Securing Wireless LANs
|
|
- Milton Wilson
- 5 years ago
- Views:
Transcription
1 Securing Wireless LANs Oct 30th, 2002 Louis Senecal 4515_03_2002_c1 2002, Cisco Systems, Inc. All rights reserved. 1
2 Agenda WLAN Overview Intro to WLAN Security Attack Scenarios Mitigation Stategies 2
3 Benefits of Wireless Mobility within building or campus Lots of Notebooks / Handhelds Convenience (no cables) Flexibility (anytime, anywhere access) Challenging Work Environments Easier to set-up temporary spaces Cost Effective No cable infrastructure / trenching Moves / Adds / Changes Reduce / Eliminate Recurring Network Costs Investment Protection Pick it up and move it out Productivity gains Rapid Deployment 3
4 Wireless Office Quickly emerging market New solutions being developed Ad hoc network may be the answer May want site survey for future growth All Cisco Offices Use WLANs as infrastructure overlay Wireless Technology becoming Pervasive Public Hotspots 4
5 NOP Study Wireless LANs Increase Productivity Based on a survey of 300+ U.S.- based organizations with more than 100 employees: End users stayed connected an average of 1¾ hours more per day to their corporate network Average daily time savings: 70 minutes Productivity: +22% Source: NOP World-Technology, Sept
6 Wireless LAN Technologies b a g Frequency Band 2.4 GHz 5 GHz 2.4 GHz Availability Worldwide US/AP Worldwide Maximum Data Rate 11 Mbps 54 Mbps 54 Mbps 6
7 Frequency Bands Audio Short Wave Radio AM Broadcast FM Broadcast Television Cellular (840MHz) NPCS (1.9GHz) Infrared wireless LAN Extremely Low Very Low Low Medium High Very Ultra High High Super High Infrared Visible Light Ultraviolet X-Rays 900 MHz 26 MHz 11.b 11.g 11.a 2.4GHZ 83.5 MHz 5 GHz Older Devices 11 FC (3 non-overlapping) Industrial, Scientific & Medical (ISM) band (8 non-overlapping) Unlicensed National Information Infrastructure (U-NII) band7
8 IEEE Standard Activities a 54 Mbps, 5 GHz, ratified in 1999, b 11Mbps, 2.4 GHz, ratified in d World Wide Roaming e Quality of Service f Inter-Access Point Protocol (IAPP) To be ratified soon g Higher Data rate (54 Mbps) 2.4 GHz h Dynamic Frequency Selection and Transmit Power Control mechanisms i Authentication and Security 8
9 Local Area Network (LAN) Wireless LAN (WLAN) as an extension to wired LAN Cisco Switch Cisco Switch Cisco Access Point Server Cisco Switch Rogue Access Point?? Internet Work Group Bridge 9
10 Typical Multicell Configuration Channel 1 Channel 6 LAN Backbone Wireless Cell Access Point Wireless Cell Wireless Clients 10
11 Association Process -- Passive Scanning Access Point A Access Point B Steps to Association: Client sends probe. AP sends probe response. Client evaluates AP response, selects best AP. Client sends authentication request to selected AP (A). AP A confirms authentication and registers client. Client sends association request to selected AP (A). Initial connection to an Access Point AP A confirms association and registers client. 11
12 Aironet b: Power and Range 11 Mbps DSSS feet 30mW feet radius@ 100mW 5.5 Mbps DSSS feet radius@ 30mW feet radius@ 100mW 2 Mbps DSSS feet radius@30mw feet radius@100mw 12
13 Channel Setup Site Survey Channel Example Channel 1 Channel 11 Channel 6 Channel 11 Channel 6 Channel 6 Channel 1 Channel 11 Channel 1 Channel 11 13
14 Multi-rate Implementation Site Survey Bandwidth Example 2 Mbps 2 Mbps 2 Mbps 2 Mbps 2 Mbps 5.5 Mbps 5.5 Mbps 5.5 Mbps 5.5 Mbps 5.5 Mbps 11 Mbps 11 Mbps 11 Mbps 11 Mbps 11 Mbps 11 Mbps 11 Mbps 11 Mbps 11 Mbps 11 Mbps 5.5 Mbps 5.5 Mbps 5.5 Mbps 5.5 Mbps 5.5 Mbps 2 Mbps 2 Mbps 2 Mbps 2 Mbps 2 Mbps 14
15 Things to Consider for Site Survey Floor Plan Bandwidth required Dense or sparse user population Know your users: Protocols Types of applications mainly being used Possibility to connect AP to wired network 15
16 Aironet Ethernet In-Line Power Ethernet In-line Power Source: Catalyst 3524 Power Switch Catalyst 6000 Power Blade Catalyst 4000 Power Blade 48 Port Power Patch Panel Power Ethernet In-line Power Source: Aironet Power Injector No Power Power Aironet 350 uses Ethernet in-line power ONLY Eliminates need for local power and AC infrastructure cost Draws in-line power from edge devices (-48 Volts) Catalyst power switches support device discovery mode 16
17 Mixed Antenna Example Maximum Coverage Autorate Negotiation Channel 11 Wireless for Students DiPole Indoor, Patch Outdoor Channel 1 Channel 6 Class 1 Class 2 Class 3 Class Hallway Class 8 Class 9 Class 10 Class 11 Channel 6 Building 1000 Channel 11 Channel 1 Courtyard
18 Cisco Aironet 350 Series Wireless LAN Solution The Cisco Aironet 350 Series of b compliant high speed wireless solutions offers the best performance, manageability, scalability and security for both in-building and building to building wireless applications PC Card/PCI Client Adapters Access Points Line-of-Sight Bridge Products Antennas & Accessories 18
19 Cisco Aironet 350/340 Series Client Adapters Client access for both notebook and desktop systems Broad Operating Systems Support: Windows 95, 98, Windows NT 4.0 Windows 2000 Windows Millennium Windows CE Linux MacOS Easy, simple installation Lifetime limited warranty 19
20 New AP1200 Dual-Band Access Point The Cisco Aironet 1200 Series Access Point delivers on enterprise requirements 20
21 AP1200 Access Point GHz antenna connectors 2. DC input 3. Ethernet 4. Console Port 5. Reserved 6. LEDs (Ethernet, Status, Radio) 7. Mounting plate 5GHz PC-Cardbus Module 2.4GHz mini-pci radio 21
