White Paper. WLAN Security: Top 10 Checklist. December 10, 2003

Size: px
Start display at page:

Download "White Paper. WLAN Security: Top 10 Checklist. December 10, 2003"

Transcription

1 December 10, 2003

2 Table of Contents Can you prevent wireless deployment until your IT staff is ready to support it? 5 2. Is every element of your wireless system secure? 6 3. Are your access points an Achilles heel? 6 4. Does your WLAN system support security policies for heterogeneous users? How are the security approaches integrated? 7 5. Can you apply wired security policies to your wireless network? 8 6. Can you use existing Virtual Private Network (VPN) technology to secure your WLAN environment? Will users be able to roam when using VPNs? 9 7. Can your WLAN address security threats in real-time? How does your WLAN handle attacks? Can you accurately locate the source of security risks? Will your WLAN support future innovation and changes in security standards? 13 Conclusion 2

3 Wireless LANs (WLANs) represent one of the greatest innovations in enterprise networking since the invention of Ethernet. Over 10 million Access Points (APs) shipped in the four years since the b standard was ratified (source: Gartner Group), making this one of the fastest growing networking technologies of the last decade. While the benefits of wireless mobility are commonly appreciated by many enterprises increased productivity, enhanced communications, and new applications to name a few the security issues associated with implementing this new technology are often not completely understood by IT staff. Early inadequacies with the Wired Equivalent Privacy (WEP) protocol have exacerbated this problem, causing many enterprises to focus most of their attention on better Layer 2 authentication, authorization, and encryption capabilities, ignoring other key components to WLAN security, such as RF-layer protection and rogue AP containment. As each enterprise s individual security architecture is dependent upon its specific network infrastructure, client capabilities, and applications, there is no one-size-fits-all approach to wireless security. Every individual enterprise requires its own comprehensive framework that addresses all facets of wireless networking, from the RF physical layer to the protection of key business-critical applications. The best solution is a mix of well established industry standards, such as 802.1x, WPA, and IPsec, combined with innate WLAN infrastructure capabilities, such as real-time monitoring for wireless protection. The trick is understanding what security risks to look for, and knowing how best to address them in your enterprise environment Airespace compiled the following top 10 WLAN security checklist to assist in this endeavor: 3

4 1. Can you prevent wireless deployment until your IT staff is ready to support it? One of the greatest security threats an enterprise faces is spawned by relatively innocent motives. For example, an employee can bring in a low-cost AP purchased at the nearest electronic store to enable roaming between his cubicle and a conference room. While this employee s intentions are innocent, the result of his actions can be quite severe. If the consumer-grade AP does not have appropriate security parameters in place, this rogue device is exposing your entire corporate network to anyone and everyone with a wireless client. As a result, most enterprises should have a mechanism in place whereby IT staff have complete control over how and when wireless services are rolled-out and managed. Airespace gives network managers complete control of WLAN deployment with the Airespace Wireless Protection System. When operated in standalone prevention mode, it creates a complete defense shield around an enterprise s RF domain whereby service is denied to all wireless clients and APs rogue or otherwise. This lock down of the air space enables IT staff to deploy Wireless LANs at their own pace, in complete coordination with established corporate security policies. The same Airespace equipment that is used to prevent wireless activity today can also be used to deliver WLAN services in the future. As a result, Airespace offers a cost effective migration strategy for any enterprise interested in the eventual deployment of business critical wireless networks. Figure 1 Airespace s Defense Shield locks down the air space to prevent unauthorized wireless activity. 4

5 2. Is every element of your wireless system secure? A WLAN is only as secure as its weakest link. When deploying a wireless network system, two objectives must therefore be met: 1. The system must be secure out of the box. From the moment equipment arrives onsite, it should be configured for maximum security. This prevents malicious activity from taking place during initial configuration, and protects your enterprise in the event that default parameters are left as is once the WLAN is up and running. 2. Every element of the system must be secured from potential attack. Much attention is given to securing the connection between clients and the WLAN system itself. But, is the connection between your APs and WLAN switches/ appliances also secure? What about your communication between different switches/appliances? Each of these distinct parts of the network can pose potential security risks to a WLAN system, and must therefore be addressed accordingly. Airespace meets these objectives in several ways. Airespace equipment ships from the manufacturer with built-in X.509 certificates. This ensures the authenticity of each device, preventing unauthorized equipment from participating in an Airespace network. The Airespace system is secured from the time the system is first powered up. Upon initial installation, SNMP v3, SSH, and HTTPs are all enabled, ensuring that there are no insecure ways to access the Airespace equipment. All Airespace hardware and software elements (APs, switches, appliances, and Airespace Control System Software) operate over a secured control channel, whether it occurs in the wired or wireless side of the network. All communication between APs, between APs and switches/appliances, between the controllers themselves, and to ACS are secured via the Lightweight Access Point Protocol (LWAPP). This ensures that all elements remain secure throughout the life cycle of an entire Airespace wireless network. The Airespace solution continues to monitor the network to prevent possible Trojan Horses. 5

