Securing Wireless LANs with Certificate Services

Similar documents
What is Eavedropping?

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

FAQ on Cisco Aironet Wireless Security

Authentication and Security: IEEE 802.1x and protocols EAP based

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

KNOWLEDGE SOLUTIONS. MIC2823 Implementing and Administering Security in a Microsoft Windows Server 2003 Network 5 Day Course

Wireless Network Security Fundamentals and Technologies

Automating VPN Management

Wireless technology Principles of Security

Implementing Security in Windows 2003 Network (70-299)

Standard For IIUM Wireless Networking

Chapter 24 Wireless Network Security

LESSON 12: WI FI NETWORKS SECURITY

Exam Questions CWSP-205

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)

Csci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802.

Cross-organisational roaming on wireless LANs based on the 802.1X framework Author:

Wireless# Guide to Wireless Communications. Objectives

Wireless LAN Security. Gabriel Clothier

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

MCSA Guide to Networking with Windows Server 2016, Exam

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Wireless Attacks and Countermeasures

Using Mobile Computers Lesson 12

The following chart provides the breakdown of exam as to the weight of each section of the exam.

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Chapter 1 Describing Regulatory Compliance

Configuring the Client Adapter through the Windows XP Operating System

Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP)

A POLYCOM WHITEPAPER Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering

Summary. Deployment Guide: Configuring the Cisco Wireless Security Suite 1 OL

Security in IEEE Networks

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Security+ SY0-501 Study Guide Table of Contents

ECHONET Lite SPECIFICATION. ECHONET Lite System Design Guidelines 2011 (2012) ECHONET CONSORTIUM ALL RIGHTS RESERVED

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Aerohive Private PSK. solution brief

5 Tips to Fortify your Wireless Network

Appendix E Wireless Networking Basics

Exam Questions SY0-401

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

Wireless Network Security

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

802.1x. ACSAC 2002 Las Vegas

BYOD: BRING YOUR OWN DEVICE.

Configuring the Client Adapter through Windows CE.NET

Your wireless network

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

Securing a Wireless LAN

U S E R M A N U A L b/g PC CARD

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

TestsDumps. Latest Test Dumps for IT Exam Certification

Configuring the WMIC for the First Time

Secure Access Configuration Guide For Wireless Clients

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

ENHANCING PUBLIC WIFI SECURITY

ClearPass QuickConnect 2.0

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003

VOCOM II. WLAN Instructions. VOCOM II Tough

PMS 138 C Moto Black spine width spine width 100% 100%

Configuring EAP for Wireless Network Connectivity By Victor Zapata

AmbiCom WL11-SD Wireless LAN SD Card. User Manual

CENTRAL AUTHENTICATION USING RADIUS AND 802.1X

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter. User Guide WIRELESS WUSB54G. Model No.

TopGlobal MB8000 Hotspots Solution

Access Connections 5.1 for Windows Vista: User Guide

Wireless-N. User Guide. USB Network Adapter WUSB300N WIRELESS. Model No.

Configuring Wireless Security Settings on the RV130W

CUA-854 Wireless-G Long Range USB Adapter with Antenna. User s Guide

Internet access system through the Wireless Network of the University of Bologna (last update )

Exam : PW Title : Certified wireless security professional(cwsp) Version : DEMO

Configuring a VAP on the WAP351, WAP131, and WAP371

Cisco Unified Wireless Network Solution Overview

Configuring Authentication Types

Network Security and Cryptography. 2 September Marking Scheme

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users

Network Security and Cryptography. December Sample Exam Marking Scheme

Configuring the Client Adapter through the Windows XP Operating System

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year!

WNRT-627. Data Sheet. Europe/ ETSI: 2.412~2.472GHz (13 Channels) Japan/ TELEC: 2.412~2.484GHz (14 Channels) RF Power.

Security Setup CHAPTER

Wireless LAN Security (RM12/2002)

TABLE OF CONTENTS CHAPTER TITLE PAGE

D-Link AirPlus G DWL-G700AP

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

Agile Controller-Campus V100R002C10. Permission Control Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with SRX 400. User Guide WIRELESS WMP54GX4. Model No.

Designing AirPort Extreme n Networks

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Securing Your Wireless LAN

Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office

802.1x Port Based Authentication

WL 5011s g Wireless Network Adapter Client Utility User Guide

Zebra Mobile Printer, Microsoft IAS, Cisco Controller TLS and WPA-TLS, Zebra Setup Utility

Security Enhancements

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. Access Point WIRELESS WAP54G (EU/LA/UK) Model No.

