Wi-Fi Protected Access (WPA) Implementation at the Children s Health System

Size: px
Start display at page:

Download "Wi-Fi Protected Access (WPA) Implementation at the Children s Health System"

Transcription

1 Wi-Fi Protected Access (WPA) Implementation at the Children s Health System Kalyana Sannedhi kalyan@uab.edu HI 699 Masters in Health Informatics University of Alabama at Birmingham 1

2 Table of Contents Introduction...4 Chapter1. The IEEE family of Standards History of Wireless LANs Current Wireless LAN Standards Wireless LAN applications...8 Chapter2. Wireless LAN Security The WEP Privacy Algorithm The WEP Authentication Process i. Filtering Techniques Attacks on WEP The IEEE i Standard Wi-Fi Protected Access...15 Chapter3. WPA Implementation at the Children s Health System Brief overview of the wireless infrastructure at Children s Health System Need to move on with the new security standards Aegis Server for authentication Aegis Server Configuration Access Point Configuration Aegis Client Configuration Workgroup Bridge Configuration...33 Appendix A Proof of WPA Authentication of the Wireless Client...34 Appendix B Proof of WPA Authentication of the Workgroup Bridge...41 WPA References...42 Summary and Recommendations...44 Acknowledgements

3 Table of Figures Figure 1.1 Ad-hoc mode...5 Figure 1.2 Infrastructure mode...6 Figure 2.1 WEP encryption...10 Figure x authentication...14 Figure 3.1 Aegis Server home screen...22 Figure 3.2 Aegis Server s Realms screen...23 Figure 3.3 Aegis Server s LDAP configuration module...23 Figure 3.4 Aegis Server s access point listing screen...24 Figure 3.5 Aegis Server s access point configuration screen...24 Figure 3.6 Aegis Server s authentication types screen...25 Figure 3.7 Available EAP types screen...25 Figure 3.8 Aegis Server s user listing screen...26 Figure 3.9 Aegis Server s user configuration screen...27 Figure 3.10 Access point configuration to use the authentication server...28 Figure 3.11 Access point configuration to allow only EAP clients...29 Figure 3.12 MIC, TKIP configuration on the access point...30 Figure 3.13 Latest Cisco wireless client adapter s configuration screen...31 Figure 3.14 Aegis Client configuration screen...32 Figure 3.15 Cisco Aironet Workgroup bridge configuration for LEAP authentication...33 Figure A.1 Aegis Client configuration screen...34 Figure A.2 Aegis Client authentication screen...34 Figure A.3 Wireless client s IP address assignment...35 Figure A.4 Proof of successful network connectivity after authentication...36 Figure A.5 Wireless client association with the access point...37 Figure A.6 Aegis Server s request response statistics...37 Figure A.7 Aegis Server s authentication statistics...38 Figure B.1 Workgroup bridge and wireless client association with the access point...41 Table of tables Table 2.1 Comparison of security standards...16 Table 3.1 WPA authentication methods...21 Table 3.2 Aegis Client parameter requirement for various EAP methods

4 Introduction While most of the organizations recognize the benefits of wireless LANs such as mobility, cost savings, and convenience there still remains many questions about the security. Wireless LANs are not inherently secure and security is the most challenging part of managing them. Weaknesses in the underlying security capabilities have been well documented and a range of freely downloadable hacking tools are widely available. Outside the formal standards bodies, the industry has reacted to the wireless LAN security problem in many different ways, often exacerbating the problem. Wireless LAN vendors have also taken a variety of security approaches, for example VPN. Most of these solutions are costly, not ideal for handheld devices, and some times provide easy targets for a variety of attacks. However, a new wireless LAN security standard called Wi-Fi Protected Access (WPA) has emerged. WPA is a response from the Wi-Fi Alliance - a non-profit international association of wireless vendors. WPA offers strong authentication and encryption techniques without any extra overhead and lost of convenience of using wireless LANs. WPA is also forward compatible with the much publicized IEEE i wireless security standard. Hospitals are one of the few early adopters of the wireless network technology and they are also one of the very few organizations to carry sensitive information. Hospitals are traditionally regulated by several federal agencies. The Office for Civil Rights Health Insurance Portability and Accountability Act (HIPAA) mandates security of the patient information through the Security and Privacy Rules. We at Children s Health System are fully aware of all these facts. As part of Masters degree from the Department of Health Informatics I implemented the WPA on a test wireless LAN. This implementation provided very good experience and gave us confidence to move forward with the upcoming security standards. This project report contains all the details of wireless security standards, current security approaches at Children s Health System, and the details of WPA components, setup, and configuration. 4

5 1. The IEEE family of Standards Wireless networks provide mobility and flexibility to Internet users. Also wireless networks are more economical and efficient than installing wired networks. With the market promotion of wireless network technologies, services and applications are increasing day by day. Industry as well as households are benefiting from this technology. However, the growth of this technology depends on the standards and regulations set by various organizations. The standards that govern wireless networks are expected to improve interoperability, compatibility, data rate, coverage, etc. 1.1 History of Wireless LANs Wireless network technologies were immature until 1xy5 when the Federal Communications Commission (FCC) authorized the Industrial, Scientific, and Medical (ISM) frequency bands. Freeing up these three bands for commercial purposes accelerated the development of wireless LANs because licenses are not required any more to operate in the ISM frequency band. In 1xy9, the Institute of Electrical and Electronics Engineers, Inc. (IEEE) working group began elaborating on the wireless LAN Medium Access Control and Physical layer specifications. The final draft was ratified on 26 June The standard defines what comprises a Basic Service Set (BSS). A BSS consists of two or more fixed, portable, and/or moving nodes that can communicate with each other or with the fixed network over the air in a geographically limited area. The IEEE standard specified two wireless configuration modes, ad-hoc and infrastructure. The ad-hoc mode is also referred to as the peer-to-peer mode or an Independent Basic Service Set (IBSS) is shown below. Figure 1.1 Ad-hoc mode 5

6 This mode enables mobile stations to interconnect with each other directly without the use of an access point. All stations are usually independent in the ad-hoc mode. Stations broadcast and flood packets in the wireless coverage area without accessing the Internet. An ad-hoc network is easy to setup if users only need simple file transfer but no network access. Whereas in the infrastructure mode an access point is used to bridge wireless and wired networks to provide network access to wireless clients. Infrastructure mode configuration is shown below. Figure 1.2 Infrastructure mode A typical BSS looks like the above diagram. Each wireless station must be a member of any of the BSS to get network access. Multiple BSSs can be interconnected through a wired network to form an Extended Service Set (ESS). ESS appears as a single logical LAN. The coverage areas of individual BSSs overlap to provide handoff mechanism between any two access points. 1.2 Current Wireless LAN Standards IEEE standard bodies include people from academics, business, military, and the government. Because of tremendous influence of wireless networks on the market it takes many years to create standards. IEEE also allows some comment period for each standard. 6

7 The first IEEE standard was proposed in Two years later in September, 1999 the b standard was proposed. Here is a brief overview of the various standards. IEEE : The original wireless LAN standard that specifies the slowest data transfer rate. This standard contained all of the available transmission technologies at the physical layer including Direct Sequence Spread Spectrum (DSSS), Frequency Hopping Spread Spectrum (FHSS), and infrared. More specifically, the IEEE standard describes DSSS systems that operate at 1 Mbps and 2 Mbps. All the compliant products operate strictly in the 2.4 GHz ISM band between 2.4 and GHz. IEEE b: This standard is also widely promoted as Wi-Fi by the Wireless Ethernet Compatibility Alliance (WECA). This standard also operates in the same frequency band as the original standard but provide a data rate up to 11 Mbps, which is comparable to a regular Ethernet network. This standard also provided interoperability among various products from different vendors and compatibility with the older products. The high data rate of b products is a result of using a different coding technique called Complimentary Code Keying (CCK). IEEE a: The IEEE a standard describes wireless LAN device operation in the 5 GHZ UNII bands. Operation in the UNII bands makes these devices incompatible with all other devices complying with the other series of standards. This standard uses Orthogonal Frequency Division Multiplexing (OFDM), a different coding scheme that provides significantly higher data rates up to 54 Mbps and beyond (using rate doubling technique) g: This is the most recent standard based on the standard that describes data transfer rates equal to the a standard. The g standard is also backward compatible with the popular b standard. This backward compatibility also makes wireless LAN upgrade easy and inexpensive. The g standard uses two optional modulation techniques. The packet Binary Convolution Code (PBCC) modulation supports both 22 Mbps and 33 Mbps data rates and the OFDM supports a data rate of 54 Mbps i: This standard still in the draft form supports enhanced security and authentication mechanisms for the IEEE systems. This standard has adopted the IEEE 802.1x, a port based network access control standard, to authenticate wireless users. The 802.1x standard leverages on the existing authentication protocol called Extensible Authentication Protocol (EAP). This standard supports two different types of encryption algorithms WEP2 (also called Temporal Key Integrity Protocol (TKIP)) which is an enhanced version of WEP and Advanced Encryption Standard (AES). Apart from the above standards IEEE committees are working on the e standard to support Quality of Service (QoS) in wireless devices and the f standard for multivendor access point interoperability. 7