6 3. Are your access points an Achilles heel? Traditional fat APs typically operate as a stand alone network element. As a result, they are responsible for all aspects of WLAN security, including user authentication and encryption key management. If a fat AP is stolen, different user and network secrets can be compromised. Given the fact that most fat APs are usually deployed either out in the open or just above a drop ceiling in the plenum (as opposed to in a locked wiring closet or data center) this is a very real risk for many enterprise environments. Airespace Access Points contain no information that would compromise WLAN security if stolen. Instead, all user authentication and access information is stored in the wiring closet or data center, where Airespace WLAN switches and appliances are securely deployed and managed. In addition, an Airespace AP will not work without a certified Airespace WLAN switch/appliance or other valid LWAPP-enabled access controller. 4. Does your WLAN system support security policies for heterogeneous users? How are the security approaches integrated? The embedded nature of chipsets in laptops, PDAs and tablet computers is leading to an increasingly diverse client environment. As each type of client has unique security requirements and specific capabilities with respect to the types of technologies they can support, it is extremely difficult for IT staff to establish and enforce uniform security approaches across a large enterprise. Flexibility is key. As there is no one size fits all answer to WLAN security, wireless infrastructures must provide IT staff with a variety of security options that cater to many different types of user requirements. This means all layers of the WLAN must be secured, and more importantly, the policies across these layers must be coordinated. 6

7 Figure 2 Airespace provides multiple layers of WLAN protection. Airespace Control System Software, Airespace s award-winning platform for WLAN systems management, allows administrators to establish up to 17 different policies across an entire network for different kinds of users and devices. Security can be configured by policy groups or templates or per user and device, giving tight control over how wireless users can use the network. More importantly, the security template tools in ACS eliminate the manual configuration associated with different security devices and software packages, dramatically reducing the chance of operator error. 5. Can you apply wired security policies to your wireless network? Security is nothing new to enterprise networking. In most environments, well-established policies exist that govern how information is accessed, such as virtual LANs (VLANs), firewalls, Authentication/Authorization/Access control. These existing wireline schemes must be integrated into a wireless environment to ensure uniformity across an entire enterprise and to ease IT management burden. The Airespace system uses traditional QoS and VLAN tagging schemes (802.1p and 802.1q) to map wireline VLANs into the wireless world. In addition, the Airespace Wireless Enterprise Platform supports the use of per-user Access Control Lists (ACLs) and per-user policies to maintain security from the wired network. For example, if it s time for final exams in the graduate school of engineering, the IT manager can turn off Yahoo, AOL and MSN instant messenger to avoid sharing of the answers among various wireless users. 7

8 6. Can you use existing Virtual Private Network (VPN) technology to secure your WLAN environment? Will users be able to roam when using VPNs? Greater than ninety percent of all enterprises have a remote access solution in place. As a result, VPNs are a staple in most corporate environments, whether a Layer 2 tunneling approach (e.g., L2TP) is used, or a Layer 3 solution, such as IPsec, is deployed. Airespace is a leader in the support and use of VPN technology in WLAN environments. In the Airespace environment, VPNs can be terminated on the Airespace WLAN switch and appliance, or passed-through to a VPN concentrator in the data center. Both Layer 2 and Layer 3 VPN approaches are supported by Airespace, with proven interoperability with leading VPN client solutions, such as Cisco, Netscreen and Funk. The Airespace system helps make VPNs mobile through a unique capability called Follow-Me VPN. Figure 3 Follow-Me VPNs enable users to roam throughout an Airespace network without losing their secure connection. Router Airespace 4000 Wireless Switch Secure Context Transfer Airespace 1200 Access Point 8

