, Oklahoma

Temporal Key Integrity Protocol: TKIP. Tim Fielder University of Tulsa Tulsa, Oklahoma Temporal Key Integrity Protocol: TKIP Tim Fielder University of Tulsa Tulsa, Oklahoma History IEEE released the first 802.11 specification back in 1997 The Wired Equivalent Privacy (WEP) authentication/encryption

More information

Advanced Security and Mobile Networks

Advanced Security and Mobile Networks Advanced Security and Mobile Networks W.Buchanan (1) 9. GSM/3G Unit 7: Mobile Networks. Wireless. Security. Mobile IP. Mobile Agents. Spread spectrum. Military/Emergency Networks 8. Ad-hoc 7. Mobile Networks

More information

Securing Wireless LANs with Certificate Services

Securing Wireless LANs with Certificate Services 1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the

More information

LAB: Configuring LEAP. Learning Objectives

LAB: Configuring LEAP. Learning Objectives LAB: Configuring LEAP Learning Objectives Configure Cisco ACS Radius server Configure a WLAN to use the 802.1X security protocol and LEAP Authenticate with an access point using 802.1X security and LEAP

More information

Plaintext Recovery Attacks Against WPA/TKIP

Plaintext Recovery Attacks Against WPA/TKIP Plaintext Recovery Attacks Against WPA/TKIP Kenny Paterson, Bertram Poettering, Jacob Schuldt Royal Holloway, University of London! The 21st International Workshop on Fast Software Encryption March 4th,

More information

Configuring Management Frame Protection

Configuring Management Frame Protection Information About Management Frame Protection, page 1 Restrictions for Management Frame Protection, page 3 (GUI), page 3 Viewing the Management Frame Protection Settings (GUI), page 3 (CLI), page 4 Viewing

More information

Chapter 17. Wireless Network Security

Chapter 17. Wireless Network Security Chapter 17 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s, to develop a protocol & transmission specifications for wireless LANs (WLANs) Demand

More information

Designing Polycom SpectraLink VoWLAN Solutions to Comply with Payment Card Industry (PCI) Data Security Standard (DSS)

Designing Polycom SpectraLink VoWLAN Solutions to Comply with Payment Card Industry (PCI) Data Security Standard (DSS) Designing Polycom SpectraLink VoWLAN Solutions to Comply with Payment Card Industry (PCI) Data Security Standard (DSS) January 2009 1 January 2009 Polycom White Paper: Complying with PCI-DSS Page 2 1.

More information

Wireless Domain Services FAQ

Wireless Domain Services FAQ Wireless Domain Services FAQ Document ID: 65346 Contents Introduction What is WDS? How do I configure my AP as a WDS? On what platforms does Cisco Structured Wireless Aware Network (SWAN) WDS run? How

More information

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy CCS 2017, 1 October 2017

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy CCS 2017, 1 October 2017 Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 Mathy Vanhoef @vanhoefm CCS 2017, 1 October 2017 Overview Key reinstalls in 4-way handshake Misconceptions Practical impact Lessons learned 2 Overview

More information

Wi-Fi Protected Access (WPA) Implementation at the Children s Health System

Wi-Fi Protected Access (WPA) Implementation at the Children s Health System Wi-Fi Protected Access (WPA) Implementation at the Children s Health System Kalyana Sannedhi kalyan@uab.edu HI 699 Masters in Health Informatics University of Alabama at Birmingham 1 Table of Contents

More information

Wireless-N Business Notebook Adapter

Wireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter USER GUIDE BUSINESS SERIES Model No. WPC4400N Model Model No. No. Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered

More information

Cisco Aironet 1240G Access Point

Cisco Aironet 1240G Access Point . Data Sheet Cisco Aironet 1240G Series Access Point Cisco Aironet 1240G Series Access Points provide single-band 802.11g wireless connectivity for challenging RF environments such as factories, warehouses,

More information

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services CHAPTER 11 Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services This chapter describes how to configure your access point/bridges for wireless domain services

