Securing Wireless LANs

Size: px
Start display at page:

Download "Securing Wireless LANs"

Transcription

1 Securing Wireless LANs Oct 30th, 2002 Louis Senecal 4515_03_2002_c1 2002, Cisco Systems, Inc. All rights reserved. 1

2 Agenda WLAN Overview Intro to WLAN Security Attack Scenarios Mitigation Stategies 2

3 Benefits of Wireless Mobility within building or campus Lots of Notebooks / Handhelds Convenience (no cables) Flexibility (anytime, anywhere access) Challenging Work Environments Easier to set-up temporary spaces Cost Effective No cable infrastructure / trenching Moves / Adds / Changes Reduce / Eliminate Recurring Network Costs Investment Protection Pick it up and move it out Productivity gains Rapid Deployment 3

4 Wireless Office Quickly emerging market New solutions being developed Ad hoc network may be the answer May want site survey for future growth All Cisco Offices Use WLANs as infrastructure overlay Wireless Technology becoming Pervasive Public Hotspots 4

5 NOP Study Wireless LANs Increase Productivity Based on a survey of 300+ U.S.- based organizations with more than 100 employees: End users stayed connected an average of 1¾ hours more per day to their corporate network Average daily time savings: 70 minutes Productivity: +22% Source: NOP World-Technology, Sept

6 Wireless LAN Technologies b a g Frequency Band 2.4 GHz 5 GHz 2.4 GHz Availability Worldwide US/AP Worldwide Maximum Data Rate 11 Mbps 54 Mbps 54 Mbps 6

7 Frequency Bands Audio Short Wave Radio AM Broadcast FM Broadcast Television Cellular (840MHz) NPCS (1.9GHz) Infrared wireless LAN Extremely Low Very Low Low Medium High Very Ultra High High Super High Infrared Visible Light Ultraviolet X-Rays 900 MHz 26 MHz 11.b 11.g 11.a 2.4GHZ 83.5 MHz 5 GHz Older Devices 11 FC (3 non-overlapping) Industrial, Scientific & Medical (ISM) band (8 non-overlapping) Unlicensed National Information Infrastructure (U-NII) band7

8 IEEE Standard Activities a 54 Mbps, 5 GHz, ratified in 1999, b 11Mbps, 2.4 GHz, ratified in d World Wide Roaming e Quality of Service f Inter-Access Point Protocol (IAPP) To be ratified soon g Higher Data rate (54 Mbps) 2.4 GHz h Dynamic Frequency Selection and Transmit Power Control mechanisms i Authentication and Security 8

9 Local Area Network (LAN) Wireless LAN (WLAN) as an extension to wired LAN Cisco Switch Cisco Switch Cisco Access Point Server Cisco Switch Rogue Access Point?? Internet Work Group Bridge 9

10 Typical Multicell Configuration Channel 1 Channel 6 LAN Backbone Wireless Cell Access Point Wireless Cell Wireless Clients 10

11 Association Process -- Passive Scanning Access Point A Access Point B Steps to Association: Client sends probe. AP sends probe response. Client evaluates AP response, selects best AP. Client sends authentication request to selected AP (A). AP A confirms authentication and registers client. Client sends association request to selected AP (A). Initial connection to an Access Point AP A confirms association and registers client. 11

12 Aironet b: Power and Range 11 Mbps DSSS feet 30mW feet radius@ 100mW 5.5 Mbps DSSS feet radius@ 30mW feet radius@ 100mW 2 Mbps DSSS feet radius@30mw feet radius@100mw 12

13 Channel Setup Site Survey Channel Example Channel 1 Channel 11 Channel 6 Channel 11 Channel 6 Channel 6 Channel 1 Channel 11 Channel 1 Channel 11 13

14 Multi-rate Implementation Site Survey Bandwidth Example 2 Mbps 2 Mbps 2 Mbps 2 Mbps 2 Mbps 5.5 Mbps 5.5 Mbps 5.5 Mbps 5.5 Mbps 5.5 Mbps 11 Mbps 11 Mbps 11 Mbps 11 Mbps 11 Mbps 11 Mbps 11 Mbps 11 Mbps 11 Mbps 11 Mbps 5.5 Mbps 5.5 Mbps 5.5 Mbps 5.5 Mbps 5.5 Mbps 2 Mbps 2 Mbps 2 Mbps 2 Mbps 2 Mbps 14

15 Things to Consider for Site Survey Floor Plan Bandwidth required Dense or sparse user population Know your users: Protocols Types of applications mainly being used Possibility to connect AP to wired network 15

16 Aironet Ethernet In-Line Power Ethernet In-line Power Source: Catalyst 3524 Power Switch Catalyst 6000 Power Blade Catalyst 4000 Power Blade 48 Port Power Patch Panel Power Ethernet In-line Power Source: Aironet Power Injector No Power Power Aironet 350 uses Ethernet in-line power ONLY Eliminates need for local power and AC infrastructure cost Draws in-line power from edge devices (-48 Volts) Catalyst power switches support device discovery mode 16

17 Mixed Antenna Example Maximum Coverage Autorate Negotiation Channel 11 Wireless for Students DiPole Indoor, Patch Outdoor Channel 1 Channel 6 Class 1 Class 2 Class 3 Class Hallway Class 8 Class 9 Class 10 Class 11 Channel 6 Building 1000 Channel 11 Channel 1 Courtyard

18 Cisco Aironet 350 Series Wireless LAN Solution The Cisco Aironet 350 Series of b compliant high speed wireless solutions offers the best performance, manageability, scalability and security for both in-building and building to building wireless applications PC Card/PCI Client Adapters Access Points Line-of-Sight Bridge Products Antennas & Accessories 18

19 Cisco Aironet 350/340 Series Client Adapters Client access for both notebook and desktop systems Broad Operating Systems Support: Windows 95, 98, Windows NT 4.0 Windows 2000 Windows Millennium Windows CE Linux MacOS Easy, simple installation Lifetime limited warranty 19