9 With this technology, users can roam within or across subnets with no drop in connection or need to re-authenticate. In addition, Follow-Me VPNs have very fast handoffs usually less than 50 milliseconds across subnets. This means that Airespace supports latency-sensitive applications, such as voice, without compromising security. 7. Can your WLAN address security threats in real-time? There is no way to predict the exact date or time when your WLAN might come under attack. As a result, network administrators require a WLAN solution with realtime RF monitoring capabilities to provide constant visibility into the air space. In addition, it is easy to confuse benign activities, such as interference from a neighboring coffee shop, with real security threats. Consequently, IT staff require RF intelligence within the WLAN to help analyze RF activity to help them make informed decisions. Airespace is the only WLAN platform with real-time RF management. With AireWave Director Software, which is embedded on all Airespace equipment, enterprises are equipped with dynamic RF intelligence for real-time detection and analysis of all activities within the air space. Anything that might threaten WLAN performance or security is immediately noted, analyzed, and logged, enabling IT staff to address immediate problems, as well as identify recurring trends. This type of real-time RF management goes well-beyond the security capabilities offered by alternative WLAN solutions whereby site survey and periodic RF scans are used to detect unusual activity. As these devices only take a snapshot in time, they are not equipped to handle security for a dynamic real-world environment. 9

10 8. How does your WLAN handle attacks? The RF is an open medium. As a result, wireless networks are exposed to many more attacks than traditional wireline networks. Some attacks disrupt performance, such as Denial of Service (DOS) attacks that debilitates WLAN operations through excessive interference. Others attacks enable malicious users to gain unauthorized entry to a WLAN, such as dictionary, Fake AP, and Man in Middle (MiM) attacks, A WLAN system must be able to rapidly detect each kind of attack and take appropriate action Airespace s Wireless Protection System provides multiple layers of protection against numerous types of WLAN attacks. More specifically, Airespace combines real-time RF monitoring and analysis with location tracking and dynamic RF intelligence to enable the following capabilities: Dynamic control of the air space (channel, power, etc.), allows the system to move away from radio frequencies that are over utilized. This protects applications from Denial of Service (DoS) attacks and from excessive interference. All Airespace equipment ships with built-in certificates to prevent unauthorized devices from accessing an Airespace network. In addition, the Airespace system constantly monitor the air space to detect unusual activity that might be attributed to devices attempting to spoof a valid equipment address e.g., ASLEAP, deauthentication floods, void11, Fake AP, etc. Airespace offers a blacklisting feature whereby users making repeated attempts to captures or spoof passwords or MAC addresses are barred from access to the Airespace network. Blacklisting takes place across an entire enterprise domain and lasts for an adjustable period of time. The Airespace system detect clients in ad-hoc mode and prevents users from associating with these devices. The Airespace Wireless Protection System can be used to detect and contain Rogue APs. By combining location tracking with rogue containment features, the system detects unauthorized APs, helps IT staff determine if they are a security threat, and then provides tools for containing these devices. Alarms can be generated with precise location information, enabling IT staff to address the rogue device with minimal effort. 10

11 9. Can you accurately locate the source of security risks? Monitoring and analysis is only half the answer when it comes to WLAN security. IT staff must also take control of their air space to contain potentially harmful activity before they have a serious impact on WLAN operations. Granular location tracking is key to this, providing IT staff with detailed insight into the physical source of unauthorized or harmful activity, such as a rogue AP, computer running in ad-hoc mode, or a laptop with improperly configured security parameters. Once the physical location of an offending device can be located, swift corrective action can be taken. Airespace offers the only WLAN system with integrated location tracking for granular visibility and control of the RF domain. While separate overlay networks can be deployed to provide this functionality, these require additional appliances, APs, and software which significantly adds to overall equipment costs. In addition, there is no guarantee that such a solution will provide 100% coverage of a wireless network, as is the case with the Airespace Wireless Enterprise Platform. Figure 4 Airespace uses advanced location tracking techniques to locate security risks. 11

12 10. Will your WLAN support future innovation and changes in security standards? Significant attention has been given to existing layer 2 encryption and authentication approaches, such as 802.1x and WPA. As new standards emerge, enterprises must determine the effect that they will have on existing security schemes. For example, what changes are required to migrate from WPA to i, which uses the Advanced Encryption Standard (AES) for dynamic negotiation of authentication and encryption algorithms? Similarly, will existing WLAN security systems support e, which defines Quality of Service (QoS) mechanisms for wireless domains? Many existing WLAN platforms are not ready to support some of the emerging standards. For example, WLAN solutions that handle all encryption in the WLAN switch (as opposed to handling some encryption in the AP), are ill-equipped for e. That is because if the AP cannot read data packets, it cannot enforce QoS policies. The Airespace system is equipped to handle encryption in both the WLAN switch and in the APs. The APs themselves are equipped with hardware acceleration to support emerging standards, without impacting overall WLAN performance. This means that the Airespace solution requires nothing more than a software upgrade to support the i and e standards when they are completed. No costly forklift upgrades are required. 12