8 1.3 Wireless LAN applications As a technology, wireless LANs have enjoyed a very fast adoption rate due to many advantages they offer to a variety of situations. Some of the most common and appropriate uses are explained below. Network Extension: Wireless LANs can serve as an extension to a wired network. A wireless LAN saves the cost of LAN cabling and eases the task of relocation. For example, in case of a large warehouse, the distances may be too great to use Category 5 cable to setup an Ethernet network. Other examples include buildings with large open areas such as manufacturing plants, stock exchange trading floors, and warehouses; historical buildings with insufficient twisted pair and where drilling holes for new wiring is prohibited; and small offices where installation and maintenance of wired LANs is not economical. For all these scenarios wireless LANs provide an effective and more attractive alternative. Cross-building Interconnect: Wireless technology is useful to interconnect LANs in nearby buildings, whether wired or wireless LANs. A point-to-point wireless link can be established between two buildings. The other type of cross-building connectivity is pointto-multipoint (PTMP). The devices connected in such a way are typically bridges or routers and they use either semi-directional or highly-directional antennas at each end of the link. This type of wireless interconnectivity avoids running cables underground from one building to another or renting expensive leased-lines from a local telephone company. Last Mile Data Delivery: Wireless Internet Service Providers (WISPs) are now taking advantage of latest developments in wireless networking to provide last mile data delivery services to their customers. Last mile refers to the communications infrastructure between central office of the telecommunications company and the end user. This is a very ideal solution for telecom and cable companies that are encountering difficulties expanding their networks because of geographical barriers. And this also provides an opportunity to provide data delivery services for rural communities. Small Office Home Office: Wireless devices are very beneficial for home users and small offices if they want to share single Internet connection. The only alternative is to run cables throughout the office to connect all workstations which is costly without the benefit of mobility. Ad-Hoc Networking: As mentioned earlier this is a peer-to-peer network without any centralized bridge setup to meet some immediate need such as a simple file transfer. For example, a group of employees, each with a laptop or palmtop computer can assemble in a conference room for a business or classroom meeting and link their computers to form a temporary network just for duration of the meeting. 8

9 2. Wireless LAN Security Wireless LANs are not inherently secure because the data transfer is not confined physically like in wired networks and also bad press such as Ethernet jack in a parking lot analogies are holding back businesses and home users from embracing wireless LAN technology. Organizations like hospitals and banks where sensitive data is transferred all the time will undoubtedly require user authentication to prevent unauthorized access and strong encryption to protect privacy of the data. The IEEE b standard made many improvements over its predecessor the IEEE standard. These improvements include Wired Equivalent Privacy (WEP) protocol and filtering techniques. WEP provides encryption with built-in message authentication and data integrity. WEP is a simple protocol utilizes a Pseudo-Random Number Generator (PRNG) and the RC4 stream cipher. When the standard was approved, manufacturers of wireless LAN equipment rushed their products to market without much consideration about security. However, the standard specifies the following criteria for security. Exportable Reasonably strong Self-synchronizing Computationally efficient Optional WEP meets all these requirements. How the WEP provides privacy, data integrity, and authentication are explained below. 2.1 The WEP Privacy Algorithm With wireless LANs, eavesdropping is a major concern because of the ease of capturing a data transmission. WEP provides modest level of security. To provide privacy as well as data integrity, WEP uses an encryption algorithm based on the RC4. RC4 is the most widely used stream cipher in software applications. It was designed by Ron Rivest in 1xy7 and kept as trade secret until the source code was leaked out by somebody to the Cyberpunks mailing list in RC4 consists of two stages: a Key Scheduling Algorithm (KSA) and Pseudo-Random Generation Algorithm (PRGA). KSA turns a randomly selected key (shared key in case of the WEP implementation) into a permutation to derive the initial state and PRGA uses this permutation to generate a pseudo-random output key sequence. For the encryption process, a 40-bit or 104-bit secret key is shared by the two participants to exchange data. The data integrity algorithm is simply the 32-bit Cyclic Redundancy Check (CRC) value appended at the end to each Medium Access Control (MAC) frame. WEP encryption and decryption processes are shown in the figure below. 9

10 IV IV Secret key Seed WEP PRNG Key sequence Cipher text Plain text Integrity algorithm ICV Encryption Secret key IV Cipher text Seed WEP PRNG Key sequence ICV Integrity algorithm ICV Compare Decryption Figure 2.1 WEP encryption An Initialization Vector (IV) is concatenated to the secret key. The resulting block forms the seed that is input to the PRNG. The PRNG generates a bit sequence of the same length as the MAC frame plus it s CRC. A bit-by-bit exclusive-or (XOR) between the MAC frame and the PRNG sequence produces the cipher text. The IV is attached to the cipher text and the resulting block is transmitted to the receiver. A different IV is used for each data block. Each time IV changes, the PRNG sequence also changes. At the receiving end, the receiver retrieves the IV from the data block and concatenates this with the shared secret key to generate the same key sequence used by the sender. This key sequence is then XORed with the incoming block to recover the plain text. This is achieved because if we take a plain text, XOR it with a key sequence two times, we get the original plain text. Finally, the receiver compares the incoming CRC with the CRC calculated at the receiver to validate data integrity. If the CRC value doesn t match the receiver rejects the data. 10

11 2.2 The WEP Authentication Process WEP provides two types of authentication: open system and shared key. Shared key authentication forces all clients joining the network to confirm that they have the correct key. To confirm, the access point first sends a challenge string to the client. The client encrypts this string using the shared secret key and then sends it back to the access point. If the access point determines that the string is encrypted properly, the client gains access to the network. Open authentication does not require this handshake as it simply relies on the fact that the client that does not have the right key can not read encrypted data i. Filtering Techniques Initially many vendors did not implement WEP and developed alternate solutions such as filtering which are easily deployable. Filtering keeps out unauthorized users and allows the authorized. There are three basic types of filtering that can be performed on wireless LANs to provide security. SSID filtering: The SSID (Service Set Identifier) is another term for the network name. The SSID of a wireless client must match the SSID on the access point (infrastructure mode) or of the other station (ad-hoc mode) in order for it to authenticate and associate to the basic service set. By default the wireless access points announce their presence by sending beacon frames in the air. Beacon frames contain the SSID or the name of the network in a clear text format. It makes it easy to find the SSID using any freely available wireless sniffer such as Netstumbler. Network administrators can take out SSID from the beacon frames through SSID filtering to make the system a closed one. But the default SSIDs, SSIDs that are related to company or department names make it easy to guess by the attackers. MAC address filtering: Wireless LANs can filter traffic based on the MAC addresses of wireless clients. The network administrator can compile, distribute, and maintain a list of allowable MAC addresses and program them into each access point on a network. If a client with a wireless adapter address that is not in the access point s MAC filter list tries to gain access to the wireless LAN, the MAC address filter functionality will not let it to associate. But the MAC address filtering identifies stations not users. Also MAC addresses are easy to masquerade by malicious users with sufficient operating system privileges. Protocol filtering: Wireless LANs can filter packets traversing a network based on layer 3-7 protocols. For example if users only require Internet access then filtering out every protocol except POP3, HTTP, HTTPS, and any instant messaging protocols would limit wireless network users from accessing internal database systems. All these filtering techniques can be used in addition to the WEP for extra security. 11