20 New AP1200 Dual-Band Access Point The Cisco Aironet 1200 Series Access Point delivers on enterprise requirements 20

21 AP1200 Access Point GHz antenna connectors 2. DC input 3. Ethernet 4. Console Port 5. Reserved 6. LEDs (Ethernet, Status, Radio) 7. Mounting plate 5GHz PC-Cardbus Module 2.4GHz mini-pci radio 21

22 Investment Protection and Future Proofing Modular platform for single or dual band operation Field upgradeable radios Eight megabytes of storage and support for Cisco management tools 22

23 Cisco Aironet 1100 Series Scalable Fully functional access point ideal for all enterprise deployments without expensive controllers Affordable Lowest priced upgradable Cisco Aironet access point protects customer investment Enterprise-class features End-to-end intelligent networking extended to WLAN Secure Enterprise-class interoperable security for WLAN Easy-to-use Intuitive installation and set up for rapid deployment FCS Friday Oct 18, 2002 GA Approx mid-nov 23

24 Wireless Antennas Access Points Rubber DiPole Pillar Mount Ground Plane Patch Wall Ceiling Mount Type Omni Directional Omni Directional Omni Ceiling Mount High Gain Omni Gain 2.15 dbi 5.2 dbi 5.2 dbi 8.5 dbi 2.2 dbi 5.2 dbi Beam Width 360 H 75 V 360 H 75 V 360 H 75 V 60 H 55 V 360 H 75 V 360 H 75 V ~ Indoor Range at 1 Mbps ~ Indoor Range at 11 Mbps Cable Length N/A

25 Agenda WLAN Overview Intro to WLAN Security Attack Scenarios Migigation Strategies 25

26 Toronto Insecure?? (Pearson to Downtown Cab ride yesterday) 50 AP out of 102 with WEP 26

27 HAS Your Building Been Chalked? War Driver s Results 27

28 (Some) WLAN Security Issues Default setups: WEP: AP Technology: Rogue APs: RF Propagation: New Attacks: Safeguards: Policy: Newness: Work well, but are not secure Broken at any key length Many flawed implementations Impact security of wired network Extends network environment beyond the walls Radio protocol attacks are nasty (ECM) Poorly architected/implemented Monitoring, updating and enforcement Confusion, lots of attacks and variants 28

29 Intruder/Safeguard Cycle Hackers Continually Optimize Attacks Automated Scanning Tools Widespread Use We are Here Today Vulnerability Discovery Crude Tools Appear 1999 Basic Safeguards Inherent in Technology Hackers Exploit Crude Tools Survey Scripts RSA 01 Kismet Wellenreiter Netstumbler WEP Crack Air Jack Jul 01 Better Safeguards Appear Intruders move to newer, more interesting exploits Time Safeguards Mature, Attackers move on Legacy Systems Still Vulnerable! 29

30 Typical Security Environment Border guards SSL Employees Suppliers Customers Web Servers App Servers Directory/ Database 30

31 Wireless Breaches The Perimeter Border guards SSL Employees Suppliers Customers Web Servers App Servers Directory/ Database Attacker Wireless Sniffer 31

32 Dispelling Misinformation Security With Antennas? Textbook radiation patterns of the AP isotropic monopole antenna 32

33 Engineering Theory Some Experts say you can place the antenna to get better security and control the perimeter 33

34 Reality Access Point Elevator or Utility Shaft WLAN Station Indoor Propagation in a Typical Crowded Office Building: Reflections Re-Radiation Attenuation Un-intentional wave guide structures Not a perfect environment 34

35 Reality in Practice There are limits to what you can achieve with directional antennas, site surveys are needed if local physical environment requires it 35

36 Add Some Antenna Gain Typical 2.4 GHz WLAN AP has mono-pole antennas with 0dBi gain. A Low Profile patch antenna can provide 8 dbi gain at 2.4 GHz and costs about $65 US 36

37 Hacking with a Pringle Tube ~12 db gain, +/ calorie Yagi antenna $

38 Now Available SAFE: Wireless LAN Security in Depth Now available as of 12/31/01 Shows what changes when WLAN is introduced into the SAFE Enterprise and SMB designs 38

39 SAFE Blueprint for Secure E-Business 39

40 Agenda WLAN Overview Intro to WLAN Security Attack Scenarios Mitigation Strategies 40

41 The Network Layers 41

42 The Bottom Layers Manipulating the bottom 2 layers of the OSI Data Link (Layer 2) Media Access Control (MAC) Access to medium Logical Link Control (LLC) Frame sync, flow control Physical (Layer 1) Radio bit stream Divided into channels 42

43 The Bottom Layers 43

44 Management Frames Management frames can control link characteristics and physical medium properties b management frames are NOT authenticated Why is this bad? Maybe DOS 44

45 WLAN-Jack Denial of Service De-authentication Use MAC address of Access Point Send deauthenticate frames Send continuously Send to broadcast address or specific MAC Users are unable to reassociate with AP Air-Jack + WLAN-Jack 45

46 WLAN-Jack 46

47 Attack Scenarios WLAN-Jack 47

48 Attack Scenarios WLAN-Jack Decode of Deauthentication Frame 48

49 Attack Scenarios WLAN-Jack This is your connection 49

50 Attack Scenarios WLAN-Jack This is your connection on WLAN-Jack. 50

51 Past Security Methods SSID (Service Set Identifier) Commonly used feature in Wireless LANs which provides a rudimentary level of security Serves to logically segment the users and Access Points that form part of a Wireless subsystem May be advertised or manually pre-configured at the station 51

52 Network Stumbler or MiniStumbler FREE Free! 52

53 Or Kismet (Also Free) 53

54 SSID no Broadcast 54

55 ESSID-Jack Is the ESSID a shared secret? If I mask the ESSID from the AP beacons then unauthorized users will not be able to associate with my AP? Discover Masked ESSID Send a deauthenticate frame to the broadcast address. Obtain ESSID contained in client probe request or AP probe response. 55

56 ESSID-Jack 56

57 ESSID-Jack 57

58 Rogue Access-Point Men in the Middle Attack 58

59 Monkey-Jack MITM Attack Taking over connections at layer 1 and 2 Insert attack machine between victim and access point Management frames Deauthenticate victim from real AP Send deauthenticate frames to the victim using the access point s MAC address as the source 59