13 Conclusion Enterprises across the world are taking advantage of productivity gains and other benefits associated with WLAN technology. However, for wireless networks to support business critical applications, they must contain adequate security measures that prevent mobility from being synonymous with vulnerability. Airespace understands WLAN security. The Airespace Wireless Enterprise System was built from the ground up for secure wireless operations. By addressing the ten basic principles outlined in this document, Airespace has built secure and reliable wireless networks for enterprises of all kind, from trading floors and hospitals to military facilities and boardrooms. 13

14 Worldwide Headquarters 110 Nortech Parkway San Jose, CA Tel: Fax: EMEA Headquarters 3000 Cathedral Hill Guildford, Surrey GU2 7YB United Kingdom Tel: +44 (0) Fax: +44 (0) Airespace, Inc. All rights reserved. AireWave Director, Airespace and the Airespace logo are trademarks of Airespace, Inc. All other trademarks belong to their respective owners. LIT W-WPWS

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements Unified Wireless Switching Enabling a Truly Converged Network White Paper Abstract As businesses scale, traditional wireless network deployments become more complex, more costly and less secure. Users

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

Cisco Wireless LAN Controller Module

Cisco Wireless LAN Controller Module Cisco Wireless LAN Controller Module Simple and Secure Wireless Deployment and Management for Small and Medium-Sized Businesses and Enterprise Branch Offices. Figure 1. Cisco Wireless LAN Controller Module

More information

PRODUCT GUIDE Wireless Intrusion Prevention Systems

PRODUCT GUIDE Wireless Intrusion Prevention Systems PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing

More information

Requirements for Building Effective Government WLANs

Requirements for Building Effective Government WLANs White Paper Government Requirements for Building Effective Government WLANs CJ Mathias Farpoint Group Introduction With governments just now beginning the adoption of wireless LANs as a key component of

More information

Symantec Client Security. Integrated protection for network and remote clients.

Symantec Client Security. Integrated protection for network and remote clients. Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

FIPS Validated i WLAN

FIPS Validated i WLAN Tech Brief Government FIPS Validated 802.11i WLAN Meeting Government Requirements for Secure Mobile Data Situation From the boardroom to the battlefield, no entity has a greater need for mobile communications

More information

A POLYCOM WHITEPAPER Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering

A POLYCOM WHITEPAPER Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering Excellent Voice Quality on Enterprise Wi-Fi Networks November 2010 Coverage,

More information

Configuring Security Solutions

Configuring Security Solutions 3 CHAPTER This chapter describes the security solutions for wireless LANs. It contains the following sections: Cisco Unified Wireless Network Solution Security, page 3-1 Interpreting the Security Dashboard,

More information

Configuring Security Solutions

Configuring Security Solutions 3 CHAPTER This chapter describes the security solutions for wireless LANs. It contains the following sections: Cisco Unified Wireless Network Solution Security, page 3-1 Interpreting the Security Tab,

More information

Your wireless network

Your wireless network Your wireless network How to ensure you are meeting Government security standards Cabinet Office best practice Wi-Fi guidelines Overview Cyber Security is a hot topic but where do you start? The Cabinet

More information

Securing Today s Mobile Workforce

Securing Today s Mobile Workforce WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................

More information

Exam : PW Title : Certified wireless security professional(cwsp) Version : DEMO

Exam : PW Title : Certified wireless security professional(cwsp) Version : DEMO Exam : PW0-200 Title : Certified wireless security professional(cwsp) Version : DEMO 1. Given: John Smith often telecommutes from a coffee shop near his home. The coffee shop has an 802.11g access point

More information

Wireless Controller DWC-1000

Wireless Controller DWC-1000 Network Architecture Manage up to 6 wireless APs, upgradable to 24 APs 1 per controller Control up to 24 wireless APs, maximum 96 APs 1 per cluster Robust Network Security Wireless Instruction Detection

More information

WIDS Technology White Paper

WIDS Technology White Paper Technical white paper WIDS Technology White Paper Table of contents Overview... 2 Background... 2 Functions... 2 Rogue detection implementation... 2 Concepts... 2 Operating mechanism... 2 Operating modes...

More information

Motorola AirDefense Retail Solutions Wireless Security Solutions For Retail

Motorola AirDefense Retail Solutions Wireless Security Solutions For Retail Motorola AirDefense Retail Solutions Wireless Security Solutions For Retail Wireless Risks in Retail The PCI Security Standards Council is an open global forum, founded by American Express, Discover Financial

More information

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] s@lm@n Cisco Exam 642-737 Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] Cisco 642-737 : Practice Test Question No : 1 RADIUS is set up with multiple servers

More information

Vendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo Vendor: Cisco Exam Code: 646-206 Exam Name: Cisco Sales Expert Version: Demo QUESTION 1 What are three current business factors that are influencing customer decisions in making technology investments?