12 2.3 Attacks on WEP Although WEP incorporates several mechanisms to help secure wireless traffic, many attacks have surfaced over time, demonstrating that WEP fails to enforce access control, and can not guarantee privacy or integrity of data transmissions. Shared key authentication and Access control: Shared key authentication puts network access control at risk. Challenging a new client to ensure it has the correct key provides useful information to an eavesdropper to compromise network access. By listening to the handshake, the eavesdropper obtains the initial unencrypted challenge message that the access point sent, as well as the encrypted response from the client. From these two pieces of information eavesdropper can conduct an off-line known plain text attack. Initialization Vector and Privacy: Data privacy is at risk when any two messages are encrypted with the same key sequence. Because the key sequence depends on a combination of the secret key and an IV, and because the secret key is always constant, an eavesdropper can determine that two messages are encrypted with the same key sequence by simply comparing their IVs, which are always sent in a plain text format. If two different plain text messages are encrypted using the same key sequence and if one of the plain text is a known one such as headers, web page requests, etc. the other plain text can be easily computed. Such attacks would not be possible if the IVs were non-repeating. However, with a 24-bit IV, at most 2 24 possible values exist. In high-traffic environments, IVs are guaranteed to repeat in a matter of hours. Some vendors designed IVs to start at zero and subsequently increment the IV for each transmitted packet. Also some implementations reinitialize the IV to zero each time the access point or client is started. Each of these faulty implementations increase the chance of repeating IVs which result in repeated key sequences. Checksum value and Data integrity: WEP uses CRC-32 algorithm to detect random errors but fails to detect intentional or malicious modifications because of CRC-32 s exclusive dependence on message i.e. CRC-32 is implemented independent of the secret key and IV. As explained earlier, the receiver accepts the message after decryption if the checksum appended to the message matches the checksum computed on the received data. If an attacker modifies a data packet, and changes the appended checksum to reflect this modification, the receiver will unknowingly accept the message as unaltered. Some of the other problems with WEP: i. It lacks tools for key management. ii. Authentication is done only one way. iii. WEP cracking tools are widely available. iv. Vulnerable to replay attacks. 12

13 All these numerous attacks show what could arise when security is not designed from the ground up. Because of all these vulnerabilities of WEP, IEEE formed a new committee in 2001 to design a new security standard for wireless LANs. This standard called the i wireless security standard strictly focuses on security and improving upon the protocols offered by previous standards. 2.4 The IEEE i Standard The IEEE i task group was formed to address the security concerns that are preventing wider adoption of wireless networking. This task group is improving security through enhancements to the current MAC layer. This standard includes another IEEE standard, 802.1x, to improve access control on wireless networks through a more rigorous authentication mechanism. The 802.1x standard provides the per-port user authentication. This security standard was originally designed for Ethernet switches. When a user attempts to connect to an Ethernet port, the port places the user s connection in blocked mode awaiting verification of the user s identity with a backend authentication system. When combined with Extensible Authentication Protocol (EAP), defined by RFC 2284, the 802.1x standard can provide a very secure and flexible environment based on various authentication schemes available today. The following five components are required to implement the 802.1x standard. Compatible client device: Typical clients include laptops and PDAs. Any device that desires to join a wireless network is called a supplicant. Supplicant software: This software provides the logic a device needs to present its credentials and follow the proper protocol for joining the network as a client. Authenticator: The authenticator is a wireless access point that must verify the identity of a supplicant before granting network access to it. Authentication server: It can be a Remote Authentication Dial-In User Service (RADIUS) or any other service capable of supporting the EAP standard. Authentication server handles authentication requests relayed by authenticators from supplicants. User database: The user database is a list of valid users and their credentials that the authentication server consults to validate authentication requests. This database may be a simple flat file or a service provided by a directory infrastructure, such as the Microsoft Active Directory service or the Lightweight Directory Access Protocol (LDAP). The authentication process begins when a client attempts to connect to the access point. The access point opens the restricted port and allows the client to pass EAP packets to the authentication server on the wired side of the access point. All other types of traffic are blocked by the port. The 802.1x protocol involves the following seven basic steps. i. Supplicant presents the authenticator with an EAP response/identity request. ii. Authenticator relays the request to the authentication server; at this point, the supplicant s access is restricted to the authentication server. 13

14 iii. Server issues a challenge and passes it back to the supplicant. iv. Supplicant answers the challenge by sending the necessary credentials back to the authentication server. v. Server verifies the user credentials against the user database. If they are valid server responds with a success message. vi. Authenticator increases scope of the client s access. vii. Authenticator notifies the client that it may participate on the network. All these seven steps are illustrated in the following diagram. iii. Issue challenge v. Validate response Authentication Server Authenticator ii. Limit access to Authentication server vi. Allow access to network Supplicant i. Request iv. Answer vii. Use other access challenge network resources Figure x authentication Enhanced key management and Privacy: Because the key sequence used to encrypt the data largely depends on the secret key, the new standard contains enhanced key management features. Unlike WEP which forces a common key to be manually entered and updated on every member of the network, the i standard uses automatically generated per-user, per-session keys. These keys, generated using a central key distribution system, are assigned to both the client and the access point for each session. After the successful mutual authentication between the access point and the client, a key exchange process occurs, called 4-way and group key handshakes. The 4-way handshake establishes the unicast key while the group key handshake establishes and distributes the group key needed for broadcast communication. Thus, the i standard uses a completely different key for broadcast traffic. 14

15 In addition, the i standard includes several privacy enhancement alternatives such as the Temporal Key Integrity Protocol (TKIP). TKIP is essentially WEP with the following three enhancements. i. Extended IV: The IV is extended from a 24-bit to a 48-bit value, significantly reducing IV collisions. ii. IV sequence counter: The IV is reinitialized to zero only when the base keys are established, not at every restart. iii. Per-packet key construction: WEP relied solely on the IV and secret key (constant value) to determine the key sequence. In contrast, the i standard relies on the base key, the transmitter s hardware address, and the IV. Michael algorithm and Data integrity: A new algorithm called Michael is used to generate an 8-bit Message Integrity Check (MIC) value for each packet. This 8-bit MIC is appended to each packet before the CRC. This value is encrypted with the data, IV, source and destination addresses. This encryption inhibits eavesdroppers from easily calculating the value, as they could with the linear CRC value. The i standard also includes countermeasures when two MIC failures occur within a minute. The countermeasures consist of re-keying the connection and notifying the network administrator. The i standard is still evolving and expected to be ratified by the middle of The Wi-Fi Alliance has released key components of the i standard under the name Wi-Fi Protect Access (WPA) as an intermediary. WPA is expected to fill gaps until the i products are released to the market. 2.5 Wi-Fi Protected Access WPA is subset of the i standard and is expected to maintain forward compatibility with it. WPA has the following features. Backward compatibility with the existing hardware Only the software or firmware upgrades are enough Inexpensive in terms of time and cost to implement Has different versions for home, small business, and enterprise environments 802.1x authentication TKIP Michael algorithm Key management All these features will fix the security holes in WEP. Some of the features of i standard such as Advanced Encryption Standard (AES), ad-hoc (peer-to-peer) security, etc. does not appear in the WPA as they require hardware upgrades or they are not that important in a security viewpoint. 15

16 The current WPA should be sufficient to provide robust wireless security, unless one of the following requirements arises: Business with the US government - US government mandates AES encryption. Ad-hoc network support Smooth roaming WPA enables pre-authentication for wired clients so that they need not be re-authenticated if they move to a wireless network. This feature also enables fast roaming from one access point to the other. Here is a comparison table among WEP, WPA, and i standards. Wireless security WEP WPA i standard Cipher algorithm RC4 RC4 Rijndael (AES) Encryption key 40-bit, 104-bit 128-bit 128-bit length IV length 24-bit 48-bit 48-bit Integrity check CRC-32 Michael Counter mode Cyclic block chaining MAC (CCM) Key management Manual 802.1x (EAP) 802.1x (EAP) Key unique to Network Packet, session, user Packet, session, user Ad-hoc (P2P) security No No No Table 2.1 Comparison of security standards 16

17 3. WPA Implementation at the Children s Health System As mentioned in the previous chapter, the IEEE i security standard will be released by the middle of It may take few more months for the vendors to come up with the IEEE i compliant products. The Wi-Fi Alliance has released the WPA as an intermediary standard for wireless users to secure their networks. We at Children s Health System decided to implement this standard as it offers a good learning experience before we fully support the i standard at the enterprise level. WPA consists of two standards: 802.1x for authentication and TKIP for encryption. 3.1 Brief overview of the wireless infrastructure at Children s Health System Children s hospital is proud to be one of the early implementers of wireless technology in the Birmingham metro area. A large wireless network was setup in year 2000 using Symbol Spectrum24 access points to support mobile stations on half of the hospital s floors. The Symbol access points support the IEEE standard at 2 Mbps data rate. Hardware address and SSID filtering were the only security measures available on these access points. In year 2002 we slowly started moving towards implementation of the IEEE b standard, which operates at 11 Mbps data rate. The Cisco Aironet 1200 access points are used to support this standard. At the same time we started replacing the existing Symbol access points with the Cisco access points. Users were excited about better data rate and more consistent performance of this new implementation. Being a more sophisticated standard than its predecessor, the IEEE b supported the following security features. i. SSID filtering ii. Hardware address filtering iii. Protocol filtering iv. Static WEP key support The IEEE b standard based wireless LAN is spread over the following buildings. i. Children s Hospital ii. Midtown Center iii. Children s Hospital Office Building iv. Ambulatory Care Center Wireless technology was quickly adopted by many users at our facility on laptops, PDAs, mobile carts, etc. Various clinical applications are also supported on these mobile devices. For example, MercuryMD s MData, is capable of integrating hospital data from existing clinical information systems and securely deliver patient information including demographics, laboratory results, medication lists, diagnostic reports, consults, transcribed reports directly to clinician s handheld devices. Physicians and nurses can place their handheld devices in synch stations. These stations are wirelessly connected to the MData server to access required patient information. They can also directly connect to the MData server if their devices are wireless capable. Such implementations quickly 17