60 Monkey-Jack Victim s card scans channels to search for new AP Victim s card associates with fake AP on the attack machine Fake AP is on a different channel than the real one Attack machine s fake AP is duplicating MAC address and ESSID of real AP 60

61 Monkey-Jack Attack machine associates with real AP Attack machine duplicates MAC address of the victim s machine. Attack machine is now inserted and can pass frames through in a manner that is transparent to the upper level protocols 61

62 Monkey-Jack Before Monkey-Jack 62

63 Monkey-Jack After Monkey-Jack 63

64 Monkey-Jack 64

65 Open Authentication With Client AP Open Authentication Authentication request Authentication response Open or Shared needs to be setup identically on both the Access Point and Client 65

66 Shared Key - WEP/RC4 in

67 Shared-key Authentication With Client AP Shared-Key Authentication Authentication request Challenge text packet Encrypted challenge text packet Authentication response Open or Shared needs to be setup identically on both the Access Point and Client 67

68 Security Issues Authentication is one-way No way to dynamically generate keys No integration with existing network authentication methods on LAN Authentication is device-based No method for account auditing Keys are static 68

69 Improved Attacks on RC4 (WEP) In order to carry out the attack, the cryptanalyst needs the first output word of a large number RC4 streams along with the IV that was used to generate each one of them. Since in WEP, the IVs are transmitted in the clear, and the first message word in most packets is a known constant these requirements are satisfied. Optimizations of the attack have lead to deduction of a 128 bit RC4 key in 15 minutes from an actual network. RSA Laboratories Volume 5, No. 2, Summer / Fall

70 AirSnort, WEPCrack and the others 70

71 UC Berkeley Study Bit flipping Bits are flipped in WEP encrypted frames, and ICV CRC32 is recalculated Replay Bit flipped frames with known IVs resent AP accepts frame since CRC32 is correct Layer 3 device will reject, and send predictable response Response database built and used to derive key 71

72 UC Berkeley Study PlainText Cisco Stream Cipher 1234 WEP CipherText XXYYZZ PlainText Data Is XORed with the WEP Stream Cipher to Produce the Encrypted CipherText Predicted PlainText Cisco CipherText Stream Cipher XXYYZZ WEP 1234 If CipherText Is XORed with Guessed PlainText, the Stream Cipher Can Be Derived 72

73 UC Berkeley Study Bit Flipped Frame Sent Frame Passes ICV Forwarded to Dest MAC Attacker Anticipates Response from Upper Layer Device and Attempts to Derive Key AP WEP Encrypts Response and Forwards to Source MAC Upper Layer Protocol Fails CRC Sends Predictable Error Message to Source MAC 73

74 Agenda WLAN Overview Intro to WLAN Security Attack Scenarios Mitigation Stategies 74

75 WEP Mitigation: Temporal Key Integrity Protocol (TKIP) Base key and IV hashed Transmit WEP Key changes as IV changes Key hashing is still pre-standards, awaiting i ratification 75

76 WEP and TKIP Implementations WEP today uses an IV and base key; this includes weak IVs which can be compromised TKIP uses the IV and base key to hash a new key thus a new key every packet; weak keys are mitigated WEP Encryption Today TKIP IV Base Key Plaintext Data IV Base Key Plaintext Data RC4 XOR CipherText Data Hash XOR CipherText Data IV Packet Key Stream Cipher RC4 Stream Cipher 76

77 WECA (Wireless Ethernet Compatibility Alliance) Security Improvements Will develop a new test plan that will require TKIP as part of certification This will include 128 bit encryption Products certified prior to new plan will not need to be re-tested (and do not need to include TKIP) 77

78 UC Berkeley Study Mitigation Message Integrity Check (MIC) The MIC will protect WEP frames from being tampered with The MIC is based on seed value, destination MAC, source MAC, and payload Any change to these will change MIC value The MIC is included in the WEP encrypted payload 78

79 Message Integrity Check MIC uses a hashing algorithm to stamp frame The MIC is still pre-standards, awaiting i ratification WEP Frame No MIC DA SA IV Data ICV WEP Encrypted WEP Frame MIC DA SA IV Data SEQ MIC ICV WEP Encrypted 79

80 WEP & Rogue Access Point Cisco LEAP Overview Provides centralized, scalable, user-based authentication Algorithm requires mutual authentication Network authenticates client, client authenticates network Uses 802.1X for authentication messaging APs will support WinXP s EAP-TLS also Dynamic WEP key support with WEP key session timeouts 80

81 802.1X 81

82 Solution: 802.1X over Wireless 802.1X is IEEE draft standard for port-based network access control Leverages existing standards Extensible Authentication Protocol (EAP) RADIUS 802.1X for overcomes limitations of security Mutual authentication Dynamic, session-based encryption keys Centralized user administration Extensible authentication support 1 2 client EAP AP RADIUS RADIUS server 3 4 user database 82

83 802.1X for Authentication Types Authentication type Operates over 802.1X for (EAP and RADIUS) Enables client and authentication server to: Do mutual authentication Derive session-based encryption key Available authentication types EAP-Cisco Wireless (LEAP): Uses password as shared secret EAP-TLS: Uses certificates 83

84 Availability Cisco Aironet access points support 802.1X and EAP AP can act as 802.1X middleman when wireless client and authentication (RADIUS) server support authentication type Cisco introduced LEAP in December 2000 Is supported by Cisco Aironet client adapters on wide range of client operating systems (Windows, CE, Mac OS, Linux) Is supported by Cisco Secure ACS RADIUS server Will be supported by other RADIUS servers in 2001 Microsoft supports EAP-TLS authentication type in Windows XP and Windows CE 4.0 Cisco is first to fully support EAP-TLS with its client adapters and APs 84

85 LEAP Authentication Process Client AP RADIUS Server Start Request Identity Identity AP Blocks All Requests Until Authentication Completes Identity RADIUS Server Authenticates Client Derive Key Client Authenticates RADIUS Server Broadcast Key Key Length Derive Key AP Sends Client Broadcast Key, Encrypted with Session Key 85