More information

Wireless MAXg Technology

Wireless MAXg Technology Wireless MAXg Technology MAXimizing range, performance, security and simplicity for 802.11g networks Technology Note Wireless technology has undoubtedly become a ubiquitous presence in our computing environment,

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased

More information

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Securing Wireless Networks by By Joe Klemencic Mon. Apr http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies

More information

The Benefits of Wireless Infrastructure Management in the Cloud

The Benefits of Wireless Infrastructure Management in the Cloud WHITE PAPER The Benefits of Wireless Infrastructure Management in the Cloud High Performance Wireless Networks The Benefits of Wireless Infrastructure Management in the Cloud How the cloud maximizes IT

More information

Wednesday, May 16, 2018

Wednesday, May 16, 2018 Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available

More information

Aerohive Private PSK. solution brief

Aerohive Private PSK. solution brief Aerohive Private PSK solution brief Table of Contents Introduction... 3 Overview of Common Methods for Wi-Fi Access... 4 Wi-Fi Access using Aerohive Private PSK... 6 Private PSK Deployments Using HiveManager...

More information

Achieving End-to-End Security in the Internet of Things (IoT)

Achieving End-to-End Security in the Internet of Things (IoT) Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of

More information

The Aruba S3500 Mobility Access Switch

The Aruba S3500 Mobility Access Switch Tech Brief Enterprise The Aruba S3500 Mobility Access Switch Tech Brief: The Aruba S3500 Mobility Access Switch Table of Contents Introducing the Aruba S3500 Mobility Access Switch... 2 Flexible deployment

More information

WIRELESS AS A BUSINESS ENABLER. May 11, 2005 Presented by: Jim Soenksen and Ed Sale, Pivot Group

WIRELESS AS A BUSINESS ENABLER. May 11, 2005 Presented by: Jim Soenksen and Ed Sale, Pivot Group WIRELESS AS A BUSINESS ENABLER May 11, 2005 Presented by: Jim Soenksen and Ed Sale, Pivot Group Presentation Goals Describe the need for and benefits of Wireless Networking Describe the risks involved

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo Vendor: Cisco Exam Code: 642-737 Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0 Version: Demo QUESTION 1 Which statement describes the major difference between PEAP and EAP-FAST

More information

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices. Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise

More information

Cisco Unified Wireless Network Solution Overview

Cisco Unified Wireless Network Solution Overview 1 CHAPTER Unified Wireless Network Solution Overview This chapter summarizes the benefits and characteristics of the Unified Wireless Network for the enterprise.the Unified Wireless Network solution offers

More information

Cisco Network Admission Control (NAC) Solution

Cisco Network Admission Control (NAC) Solution Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,

More information

Wireless Network Security Fundamentals and Technologies

Wireless Network Security Fundamentals and Technologies Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology

More information

Enterprise Guest Access

Enterprise Guest Access Data Sheet Published Date July 2015 Service Overview Whether large or small, companies have guests. Guests can be virtually anyone who conducts business with the company but is not an employee. Many of

More information

Wireless LAN Overview

Wireless LAN Overview A wireless LAN (WLAN) is, in some sense, nothing but a radio with different frequencies and characteristics acting as a medium for networks. The Cisco 800, 1800, 2800, and 3800 series integrated services

More information

CCNA Discovery 4.0 Designing and Supporting Computer Networks

CCNA Discovery 4.0 Designing and Supporting Computer Networks CCNA Discovery 4.0 Designing and Supporting Computer Networks Creating the Network Design Chapter 5 1 Objectives 2 Analyzing Business goals and technical requirements Determining how to design a network

More information

5 Tips to Fortify your Wireless Network

5 Tips to Fortify your Wireless Network Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In

More information

Cisco Catalyst 6500 Series/Cisco 7600 Series Wireless Services Module

Cisco Catalyst 6500 Series/Cisco 7600 Series Wireless Services Module Cisco Catalyst 6500 Series/Cisco 7600 Series Wireless Services Module Product Overview The Cisco Catalyst 6500 Series/Cisco 7600 Series Wireless Services Module (WiSM) provides unparalleled security, mobility,

More information

What is Eavedropping?