18 popularized the usefulness of wireless LANs among the user community. They also increased efficiency of the staff, saved time, and quickly realized Return On Investment (ROI). Children s Health System s wireless infrastructure includes the following devices: i. Workstations running Windows NT, 2000, XP ii. PDAs running Windows CE, PPC 2002, PPC 2003, Palm OS iii. Cisco Aironet 1200 access points running VxWorks iv. Cisco Aironet 350 Workgroup bridges The sheer diversity of the wireless devices made implementation of the new security standards very complicated especially for the Palm OS based devices as they lacked inbuilt security tools. 3.2 Need to move on with the new security standards Some of the reasons why we wanted to introduce new security standards are explained below. i. Static WEP key implementation is time intensive and not very secure. With the static WEP key implementation, the same key is entered into each wireless device by the network administrators which take enormous amount of time to configure and maintain them. Also there is a chance for the key to slip into some one hand outside the wireless network team. Apart from these reasons several vulnerabilities exist with the WEP key implementation. All these vulnerabilities are elaborately explained in the previous chapter. ii. One of the security measures we have taken is hardware address filtering. Like static WEP management, this one also is a time intensive job. As of now we enter any new client adapter s hardware address into one of the access point s Address Filters list and export it to rest of the access points. Some times we issue these cards temporarily and some of the existing cards on the network get lost. These types of scenarios require frequent hardware address filter updates. At one point we considered purchasing wireless network management tools such as Airwave or Wavelink, but these are very expensive solutions. These tools act as a central management system; hardware addresses entered in them will be distributed to all the access points and updates take effect instantaneously. Apart from the management hassles, hardware addresses are vulnerable to spoofing. Also hardware addresses authenticate the devices not the users. iii. Right now user authentication is non-existent on our wireless network. We explored different wireless security products in the market to know if there are any that can solve the problems listed above and provide strong authentication, hack proof encryption, open standards compliance, and support various types of clients used in our hospital. 18

19 Funk Software and Meetinghouse Data Communications are the only few companies that offer software based wireless LAN security solutions. Funk Software s Odyssey Client allows users to connect to wireless LANs using the security credentials such as user id and password, digital certificates, etc. Odyssey Clients are available for Windows XP, 2000, xy, Me, Pocket PC, and Windows Mobile 2003 operating systems. Whereas, Meetinghouse Data Communications has clients for all of them including Palm operating system. This is the solution we are interested in as we have many users of Palm Tungsten C handheld devices with in-built wireless adapters. Their Aegis Client supports MD5, TLS, TTLS, Cisco LEAP, and PEAP authentication standards. Meetinghouse Data Communications also make Aegis Server to authenticate wireless LAN users. All their products are standards based and provide interoperability with other vendor solutions. Aegis Server is an Authentication, Authorization, and Accounting (AAA) Remote Authentication Dial In User Service (RADIUS) server, which can be configured either as a standalone or as a RADIUS server to pass user authentication credentials to Windows Active Directory server, Cisco Secure Access Control Server, or LDAP server. In case the Aegis Server is used as a standalone, a user database can be maintained with user ids and passwords to verify the supplied credentials. If it is merely used as a proxy to pass the credentials to a domain directory service, it will simplify the overall operation because a single user credential store is used for both domain and wireless LAN authentication. In addition to user authentication, access point authentication is also required on the wireless network to ensure that users are connecting to legitimate access points. 3.3 Aegis Server for authentication Aegis Server is a full implementation of RADIUS protocol according to the RFC Here are some of the features of Aegis Server: i. Supports EAP-MD5, EAP-TLS, EAP-TTLS, LEAP, and PEAP. ii. LDAP authentication. iii. Supports legacy authentication standards such as PAP, CHAP, MS-CHAP, MS-CHAP-V2, and UNIX password authentication. iv. Legacy authentication requests sent through a secure TTLS channel can be either handled by the AEGIS server or can be proxied to another RADIUS including Microsoft s IAS, Cisco s ACS, and Funk s Steel-belted RADIUS. v. It can be configured and monitored through a comprehensive graphical management console. Aegis Server requirements: It can run on any modest Pentium class machine. Here is a list of both hardware and software requirements. 19

20 i. Pentium 450 MHz or above processing power. ii. 256 MB RAM or above memory. iii. 10/100 Mbps Ethernet Interface. iv. Red Hat Linux v7.2 or above, Solaris 8.0, Windows 2000 or Windows XP operating system. v. Java Runtime Environment (JRE) vi. Aegis Server must use an Ethernet connection it should not use the same wireless network which it will authenticate. vii. Aegis Server must be configured with a static IP address. viii. Aegis Server must be installed on the same subnet on which the access points (authenticators) are setup. A trial version of the Aegis Server was downloaded onto a Windows XP machine and installed in the Program Files folder. Aegis Server runs as a service on the Windows. Aegis Server and TLS: Mutual authentication to ensure legitimacy of the network and strong encryption to prevent eavesdropping are two of the major requirements of wireless LANs. The Internet Engineering Task Force s (IETF) well-known Transport Layer Security (TLS) can satisfy both these requirements. Three TLS based protocols have been developed for use with EAP and are suitable for deployments with wireless LANs: i. EAP-TLS A TLS session will be established between client and server and certification validation is required on both ends. In this protocol both server and client digital certificates are required. ii. Tunneled Transport Layer Security (TTLS) It is an extension of TLS and was developed to overcome the need created for client-side certification of TLS. In this method, first a TLS encryption tunnel is established between a client and the TTLS server and then value pair exchange occurs between them. The encryption tunnel is used only for protecting the client authentication data. Once verified, the encryption tunnel is collapsed and it is up to the wireless devices to create WEP encryption channel for future data transfer. In this protocol a server digital certificate is required whereas client digital certificate is optional. iii. Protected EAP (PEAP) As with TTLS, an encryption channel is established using a server certificate over which the client authentication process is securely conducted. PEAP also requires a digital certificate on the server side but it is optional on the client side. Some of the important points about digital certificate authentication: i. Client digital certificate can be protected using a passphrase, personal identification number, etc. ii. A two-factor authentication method such as smartcards can be used to provide an extra level of security. User credentials such as client side digital certificate can be setup on these cards. They require user to enter the PIN to use the digital certificate. This technique is very secure and guards against mistakes 20

21 iii. iv. made because of ignorance, such as passwords carelessly displayed on keyboards or monitors. Furthermore, if an employee leaves the company, he can be asked to return the smartcard thus avoiding any potential security breach. EAP-TLS authentication requires expensive PKI rollout. Work required in issuing, managing, and revoking them is quite large. Whereas, TTLS and PEAP implementations does not require PKI rollout, they only require server side certificates. TTLS and PEAP implementations are similar and occur in two stages. Stage one of both protocols establish a TLS tunnel to authenticate the authentication server to the client with a certificate. Then in the second stage, client credentials are transferred through the established secure tunnel. Aegis server and MD5: MD5 is considered a base-level authentication method and not generally appropriate where strong security is required. A random challenge is issued to the client and the client responds to it by applying a hash algorithm on the shared secret. This method is prone to dictionary attacks as an attacker can obtain both the challenge and its corresponding response. It is very important for the users to choose non-dictionary based passwords. MD5 is also a one-sided authentication method. With one-sided authentication, a client may be fooled to communicate with a rogue AP deployed by a malicious person. Aegis Server and LEAP: Cisco developed Lightweight Extensible Authentication Protocol (LEAP) - a type of RADIUS EAP protocol to authenticate wireless clients. LEAP features mutual authentication, secure session key derivation and dynamic per user, per session WEP keys. Mutual authentication process relies on a shared secret the user s logon password which is known to both the client and the authentication server. User password is used to respond to challenges between the client and the RADIUS server. Initially Cisco LEAP is supported only by the Cisco Aironet access points and the Cisco Aironet wireless adapters. Recently Cisco started licensing their proprietary solution to interested chipset makers through the Cisco Compatible extension (CCX) program. CCX lets a Cisco access point to authenticate a non-cisco wireless client using the LEAP authentication. Here is a comparison chart of the authentication methods discussed above. Authentication method Security solution Client certificate Server certificate Dynamic key exchange EAP-MD5 EAP-TLS EAP-TTLS EAP-PEAP EAP-LEAP Standardsbasebasebasebased Standards- Standards- Standards- Proprietary No Yes Optional Optional No No Yes Yes Yes No No Yes Yes Yes Yes 21