22 Investment Protection and Future Proofing Modular platform for single or dual band operation Field upgradeable radios Eight megabytes of storage and support for Cisco management tools 22
23 Cisco Aironet 1100 Series Scalable Fully functional access point ideal for all enterprise deployments without expensive controllers Affordable Lowest priced upgradable Cisco Aironet access point protects customer investment Enterprise-class features End-to-end intelligent networking extended to WLAN Secure Enterprise-class interoperable security for WLAN Easy-to-use Intuitive installation and set up for rapid deployment FCS Friday Oct 18, 2002 GA Approx mid-nov 23
24 Wireless Antennas Access Points Rubber DiPole Pillar Mount Ground Plane Patch Wall Ceiling Mount Type Omni Directional Omni Directional Omni Ceiling Mount High Gain Omni Gain 2.15 dbi 5.2 dbi 5.2 dbi 8.5 dbi 2.2 dbi 5.2 dbi Beam Width 360 H 75 V 360 H 75 V 360 H 75 V 60 H 55 V 360 H 75 V 360 H 75 V ~ Indoor Range at 1 Mbps ~ Indoor Range at 11 Mbps Cable Length N/A
25 Agenda WLAN Overview Intro to WLAN Security Attack Scenarios Migigation Strategies 25
26 Toronto Insecure?? (Pearson to Downtown Cab ride yesterday) 50 AP out of 102 with WEP 26
27 HAS Your Building Been Chalked? War Driver s Results 27
28 (Some) WLAN Security Issues Default setups: WEP: AP Technology: Rogue APs: RF Propagation: New Attacks: Safeguards: Policy: Newness: Work well, but are not secure Broken at any key length Many flawed implementations Impact security of wired network Extends network environment beyond the walls Radio protocol attacks are nasty (ECM) Poorly architected/implemented Monitoring, updating and enforcement Confusion, lots of attacks and variants 28
29 Intruder/Safeguard Cycle Hackers Continually Optimize Attacks Automated Scanning Tools Widespread Use We are Here Today Vulnerability Discovery Crude Tools Appear 1999 Basic Safeguards Inherent in Technology Hackers Exploit Crude Tools Survey Scripts RSA 01 Kismet Wellenreiter Netstumbler WEP Crack Air Jack Jul 01 Better Safeguards Appear Intruders move to newer, more interesting exploits Time Safeguards Mature, Attackers move on Legacy Systems Still Vulnerable! 29
30 Typical Security Environment Border guards SSL Employees Suppliers Customers Web Servers App Servers Directory/ Database 30
31 Wireless Breaches The Perimeter Border guards SSL Employees Suppliers Customers Web Servers App Servers Directory/ Database Attacker Wireless Sniffer 31
32 Dispelling Misinformation Security With Antennas? Textbook radiation patterns of the AP isotropic monopole antenna 32
33 Engineering Theory Some Experts say you can place the antenna to get better security and control the perimeter 33
34 Reality Access Point Elevator or Utility Shaft WLAN Station Indoor Propagation in a Typical Crowded Office Building: Reflections Re-Radiation Attenuation Un-intentional wave guide structures Not a perfect environment 34
35 Reality in Practice There are limits to what you can achieve with directional antennas, site surveys are needed if local physical environment requires it 35
36 Add Some Antenna Gain Typical 2.4 GHz WLAN AP has mono-pole antennas with 0dBi gain. A Low Profile patch antenna can provide 8 dbi gain at 2.4 GHz and costs about $65 US 36
37 Hacking with a Pringle Tube ~12 db gain, +/ calorie Yagi antenna $
38 Now Available SAFE: Wireless LAN Security in Depth Now available as of 12/31/01 Shows what changes when WLAN is introduced into the SAFE Enterprise and SMB designs 38
39 SAFE Blueprint for Secure E-Business 39
40 Agenda WLAN Overview Intro to WLAN Security Attack Scenarios Mitigation Strategies 40
41 The Network Layers 41
42 The Bottom Layers Manipulating the bottom 2 layers of the OSI Data Link (Layer 2) Media Access Control (MAC) Access to medium Logical Link Control (LLC) Frame sync, flow control Physical (Layer 1) Radio bit stream Divided into channels 42
43 The Bottom Layers 43
44 Management Frames Management frames can control link characteristics and physical medium properties b management frames are NOT authenticated Why is this bad? Maybe DOS 44
45 WLAN-Jack Denial of Service De-authentication Use MAC address of Access Point Send deauthenticate frames Send continuously Send to broadcast address or specific MAC Users are unable to reassociate with AP Air-Jack + WLAN-Jack 45
46 WLAN-Jack 46
47 Attack Scenarios WLAN-Jack 47
48 Attack Scenarios WLAN-Jack Decode of Deauthentication Frame 48
49 Attack Scenarios WLAN-Jack This is your connection 49
50 Attack Scenarios WLAN-Jack This is your connection on WLAN-Jack. 50
51 Past Security Methods SSID (Service Set Identifier) Commonly used feature in Wireless LANs which provides a rudimentary level of security Serves to logically segment the users and Access Points that form part of a Wireless subsystem May be advertised or manually pre-configured at the station 51
52 Network Stumbler or MiniStumbler FREE Free! 52
53 Or Kismet (Also Free) 53
54 SSID no Broadcast 54
55 ESSID-Jack Is the ESSID a shared secret? If I mask the ESSID from the AP beacons then unauthorized users will not be able to associate with my AP? Discover Masked ESSID Send a deauthenticate frame to the broadcast address. Obtain ESSID contained in client probe request or AP probe response. 55
56 ESSID-Jack 56
57 ESSID-Jack 57
58 Rogue Access-Point Men in the Middle Attack 58
59 Monkey-Jack MITM Attack Taking over connections at layer 1 and 2 Insert attack machine between victim and access point Management frames Deauthenticate victim from real AP Send deauthenticate frames to the victim using the access point s MAC address as the source 59