What is Eavedropping? WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks

More information

TestsDumps. Latest Test Dumps for IT Exam Certification

TestsDumps.  Latest Test Dumps for IT Exam Certification TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : PW0-200 Title : Certified wireless security professional(cwsp) Vendors : CWNP Version : DEMO Get Latest & Valid PW0-200

More information

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Exam : Title : Security Solutions for Systems Engineers. Version : Demo Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized

More information

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

Securing the Empowered Branch with Cisco Network Admission Control. September 2007 Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations

More information

Aerohive and IntelliGO End-to-End Security for devices on your network

Aerohive and IntelliGO End-to-End Security for devices on your network Aerohive and IntelliGO End-to-End Security for devices on your network Introduction Networks have long used a password to authenticate users and devices. Today, many cyber attacks can be used to capture

More information

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted. Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.

More information

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the

More information

Security & Management for your wireless LANs. Bluesocket Wireless Gateways

Security & Management for your wireless LANs. Bluesocket Wireless Gateways Security & Management for your wireless LANs Wireless Gateways Achieve unparalleled wireless LAN security and manageability. With the Wireless Gateway, youcan: Establish and maintain asafe, securewirelesslan

More information

Wireless LAN Solutions

Wireless LAN Solutions Wireless LAN Solutions Juniper Networks delivers wireless solutions for enterprises of all sizes and types from small retail installations to the largest campuses Your JUNIPER NETWORKS dedicated Sales

More information

ForeScout Agentless Visibility and Control

ForeScout Agentless Visibility and Control ForeScout Agentless Visibility and Control ForeScout Technologies has pioneered an agentless approach to network security that effectively helps address the challenges of endpoint visibility and control

More information

Wireless Domain Services FAQ

Wireless Domain Services FAQ Wireless Domain Services FAQ Document ID: 65346 Contents Introduction What is WDS? How do I configure my AP as a WDS? On what platforms does Cisco Structured Wireless Aware Network (SWAN) WDS run? How

More information

CSA for Mobile Client Security

CSA for Mobile Client Security 7 CHAPTER A secure unified network, featuring both wired and wireless access, requires an integrated, defense-in-depth approach to security, including comprehensive endpoint security that is critical to

More information

The Value of Cisco Compatible Extensions (CCX) for Mobile Computers

The Value of Cisco Compatible Extensions (CCX) for Mobile Computers The Value of Cisco Compatible Extensions (CCX) for Mobile Computers Originally Published: October 2007 Updated: April 2010, October 2012 A White Paper from Laird Technologies IEEE and industry standards

More information

The Economic Benefits of a Cooperative Control Wireless LAN Architecture

The Economic Benefits of a Cooperative Control Wireless LAN Architecture White Paper The Economic Benefits of a Cooperative Control Wireless LAN Architecture Aerohive Networks, Inc. 3150-C Coronado Avenue Santa Clara, California 95054 Phone: 408.988.9918 Toll Free: 1.866.918.9918

More information

Cisco Securing Cisco Wireless Enterprise Networks (WISECURE) Download Full Version :

Cisco Securing Cisco Wireless Enterprise Networks (WISECURE) Download Full Version : Cisco 300-375 Securing Cisco Wireless Enterprise Networks (WISECURE) Download Full Version : https://killexams.com/pass4sure/exam-detail/300-375 QUESTION: 42 Which two considerations must a network engineer

More information

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps Cisco 300-375 Dumps with Valid 300-375 Exam Questions PDF [2018] The Cisco 300-375 Securing Cisco Wireless Enterprise Networks (WISECURE) exam is an ultimate source for professionals to retain their credentials

More information

The Modern Manufacturer s Guide to. Industrial Wireless Cisco and/or its affiliates. All rights reserved.

The Modern Manufacturer s Guide to. Industrial Wireless Cisco and/or its affiliates. All rights reserved. The Modern Manufacturer s Guide to Industrial Wireless 2017 Cisco and/or its affiliates. All rights reserved. The Modern Manufacturer s Guide to Industrial Wireless Page 2 It s hard to imagine an effective

More information

Deployment Scenarios

Deployment Scenarios This chapter describes and shows some typical deployment scenarios for the Cisco 860, Cisco 880, and Cisco 890 series Intergrated Services Routers (ISRs): About the, page 1 Enterprise Small Branch, page

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : 642-737 Title : Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0 Vendor : Cisco Version : DEMO Get

More information

The Aruba Mobile Virtual Enterprise for Government. The Next Generation Network Access Architecture for Mobile Technology

The Aruba Mobile Virtual Enterprise for Government. The Next Generation Network Access Architecture for Mobile Technology The Next Generation Network Access Architecture for Mobile Technology Table of Contents Government agencies recognize the benefits of mobility 3 MOVE: A user-centric, role-based access architecture for

More information

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards COUNTY OF SACRAMENTO Inter-Departmental Correspondence December 6, 2007 TO: FROM: Information Technology Policy Board Members Jeff Leveroni, Chair Technology Review Group SUBJECT: Update to County WAN/LAN

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL Q&A PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL This document answers questions about Protected Extensible Authentication Protocol. OVERVIEW Q. What is Protected Extensible Authentication Protocol? A.