22 Mutual authentication User id & Password Comments No Yes Yes Yes Yes Yes No Optional Optional Yes -> Easy to implement -> One-sided authentication; vulnerable to man-in-the middle attacks -> Requires clear text databases -> Mandates client certificates -> Involves a lot of maintenance and cost -> Creates a secure tunnel -> Supports legacy authentication methods -> Creates a secure tunnel -> Does not support legacy authentication methods -> Proprietary solution -> AP must support LEAP 3.4 Aegis Server Configuration Table 3.1 WPA authentication methods The Aegis Server console is a Java GUI, it allows configuration of the server, lets the administrator look at the server request and response statistics, individual authentication methods statistics, and log information. Aegis server s home screen is shown below. In this page the default authentication and accounting ports are configured. Figure 3.1 Aegis Server home screen The server policy can be either EAP or LDAP. If an external user id database is used to authenticate the wireless clients, a friendly Realm Name can be given to it under the Realms tab. 22

23 Figure 3.2 Aegis Server s Realms screen The following screenshot shows the identity of the external LDAP server. Figure 3.3 Aegis Server s LDAP configuration module To only let the legitimate access points to provide network access to the wireless clients, the authentication server requires them to share a secret with it. The access points are configured under the NAS (Network Access Server) Clients tab. 23

24 Figure 3.4 Aegis Server s access point listing screen These two access points are configured to provide WPA authentication. Individual configuration of one of the access points is shown below. Figure 3.5 Aegis Server s access point configuration screen 24

25 The access point s name, IP address, shared secret are shown in the above screenshot. Modules: Modules button is present on the left hand side navigation. All the supported authentication types are shown under the Modules tab. Figure 3.6 Aegis Server s authentication types screen Properties of different EAP types discussed above can be set in the following screen. Figure 3.7 Available EAP types screen 25

26 In our implementation LEAP is set as the preferred EAP type, but it can be change to MD5, PEAP, TLS, or TTLS. If the supplicant does not support LEAP it can respond with an EAP_NAK packet which contains an alternative EAP method. If the server does not support the alternative method in the NAK, authentication will fail. AAA Policy settings to configure Authentication, Authorization, and Accounting policies and Storage Policy to store the user database, and log information can also be set on this screen. Storage Policy can be set to store either locally or on a remote server. Local Users: User and Group accounts are configured by clicking on the Local Users button on the left hand side navigation. Figure 3.8 Aegis Server s user listing screen Users may be assigned to one of the Groups and the authentication policy can be set as shown in the following screen. Aegis Server lets the administrator set the authentication type for different user accounts. For example User A may use EAP authentication method whereas User B may use LDAP as the authentication method. 26

27 Figure 3.9 Aegis Server s user configuration screen 27

28 3.5 Access Point Configuration We are using Cisco Aironet 1200 series access points to function as authenticators. The authentication port and shared secret parameters should match with the Aegis Server settings. Aegis Server s IP address is also entered into this screen to let the authenticator know the location of the authentication server. Figure 3.10 Access point configuration to use the authentication server The access point is also set to request the connecting wireless client to send its authentication details. The access point is set to use static WEP encryption method. 28

29 Figure 3.11 Access point configuration to allow only EAP clients Static WEP, Dynamic WEP, TKIP, and MIC: The access point can be configured to use either static WEP or dynamic WEP keying. If static WEP keying is used on the access point the same WEP key needs to be entered into each wireless client. With the dynamic WEP keying key setup is not required at all. WEP key rotation interval can be set in the following screen. With Broadcast WEP key rotation enabled, the access point provides a dynamic broadcast WEP key and changes it at the configured interval. Broadcast key rotation is an excellent alternative to TKIP if the wireless network supports many non-cisco devices. If this parameter is enabled, only the clients that can use LEAP or EAP-TLS authentication methods will be able to access the networks. Clients that are setup for EAP-MD5 and open or shared WEP authentication methods will lose wireless network connectivity. 29

30 Figure 3.12 MIC, TKIP configuration on the access point TKIP for encryption and MIC for message integrity can also be set in the screen above. Also Use Aironet Extensions should be left as yes which is default. If TKIP and MIC are enabled on the access point they must be enabled on the wireless client also, to connect with the network. Expect to see AES encryption option in the future, which is part of the i wireless security standard. As of now only few clients support these two functions. For example, a Cisco Aironet 350 series wireless LAN adapter with new Aironet Client Utility (ACU) supports TKIP. WPA configuration for a Cisco Aironet 350 series wireless adapter is shown below. 30

31 Figure 3.13 Latest Cisco wireless client adapter s configuration screen 3.6 Aegis Client Configuration For this project Aegis Client is used as the supplicant. Screenshot of the Aegis Client is shown below. A different profile can be setup for each wireless network. For example two separate profiles can be setup, one for test and other for production networks. In this example LEAP is set as the authentication type. Both the Identity and Password fields must be set to the same values created on the Aegis Server (RADIUS server) to successfully connect with the network. 31

32 Figure 3.14 Aegis Client configuration screen Authentication type and the corresponding required parameters are shown in the following table. Authentication type Required parameters MD5-Challenge Identity, Password TLS/Smart Card Identity, Client Certificate LEAP Identity, Password TTLS Identity, Client Certificate; or Identity, Password, and Authentication protocol for the Tunneled authentication PEAP Identity, Client Certificate; or Identity, Password, and Authentication protocol for the Tunneled authentication Table 3.2 Aegis Client parameter requirement for various EAP methods The above parameters must be filled unless the Use Windows logon credentials box is checked. If this box is checked there is no need to enter the Identity and Password information. The supplicant will use the Windows login information to authenticate the user to the wireless network. 32

33 3.7 Workgroup Bridge Configuration Apart from the wireless laptops and PDAs, we have more than twenty Cisco Aironet 350 series Workgroup bridges spread all over the hospital. They are primarily used to provide wireless network access to MercuryMD MData synch stations. Wireless connectivity eliminated the need for expensive and time consuming job of running the Ethernet cable to these stations. The current Cisco Aironet 350 series Workgroup bridges are running firmware version This firmware only supports the EAP-LEAP authentication and static WEP key for encryption. The configuration screen for a wireless Workgroup bridge is shown below. Figure 3.15 Cisco Aironet Workgroup bridge configuration for LEAP authentication 33

34 Appendix A Proof of WPA Authentication of the Wireless Client A ViewSonic Tablet PC is used as a wireless client and the Aegis Client supplicant software is installed on it. The Aegis Server is installed on a Compaq laptop. The Cisco Aironet 1200 series access point is setup to request EAP credentials from the clients. Here is a screenshot of the Aegis Client s configuration (this was also shown in Chapter 3). Figure A.1 Aegis Client configuration screen Here is a screenshot of the wireless adapter establishing association with the nearest access point. Figure A.2 Aegis Client authentication screen 34

35 After the user successfully submitted credentials, the client was allowed to connect to the network. Here is a screenshot of the IP address assignment. Figure A.3 Wireless client s IP address assignment 35

36 Here is a proof of successful network connectivity. Figure A.4 Proof of successful network connectivity after authentication 36

37 Here is the access point s client association view. Notice that rest of the wireless clients lost connectivity as they are not configured for authentication. Figure A.5 Wireless client association with the access point Aegis Server s received requests, sent responses and authentication statistics are shown below. Figure A.6 Aegis Server s request response statistics 37

38 Figure A.7 Aegis Server s authentication statistics Aegis Server s log is shown below (my comments are in red font). Dec 01 22:19:12: DEBUG: Incoming auth request (client s authentication request is received from the access point) Dec 01 22:19:12: DEBUG: Received packet from xy.1263: (access point s IP and port addresses) Code: Access-Request (1) ID: 235 User-Name: Kalyan (user id) CISCO-AV-Pair: D F NAS-IP-Address: xy (access point s IP) Called-Station-Id: Calling-Station-Id: NAS-Identifier: 41 6E F NAS-Port: 42 Framed-MTU: 1400 NAS-Port-Type: Wireless (19) (access point s standard) Service-Type: Login (1) (client s request type) EAP-Message: B 01 4B 61 6C E Message-Authenticator: E0 8A 9C CC C3 EA 17 1B F9 CF FF 22 0E EF 38