60 Monkey-Jack Victim s card scans channels to search for new AP Victim s card associates with fake AP on the attack machine Fake AP is on a different channel than the real one Attack machine s fake AP is duplicating MAC address and ESSID of real AP 60
61 Monkey-Jack Attack machine associates with real AP Attack machine duplicates MAC address of the victim s machine. Attack machine is now inserted and can pass frames through in a manner that is transparent to the upper level protocols 61
62 Monkey-Jack Before Monkey-Jack 62
63 Monkey-Jack After Monkey-Jack 63
64 Monkey-Jack 64
65 Open Authentication With Client AP Open Authentication Authentication request Authentication response Open or Shared needs to be setup identically on both the Access Point and Client 65
66 Shared Key - WEP/RC4 in
67 Shared-key Authentication With Client AP Shared-Key Authentication Authentication request Challenge text packet Encrypted challenge text packet Authentication response Open or Shared needs to be setup identically on both the Access Point and Client 67
68 Security Issues Authentication is one-way No way to dynamically generate keys No integration with existing network authentication methods on LAN Authentication is device-based No method for account auditing Keys are static 68
69 Improved Attacks on RC4 (WEP) In order to carry out the attack, the cryptanalyst needs the first output word of a large number RC4 streams along with the IV that was used to generate each one of them. Since in WEP, the IVs are transmitted in the clear, and the first message word in most packets is a known constant these requirements are satisfied. Optimizations of the attack have lead to deduction of a 128 bit RC4 key in 15 minutes from an actual network. RSA Laboratories Volume 5, No. 2, Summer / Fall
70 AirSnort, WEPCrack and the others 70
71 UC Berkeley Study Bit flipping Bits are flipped in WEP encrypted frames, and ICV CRC32 is recalculated Replay Bit flipped frames with known IVs resent AP accepts frame since CRC32 is correct Layer 3 device will reject, and send predictable response Response database built and used to derive key 71
72 UC Berkeley Study PlainText Cisco Stream Cipher 1234 WEP CipherText XXYYZZ PlainText Data Is XORed with the WEP Stream Cipher to Produce the Encrypted CipherText Predicted PlainText Cisco CipherText Stream Cipher XXYYZZ WEP 1234 If CipherText Is XORed with Guessed PlainText, the Stream Cipher Can Be Derived 72
73 UC Berkeley Study Bit Flipped Frame Sent Frame Passes ICV Forwarded to Dest MAC Attacker Anticipates Response from Upper Layer Device and Attempts to Derive Key AP WEP Encrypts Response and Forwards to Source MAC Upper Layer Protocol Fails CRC Sends Predictable Error Message to Source MAC 73
74 Agenda WLAN Overview Intro to WLAN Security Attack Scenarios Mitigation Stategies 74
75 WEP Mitigation: Temporal Key Integrity Protocol (TKIP) Base key and IV hashed Transmit WEP Key changes as IV changes Key hashing is still pre-standards, awaiting i ratification 75
76 WEP and TKIP Implementations WEP today uses an IV and base key; this includes weak IVs which can be compromised TKIP uses the IV and base key to hash a new key thus a new key every packet; weak keys are mitigated WEP Encryption Today TKIP IV Base Key Plaintext Data IV Base Key Plaintext Data RC4 XOR CipherText Data Hash XOR CipherText Data IV Packet Key Stream Cipher RC4 Stream Cipher 76
77 WECA (Wireless Ethernet Compatibility Alliance) Security Improvements Will develop a new test plan that will require TKIP as part of certification This will include 128 bit encryption Products certified prior to new plan will not need to be re-tested (and do not need to include TKIP) 77
78 UC Berkeley Study Mitigation Message Integrity Check (MIC) The MIC will protect WEP frames from being tampered with The MIC is based on seed value, destination MAC, source MAC, and payload Any change to these will change MIC value The MIC is included in the WEP encrypted payload 78
79 Message Integrity Check MIC uses a hashing algorithm to stamp frame The MIC is still pre-standards, awaiting i ratification WEP Frame No MIC DA SA IV Data ICV WEP Encrypted WEP Frame MIC DA SA IV Data SEQ MIC ICV WEP Encrypted 79
80 WEP & Rogue Access Point Cisco LEAP Overview Provides centralized, scalable, user-based authentication Algorithm requires mutual authentication Network authenticates client, client authenticates network Uses 802.1X for authentication messaging APs will support WinXP s EAP-TLS also Dynamic WEP key support with WEP key session timeouts 80
81 802.1X 81
82 Solution: 802.1X over Wireless 802.1X is IEEE draft standard for port-based network access control Leverages existing standards Extensible Authentication Protocol (EAP) RADIUS 802.1X for overcomes limitations of security Mutual authentication Dynamic, session-based encryption keys Centralized user administration Extensible authentication support 1 2 client EAP AP RADIUS RADIUS server 3 4 user database 82
83 802.1X for Authentication Types Authentication type Operates over 802.1X for (EAP and RADIUS) Enables client and authentication server to: Do mutual authentication Derive session-based encryption key Available authentication types EAP-Cisco Wireless (LEAP): Uses password as shared secret EAP-TLS: Uses certificates 83