86 How LEAP Challenges and Responses Work challenge Create challenge password from database challenge one-way hash response A LEAP algorithm password hash Using password from database, generate response to own challenge 86

87 How LEAP Challenges and Responses Work challenge usersupplied password response B response A one-way hash password hash challenge LEAP algorithm response B If response A = response B, then authenticate user Why? Using user-supplied password, generate response to challenge 87

88 Comparing Responses usersupplied password password from database one-way hash challenge challenge one-way hash password hash LEAP algorithm response B response A LEAP algorithm password hash If response A = response B, then user-supplied password = password from database 88

89 Deriving the Session Key hash (hash (password)) RADIUS response to client client response to RADIUS client challenge to RADIUS RADIUS challenge to client MD5 128-bit key 89

90 WEP Keys WEP key is calculated by the Radius server, only after the authentication is completed The key is passed to Access Point for THAT single authenticated client. This is a session key Client calculates the same WEP key Key is never transmitted over RF 90

91 Advantages of 802.1X for Open, extensible and standards based. Enables interoperable user identification, centralized authentication, key management. Leverages existing standards: EAP (extensible authentication protocol), RADIUS. Compatible with existing roaming technologies, enabling use in hotels and public places. User-based identification. Dynamic key management. Centralized user administration. Support for RADIUS (RFC 2138, 2139) enables centralized authentication, authorization and accounting. RADIUS/EAP (draft-ietf-radius-ext-07.txt) enables encapsulation of EAP packets within RADIUS. 91

92 Deploying LEAP Clients Cisco Aironet adapters Turn on LEAP in ACU Windows: Use Windows Networking logon to supply username/password Others: Use ACU window to supply username/password Others: No support for LEAP Use static WEP On Windows XP, use EAP-TLS One AP can support LEAP, EAP-TLS, and static WEP RADIUS servers Cisco Secure ACS Supports LEAP Needs access to an NTformatted database or ODBC connection to NT Domain Controller or Active Directory With LEAP proxy in V3.0, can interact with database manager that supports MS-CHAP* Others: Cisco is working with: Funk Software Interlink Networks Open Systems Consultants * LDAP and NDS do not support MS-CHAP 92

93 Managing Your Secure Network Static WEP keys not only are insecure, but difficult to manage and scale Cisco EAP (Leap) utilizes RADIUS servers, and a single database to manage users credentials Cisco APs support management via SNMP, WEB (with secure User Manager settings), CiscoWorks 2000, and Wavelink 93

94 Wireless Access VPN 3000 Concentrator Series Presentation_ID 1999, Cisco Systems, Inc. 94

95 Wireless Access VPNs VPN 3000 Internet Corporate Network Cisco Aironet using WEP/128 bit Certicom Palm OS IPSec VPN Client - movianvpn (AVVID Partner) Cisco 3000 VPN Client with Aironet b PCMCIA card SOHO 95

96 Attack Mitigation Roles for Standard VPN WLAN Design Two-Factor Authentication RFC2827 Filtering Inter-Subnet Filtering Authenticate Remote VPN Gateway Terminate IPSec Personal Firewall for Local Attack Mitigation Wireless Computer with VPN Client DHCP/RADIUS/OTP Servers Access Point VPN Concentrator Authenticate Remote Users Terminate IPsec Protocol Filter to Discard none IPSEC traffic 96

97 AP Radio Protocol Filter (Inbound/Outbound) Protocol Type Protocol Value Disposition Ethertype ARP 0x0800 Forward Ethertype IP 0x0806 Forward IP Protocol UDP 17 Forward IP Protocol ESP 50 Forward IP Port BootPC 68 Forward IP Port DNS 53 Forward IP Port IKE 500 Forward 97

98 Cisco AP Allows for Filtering 98

99 Cisco Advantages GoC Environment Cisco VPN Client/Gateway technology is Best in Class for WLAN Applications John Pavelich, Senior Consultant Entrust Strong encryption, True IPSec VPN Auto-initiate VPN tunnel for WLAN connections Force Disable Split Tunneling Stateful Inspection Firewall Client Strong, certificate based authentication Security Hardware and Software from a Mature vendor 99

100 Cisco VPN Gateway Forces a Client Policy 100

101 Auto Initiation of VPN in a Wireless Environment (New VPN 3.6) The Cisco VPN Client can be configured to automatically initiate a VPN based on the network that the user's machine is connected to (that is, based on a user s assigned address). This feature is called Auto Initiation for on-site Wireless LANs (WLANs). The auto initiation feature was designed to make the user experience more like a traditional wired network in those environments in which VPNs are being used to secure WLANs. These environments are also known as on-site WLANs. 101

102 Adopted Safe Wireless Architecture Addison Texas Office, HQ Kanata Access Point 350 and 1200 Concentrator 3060 VPN Using Digital Certificates Client PC used the Integrated Zone Alarm PF Filtering Protocol on the AP 102

103 LEAP / IPSec & Static WEP Differentiation LEAP IPSec Static WEP Key Length (bits) Encryption Algorithm RC4 3 DES RC4 Packet Integrity CRC32/MIC MD5-HMAC/SHA-HMAC CRC32/MIC Device Authentication None Pre-shared secret or Certificates None User Authentication Username/Password Username/Password or OTP None User Differentiation * No Yes No Transparent user experience Yes No Yes ACL requirements None Substantial N/A Additional Hardware Authentication Server Authentication Server and VPN Gateway No Per user keying Yes Yes No Protocol Support Any IP Unicast Any Client Support PCs and high end PDAs. Wide range of OSs supported from Cisco PCs and high end PDAs. Wide range of OSs supported from Cisco and 3 rd Party Vendors. Open Standard No Yes Yes Time based key rotation Configurable Configurable No All clients supported Client hardware Encryption Yes Available, software is most common method Additional Software No IPSec client No Per-flow QoS Policy Management At access switch After VPN gateway At access switch Yes 103