39 Dec 01 22:19:12: DEBUG: Result of fetching user using 'fuser' instance: OK Dec 01 22:19:12: DEBUG: Result of fetching user using 'local-storage' storage: OK (authentication request verified) Dec 01 22:19:12: DEBUG: Using authentication module 'eap' (authentication module) Dec 01 22:19:12: DEBUG: Created new state: 7 (001A25D8) (client s status is changed after verification) Dec 01 22:19:12: DEBUG: Created new state 7. Dec 01 22:19:12: DEBUG: Result of applying policy 'eap' (AUTHENTICATION): OK (client s authentication credentials are received) Dec 01 22:19:12: DEBUG: Sent packet to xy.1263: (access challenge is sent to the client via the access point) Code: Access-Challenge (11) ID: 235 AS-Auth-Type: EAP (5) AS-EAP-Type: LEAP (17) (EAP-LEAP) State: F (17 bytes) EAP-Message: B2... (22 bytes) Message-Authenticator: AB AC C9 60 EC A7 5B 06 EC 26 9F DA Dec 01 22:19:12: DEBUG: Incoming auth request Dec 01 22:19:12: DEBUG: Received packet from xy.1264: Code: Access-Request (1) ID: 236 User-Name: Kalyan CISCO-AV-Pair: D F NAS-IP-Address: xy Called-Station-Id: Calling-Station-Id: NAS-Identifier: 41 6E F NAS-Port: 42 Framed-MTU: 1400 State: F (17 bytes) NAS-Port-Type: Wireless (19) Service-Type: Login (1) EAP-Message: BC E8... (38 bytes) Message-Authenticator: 1D 06 B7 A4 EF DE AF 7A D1 2E D8 88 Dec 01 22:19:12: DEBUG: Result of fetching user using 'fuser' instance: OK. Dec 01 22:19:12: DEBUG: Result of fetching user using 'local-storage' storage: OK. Dec 01 22:19:12: DEBUG: Using authentication module 'eap' Dec 01 22:19:12: DEBUG: Using state 7. Dec 01 22:19:12: DEBUG: Result of applying policy 'eap' (AUTHENTICATION): OK. Dec 01 22:19:12: DEBUG: Sent packet to xy.1264: Code: Access-Challenge (11) ID:

40 AS-Auth-Type: EAP (5) AS-EAP-Type: LEAP (17) State: F (17 bytes) EAP-Message: 03 0A Message-Authenticator: 39 0A 4D B A 48 6A B1 37 8B 35 Dec 01 22:19:12: DEBUG: Incoming auth request Dec 01 22:19:12: DEBUG: Received packet from xy.1265: Code: Access-Request (1) ID: 237 User-Name: Kalyan CISCO-AV-Pair: D F NAS-IP-Address: xy Called-Station-Id: Calling-Station-Id: NAS-Identifier: 41 6E F NAS-Port: 42 Framed-MTU: 1400 State: F (17 bytes) NAS-Port-Type: Wireless (19) Service-Type: Login (1) EAP-Message: 01 0A (22 bytes) Message-Authenticator: F6 CF F 5B DA 43 B2 7B D D Dec 01 22:19:12: DEBUG: Result of fetching user using 'fuser' instance: OK. Dec 01 22:19:12: DEBUG: Result of fetching user using 'local-storage' storage: OK. Dec 01 22:19:12: DEBUG: Using authentication module 'eap' Dec 01 22:19:12: DEBUG: Using state 7. Dec 01 22:19:12: DEBUG: Remove state 7 (001A25D8) Dec 01 22:19:12: DEBUG: Result of applying policy 'eap' (AUTHENTICATION): OK (client s authentication request successful) Dec 01 22:19:12: DEBUG: Sent packet to xy.1265: (permission to let the client to connect to the network is sent to the access point) Code: Access-Accept (2) ID: 237 AS-Auth-Type: EAP (5) AS-EAP-Type: LEAP (17) CISCO-AV-Pair: 6C A F... (51 bytes) EAP-Message: 02 0A ED... (32 bytes) Session-Timeout: 3600 Message-Authenticator: 7A E4 FA 80 C3 F9 43 5F 1F 65 E8 FC 6D 7F C7 F7 Aegis Client s log is written to the Windows XP s Application Log. 40

41 Appendix B Proof of WPA Authentication of the Workgroup Bridge Here is a screenshot of the Workgroup bridge s association with the access point. Note that the access point requires authentication credentials from the connecting devices. Figure B.1 Workgroup bridge and wireless client association with the access point This screen shows that only the wireless client and the Workgroup bridge were successfully associated, where as the third device was not associated. 41

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Appendix E Wireless Networking Basics

Appendix E Wireless Networking Basics Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical

More information

FAQ on Cisco Aironet Wireless Security

FAQ on Cisco Aironet Wireless Security FAQ on Cisco Aironet Wireless Security Document ID: 68583 Contents Introduction General FAQ Troubleshooting and Design FAQ Related Information Introduction This document provides information on the most

More information

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov. Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE

More information

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL Q&A PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL This document answers questions about Protected Extensible Authentication Protocol. OVERVIEW Q. What is Protected Extensible Authentication Protocol? A.

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

A Configuration Protocol for Embedded Devices on Secure Wireless Networks A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)

More information

Wireless LAN Security. Gabriel Clothier

Wireless LAN Security. Gabriel Clothier Wireless LAN Security Gabriel Clothier Timeline 1997: 802.11 standard released 1999: 802.11b released, WEP proposed [1] 2003: WiFi alliance certifies for WPA 2004: 802.11i released 2005: 802.11w task group

More information

Security Setup CHAPTER

Security Setup CHAPTER CHAPTER 8 This chapter describes how to set up your bridge s security features. This chapter contains the following sections: Security Overview, page 8-2 Setting Up WEP, page 8-7 Enabling Additional WEP

More information

Chapter 24 Wireless Network Security

Chapter 24 Wireless Network Security Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically

More information

Summary. Deployment Guide: Configuring the Cisco Wireless Security Suite 1 OL

Summary. Deployment Guide: Configuring the Cisco Wireless Security Suite 1 OL Summary Numerous papers have been written on the topic of IEEE 802.11 security for wireless LANs (WLANs). The major vulnerabilities of 802.11 security can be summarized as follows: Weak device-only authentication:

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE

More information

Configuring Authentication Types

Configuring Authentication Types CHAPTER 11 This chapter describes how to configure authentication types on the access point. This chapter contains these sections: Understanding Authentication Types, page 11-2, page 11-10 Matching Access

More information

Protected EAP (PEAP) Application Note

Protected EAP (PEAP) Application Note to users of Microsoft Windows 7: Cisco plug-in software modules such as EAP-FAST and PEAP are compatible with Windows 7. You do not need to upgrade these modules when you upgrade to Windows 7. This document

More information

Configuring the Client Adapter through Windows CE.NET

Configuring the Client Adapter through Windows CE.NET APPENDIX E Configuring the Client Adapter through Windows CE.NET This appendix explains how to configure and use the client adapter with Windows CE.NET. The following topics are covered in this appendix:

More information

Configuring the Client Adapter through the Windows XP Operating System

Configuring the Client Adapter through the Windows XP Operating System APPENDIX E through the Windows XP Operating System This appendix explains how to configure and use the client adapter with Windows XP. The following topics are covered in this appendix: Overview, page

More information

Csci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802.

Csci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802. WEP Weakness Csci388 Wireless and Mobile Security Access Control:, EAP, and Xiuzhen Cheng cheng@gwu.edu 1. IV is too short and not protected from reuse 2. The per packet key is constructed from the IV,

More information

802.1x. ACSAC 2002 Las Vegas

802.1x. ACSAC 2002 Las Vegas 802.1x ACSAC 2002 Las Vegas Jeff.Hayes@alcatel.com 802.1 Projects The IEEE 802.1 Working Group is chartered to concern itself with and develop standards and recommended practices in the following areas:

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information

Securing a Wireless LAN

Securing a Wireless LAN Securing a Wireless LAN This module describes how to apply strong wireless security mechanisms on a Cisco 800, 1800, 2800, or 3800 series integrated services router, hereafter referred to as an access

More information

Network Access Flows APPENDIXB

Network Access Flows APPENDIXB APPENDIXB This appendix describes the authentication flows in Cisco Identity Services Engine (ISE) by using RADIUS-based Extensible Authentication Protocol (EAP) and non-eap protocols. Authentication verifies

More information

Product Brief: SDC-EC25N n ExpressCard Card with Integrated Antenna

Product Brief: SDC-EC25N n ExpressCard Card with Integrated Antenna Product Brief: SDC-EC25N 802.11n ExpressCard Card with Integrated Antenna The SDC-EC25N ExpressCard radio card from Summit Data Communications combines a high-performance, dual-band 802.11n radio with

More information

Product Brief: SDC-PE15N n PCIe Module with Antenna Connectors

Product Brief: SDC-PE15N n PCIe Module with Antenna Connectors Product Brief: SDC-PE15N 802.11n PCIe Module with Antenna Connectors The SDC-PE15N PCI Express Mini Card (PCIe) radio module from Summit Data Communications combines a high-performance, dual-band 802.11n