84 Availability Cisco Aironet access points support 802.1X and EAP AP can act as 802.1X middleman when wireless client and authentication (RADIUS) server support authentication type Cisco introduced LEAP in December 2000 Is supported by Cisco Aironet client adapters on wide range of client operating systems (Windows, CE, Mac OS, Linux) Is supported by Cisco Secure ACS RADIUS server Will be supported by other RADIUS servers in 2001 Microsoft supports EAP-TLS authentication type in Windows XP and Windows CE 4.0 Cisco is first to fully support EAP-TLS with its client adapters and APs 84
85 LEAP Authentication Process Client AP RADIUS Server Start Request Identity Identity AP Blocks All Requests Until Authentication Completes Identity RADIUS Server Authenticates Client Derive Key Client Authenticates RADIUS Server Broadcast Key Key Length Derive Key AP Sends Client Broadcast Key, Encrypted with Session Key 85
86 How LEAP Challenges and Responses Work challenge Create challenge password from database challenge one-way hash response A LEAP algorithm password hash Using password from database, generate response to own challenge 86
87 How LEAP Challenges and Responses Work challenge usersupplied password response B response A one-way hash password hash challenge LEAP algorithm response B If response A = response B, then authenticate user Why? Using user-supplied password, generate response to challenge 87
88 Comparing Responses usersupplied password password from database one-way hash challenge challenge one-way hash password hash LEAP algorithm response B response A LEAP algorithm password hash If response A = response B, then user-supplied password = password from database 88
89 Deriving the Session Key hash (hash (password)) RADIUS response to client client response to RADIUS client challenge to RADIUS RADIUS challenge to client MD5 128-bit key 89
90 WEP Keys WEP key is calculated by the Radius server, only after the authentication is completed The key is passed to Access Point for THAT single authenticated client. This is a session key Client calculates the same WEP key Key is never transmitted over RF 90
91 Advantages of 802.1X for Open, extensible and standards based. Enables interoperable user identification, centralized authentication, key management. Leverages existing standards: EAP (extensible authentication protocol), RADIUS. Compatible with existing roaming technologies, enabling use in hotels and public places. User-based identification. Dynamic key management. Centralized user administration. Support for RADIUS (RFC 2138, 2139) enables centralized authentication, authorization and accounting. RADIUS/EAP (draft-ietf-radius-ext-07.txt) enables encapsulation of EAP packets within RADIUS. 91
92 Deploying LEAP Clients Cisco Aironet adapters Turn on LEAP in ACU Windows: Use Windows Networking logon to supply username/password Others: Use ACU window to supply username/password Others: No support for LEAP Use static WEP On Windows XP, use EAP-TLS One AP can support LEAP, EAP-TLS, and static WEP RADIUS servers Cisco Secure ACS Supports LEAP Needs access to an NTformatted database or ODBC connection to NT Domain Controller or Active Directory With LEAP proxy in V3.0, can interact with database manager that supports MS-CHAP* Others: Cisco is working with: Funk Software Interlink Networks Open Systems Consultants * LDAP and NDS do not support MS-CHAP 92
93 Managing Your Secure Network Static WEP keys not only are insecure, but difficult to manage and scale Cisco EAP (Leap) utilizes RADIUS servers, and a single database to manage users credentials Cisco APs support management via SNMP, WEB (with secure User Manager settings), CiscoWorks 2000, and Wavelink 93
94 Wireless Access VPN 3000 Concentrator Series Presentation_ID 1999, Cisco Systems, Inc. 94
95 Wireless Access VPNs VPN 3000 Internet Corporate Network Cisco Aironet using WEP/128 bit Certicom Palm OS IPSec VPN Client - movianvpn (AVVID Partner) Cisco 3000 VPN Client with Aironet b PCMCIA card SOHO 95
96 Attack Mitigation Roles for Standard VPN WLAN Design Two-Factor Authentication RFC2827 Filtering Inter-Subnet Filtering Authenticate Remote VPN Gateway Terminate IPSec Personal Firewall for Local Attack Mitigation Wireless Computer with VPN Client DHCP/RADIUS/OTP Servers Access Point VPN Concentrator Authenticate Remote Users Terminate IPsec Protocol Filter to Discard none IPSEC traffic 96
97 AP Radio Protocol Filter (Inbound/Outbound) Protocol Type Protocol Value Disposition Ethertype ARP 0x0800 Forward Ethertype IP 0x0806 Forward IP Protocol UDP 17 Forward IP Protocol ESP 50 Forward IP Port BootPC 68 Forward IP Port DNS 53 Forward IP Port IKE 500 Forward 97
98 Cisco AP Allows for Filtering 98
99 Cisco Advantages GoC Environment Cisco VPN Client/Gateway technology is Best in Class for WLAN Applications John Pavelich, Senior Consultant Entrust Strong encryption, True IPSec VPN Auto-initiate VPN tunnel for WLAN connections Force Disable Split Tunneling Stateful Inspection Firewall Client Strong, certificate based authentication Security Hardware and Software from a Mature vendor 99
100 Cisco VPN Gateway Forces a Client Policy 100
101 Auto Initiation of VPN in a Wireless Environment (New VPN 3.6) The Cisco VPN Client can be configured to automatically initiate a VPN based on the network that the user's machine is connected to (that is, based on a user s assigned address). This feature is called Auto Initiation for on-site Wireless LANs (WLANs). The auto initiation feature was designed to make the user experience more like a traditional wired network in those environments in which VPNs are being used to secure WLANs. These environments are also known as on-site WLANs. 101