104 Cisco VPN 3000 Concentrator Series Includes a standards based VPN Client and management GUI Allows mobile workers and telecommuters broadband connectivity over Cable and DSL Uses RADIUS for Authentication (Softoken) Split tunneling corporate and Internet Implement behind the Internet access router and parallel to the PIX Firewall 104

105 Cisco VPN 3000 Concentrator Series Simultaneous Users ,000 Performance (Mbps) Encryption Cards Memory (Mb) Upgradable No Yes Yes Yes n/a Dual Power Supply No Optional Optional Optional Yes Redundancy No Yes Yes Yes Yes Site-to-Site Tunnels

106 Platform Highlights Models 3015, 3030, 3060, 3080 Modular Expandable Redundant Hardware Encryption Extensive Instrumentation 2U Form Factor 106

107 Cisco Remote Access VPN Cisco VPN 3000 Concentrator Series Cisco 3000 VPN Client HTML-Based Management 107

108 VPN Device Manager (VDM) HTML Based NETWORK COMPUTING 11/15/99..has a great overall management architecture with configuration options laid out in a logical tree structure, a hierarchical profile management and excellent troubleshooting tools. 108

109 Wireless Best Practices Enable WEP Key rotation when equipment supports it Change default SSID Disable broadcast of ESSID Change default password AP Block null ESSID connection Restrict access by MAC address Use VPN technology or Dynamic WEP Use strong mutual authentication Monitor wireless network medium (air space) for suspicious activity 109

110 For more information... Home Page Technical documents (white papers, app notes, etc.) Product Catalog Product Support 110

111 Questions?? 111

112 4515_03_2002_c1 2002, Cisco Systems, Inc. All rights reserved. 112

How can you bring. Trust and Security. to Wireless LAN solutions? November 2002

How can you bring. Trust and Security. to Wireless LAN solutions? November 2002 How can you bring Trust and Security to Wireless LAN solutions? November 2002 1 Today s Topics Entrust Introduction Brief overview of the 802.11b technology/security Top vulnerabilities Analysis and attack

More information

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved. 1 Session Number Denver Tech Days 2002 WLAN Security Mike Morrato System Engineer Cisco Systems April 10, 2002 2 Agenda Past security methods in Wireless LANs The problem with 802.11 - Wireless Insecurity

More information

FAQ on Cisco Aironet Wireless Security

FAQ on Cisco Aironet Wireless Security FAQ on Cisco Aironet Wireless Security Document ID: 68583 Contents Introduction General FAQ Troubleshooting and Design FAQ Related Information Introduction This document provides information on the most

More information

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov. Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE

More information

Wireless LAN, WLAN Security, and VPN

Wireless LAN, WLAN Security, and VPN Wireless LAN, WLAN Security, and VPN 麟瑞科技台南辦事處技術經理張晃崚 WLAN & VPN FAQ What is WLAN?802.11a?802.11b?802.11g? Which standard (product) should we use? How to deploy WLAN? How to block intruders? How to authenticate

More information

Securing Your Wireless LAN

Securing Your Wireless LAN Securing Your Wireless LAN Pejman Roshan Product Manager Cisco Aironet Wireless Networking Session Number 1 Agenda Requirements for secure wireless LANs Overview of 802.1X and TKIP Determining which EAP

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE

More information

Security Setup CHAPTER

Security Setup CHAPTER CHAPTER 8 This chapter describes how to set up your bridge s security features. This chapter contains the following sections: Security Overview, page 8-2 Setting Up WEP, page 8-7 Enabling Additional WEP

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC WLAN Security Dr. Siwaruk Siwamogsatham ThaiCERT, NECTEC Agenda Wireless Technology Overview IEEE 802.11 WLAN Technology WLAN Security Issues How to secure WLAN? WLAN Security Technologies Wireless Technologies

More information

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

A Configuration Protocol for Embedded Devices on Secure Wireless Networks A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)

More information

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL Q&A PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL This document answers questions about Protected Extensible Authentication Protocol. OVERVIEW Q. What is Protected Extensible Authentication Protocol? A.

More information

Appendix E Wireless Networking Basics

Appendix E Wireless Networking Basics Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

TestsDumps. Latest Test Dumps for IT Exam Certification

TestsDumps.  Latest Test Dumps for IT Exam Certification TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : PW0-200 Title : Certified wireless security professional(cwsp) Vendors : CWNP Version : DEMO Get Latest & Valid PW0-200

More information

Wireless Networking Basics. Ed Crowley

Wireless Networking Basics. Ed Crowley Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2

More information

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Securing Wireless Networks by By Joe Klemencic Mon. Apr http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Exam : PW Title : Certified wireless security professional(cwsp) Version : DEMO

Exam : PW Title : Certified wireless security professional(cwsp) Version : DEMO Exam : PW0-200 Title : Certified wireless security professional(cwsp) Version : DEMO 1. Given: John Smith often telecommutes from a coffee shop near his home. The coffee shop has an 802.11g access point

More information

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks

More information

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor What is a Wireless LAN? The wireless telegraph is not difficult to understand.

More information

CWNA Exam PW0-100 certified wireless network administrator(cwna) Version: 5.0 [ Total Questions: 120 ]

CWNA Exam PW0-100 certified wireless network administrator(cwna) Version: 5.0 [ Total Questions: 120 ] s@lm@n CWNA Exam PW0-100 certified wireless network administrator(cwna) Version: 5.0 [ Total Questions: 120 ] Topic 1, A A Question No : 1 - (Topic 1) What criteria can an 802.11 wireless client use to

More information

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the

More information

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted. Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.