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

The Neutron Series Distributed Network Management Solution

The Neutron Series Distributed Network Management Solution Datasheet The Neutron Series Distributed Network ment Solution Flexible, Scalable, Enterprise-Class ment for Networks Both Large and Small Today s networks must be flexible, robust and as effective as

More information

B.Y.O.D Bring Your Own Device

B.Y.O.D Bring Your Own Device B.Y.O.D Bring Your Own Device Ed Merkle Motorola Solutions, Inc AAPA Technology Seminar May 14, 2013 BYOD - Statistics 60m tablets to be shipped in 2011 275m tablets to be shipped in 2015 Apple s market

More information

Cisco Meraki Wireless Solution Comparison

Cisco Meraki Wireless Solution Comparison Solution Comparison Cisco Meraki Wireless Cisco Meraki Wireless Solution Comparison Why Cisco Meraki? Simplified cloud management Intuitive interface allows devices to be configured in minutes without

More information

CertifyMe. CertifyMe

CertifyMe. CertifyMe CertifyMe Number: 642-586 Passing Score: 800 Time Limit: 120 min File Version: 8.0 http://www.gratisexam.com/ CertifyMe 642-586 Exam A QUESTION 1 A customer in the United States requires connectivity between

More information

802.11ac 3x3 Dual Band High-Powered Wireless Access Point/Client Bridge

802.11ac 3x3 Dual Band High-Powered Wireless Access Point/Client Bridge Datasheet ECB1750 802.11ac 3x3 Dual Band High-Powered Wireless Access Point/Client Bridge The ECB1750 marks a new speed and performance breakthrough for users with 802.11ac laptops and other devices, who

More information

Deployment of Cisco IP Mobility Solution on Enterprise Class Teleworker Network

Deployment of Cisco IP Mobility Solution on Enterprise Class Teleworker Network Deployment Guide Deployment of Cisco IP Mobility Solution on Enterprise Class Teleworker Network The Cisco Service Oriented Network Architecture (SONA) framework helps enterprise customers evolve their

More information

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all

More information

Securing Access to Network Devices

Securing Access to Network Devices Securing Access to Network s Data Track Technology October, 2003 A corporate information security strategy will not be effective unless IT administrative services are protected through processes that safeguard

More information

Frequently Asked Questions WPA2 Vulnerability (KRACK)

Frequently Asked Questions WPA2 Vulnerability (KRACK) Frequently Asked Questions WPA2 Vulnerability (KRACK) Release Date: October 20, 2017 Document version: 1.0 What is the issue? A research paper disclosed serious vulnerabilities in the WPA and WPA2 key

More information

SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS

SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS David Murotake, (SCA Technica, Inc. Nashua NH, USA; david.murotak@scatechnica.com) Antonio Martin (SCA Technica, Inc., Nashua NH, USA;

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Automating VPN Management

Automating VPN Management Automating VPN Management By Scott Hilton, Vice President Product Management Assured Digital, Inc. Although many network managers, users and executives agree on the benefits of virtual private networking,

More information

Monitoring Wireless Devices

Monitoring Wireless Devices CHAPTER 6 This chapter describes how to use WCS to monitor your wireless LANs. It contains these sections: Monitoring Rogue Access Points, Adhocs, and Clients, page 6-1 Rogue Access Point Location, Tagging,

More information

Technology Solution Guide. Deploying Entuity s Eye of the Storm with Aruba Networks Secure Mobility Solution

Technology Solution Guide. Deploying Entuity s Eye of the Storm with Aruba Networks Secure Mobility Solution Technology Solution Guide Deploying Entuity s Eye of the Storm with Aruba Networks Secure Mobility Solution S/W Version: Eye of the Storm Enterprise 2011 WARRANTY DISCLAIMER THE FOLLOWING DOCUMENT, AND

More information

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility w h i t e p a p e r How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility So much is happening today to give you a chance to rethink your wireless architecture. Indeed, you

More information

Standard For IIUM Wireless Networking

Standard For IIUM Wireless Networking INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version