102 Adopted Safe Wireless Architecture Addison Texas Office, HQ Kanata Access Point 350 and 1200 Concentrator 3060 VPN Using Digital Certificates Client PC used the Integrated Zone Alarm PF Filtering Protocol on the AP 102
103 LEAP / IPSec & Static WEP Differentiation LEAP IPSec Static WEP Key Length (bits) Encryption Algorithm RC4 3 DES RC4 Packet Integrity CRC32/MIC MD5-HMAC/SHA-HMAC CRC32/MIC Device Authentication None Pre-shared secret or Certificates None User Authentication Username/Password Username/Password or OTP None User Differentiation * No Yes No Transparent user experience Yes No Yes ACL requirements None Substantial N/A Additional Hardware Authentication Server Authentication Server and VPN Gateway No Per user keying Yes Yes No Protocol Support Any IP Unicast Any Client Support PCs and high end PDAs. Wide range of OSs supported from Cisco PCs and high end PDAs. Wide range of OSs supported from Cisco and 3 rd Party Vendors. Open Standard No Yes Yes Time based key rotation Configurable Configurable No All clients supported Client hardware Encryption Yes Available, software is most common method Additional Software No IPSec client No Per-flow QoS Policy Management At access switch After VPN gateway At access switch Yes 103
104 Cisco VPN 3000 Concentrator Series Includes a standards based VPN Client and management GUI Allows mobile workers and telecommuters broadband connectivity over Cable and DSL Uses RADIUS for Authentication (Softoken) Split tunneling corporate and Internet Implement behind the Internet access router and parallel to the PIX Firewall 104
105 Cisco VPN 3000 Concentrator Series Simultaneous Users ,000 Performance (Mbps) Encryption Cards Memory (Mb) Upgradable No Yes Yes Yes n/a Dual Power Supply No Optional Optional Optional Yes Redundancy No Yes Yes Yes Yes Site-to-Site Tunnels
106 Platform Highlights Models 3015, 3030, 3060, 3080 Modular Expandable Redundant Hardware Encryption Extensive Instrumentation 2U Form Factor 106
107 Cisco Remote Access VPN Cisco VPN 3000 Concentrator Series Cisco 3000 VPN Client HTML-Based Management 107
108 VPN Device Manager (VDM) HTML Based NETWORK COMPUTING 11/15/99..has a great overall management architecture with configuration options laid out in a logical tree structure, a hierarchical profile management and excellent troubleshooting tools. 108
109 Wireless Best Practices Enable WEP Key rotation when equipment supports it Change default SSID Disable broadcast of ESSID Change default password AP Block null ESSID connection Restrict access by MAC address Use VPN technology or Dynamic WEP Use strong mutual authentication Monitor wireless network medium (air space) for suspicious activity 109
110 For more information... Home Page Technical documents (white papers, app notes, etc.) Product Catalog Product Support 110
111 Questions?? 111
112 4515_03_2002_c1 2002, Cisco Systems, Inc. All rights reserved. 112
How can you bring. Trust and Security. to Wireless LAN solutions? November 2002
How can you bring Trust and Security to Wireless LAN solutions? November 2002 1 Today s Topics Entrust Introduction Brief overview of the 802.11b technology/security Top vulnerabilities Analysis and attack
More informationPresentation_ID. 2001, Cisco Systems, Inc. All rights reserved.
1 Session Number Denver Tech Days 2002 WLAN Security Mike Morrato System Engineer Cisco Systems April 10, 2002 2 Agenda Past security methods in Wireless LANs The problem with 802.11 - Wireless Insecurity
More informationFAQ on Cisco Aironet Wireless Security
FAQ on Cisco Aironet Wireless Security Document ID: 68583 Contents Introduction General FAQ Troubleshooting and Design FAQ Related Information Introduction This document provides information on the most
More informationWireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.
Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE
More informationWireless LAN, WLAN Security, and VPN
Wireless LAN, WLAN Security, and VPN 麟瑞科技台南辦事處技術經理張晃崚 WLAN & VPN FAQ What is WLAN?802.11a?802.11b?802.11g? Which standard (product) should we use? How to deploy WLAN? How to block intruders? How to authenticate
More informationSecuring Your Wireless LAN
Securing Your Wireless LAN Pejman Roshan Product Manager Cisco Aironet Wireless Networking Session Number 1 Agenda Requirements for secure wireless LANs Overview of 802.1X and TKIP Determining which EAP
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE
More informationSecurity Setup CHAPTER
CHAPTER 8 This chapter describes how to set up your bridge s security features. This chapter contains the following sections: Security Overview, page 8-2 Setting Up WEP, page 8-7 Enabling Additional WEP
More informationWireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More informationWLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC
WLAN Security Dr. Siwaruk Siwamogsatham ThaiCERT, NECTEC Agenda Wireless Technology Overview IEEE 802.11 WLAN Technology WLAN Security Issues How to secure WLAN? WLAN Security Technologies Wireless Technologies
More informationA Configuration Protocol for Embedded Devices on Secure Wireless Networks
A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)
More informationPROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL
Q&A PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL This document answers questions about Protected Extensible Authentication Protocol. OVERVIEW Q. What is Protected Extensible Authentication Protocol? A.