More information

Security in IEEE Networks

Security in IEEE Networks Security in IEEE 802.11 Networks Mário Nunes, Rui Silva, António Grilo March 2013 Sumário 1 Introduction to the Security Services 2 Basic security mechanisms in IEEE 802.11 2.1 Hidden SSID (Service Set

More information

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards COUNTY OF SACRAMENTO Inter-Departmental Correspondence December 6, 2007 TO: FROM: Information Technology Policy Board Members Jeff Leveroni, Chair Technology Review Group SUBJECT: Update to County WAN/LAN

More information

NT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs

NT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs NT1210 Introduction to Networking Unit 6: Chapter 6, Wireless LANs Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of networks

More information

Wireless Network Infrastructure. Inscape Data Corporation January 10, 2006

Wireless Network Infrastructure. Inscape Data Corporation January 10, 2006 Wireless Network Infrastructure Inscape Data Corporation January 10, 2006 1 Introduction Purpose Providing fixed wireless Internet connectivity to the general population from rural towns to densely populated

More information

Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE

Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE COURSE TITLE WIRELESS TECHNOLOGY SPECIALIST COURSE DURATION 13 Hours of Interactive Training COURSE OVERVIEW This course will teach you

More information

IT220 Network Standards & Protocols. Unit 6: Chapter 6 Wireless LANs

IT220 Network Standards & Protocols. Unit 6: Chapter 6 Wireless LANs IT220 Network Standards & Protocols Unit 6: Chapter 6 Wireless LANs 2 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of

More information

On completing this chapter, you will be able to Explain the different WLAN configurations Explain how WLANs work Describe the risks of open wireless

On completing this chapter, you will be able to Explain the different WLAN configurations Explain how WLANs work Describe the risks of open wireless On completing this chapter, you will be able to Explain the different WLAN configurations Explain how WLANs work Describe the risks of open wireless ports Describe SAFE WLAN design techniques C H A P T

More information

How Insecure is Wireless LAN?

How Insecure is Wireless LAN? Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost

More information

Chapter 24 Wireless Network Security

Chapter 24 Wireless Network Security Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically

More information

Network Security 1. Module 7 Configure Trust and Identity at Layer 2

Network Security 1. Module 7 Configure Trust and Identity at Layer 2 Network Security 1 Module 7 Configure Trust and Identity at Layer 2 1 Learning Objectives 7.1 Identity-Based Networking Services (IBNS) 7.2 Configuring 802.1x Port-Based Authentication 2 Module 7 Configure

More information

Configuring Authentication Types

Configuring Authentication Types CHAPTER 11 This chapter describes how to configure authentication types on the access point. This chapter contains these sections: Understanding Authentication Types, page 11-2, page 11-10 Matching Access

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer Managing and Securing Computer Networks Guy Leduc Chapter 7: Securing LANs Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2016. (section 8.8) Also

More information

Configuring OfficeExtend Access Points

Configuring OfficeExtend Access Points Information About OfficeExtend Access Points, page 1 OEAP 600 Series Access Points, page 2 OEAP in Local Mode, page 3 Supported WLAN Settings for 600 Series OfficeExtend Access Point, page 3 WLAN Security

More information

What is Eavedropping?

What is Eavedropping? WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks

More information

Protected EAP (PEAP) Application Note

Protected EAP (PEAP) Application Note to users of Microsoft Windows 7: Cisco plug-in software modules such as EAP-FAST and PEAP are compatible with Windows 7. You do not need to upgrade these modules when you upgrade to Windows 7. This document

More information

Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide

Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide Introduction This is the first of a series of documents on the design and implementation of a wireless

More information

C H A P T E R Overview Cisco Aironet Wireless LAN Client Adapters Installation and Configuration Guide for Mac OS OL

C H A P T E R Overview Cisco Aironet Wireless LAN Client Adapters Installation and Configuration Guide for Mac OS OL CHAPTER 1 This chapter describes the Cisco Aironet Wireless LAN Adapters, also referred to as client adapters, and illustrates their role in a wireless network. The following topics are covered in this

More information

Summary. Deployment Guide: Configuring the Cisco Wireless Security Suite 1 OL

Summary. Deployment Guide: Configuring the Cisco Wireless Security Suite 1 OL Summary Numerous papers have been written on the topic of IEEE 802.11 security for wireless LANs (WLANs). The major vulnerabilities of 802.11 security can be summarized as follows: Weak device-only authentication:

More information

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals

More information

Family Structural Overview

Family Structural Overview Some IEEE 802 Standards TELE301 Lecture 5 802.11 Wireless Networking David Eyers Telecommunications Programme University of Otago 802.1 Bridging and Management 802.1X,... 802.3 Ethernet 802.11 Wireless

More information

Standard For IIUM Wireless Networking

Standard For IIUM Wireless Networking INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version

More information

Enterprise Mobility with Smarter Wi-Fi

Enterprise Mobility with Smarter Wi-Fi Enterprise Mobility with Smarter Wi-Fi Wi-Fi as Ubiquitous Utility to access your Data Martin Šmrha Product Manager, DNS Agenda 1. Introducing Ruckus 2. The Issues with WiFi 3. Technologies 4. Products

More information

1. INTRODUCTION. Wi-Fi 1

1. INTRODUCTION. Wi-Fi 1 Wi-Fi 1 1. INTRODUCTION Wi-Fi, or Wireless Fidelity, is freedom: it allows you to connect to the Internet from your home, a bed in a hotel room or at a conference room at work without wires. How? Wi-Fi

More information

QuickSpecs. HP enterprise access point WL520. Overview

QuickSpecs. HP enterprise access point WL520. Overview Overview 1. Power Out 8. Ethernet LAN Activity LED 2. Power Supply 9. Power LED 3. Power Input 10. Wireless Interface Cardbus Slot B 4. Processor Module 11. Wireless Interface Cardbus Slot A 5. Cover 12.