More information

LEAP Authentication on a Local RADIUS Server

LEAP Authentication on a Local RADIUS Server LEAP Authentication on a Local RADIUS Server Document ID: 44100 Contents Introduction Prerequisites Requirements Components Conventions Overview of Local RADIUS Server Feature Configure CLI Configuration

More information

Cisco 4400 Series Wireless LAN Controllers PEAP Under Unified Wireless Networks with Microsoft Internet Authentication Service (IAS)

Cisco 4400 Series Wireless LAN Controllers PEAP Under Unified Wireless Networks with Microsoft Internet Authentication Service (IAS) Cisco 4400 Series Wireless LAN Controllers PEAP Under Unified Wireless Networks with Microsoft Internet Authentication Service (IAS) HOME SUPPORT PRODUCT SUPPORT WIRELESS CISCO 4400 SERIES WIRELESS LAN

More information

Designing AirPort Networks

Designing AirPort Networks Designing AirPort Networks 1 Contents Chapter 1 5 Getting Started 6 How AirPort Works 6 How Wireless Internet Access Is Provided 7 Configuring the AirPort Extreme Base Station and AirPort Express for

More information

Port-based authentication with IEEE Standard 802.1x. William J. Meador

Port-based authentication with IEEE Standard 802.1x. William J. Meador Port-based authentication 1 Running head: PORT-BASED AUTHENTICATION Port-based authentication with IEEE Standard 802.1x William J. Meador Port-based authentication 2 Port based authentication Preface You

More information

Cisco IP Phone Security

Cisco IP Phone Security Overview, page 1 Security Enhancements for Your Phone Network, page 2 View the Current Security Features on the Phone, page 2 View Security Profiles, page 3 Supported Security Features, page 3 Overview

More information

Configuring Settings on the Cisco Unified Wireless IP Phone

Configuring Settings on the Cisco Unified Wireless IP Phone CHAPTER 5 Configuring Settings on the Cisco Unified Wireless IP Phone The Settings menu on the Cisco Unified Wireless IP Phone 7921G provides access to view and change network profile settings and several

More information

150Mbps N Wireless USB Adapter

150Mbps N Wireless USB Adapter LevelOne User Manual WUA-0614 / WUA-0624 150Mbps N Wireless USB Adapter 1.1 Safety FCC WARNING This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant

More information

ECE 646 Lecture 7. Modes of Operation of Block Ciphers. Modes of Operation. Required Reading:

ECE 646 Lecture 7. Modes of Operation of Block Ciphers. Modes of Operation. Required Reading: C 646 Lecture 7 Modes of Operation of Block Ciphers Required Reading: I. W. Stallings, "Cryptography and Network-Security," 5th dition, Chapter 6 Block Cipher Operation II. A. Menezes, P. van Oorschot,

More information

Block Cipher Modes of Operation

Block Cipher Modes of Operation Block Cipher Modes of Operation Luke Anderson luke@lukeanderson.com.au 24th March 2016 University Of Sydney Overview 1. Crypto-Bulletin 2. Modes Of Operation 2.1 Evaluating Modes 2.2 Electronic Code Book

More information

Cisco Aironet 1100 Series Access Point

Cisco Aironet 1100 Series Access Point Cisco Aironet 1100 Series Access Point The Cisco Aironet 1100 Series Access Point provides a high-speed, secure, affordable, and easy-to-use wireless LAN solution that combines the freedom and flexibility

More information

PEAP under Cisco Unified Wireless Networks with ACS 4.0 and Windows 2003

PEAP under Cisco Unified Wireless Networks with ACS 4.0 and Windows 2003 PEAP under Cisco Unified Wireless Networks with ACS 4.0 and Windows 2003 Document ID: 72013 Contents Introduction Prerequisites Requirements Components Used Network Diagram Conventions Windows Enterprise

More information

ISE Primer.