More information

Mobility Optimized Access Layer

Mobility Optimized Access Layer solution brief Mobility Optimized Access Layer Completing the Hive with Aerohive Switches Designing for Mobile First Legacy enterprise networks were never designed to accommodate the complexity of a mobile-first

More information

802.3at ac 3x3 Dual Band Ceiling Mount Access Point/WDS. Datasheet. can be used with EAP1750H. Key Features. capable switches or injectors

802.3at ac 3x3 Dual Band Ceiling Mount Access Point/WDS. Datasheet. can be used with EAP1750H. Key Features. capable switches or injectors Datasheet EAP1750H 802.11ac 3x3 Dual Band Ceiling Mount Access Point/WDS The EAP1750H leverages the breakthrough speed and performance of 802.11ac for connecting to laptops and other devices that need

More information

802.3at ac 3x3 Dual Band Ceiling Mount Access Point/WDS. can be used with EAP1750H. Key Features

802.3at ac 3x3 Dual Band Ceiling Mount Access Point/WDS. can be used with EAP1750H. Key Features EAP1750H can be used with 802.3at capable switches or injectors 802.11ac 3x3 Dual Band Ceiling Mount Access Point/WDS The EAP1750H leverages the breakthrough speed and performance of 802.11ac for connecting

More information

Chapter 1 Describing Regulatory Compliance

Chapter 1 Describing Regulatory Compliance [ 2 ] Chapter 1 Describing Regulatory Compliance Failure to secure a WLAN makes it vulnerable to attack. To properly secure your network, you must be able to identify common threats to wireless and know

More information

CISCO SHIELDED OPTICAL NETWORKING

CISCO SHIELDED OPTICAL NETWORKING CISCO SHIELDED OPTICAL NETWORKING Dr. Gaurav Kumar Jain Regional College For Education, Research and Technology Email: gaurav.rinkujain.jain@gmail.com Tarun Kumawat JECRC,UDML,College of Engineering Purabi

More information

IBM Cloud Internet Services: Optimizing security to protect your web applications

IBM Cloud Internet Services: Optimizing security to protect your web applications WHITE PAPER IBM Cloud Internet Services: Optimizing security to protect your web applications Secure Internet applications and APIs against denialof-service attacks, customer data compromise, and abusive

More information

Prepare Your Network for BYOD. Meraki Webinar Series

Prepare Your Network for BYOD. Meraki Webinar Series Prepare Your Network for BYOD Meraki Webinar Series 1 Agenda Introduction to Meraki and Cloud Networking BYOD objectives Taming BYOD: capacity, security & management Design considerations Live demos Product

More information

Cisco Meraki. Spectralink VIEW Certified Configuration Guide

Cisco Meraki. Spectralink VIEW Certified Configuration Guide Spectralink VIEW Certified Configuration Guide Cisco Meraki Meraki Cloud-Controlled APs MR26, MR30H, MR32, MR33, MR34, MR42, MR52, MR53, MR72, MR74, MR84 721-1013-000 Rev: A August 2017 Copyright Notice

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

Cisco Unified Wireless Network Software Release 5.2

Cisco Unified Wireless Network Software Release 5.2 Cisco Unified Wireless Network Software Release 5.2 PB507140 Overview With Cisco Unified Wireless Network Software Release 5.2, Cisco is delivering critical features for its industry-leading indoor and

More information

Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03

Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03 Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03 Introduction Although a variety of wireless network technologies have or will soon reach the general business market, wireless

More information

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS) Internet Communications Made Safe SteelGate Overview SteelGate Overview SteelGate is a high-performance VPN firewall appliance that Prevent Eliminate threats & attacks at the perimeter Stop unauthorized

More information

Symantec Security Monitoring Services

Symantec Security Monitoring Services 24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts

More information

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network Critical Infrastructure Protection for the Energy Industries Building Identity Into the Network Executive Summary Organizations in the oil, gas, and power industries are under increasing pressure to implement

More information

Wireless Controller DWC Product Highlights. Features. Robust and Optimised Network. Comprehensive Security

Wireless Controller DWC Product Highlights. Features. Robust and Optimised Network. Comprehensive Security Product Highlights Reliable, Secure Network Self-healing and self-optimising technology combined with 4 + 4 wireless controller redundancy and RF scanning ensures reliability and performance Easy Guest

More information

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003 Attacking 802.11 Networks Joshua Wright Joshua.Wright@jwu.edu LightReading LIVE! October 1, 2003 Attention The material presented here reflects the personal experience and opinions of the author, and not

More information