More information

Configuring the Client Adapter

Configuring the Client Adapter CHAPTER 5 This chapter explains how to configure profile parameters. The following topics are covered in this chapter: Overview, page 5-2 Setting General Parameters, page 5-3 Setting Advanced Parameters,

More information

Wireless Networking WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses

More information

Product Brief: SDC-MSD30AG a/g Miniature SDIO Module with Antenna Connectors

Product Brief: SDC-MSD30AG a/g Miniature SDIO Module with Antenna Connectors Product Brief: SDC-MSD0AG 802.11a/g Miniature SDIO Module with Antenna Connectors The SDC-MSD0AG SDIO radio module from Summit Data Communications combines a high-performance 802.11a/g radio with the Summit

More information

Lab Configure Enterprise Security on AP

Lab Configure Enterprise Security on AP Lab 8.5.4.1 Configure Enterprise Security on AP Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will demonstrate an understanding

More information

Hardware Capabilities. Product Brief: SDC-PC20G g PCMCIA Card with Integrated Antenna

Hardware Capabilities. Product Brief: SDC-PC20G g PCMCIA Card with Integrated Antenna Product Brief: SDC-PC20G 802.11g PCMCIA Card with Integrated Antenna The SDC-PC20G PCMCIA card from Summit Data Communications combines Summit s 802.11g radio and customized software both proven on mobile

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

Security in IEEE Networks

Security in IEEE Networks Security in IEEE 802.11 Networks Mário Nunes, Rui Silva, António Grilo March 2013 Sumário 1 Introduction to the Security Services 2 Basic security mechanisms in IEEE 802.11 2.1 Hidden SSID (Service Set

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

Product Brief: SDC-PC22AG a/g PCMCIA Card with Integrated Antenna

Product Brief: SDC-PC22AG a/g PCMCIA Card with Integrated Antenna Product Brief: SDC-PC22AG 802.11a/g PCMCIA Card with Integrated Antenna The SDC-PC22AG PC Card (PCMCIA) radio card from Summit Data Communications combines a high-performance 802.11a/g radio with customized

More information

Standard For IIUM Wireless Networking

Standard For IIUM Wireless Networking INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version

More information

Securing Your Wireless LAN

Securing Your Wireless LAN Securing Your Wireless LAN Pejman Roshan Product Manager Cisco Aironet Wireless Networking Session Number 1 Agenda Requirements for secure wireless LANs Overview of 802.1X and TKIP Determining which EAP

More information

Product Brief: SDC-MCF10G g Miniature CF Module with Antenna Connectors

Product Brief: SDC-MCF10G g Miniature CF Module with Antenna Connectors Product Brief: SDC-MCF10G 802.11g Miniature CF Module with Antenna Connectors The SDC-MCF10G miniature compact flash radio module from Summit Data Communications is a high-performance 802.11g radio in

More information

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted. Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.

More information

Wireless LAN USB Super G 108 Mbit. Manual

Wireless LAN USB Super G 108 Mbit. Manual Wireless LAN USB Super G 108 Mbit Manual Dear Customer, Thanks for choosing Hamlet. Please carefully follow the instructions for its use and maintenance and, once this item has run its life span, we kindly

More information

11n Wireless USB Adapter

11n Wireless USB Adapter User Manual 11n Wireless USB Adapter Model No.: SP907NS Table of Content 1. INTRODUCTION... 2 1.1 Features... 2 1.2 Specifications... 2 1.3 Package Contents... 3 2. INSTALLATION PROCEDURE... 4 2.1 Install

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Securing Wireless Networks by By Joe Klemencic Mon. Apr http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies

More information

b/g/n 1T1R Wireless USB Adapter. User s Manual

b/g/n 1T1R Wireless USB Adapter. User s Manual 802.11 b/g/n 1T1R Wireless USB Adapter User s Manual Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device,

More information

Wireless Networking Basics. Ed Crowley

Wireless Networking Basics. Ed Crowley Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2

More information

Wireless Technologies

Wireless Technologies Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless

More information

Wireless MAXg Technology

Wireless MAXg Technology Wireless MAXg Technology MAXimizing range, performance, security and simplicity for 802.11g networks Technology Note Wireless technology has undoubtedly become a ubiquitous presence in our computing environment,

More information

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment

More information

U S E R M A N U A L b/g PC CARD

U S E R M A N U A L b/g PC CARD U S E R M A N U A L 802.11b/g PC CARD Table of Content CHAPTER 1 INTRODUCTION... 1 1.1 WIRELESS LAN FEATURE FUNCTIONS... 1 1.2 REGULATORY NOTICE... 1 1.2.1 FCC Class B Statement...1 1.2.2 Canadian Regulatory

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer Managing and Securing Computer Networks Guy Leduc Chapter 7: Securing LANs Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2016. (section 8.8) Also

More information

COPYRIGHTED MATERIAL. Contents

COPYRIGHTED MATERIAL. Contents Contents Foreword Introduction xxv xxvii Assessment Test xxxviii Chapter 1 WLAN Security Overview 1 Standards Organizations 3 International Organization for Standardization (ISO) 3 Institute of Electrical

More information

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks

More information

Product Brief: SDC-PC10AG a/g Compact Flash Module with Antenna Connectors

Product Brief: SDC-PC10AG a/g Compact Flash Module with Antenna Connectors Product Brief: SDC-PC10AG 802.11a/g Compact Flash Module with Antenna Connectors The SDC PC10AG PC Card (PCMCIA) radio module from Summit Data Communications combines a high performance 802.11a/g radio

More information

How Insecure is Wireless LAN?

How Insecure is Wireless LAN? Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost

More information

Wireless Security i. Lars Strand lars (at) unik no June 2004

Wireless Security i. Lars Strand lars (at) unik no June 2004 Wireless Security - 802.11i Lars Strand lars (at) unik no June 2004 802.11 Working Group 11 of IEEE 802 'Task Groups' within the WG enhance portions of the standard: 802.11 1997: The IEEE standard for

More information

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the

More information

Configuring the Client Adapter through the Windows XP Operating System

Configuring the Client Adapter through the Windows XP Operating System APPENDIX E Configuring the Client Adapter through the Windows XP Operating System This appendix explains how to configure and use the client adapter with Windows XP. The following topics are covered in

More information

802.1X: Deployment Experiences and Obstacles to Widespread Adoption

802.1X: Deployment Experiences and Obstacles to Widespread Adoption 802.1X: Deployment Experiences and Obstacles to Widespread Adoption Terry Simons University of Utah; open1x.org Terry.Simons@utah.edu Jon Snyder Portland State University jon@pdx.edu 802.1X Adoption Ratified

More information

AmbiCom WL11-SD Wireless LAN SD Card. User Manual

AmbiCom WL11-SD Wireless LAN SD Card. User Manual AmbiCom WL11-SD Wireless LAN SD Card User Manual Version 3.0 October 15, 2004 Table of Contents 1 WL11-SD features...3 2 Package Contents & System Requirements...3 2.1 Package Contents... 3 2.2 System

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless

More information

Configuring a VAP on the WAP351, WAP131, and WAP371

Configuring a VAP on the WAP351, WAP131, and WAP371 Article ID: 5072 Configuring a VAP on the WAP351, WAP131, and WAP371 Objective Virtual Access Points (VAPs) segment the wireless LAN into multiple broadcast domains that are the wireless equivalent of

More information

TestsDumps. Latest Test Dumps for IT Exam Certification

TestsDumps.  Latest Test Dumps for IT Exam Certification TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : PW0-200 Title : Certified wireless security professional(cwsp) Vendors : CWNP Version : DEMO Get Latest & Valid PW0-200

More information

Exam : PW Title : Certified wireless security professional(cwsp) Version : DEMO

Exam : PW Title : Certified wireless security professional(cwsp) Version : DEMO Exam : PW0-200 Title : Certified wireless security professional(cwsp) Version : DEMO 1. Given: John Smith often telecommutes from a coffee shop near his home. The coffee shop has an 802.11g access point

More information

Advanced Security and Mobile Networks

Advanced Security and Mobile Networks Advanced Security and Mobile Networks W.Buchanan (1) 9. GSM/3G Unit 7: Mobile Networks. Wireless. Security. Mobile IP. Mobile Agents. Spread spectrum. Military/Emergency Networks 8. Ad-hoc 7. Mobile Networks

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

Chapter 7. Basic Wireless Concepts and Configuration. Part I

Chapter 7. Basic Wireless Concepts and Configuration. Part I Chapter 7 Basic Wireless Concepts and Configuration Part I CCNA3-1 Chapter 7-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,