More informationAppendix E Wireless Networking Basics
Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationTestsDumps. Latest Test Dumps for IT Exam Certification
TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : PW0-200 Title : Certified wireless security professional(cwsp) Vendors : CWNP Version : DEMO Get Latest & Valid PW0-200
More informationWireless Networking Basics. Ed Crowley
Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2
More informationSecuring Wireless Networks by By Joe Klemencic Mon. Apr
http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More informationExam : PW Title : Certified wireless security professional(cwsp) Version : DEMO
Exam : PW0-200 Title : Certified wireless security professional(cwsp) Version : DEMO 1. Given: John Smith often telecommutes from a coffee shop near his home. The coffee shop has an 802.11g access point
More informationWireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved
Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks
More informationWireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS
How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms
More informationExpected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy
CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design
More informationWhat is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne
Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor What is a Wireless LAN? The wireless telegraph is not difficult to understand.
More informationCWNA Exam PW0-100 certified wireless network administrator(cwna) Version: 5.0 [ Total Questions: 120 ]
s@lm@n CWNA Exam PW0-100 certified wireless network administrator(cwna) Version: 5.0 [ Total Questions: 120 ] Topic 1, A A Question No : 1 - (Topic 1) What criteria can an 802.11 wireless client use to
More informationVendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo
Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the
More informationD. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.
Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.
More informationSecurity in IEEE Networks
Security in IEEE 802.11 Networks Mário Nunes, Rui Silva, António Grilo March 2013 Sumário 1 Introduction to the Security Services 2 Basic security mechanisms in IEEE 802.11 2.1 Hidden SSID (Service Set
More informationInformation Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards
COUNTY OF SACRAMENTO Inter-Departmental Correspondence December 6, 2007 TO: FROM: Information Technology Policy Board Members Jeff Leveroni, Chair Technology Review Group SUBJECT: Update to County WAN/LAN
More informationNT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs
NT1210 Introduction to Networking Unit 6: Chapter 6, Wireless LANs Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of networks
More informationWireless Network Infrastructure. Inscape Data Corporation January 10, 2006
Wireless Network Infrastructure Inscape Data Corporation January 10, 2006 1 Introduction Purpose Providing fixed wireless Internet connectivity to the general population from rural towns to densely populated
More informationMobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE
Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE COURSE TITLE WIRELESS TECHNOLOGY SPECIALIST COURSE DURATION 13 Hours of Interactive Training COURSE OVERVIEW This course will teach you
More informationIT220 Network Standards & Protocols. Unit 6: Chapter 6 Wireless LANs
IT220 Network Standards & Protocols Unit 6: Chapter 6 Wireless LANs 2 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of
More informationOn completing this chapter, you will be able to Explain the different WLAN configurations Explain how WLANs work Describe the risks of open wireless
On completing this chapter, you will be able to Explain the different WLAN configurations Explain how WLANs work Describe the risks of open wireless ports Describe SAFE WLAN design techniques C H A P T
More informationHow Insecure is Wireless LAN?
Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost
More informationChapter 24 Wireless Network Security
Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically
More informationNetwork Security 1. Module 7 Configure Trust and Identity at Layer 2
Network Security 1 Module 7 Configure Trust and Identity at Layer 2 1 Learning Objectives 7.1 Identity-Based Networking Services (IBNS) 7.2 Configuring 802.1x Port-Based Authentication 2 Module 7 Configure
More informationConfiguring Authentication Types
CHAPTER 11 This chapter describes how to configure authentication types on the access point. This chapter contains these sections: Understanding Authentication Types, page 11-2, page 11-10 Matching Access
More informationManaging and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer
Managing and Securing Computer Networks Guy Leduc Chapter 7: Securing LANs Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2016. (section 8.8) Also
More informationConfiguring OfficeExtend Access Points
Information About OfficeExtend Access Points, page 1 OEAP 600 Series Access Points, page 2 OEAP in Local Mode, page 3 Supported WLAN Settings for 600 Series OfficeExtend Access Point, page 3 WLAN Security
More informationWhat is Eavedropping?
WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks
More informationProtected EAP (PEAP) Application Note
to users of Microsoft Windows 7: Cisco plug-in software modules such as EAP-FAST and PEAP are compatible with Windows 7. You do not need to upgrade these modules when you upgrade to Windows 7. This document
More informationCisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide
Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide Introduction This is the first of a series of documents on the design and implementation of a wireless
More informationC H A P T E R Overview Cisco Aironet Wireless LAN Client Adapters Installation and Configuration Guide for Mac OS OL
CHAPTER 1 This chapter describes the Cisco Aironet Wireless LAN Adapters, also referred to as client adapters, and illustrates their role in a wireless network. The following topics are covered in this
More informationSummary. Deployment Guide: Configuring the Cisco Wireless Security Suite 1 OL
Summary Numerous papers have been written on the topic of IEEE 802.11 security for wireless LANs (WLANs). The major vulnerabilities of 802.11 security can be summarized as follows: Weak device-only authentication:
More informationCSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology
CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals
More informationFamily Structural Overview
Some IEEE 802 Standards TELE301 Lecture 5 802.11 Wireless Networking David Eyers Telecommunications Programme University of Otago 802.1 Bridging and Management 802.1X,... 802.3 Ethernet 802.11 Wireless
More informationStandard For IIUM Wireless Networking
INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version
More informationEnterprise Mobility with Smarter Wi-Fi
Enterprise Mobility with Smarter Wi-Fi Wi-Fi as Ubiquitous Utility to access your Data Martin Šmrha Product Manager, DNS Agenda 1. Introducing Ruckus 2. The Issues with WiFi 3. Technologies 4. Products
More information1. INTRODUCTION. Wi-Fi 1
Wi-Fi 1 1. INTRODUCTION Wi-Fi, or Wireless Fidelity, is freedom: it allows you to connect to the Internet from your home, a bed in a hotel room or at a conference room at work without wires. How? Wi-Fi
More informationQuickSpecs. HP enterprise access point WL520. Overview
Overview 1. Power Out 8. Ethernet LAN Activity LED 2. Power Supply 9. Power LED 3. Power Input 10. Wireless Interface Cardbus Slot B 4. Processor Module 11. Wireless Interface Cardbus Slot A 5. Cover 12.