More information

Wireless LAN Security. Gabriel Clothier

Wireless LAN Security. Gabriel Clothier Wireless LAN Security Gabriel Clothier Timeline 1997: 802.11 standard released 1999: 802.11b released, WEP proposed [1] 2003: WiFi alliance certifies for WPA 2004: 802.11i released 2005: 802.11w task group

More information

Configuring the Client Adapter

Configuring the Client Adapter CHAPTER 5 This chapter explains how to configure profile parameters. The following topics are covered in this chapter: Overview, page 5-2 Setting General Parameters, page 5-3 Setting Advanced Parameters,

More information

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment

More information

Wireless Security i. Lars Strand lars (at) unik no June 2004

Wireless Security i. Lars Strand lars (at) unik no June 2004 Wireless Security - 802.11i Lars Strand lars (at) unik no June 2004 802.11 Working Group 11 of IEEE 802 'Task Groups' within the WG enhance portions of the standard: 802.11 1997: The IEEE standard for

More information

EnGenius Networks Singapore Pte Ltd M-Series Products Launch Oct., 2009

EnGenius Networks Singapore Pte Ltd M-Series Products Launch Oct., 2009 EnGenius Networks Singapore Pte Ltd M-Series Products Launch Oct., 2009 What is Wireless Mesh Network? A collection of wireless devices maintaining RF connectivity to create a seamless path for data packets

More information

Wireless AC1750 Wave 2 Dual-Band PoE Access Point

Wireless AC1750 Wave 2 Dual-Band PoE Access Point Product Highlights Enjoy High-Performance Wireless Connectivity Harness the power of IEEE 802.11ac Wave 2 wireless and experience wireless speeds of up to 1750 Mbps 1, perfect for high-demand business

More information

Lab Configure Enterprise Security on AP

Lab Configure Enterprise Security on AP Lab 8.5.4.1 Configure Enterprise Security on AP Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will demonstrate an understanding

More information

EnGenius Quick Start Guide

EnGenius Quick Start Guide T he operates seamlessly in the 2.4 GHz frequency spectrum supporting the 802.11b (2.4GHz, 11Mbps) and the newer, faster 802.11g (2.4GHz, 54Mbpswireless standard. High output power and high sensitivity

More information

802.11ac 3x3 Dual Band High-Powered Wireless Access Point/Client Bridge

802.11ac 3x3 Dual Band High-Powered Wireless Access Point/Client Bridge Datasheet ECB1750 802.11ac 3x3 Dual Band High-Powered Wireless Access Point/Client Bridge The ECB1750 marks a new speed and performance breakthrough for users with 802.11ac laptops and other devices, who

More information

Cisco Aironet 350 (DS) AP IOS Software

Cisco Aironet 350 (DS) AP IOS Software Cisco Aironet 350 (DS) AP IOS Software This document details the specifications for configuring the Cisco Aironet 350 series access points (APs) using the IOS software with NetLink Wireless Telephones.

More information

Models HP ProCurve M110 Access Point WW

Models HP ProCurve M110 Access Point WW Overview Models HP ProCurve M110 Access Point US HP ProCurve M110 Access Point WW J9385A J9388A Key features Entry-level access point Single radio /b/g Autonomous mode Two external antennas Introduction

More information

Wireless Domain Services FAQ

Wireless Domain Services FAQ Wireless Domain Services FAQ Document ID: 65346 Contents Introduction What is WDS? How do I configure my AP as a WDS? On what platforms does Cisco Structured Wireless Aware Network (SWAN) WDS run? How

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

Configuring the Client Adapter through the Windows XP Operating System

Configuring the Client Adapter through the Windows XP Operating System APPENDIX E through the Windows XP Operating System This appendix explains how to configure and use the client adapter with Windows XP. The following topics are covered in this appendix: Overview, page

More information

PRODUCT OVERVIEW. Learn more about EnGenius Solutions at

PRODUCT OVERVIEW. Learn more about EnGenius Solutions at Dual Radio Multi-Function Repeater 2.4 GHz / 5 GHz 300Mbps 802.11a/b/g/n Multi Function PRODUCT OVERVIEW equips with two powerful independent RF interfaces which support 802.11a/b/g and 802.11b/g/n. With

More information

WPA Migration Mode: WEP is back to haunt you

WPA Migration Mode: WEP is back to haunt you Black Hat USA 2010 WPA Migration Mode: WEP is back to haunt you Leandro Meiners (lmeiners@coresecurity.com / @gmail.com) Diego Sor (dsor@coresecurity.com / diegos@gmail.com) Page 1 WPA Migration Mode:

More information

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003 Attacking 802.11 Networks Joshua Wright Joshua.Wright@jwu.edu LightReading LIVE! October 1, 2003 Attention The material presented here reflects the personal experience and opinions of the author, and not

More information

Wireless Technologies

Wireless Technologies Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless

More information

Wireless Networking WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses

More information

Highlight. Central AP Management with High Scalability

Highlight. Central AP Management with High Scalability WMS-608N/C Wireless LAN Controller with Built-in AAA Radius Based User Access Control, Support 512 AP and 5000 User License (5 Giga Ethernet Switch Ports) PheeNet WMS-608N/C utilizes New Generation Technology

More information

Wi-Fi Scanner. Glossary. LizardSystems

Wi-Fi Scanner. Glossary. LizardSystems Wi-Fi Scanner Glossary LizardSystems 2 Table of Contents 802 6 802.11 6 802.11a 6 802.11b 6 802.11d 6 802.11e 6 802.11g 6 802.11h 6 802.11i 6 802.11j 6 802.11n 7 802.1X 7 802.3 7 A 8 Ad-Hoc mode 8 AES

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #7 More WiFi Security 2015 Patrick Tague 1 Class #7 Continuation of WiFi security 2015 Patrick Tague 2 Device Private WiFi Networks AP Local AAA

More information

Cisco Structured Wireless-Aware Network (SWAN) Implementation Guide

Cisco Structured Wireless-Aware Network (SWAN) Implementation Guide Cisco Structured Wireless-Aware Network (SWAN) Implementation Guide The Cisco Structured Wireless-Aware Network (SWAN) provides the framework to integrate and extend wired and wireless networks to deliver

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

CWTS Exam Objectives (Exam PW0-070)

CWTS Exam Objectives (Exam PW0-070) Introduction The Certified Wireless Technology Specialist (CWTS) certification, covering the current objectives, will certify that successful candidates know the fundamentals of RF behavior, can explain

More information

802.3at ac 3x3 Dual Band Ceiling Mount Access Point/WDS. can be used with EAP1750H. Key Features

802.3at ac 3x3 Dual Band Ceiling Mount Access Point/WDS. can be used with EAP1750H. Key Features EAP1750H can be used with 802.3at capable switches or injectors 802.11ac 3x3 Dual Band Ceiling Mount Access Point/WDS The EAP1750H leverages the breakthrough speed and performance of 802.11ac for connecting