Transcription:

1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the home environment to the large organizations with hundreds of wireless clients. Although WLAN has many useful features, but the securing wireless network is always a top priority for analysts and network security firms to improve. The Institute of Electrical and Electronic Engineers (IEEE), along with other standards organizations, have been redefining and improving wireless security standard to enable WLANs to stand up to the hostile security environment. This research examines the Microsoft Securing WLANs solution which is based on IEEE 802.1X and requires a Remote Authentication Dial-In User Service (RADIUS) infrastructure and a Public Key Infrastructure (PKI). The solution uses a flexible design and is suited for the organizations of several hundreds to many thousands of wireless network users. I. Introduction Since the discovery of WLAN security weakness, leading network vendors, standards organizations, and analysts have focused a great deal of effort on finding remedies for these vulnerabilities. This has yielded a number of responses to the concerns over WLAN security. The principal alternatives are: Not to deploy WLAN technology Stay with 802.11 static WEP security Use a VPN to protect data on the WLAN Use IPsec to protect WLAN traffic Use 802.1X authentication and data encryption to protect the WLAN These alternative strategies are listed in order of the least to the most satisfactory based on a combination of security, functionality, and usability, although this is somewhat subjective. In this paper, I would like to introduce the Microsoft favor alternative: using 802.1X authentication and WLAN encryption. The rest of the paper is organized as follows. In session II, I discuss about the 802.1X EAP-TLS solution architecture. In session III, I discuss about the extending of the solution design. Session IV is about the re-evaluation of the design criteria. I conclude in session V. II. The 802.1X EAP-TLS Solution Architecture In this session, I will describe the solution architecture, and then a logical design is derived based on design criteria taken from an example company. The logical design is based on 802.1X WLAN network hardware, Remote Authentication Dial-In User Service (RADIUD) authentication, and a public key.

2 Understanding WLAN Security Protecting a WLAN involves three major elements Authenticating the person (or device) connecting to the network. Authorizing the person or device to use the WLAN so that you control who has access to the network. Protecting the data transmitted on the network Network Authentication and Authorization Static WEP security relies on a simple shared secret (password or key) for authenticating users and devices to the WLAN The 802.1X protocol is an IEEE standard for authenticating access to a network and, optionally, for managing keys used to protect traffic. The 802.1X protocol involves the network user, a network access (or gateway) device such as a wireless AP, and an authentication and authorization service in the form of a RADIUS sever. The RADIUS server performs the job of authenticating the users credentials and authorizing the users access to the WLAN. The 802.1X protocol relies on an IETF protocol called the Extensible Authentication Protocol (EAP) to carry out the authentication exchange between the client and the RADIUS server. EAP is a general protocol for authentication that supports multiple authentication methods, based on passwords, digital certificates, or other types of credential extensible. EAP-TLS is an IETF standard (RFC 2716) and is probably the most widely supported authentication method on both wireless client and RADIUS servers in use today. The EAP-TLS method uses public key certificates to authenticate both the wireless clients and the RADIUS servers by establishing an encrypted TLS session between them. WLAN Data Protection Authentication is one part of the solution. The other significant solution component is the protecting the data communication over the LAN. WEP data encryption is not secured enough for serious applications. The 802.1X solution allows to frequently changing the encryption keys. The EAP methods generate an encryption key that is unique to each client. WPA is an industry standard published by the Wi-Fi Alliance, a consortium of the leading Wi-Fi vendors. WPA includes two modes, one using 802.1X and RADIUS authentication, and another simpler scheme for SOHO environment using a pre-shared key (known as WPA PSK). Conceptual Design As we know, there are a number of serious security vulnerabilities inherent in wireless networking. At best, these weaknesses are only partially addressed by the use of Wired Equivalent Privacy (WEP) as specified in the IEEE 802.11 standard. The solution proposed in this guide addresses the problem of how to improve the security of wireless network communications. To do this, the ideal solution needs to have the following features:

3 Robust wireless client authentication. This should include mutual authentication of the client, the wireless access point (AP) and the RADIUS server. An authorization process to determine who will be allowed to access the wireless network. Access control to only permit network access to authorized clients. Strong encryption of wireless network traffic Secure management of encryption keys. Resilience to denial of service (DoS) attacks. The 802.1X protocol standard for network access control combined with a secure authentication method such as EAP-TLS fulfills some of these requirements. A conceptual figure of the solution (802.1X EAP-TLS Authentication) is displayed in the following figured Figure 1 The solution concept based on 802.1X EAP-LTS authentication The figure depicts four main components: The wireless client: a computer or device running application that requires access to network resources. The wireless AP: Network access point. AP implements access control functions to allow and deny access to the network and provides the capability to encrypt wireless traffic. The Authentication Service: This component stores and verifies the credentials of valid users and makes authorization decisions based on an access policy. The internal network: A secured area of networked services that the wireless client application needs to gain access. Solution Design Criteria

4 Target Organization Figure 2 The schematic of the target organization s network and physical layout Organization Requirements There are some key requirements for the WLAN securing solution. Improve the security of WLAN to eliminate or substantially reduce the following threats: o Intruders eavesdropping on data transmissions across the WLAN o Intruders intercepting and modifying data transmissions on the WLAN o Intruders or other unauthorized users connecting to the WLAN and introducing viruses or other hostile code onto the internal network. o Network-level (rather than radio-level) DoS attacks. o Intruders making use of the corporate WLAN to gain Internet access. The security measures should not reduce the usability of the network and not lead to any significant increase in help desk calls. The design should be capable of supporting a broad variety of clients and devices. Availability 24/7 service Scalability should exist to cope with higher levels of use in the future possibly beyond 100 percent of the existing workforce.