More informationWireless LAN Security. Gabriel Clothier
Wireless LAN Security Gabriel Clothier Timeline 1997: 802.11 standard released 1999: 802.11b released, WEP proposed [1] 2003: WiFi alliance certifies for WPA 2004: 802.11i released 2005: 802.11w task group
More informationConfiguring the Client Adapter
CHAPTER 5 This chapter explains how to configure profile parameters. The following topics are covered in this chapter: Overview, page 5-2 Setting General Parameters, page 5-3 Setting Advanced Parameters,
More information02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel
TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment
More informationWireless Security i. Lars Strand lars (at) unik no June 2004
Wireless Security - 802.11i Lars Strand lars (at) unik no June 2004 802.11 Working Group 11 of IEEE 802 'Task Groups' within the WG enhance portions of the standard: 802.11 1997: The IEEE standard for
More informationEnGenius Networks Singapore Pte Ltd M-Series Products Launch Oct., 2009
EnGenius Networks Singapore Pte Ltd M-Series Products Launch Oct., 2009 What is Wireless Mesh Network? A collection of wireless devices maintaining RF connectivity to create a seamless path for data packets
More informationWireless AC1750 Wave 2 Dual-Band PoE Access Point
Product Highlights Enjoy High-Performance Wireless Connectivity Harness the power of IEEE 802.11ac Wave 2 wireless and experience wireless speeds of up to 1750 Mbps 1, perfect for high-demand business
More informationLab Configure Enterprise Security on AP
Lab 8.5.4.1 Configure Enterprise Security on AP Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will demonstrate an understanding
More informationEnGenius Quick Start Guide
T he operates seamlessly in the 2.4 GHz frequency spectrum supporting the 802.11b (2.4GHz, 11Mbps) and the newer, faster 802.11g (2.4GHz, 54Mbpswireless standard. High output power and high sensitivity
More information802.11ac 3x3 Dual Band High-Powered Wireless Access Point/Client Bridge
Datasheet ECB1750 802.11ac 3x3 Dual Band High-Powered Wireless Access Point/Client Bridge The ECB1750 marks a new speed and performance breakthrough for users with 802.11ac laptops and other devices, who
More informationCisco Aironet 350 (DS) AP IOS Software
Cisco Aironet 350 (DS) AP IOS Software This document details the specifications for configuring the Cisco Aironet 350 series access points (APs) using the IOS software with NetLink Wireless Telephones.
More informationModels HP ProCurve M110 Access Point WW
Overview Models HP ProCurve M110 Access Point US HP ProCurve M110 Access Point WW J9385A J9388A Key features Entry-level access point Single radio /b/g Autonomous mode Two external antennas Introduction
More informationWireless Domain Services FAQ
Wireless Domain Services FAQ Document ID: 65346 Contents Introduction What is WDS? How do I configure my AP as a WDS? On what platforms does Cisco Structured Wireless Aware Network (SWAN) WDS run? How
More informationNetwork Encryption 3 4/20/17
The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server
More informationConfiguring the Client Adapter through the Windows XP Operating System
APPENDIX E through the Windows XP Operating System This appendix explains how to configure and use the client adapter with Windows XP. The following topics are covered in this appendix: Overview, page
More informationPRODUCT OVERVIEW. Learn more about EnGenius Solutions at
Dual Radio Multi-Function Repeater 2.4 GHz / 5 GHz 300Mbps 802.11a/b/g/n Multi Function PRODUCT OVERVIEW equips with two powerful independent RF interfaces which support 802.11a/b/g and 802.11b/g/n. With
More informationWPA Migration Mode: WEP is back to haunt you
Black Hat USA 2010 WPA Migration Mode: WEP is back to haunt you Leandro Meiners (lmeiners@coresecurity.com / @gmail.com) Diego Sor (dsor@coresecurity.com / diegos@gmail.com) Page 1 WPA Migration Mode:
More informationAttacking Networks. Joshua Wright LightReading LIVE! October 1, 2003
Attacking 802.11 Networks Joshua Wright Joshua.Wright@jwu.edu LightReading LIVE! October 1, 2003 Attention The material presented here reflects the personal experience and opinions of the author, and not
More informationWireless Technologies
Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless
More informationWireless Networking WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses
More informationHighlight. Central AP Management with High Scalability
WMS-608N/C Wireless LAN Controller with Built-in AAA Radius Based User Access Control, Support 512 AP and 5000 User License (5 Giga Ethernet Switch Ports) PheeNet WMS-608N/C utilizes New Generation Technology
More informationWi-Fi Scanner. Glossary. LizardSystems
Wi-Fi Scanner Glossary LizardSystems 2 Table of Contents 802 6 802.11 6 802.11a 6 802.11b 6 802.11d 6 802.11e 6 802.11g 6 802.11h 6 802.11i 6 802.11j 6 802.11n 7 802.1X 7 802.3 7 A 8 Ad-Hoc mode 8 AES
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #7 More WiFi Security 2015 Patrick Tague 1 Class #7 Continuation of WiFi security 2015 Patrick Tague 2 Device Private WiFi Networks AP Local AAA
More informationCisco Structured Wireless-Aware Network (SWAN) Implementation Guide
Cisco Structured Wireless-Aware Network (SWAN) Implementation Guide The Cisco Structured Wireless-Aware Network (SWAN) provides the framework to integrate and extend wired and wireless networks to deliver
More informationWireless LAN Security (RM12/2002)
Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For
More informationCWTS Exam Objectives (Exam PW0-070)
Introduction The Certified Wireless Technology Specialist (CWTS) certification, covering the current objectives, will certify that successful candidates know the fundamentals of RF behavior, can explain