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ We offer free update service for one year Exam : PW0-250 Title : Certified Wireless Design Professional (CWDP) Vendors : CWNP Version : DEMO Get Latest

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #7 WiFi Security 1 Announcements Please do HW#2 in using the stable OMNET++ 4.6, not the beta version. Porting has proven difficult... Form project

More information

CERIO Corporation OW-310N2

CERIO Corporation OW-310N2 CERIO Corporation OW-310N2 1000mW extreme Power 11N 300Mbps Outdoor Access Point Quick Installation Guide 1. Overview CERIO OW-310N2 Outdoor AP Bridge utilizes a 1000mW high power with Aluminum Extrusion

More information

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

Cisco WAP121 Wireless-N Access Point with Single Point Setup

Cisco WAP121 Wireless-N Access Point with Single Point Setup Data Sheet Cisco WAP121 Wireless-N Access Point with Single Point Setup Secure, Easy-to-Deploy, Affordable Wireless-N Connectivity Highlights Provides affordable high-bandwidth 802.11n wireless connectivity

More information

Exam Questions CWSP-205

Exam Questions CWSP-205 Exam Questions CWSP-205 Certified Wireless Security Professional https://www.2passeasy.com/dumps/cwsp-205/ 1.. What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism

More information

Outdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0

Outdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0 Outdoor High Power 802.11b/g/n Wireless USB Adapter USER MANUAL 4.0 2012 Contents 1 Introduction... 3 2 Hardware Installation... 4 3 Driver Installation... 6 3.1 Windows XP... 6 3.2 Windows Vista... 9

More information

CertifyMe. CertifyMe

CertifyMe. CertifyMe CertifyMe Number: 642-586 Passing Score: 800 Time Limit: 120 min File Version: 8.0 http://www.gratisexam.com/ CertifyMe 642-586 Exam A QUESTION 1 A customer in the United States requires connectivity between

More information

Cisco Aironet 1130G Series IEEE g Access Point

Cisco Aironet 1130G Series IEEE g Access Point Cisco Aironet 1130G Series IEEE 802.11g Access Point Low-profile business-class access point with integrated antennas for easy deployment in offices and similar RF environments Product Overview The Cisco

More information

QuickSpecs. HP M111 Client Bridge Series (Retired) Model. Key features

QuickSpecs. HP M111 Client Bridge Series (Retired) Model. Key features Overview (Retired) Model HP M111 Client Bridge US HP M111 Client Bridge JP J9389A J9523A Key features Can connect wired device to a wireless network Single radio IEEE 802.11a/b/g Two external antennas

More information

IP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask

IP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask Network Requirements, page 1 Wireless LAN, page 2 Wi-Fi Network Components, page 3 802.11 Standards for WLAN Communications, page 6 Security for Communications in WLANs, page 9 WLANs and Roaming, page

More information

DCCS Business Breakfast. Walter Greiner Systems Engineer Sales März 2018

DCCS Business Breakfast. Walter Greiner Systems Engineer Sales März 2018 DCCS Business Breakfast Walter Greiner Systems Engineer Sales März 2018 Why Wireless is important? more then since 2016 1 IP Traffic 2020 1 66% 34% Fixed Mobile 1 Source: Cisco Visual Networking Index,

More information

Overview. Product Terminology. Autonomous Access Points. Lightweight Access Points CHAPTER

Overview. Product Terminology. Autonomous Access Points. Lightweight Access Points CHAPTER CHAPTER 1 The Cisco Aironet Cisco Aironet 1100 Series Access Point series access point is available in autonomous and lightweight configurations. The autonomous access points can support standalone network

More information

Securing Wireless LANs with Certificate Services

Securing Wireless LANs with Certificate Services 1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the

More information

M a/b/g Outdoor Layer-2 MESH AP

M a/b/g Outdoor Layer-2 MESH AP 802.11a/b/g Outdoor Layer-2 MESH AP 2.4GHz / 5GHz 802.11 a/b/g MESH PRODUCT DESCRIPTION EnGenius Mesh AP is designed with IEEE802.11a/b/g standards and addressed on providing high performance mesh network.

More information

Wireless Networks

Wireless Networks 802.11 Wireless Networks Presentation for North Central Regional Meeting October 19, 2010 Tom Jones, PE, RCDD / NTS Field Sales Engineer, D-Link Agenda Brief History of Wireless Networks 802.11b, 802.11g

More information

This course provides students with the knowledge and skills to successfully survey, install, and administer enterprise Wi-Fi networks.

This course provides students with the knowledge and skills to successfully survey, install, and administer enterprise Wi-Fi networks. Certified Wireless Network Administrator (CWNA) Course Overview This course provides students with the knowledge and skills to successfully survey, install, and administer enterprise Wi-Fi networks. Course

More information

CWNA Exam PW0-250 Certified Wireless Design Professional (CWDP) Version: 6.0 [ Total Questions: 60 ]

CWNA Exam PW0-250 Certified Wireless Design Professional (CWDP) Version: 6.0 [ Total Questions: 60 ] s@lm@n CWNA Exam PW0-250 Certified Wireless Design Professional (CWDP) Version: 6.0 [ Total Questions: 60 ] Question No : 1 After surveying for the ideal mounting locations for APs, you have been asked

More information

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ] s@lm@n HP Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ] HP HP2-Z32 : Practice Test Question No : 1 What is a proper use for an ingress VLAN in an HP MSM VSC?

More information

Cisco CCIE Wireless Beta Written. Download Full Version :

Cisco CCIE Wireless Beta Written. Download Full Version : Cisco 351-050 CCIE Wireless Beta Written Download Full Version : https://killexams.com/pass4sure/exam-detail/351-050 Question: 228 66 Which information is most important for you to obtain from the customer

More information

PRODUCT GUIDE Wireless Intrusion Prevention Systems

PRODUCT GUIDE Wireless Intrusion Prevention Systems PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : PW0-070 Title : Certified Wireless Technology Specialist Vendors : CWNP

More information