ISE Primer. ISE Primer www.ine.com Course Overview Designed to give CCIE Security candidates an intro to ISE and some of it s features. Not intended to be a complete ISE course. Some topics are not discussed. Provides

More information

SE-WL-PCI-03-11G PCI CARD DRIVERS INSTALLATION. Table of Contents

SE-WL-PCI-03-11G PCI CARD DRIVERS INSTALLATION. Table of Contents SE-WL-PCI-03-11G PCI CARD DRIVERS INSTALLATION Table of Contents 1. Introduction...2 1.1 System Requirement...2 1.2 Objects Counting...2 2. Installation...2 2.1 Install Wireless PCI Adapter...3 2.2 Install

More information

GHz g. Wireless A+G. User Guide. Notebook Adapter. Dual-Band. Dual-Band WPC55AG a. A Division of Cisco Systems, Inc.

GHz g. Wireless A+G. User Guide. Notebook Adapter. Dual-Band. Dual-Band WPC55AG a. A Division of Cisco Systems, Inc. A Division of Cisco Systems, Inc. Dual-Band 5 GHz 802.11a + GHz 2.4 802.11g WIRELESS Dual-Band Wireless A+G Notebook Adapter User Guide Model No. WPC55AG Copyright and Trademarks Specifications are subject

More information

Product Brief: SDC-PE15N n PCIe Module with Antenna Connectors

Product Brief: SDC-PE15N n PCIe Module with Antenna Connectors Product Brief: SDC-PE15N 802.11n PCIe Module with Antenna Connectors The SDC-PE15N PCI Express Mini Card (PCIe) radio module from Summit Data Communications combines a high-performance, dual-band 802.11n

More information

Wireless LAN Security: Hacking Techniques and Protection BRKEWN-2020

Wireless LAN Security: Hacking Techniques and Protection BRKEWN-2020 Wireless LAN Security: Hacking Techniques and Protection BRKEWN-2020 WLAN Hacking Techniques Topics to discuss What this session is about Attack Taxonomy Well Known broken technologies Incorrectly used

More information

WDT3250 RF Setup Guide

WDT3250 RF Setup Guide WDT3250 RF Setup Guide 2008 Wasp Technologies Table of Contents Overview...1 Using the Summit Client Utility Software...2 Main Window...2 Profile Window...3 Status Window...5 Diags Window...6 Global Window...6

More information

Wireless Networking Basics. Ed Crowley

Wireless Networking Basics. Ed Crowley Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2

More information

Wireless KRACK attack client side workaround and detection

Wireless KRACK attack client side workaround and detection Wireless KRACK attack client side workaround and detection Contents Introduction Components used Requirements EAPoL Attack protections Why this works Possible impact How to identify if a client is deleted

More information

Configuring a WLAN for Static WEP

Configuring a WLAN for Static WEP Restrictions for Configuring Static WEP, page 1 Information About WLAN for Static WEP, page 1 Configuring WPA1+WPA2, page 3 Restrictions for Configuring Static WEP The OEAP 600 series does not support

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

The Final Nail in WEP s Coffin

The Final Nail in WEP s Coffin 1/19 The Final Nail in WEP s Coffin Andrea Bittau 1 Mark Handley 1 Joshua Lackey 2 May 24, 2006 1 University College London. 2 Microsoft. Wired Equivalent Privacy 2/19 WEP is the 802.11 standard for encryption.

More information

Product Brief: SDC-MCF10G g Miniature CF Module with Antenna Connectors

Product Brief: SDC-MCF10G g Miniature CF Module with Antenna Connectors Product Brief: SDC-MCF10G 802.11g Miniature CF Module with Antenna Connectors The SDC-MCF10G miniature compact flash radio module from Summit Data Communications is a high-performance 802.11g radio in

More information

Architecting Network for Branch Offices with Cisco Unified Wireless Karan Sheth Sr. Technical Marketing Engineer