More information

Designing AirPort Extreme n Networks

Designing AirPort Extreme n Networks Designing AirPort Extreme 802.11n Networks 1 Contents Chapter 1 3 Getting Started 5 Configuring the AirPort Extreme Base Station for Internet Access Using AirPort Utility 6 Extending the Range of Your

More information

Network Security 1. Module 7 Configure Trust and Identity at Layer 2

Network Security 1. Module 7 Configure Trust and Identity at Layer 2 Network Security 1 Module 7 Configure Trust and Identity at Layer 2 1 Learning Objectives 7.1 Identity-Based Networking Services (IBNS) 7.2 Configuring 802.1x Port-Based Authentication 2 Module 7 Configure

More information

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012 NWD2705 Dual-Band Wireless N450 USB Adapter Version 1.00 Edition 1, 09/2012 Quick Start Guide User s Guide www.zyxel.com Copyright 2012 ZyXEL Communications Corporation IMPORTANT! READ CAREFULLY BEFORE

More information

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 Florin OGÎGĂU-NEAMŢIU National Defense University of Romania "Carol I"/ The Regional

More information

Cisco Aironet 350 (DS) AP IOS Software

Cisco Aironet 350 (DS) AP IOS Software Cisco Aironet 350 (DS) AP IOS Software This document details the specifications for configuring the Cisco Aironet 350 series access points (APs) using the IOS software with NetLink Wireless Telephones.

More information

Configuring Cipher Suites and WEP

Configuring Cipher Suites and WEP 10 CHAPTER This chapter describes how to configure the cipher suites required to use WPA authenticated key management, Wired Equivalent Privacy (WEP), Temporal Key Integrity Protocol (TKIP), and broadcast

More information

Exam Questions CWSP-205

Exam Questions CWSP-205 Exam Questions CWSP-205 Certified Wireless Security Professional https://www.2passeasy.com/dumps/cwsp-205/ 1.. What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism

More information

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ... Interworking 2006 Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks Interworking Conference, 15th - 17th of January 2007 Dr-Ing Kai-Oliver Detken Business URL: http://wwwdecoitde

More information

NT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs

NT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs NT1210 Introduction to Networking Unit 6: Chapter 6, Wireless LANs Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of networks

More information

Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE

Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE COURSE TITLE WIRELESS TECHNOLOGY SPECIALIST COURSE DURATION 13 Hours of Interactive Training COURSE OVERVIEW This course will teach you

More information

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Radius, LDAP, Radius, Kerberos used in Authenticating Users CSCD 303 Lecture 5 Fall 2018 Radius, LDAP, Radius, Kerberos used in Authenticating Users Kerberos Authentication and Authorization Previously Said that identification, authentication and authorization

More information

Celestix Networks, Inc. 702 Brown Road. Fremont, California Ph Fx Introduction to Wireless Local Area Network

Celestix Networks, Inc. 702 Brown Road. Fremont, California Ph Fx Introduction to Wireless Local Area Network Introduction to Wireless Local Area Network white paper Introduction A wireless local area network (WLAN) is a flexible data communications system that can use either infrared or radio frequency (RF) technology

More information

802.11a g Dual Band Wireless Access Point. User s Manual

802.11a g Dual Band Wireless Access Point. User s Manual 802.11a+802.11g Dual Band Wireless Access Point User s Manual 0 Chapter 1 Introduction 1.1 Feature Fully interoperable with IEEE 802.11b compliant products. High-Speed data transfer rate up to 11Mbps.

More information

11N Wireless PCI Adapter User Guide -6-

11N Wireless PCI Adapter User Guide -6- -6- Copyright Statement is the registered trademark of Shenzhen Tenda Technology Co., Ltd. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective

More information

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities Wireless Security Comp Sci 3600 Security Outline 1 2 3 Wired versus wireless Endpoint Access point Figure 24.1 Wireless Networking Components Locations and types of attack Outline 1 2 3 Wired Equivalent

More information

300M Wireless-N Mini USB Adapter

300M Wireless-N Mini USB Adapter Model No. ib-wua300nm Ver.: 1.0.0 FCC STATEMENT This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed

More information

11N Wireless PCI Adapter User Guide

11N Wireless PCI Adapter User Guide -- 1 -- Copyright Statement is the registered trademark of Shenzhen Tenda Technology Co., Ltd. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Implementing X Security Solutions for Wired and Wireless Networks

Implementing X Security Solutions for Wired and Wireless Networks Implementing 802.1 X Security Solutions for Wired and Wireless Networks Jim Geier WILEY Wiley Publishing, Inc. Contents Introduction xxi Part I Concepts 1 Chapter 1 Network Architecture Concepts 3 Computer

More information

Cross-organisational roaming on wireless LANs based on the 802.1X framework Author:

Cross-organisational roaming on wireless LANs based on the 802.1X framework Author: Cross-organisational roaming on wireless LANs based on the 802.1X framework Author: Klaas Wierenga SURFnet bv P.O. Box 19035 3501 DA Utrecht The Netherlands e-mail: Klaas.Wierenga@SURFnet.nl Keywords:

More information

11N Wireless USB Adapter User Guide

11N Wireless USB Adapter User Guide -- 1 -- Copyright Statement is the registered trademark of Shenzhen Tenda Technology Co., Ltd. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective

More information

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms

More information

ClearPass QuickConnect 2.0

ClearPass QuickConnect 2.0 ClearPass QuickConnect 2.0 User Guide Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the Mobile Edge Company logo,

More information

Outdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0

Outdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0 Outdoor High Power 802.11b/g/n Wireless USB Adapter USER MANUAL 4.0 2012 Contents 1 Introduction... 3 2 Hardware Installation... 4 3 Driver Installation... 6 3.1 Windows XP... 6 3.2 Windows Vista... 9

More information

High Power Wireless N USB Adapter User s Manual

High Power Wireless N USB Adapter User s Manual High Power Wireless N USB Adapter User s Manual 2 Table of Contents 1. Introduction... 4 1.1 Package Contents... 4 1.2 Features... 4 2. Installation... 5 3. Configuring the Adapter... 11 4. Wireless Utility...

More information

Wi-Fi Scanner. Glossary. LizardSystems

Wi-Fi Scanner. Glossary. LizardSystems Wi-Fi Scanner Glossary LizardSystems 2 Table of Contents 802 6 802.11 6 802.11a 6 802.11b 6 802.11d 6 802.11e 6 802.11g 6 802.11h 6 802.11i 6 802.11j 6 802.11n 7 802.1X 7 802.3 7 A 8 Ad-Hoc mode 8 AES

More information

Wireless LAN Access Point

Wireless LAN Access Point Wireless LAN Access Point IEEE 802.11b 11Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4 Physical Description...

More information

Table of Contents. Chapter1 About g Wireless LAN USB Adapter...1

Table of Contents. Chapter1 About g Wireless LAN USB Adapter...1 Table of Contents Chapter1 About 802.11g Wireless LAN USB Adapter...1 1-1 Features and Benefits... 1 1-2 Applications... 2 1-3 Product Kit... 3 1-4 About IEEE 802.11g Wireless LAN USB Adapter LED Indicators...

More information

COPYRIGHT & TRADEMARKS

COPYRIGHT & TRADEMARKS COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK Technologies Co., Ltd. Other brands and product names are trademarks or registered trademarks

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #7 WiFi Security 1 Announcements Please do HW#2 in using the stable OMNET++ 4.6, not the beta version. Porting has proven difficult... Form project

More information

WL-5420AP. User s Guide

WL-5420AP. User s Guide WL-5420AP User s Guide Table of contents INTRODUCTION... 1 About the Operation Modes...2 LED Indicators...5 Solid...5 Ports on the Rear Panel...7 GETTING CONNECTED... 8 WPA AP -CONFIGURATION VIA WEB...

More information

IT220 Network Standards & Protocols. Unit 6: Chapter 6 Wireless LANs

IT220 Network Standards & Protocols. Unit 6: Chapter 6 Wireless LANs IT220 Network Standards & Protocols Unit 6: Chapter 6 Wireless LANs 2 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #7 More WiFi Security 2015 Patrick Tague 1 Class #7 Continuation of WiFi security 2015 Patrick Tague 2 Device Private WiFi Networks AP Local AAA

More information

Viewing Status and Statistics

Viewing Status and Statistics CHAPTER 7 This chapter explains how to use ADU to view the client adapter s status and its transmit and receive statistics. The following topics are covered in this chapter: Overview of ADU and Statistics

More information

Cisco Wireless LAN Controller Module

Cisco Wireless LAN Controller Module Cisco Wireless LAN Controller Modules Simple and secure wireless deployment and management for small and medium-sized businesses (SMBs) and enterprise branch offices Product Overview Cisco Wireless LAN

More information