More information802.3at ac 3x3 Dual Band Ceiling Mount Access Point/WDS. can be used with EAP1750H. Key Features
EAP1750H can be used with 802.3at capable switches or injectors 802.11ac 3x3 Dual Band Ceiling Mount Access Point/WDS The EAP1750H leverages the breakthrough speed and performance of 802.11ac for connecting
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ We offer free update service for one year Exam : PW0-250 Title : Certified Wireless Design Professional (CWDP) Vendors : CWNP Version : DEMO Get Latest
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #7 WiFi Security 1 Announcements Please do HW#2 in using the stable OMNET++ 4.6, not the beta version. Porting has proven difficult... Form project
More informationCERIO Corporation OW-310N2
CERIO Corporation OW-310N2 1000mW extreme Power 11N 300Mbps Outdoor Access Point Quick Installation Guide 1. Overview CERIO OW-310N2 Outdoor AP Bridge utilizes a 1000mW high power with Aluminum Extrusion
More informationPrincess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content
More informationMulti-Layered Security Framework for Metro-Scale Wi-Fi Networks
Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the
More informationCisco WAP121 Wireless-N Access Point with Single Point Setup
Data Sheet Cisco WAP121 Wireless-N Access Point with Single Point Setup Secure, Easy-to-Deploy, Affordable Wireless-N Connectivity Highlights Provides affordable high-bandwidth 802.11n wireless connectivity
More informationExam Questions CWSP-205
Exam Questions CWSP-205 Certified Wireless Security Professional https://www.2passeasy.com/dumps/cwsp-205/ 1.. What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism
More informationOutdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0
Outdoor High Power 802.11b/g/n Wireless USB Adapter USER MANUAL 4.0 2012 Contents 1 Introduction... 3 2 Hardware Installation... 4 3 Driver Installation... 6 3.1 Windows XP... 6 3.2 Windows Vista... 9
More informationCertifyMe. CertifyMe
CertifyMe Number: 642-586 Passing Score: 800 Time Limit: 120 min File Version: 8.0 http://www.gratisexam.com/ CertifyMe 642-586 Exam A QUESTION 1 A customer in the United States requires connectivity between
More informationCisco Aironet 1130G Series IEEE g Access Point
Cisco Aironet 1130G Series IEEE 802.11g Access Point Low-profile business-class access point with integrated antennas for easy deployment in offices and similar RF environments Product Overview The Cisco
More informationQuickSpecs. HP M111 Client Bridge Series (Retired) Model. Key features
Overview (Retired) Model HP M111 Client Bridge US HP M111 Client Bridge JP J9389A J9523A Key features Can connect wired device to a wireless network Single radio IEEE 802.11a/b/g Two external antennas
More informationIP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask
Network Requirements, page 1 Wireless LAN, page 2 Wi-Fi Network Components, page 3 802.11 Standards for WLAN Communications, page 6 Security for Communications in WLANs, page 9 WLANs and Roaming, page
More informationDCCS Business Breakfast. Walter Greiner Systems Engineer Sales März 2018
DCCS Business Breakfast Walter Greiner Systems Engineer Sales März 2018 Why Wireless is important? more then since 2016 1 IP Traffic 2020 1 66% 34% Fixed Mobile 1 Source: Cisco Visual Networking Index,
More informationOverview. Product Terminology. Autonomous Access Points. Lightweight Access Points CHAPTER
CHAPTER 1 The Cisco Aironet Cisco Aironet 1100 Series Access Point series access point is available in autonomous and lightweight configurations. The autonomous access points can support standalone network
More informationSecuring Wireless LANs with Certificate Services
1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the
More informationM a/b/g Outdoor Layer-2 MESH AP
802.11a/b/g Outdoor Layer-2 MESH AP 2.4GHz / 5GHz 802.11 a/b/g MESH PRODUCT DESCRIPTION EnGenius Mesh AP is designed with IEEE802.11a/b/g standards and addressed on providing high performance mesh network.
More informationWireless Networks
802.11 Wireless Networks Presentation for North Central Regional Meeting October 19, 2010 Tom Jones, PE, RCDD / NTS Field Sales Engineer, D-Link Agenda Brief History of Wireless Networks 802.11b, 802.11g
More informationThis course provides students with the knowledge and skills to successfully survey, install, and administer enterprise Wi-Fi networks.
Certified Wireless Network Administrator (CWNA) Course Overview This course provides students with the knowledge and skills to successfully survey, install, and administer enterprise Wi-Fi networks. Course
More informationCWNA Exam PW0-250 Certified Wireless Design Professional (CWDP) Version: 6.0 [ Total Questions: 60 ]
s@lm@n CWNA Exam PW0-250 Certified Wireless Design Professional (CWDP) Version: 6.0 [ Total Questions: 60 ] Question No : 1 After surveying for the ideal mounting locations for APs, you have been asked
More informationExam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]
s@lm@n HP Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ] HP HP2-Z32 : Practice Test Question No : 1 What is a proper use for an ingress VLAN in an HP MSM VSC?
More informationCisco CCIE Wireless Beta Written. Download Full Version :
Cisco 351-050 CCIE Wireless Beta Written Download Full Version : https://killexams.com/pass4sure/exam-detail/351-050 Question: 228 66 Which information is most important for you to obtain from the customer
More informationPRODUCT GUIDE Wireless Intrusion Prevention Systems
PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : PW0-070 Title : Certified Wireless Technology Specialist Vendors : CWNP
More information