Architecting Network for Branch Offices with Cisco Unified Wireless Karan Sheth Sr. Technical Marketing Engineer Architecting Network for Branch Offices with Cisco Unified Wireless Karan Sheth Sr. Technical Marketing Engineer BRKEWN-2016 Abstract This session focuses on the architecture concepts of the branch office

More information

User s Manual. Date of Issue: April. 21th,

User s Manual. Date of Issue: April. 21th, User s Manual Date of Issue: April. 21th, 2005-1 - Table of Contents Chapter 1 About IEEE802.11g Wireless Network PCI Adapter...3 1-1 Features and Benefits...3 1-2 Applications...4 1-3 Product Kit...5

More information

C H A P T E R Overview Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide OL

C H A P T E R Overview Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide OL CHAPTER 1 Cisco Aironet 1400 Series s (hereafter called bridges) provide building-to-building wireless connectivity. Operating in the 5.8-GHz, UNII-3 band and conforming to the 802.11a standard, the 1400

More information

RADIUS Configuration Note WINS : Wireless Interoperability & Network Solutions

RADIUS Configuration Note WINS : Wireless Interoperability & Network Solutions RADIUS Configuration Note WINS : Wireless Interoperability & Network Solutions MERUNETWORKS.COM February 2013 1. OVERVIEW... 3 2. AUTHENTICATION AND ACCOUNTING... 4 3. 802.1X, CAPTIVE PORTAL AND MAC-FILTERING...

More information

A Secure Wireless LAN Access Technique for Home Network

A Secure Wireless LAN Access Technique for Home Network A Secure Wireless LAN Access Technique for Home Network *Ju-A Lee, *Jae-Hyun Kim, **Jun-Hee Park, and **Kyung-Duk Moon *School of Electrical and Computer Engineering Ajou University, Suwon, Korea {gaia,

More information

Integration Guide. CK30/CK31 and Cisco Aironet 1231/1242

Integration Guide. CK30/CK31 and Cisco Aironet 1231/1242 Integration Guide CK30/CK31 and Cisco Aironet 1231/1242 Intermec Technologies Corporation Worldwide Headquarters 6001 36th Ave.W. Everett, WA 98203 U.S.A. www.intermec.com The information contained herein

More information

IEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT

IEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT IEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT Hüseyin ÇOTUK Information Technologies hcotuk@etu.edu.tr Ahmet ÖMERCİOĞLU Information Technologies omercioglu@etu.edu.tr Nurettin ERGİNÖZ Master Student

More information

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter. User Guide WIRELESS WUSB54G. Model No.

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter. User Guide WIRELESS WUSB54G. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter User Guide Model No. WUSB54G Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

AirPort Networks for Windows. For Windows XP and Windows 2000

AirPort Networks for Windows. For Windows XP and Windows 2000 AirPort Networks for Windows For Windows XP and Windows 2000 1 Contents Chapter 1 5 Getting Started 6 How AirPort Works 6 How Wireless Internet Access Is Provided 7 Configuring AirPort Extreme Base Station

More information

Configuring L2TP over IPsec

Configuring L2TP over IPsec CHAPTER 62 This chapter describes how to configure L2TP over IPsec on the ASA. This chapter includes the following topics: Information About L2TP over IPsec, page 62-1 Licensing Requirements for L2TP over

More information

Hardware Capabilities. Product Brief: SDC-PC20G g PCMCIA Card with Integrated Antenna

Hardware Capabilities. Product Brief: SDC-PC20G g PCMCIA Card with Integrated Antenna Product Brief: SDC-PC20G 802.11g PCMCIA Card with Integrated Antenna The SDC-PC20G PCMCIA card from Summit Data Communications combines Summit s 802.11g radio and customized software both proven on mobile

More information

Architecting Network for Branch Offices with Cisco Unified Wireless

Architecting Network for Branch Offices with Cisco Unified Wireless Architecting Network for Branch Offices with Cisco Unified Wireless Karan Sheth - Sr. Technical Marketing Engineer Objective Design & Deploy Branch Network That Increases Business Resiliency 2 Agenda Learn

More information

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] s@lm@n Cisco Exam 642-737 Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] Cisco 642-737 : Practice Test Question No : 1 RADIUS is set up with multiple servers

More information

Cisco Aironet 1130AG Series IEEE A/B/G Access Point

Cisco Aironet 1130AG Series IEEE A/B/G Access Point Cisco Aironet 1130AG Series IEEE 802.11A/B/G Access Point Low-profile enterprise-class access point with integrated antennas for easy deployment in offices and similar RF environments. Product Overview

More information

Impact of New Highly Secure Scheme on Wireless Network Performance

Impact of New Highly Secure Scheme on Wireless Network Performance International Journal of Computer Applications (975 8887) Impact of New Highly Secure Scheme on Wireless Network 82.11 Performance Brijesh Singh Yadav UPRVUNL Lucknow, U.P. (India) Parul Yadav Amity University,

More information

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some 3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some popular block ciphers Triple DES Advanced Encryption

More information

Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3

Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3 Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3 Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram Configuration Declare RADIUS Server on WLC Create

More information

THOUGHTS ON TSN SECURITY

THOUGHTS ON TSN SECURITY THOUGHTS ON TSN SECURITY Contributed by Philippe Klein, PhD (philippe@broadcom.com) 1 METWORK SECURITY PROTOCOLS Description Complexity Performance Layer 4..7 Layer 3 Layer 2 SSL / TLS, IPsec MACsec Application

More information

Configure Site Network Settings

Configure Site Network Settings About Global Network Settings, page 1 About Device Credentials, page 2 Configure Global Device Credentials, page 4 Configure IP Address Pools, page 9 Configure Global Network Servers, page 9 Configure

More information

EnGenius Quick Start Guide

EnGenius Quick Start Guide T he operates seamlessly in the 2.4 GHz frequency spectrum supporting the 802.11b (2.4GHz, 11Mbps) and the newer, faster 802.11g (2.4GHz, 54Mbpswireless standard. High output power and high sensitivity

More information

KRACKing WPA2 in Practice Using Key Reinstallation Attacks. Mathy BlueHat IL, 24 January 2018

KRACKing WPA2 in Practice Using Key Reinstallation Attacks. Mathy BlueHat IL, 24 January 2018 KRACKing WPA2 in Practice Using Key Reinstallation Attacks Mathy Vanhoef @vanhoefm BlueHat IL, 24 January 2018 Overview Key reinstalls in 4-way handshake Misconceptions Practical impact Lessons learned

More information

Findings for

Findings for Findings for 198.51.100.23 Scan started: 2017-07-11 12:30 UTC Scan ended: 2017-07-11 12:39 UTC Overview Medium: Port 443/tcp - NEW Medium: Port 443/tcp - NEW Medium: Port 443/tcp - NEW Medium: Port 80/tcp

More information

1. Data Link Layer Protocols

1. Data Link Layer Protocols 1. Data Link Layer Protocols Purpose of the Data Link Layer The Data Link Layer Purpose of the Data Link Layer Data Link Sublayers Network LLC Sublayer Data Link Physical MAC Sublayer 802.3 Ethernet 802.11

More information

Lightweight AP (LAP) Registration to a Wireless LAN Controller (WLC)

Lightweight AP (LAP) Registration to a Wireless LAN Controller (WLC) Lightweight AP (LAP) Registration to a Wireless LAN Controller (WLC) Document ID: 70333 Introduction Prerequisites Requirements Components Used Conventions Background Information Register the LAP with

More information

CWA-854HT 54 Mbps Wireless-G High Transmission Access Point User s Guide

CWA-854HT 54 Mbps Wireless-G High Transmission Access Point User s Guide CWA-854HT 54 Mbps Wireless-G High Transmission Access Point User s Guide May 2006 Version 1.00 1 Table of Contents Table of Contents... 2 List of Figures... 4 List of Tables... 6 Chapter 1. Introduction...

More information