5 Reusability of components Solution Design Criteria From the requirements, the criteria can be derived to support the solution design. Security: o Robust authentication and authorization of wireless clients o Robust access control to limit access to authorized clients o High strength encryption of wireless network traffic o Secure management of encryption keys o Resilience to DoS attacks Scalability: o Basic design that scales up and down to include a broad range of organizations Min/Max users supported o 500-15,000+ WLAN users o 500 15,000+ certificate users Number of sites supported o Multiple large sites with local authentication domain controllers and MS IAS. o Supported with resilience to WAN failure o Multiple small sites supported with no resilience to WAN failure Component reuse (use of existing infrastructure) o Use Active Directory, network services, and Microsoft Windows XP clients Component reuse (usability by future applications) o Support for other network access applications (VPN and 802.1X wired network access) by the authentication infrastructure. o Support wide variety of applications, for example VPN by PKI. Availability o Resilience to single component or network link failure Extensibility o Support future capabilities and standards 802.11i, WPA, 802.11a for WLAN o Certificate infrastructure is extensible to support most common uses of public key certificates, i.e. secure e-mail, smart card logon, Web service Security Manageability o Integration into existing corporate management solutions IT organization structure o Favors centralized IT Standard conformance o Adherence to current relevant standards and a clear migration path to future relevant standards. Solution Logical Design

6 Conceptual Design Review Figure 3 The conceptual view of the network access process Logical Design The IT services in the design are grouped into the following categories: WLAN components Wireless clients and Access Points (AP) RADIUS components PKI component Certificates Authorities (CA) Infrastructure services component

7 Figure 4 The logical design of the secure WLAN solution Logical Physical Level Headquarters Figure 5 The head office server implementation Large Branch/Regional Office

8 Figure 6 The physical layout for a large branch office Small Branch Office Figure 7 The physical layout for a small branch office Scaling Strategy One of the key design criteria is to ensure that the design can scale. Large Organization Figure 8 The solution scaled for a large organization

9 Small Organization Figure 9 The solution scaled for a small organization III. Extending the Design Another key design criterion of the solution is the reusability of the components in future applications. The RADIUS component and the PKI component can be reused to provide authentication and other security services for a variety of applications. Other Network Access Services This solution s RADIUS design can provide authentication, authorization, and accounting services for other network access servers, such as 802.1X wired network authentication, and VPN and remote access authentication. 802.1X Wired Network Authentication Figure 10 Using 802.1X wired authentication VPN and Remote Dial-Up Authentication

10 Figure 11 Extending the RADIUS component to support a VPN PKI Applications Because the solution criteria for reusability and extensibility are important, the PKI component was designed in the knowledge that it may be used in the future for a variety of different security applications. The following figure illustrates a few of the applications that the PKI component could support in addition to the secure wireless application.

11 Figure 12 PKI application IV. Design criteria Re-Evaluated It is worth re-examining the list of design criteria for the solution to examine how well the proposed design now meets the goals set earlier. Security - The solution design includes robust authentication, authorization, and access control. Strong (128 bit) encryption is a function of the network hardware and is supported on most currently available devices. Scalability The basic design accommodates a wide range of organizations in a cost-effective manner from a few hundred to many thousands of users. Component reuses (use of existing infrastructure) The design uses Active Directory and many existing network service, such as DHCP and DNS.

12 Component reuses by future applications The RADIUS design, implemented using IAS, can be used by or easily extended to support other network access applications (such as VPN, 802.1X wired network access). The PKI is also capable of supporting simple public key applications. Availability The solution design is resilient to a single component or network link failure at the head office and for all outlying offices where a RADIUS server can be deployed. Small offices without a local RADIUS server are vulnerable to a WAN failure. Standards compliance The solution adhere to current official and industry standard. This is most relevant in the area of WLAN security where the solution is based on the 802.1X protocol, EAP-TLS, 128-bit dynamic or WPA. V. Conclusion In this paper I have introduced the design of 820.1X EAP-TLS solution from Microsoft. The design is for a sample target organization network. The criteria have been given to support the design. Then the proposed design was re-evaluated to the criteria to make sure it met the desired goals. The IEEE 802.1X EAP-TLS solution has many key benefits, such as, high security, stronger encryption, transparent, user and computer authentication, low cost, and high performance. The design can be scaled to meet the needs of organizations if different size. The design can be extended or used as the basic to build other network access solutions that include VPN and wired network access control, and the PKI can be used in different applications such as Web Services Security, Secure E-mail, and IP Security. References [1] IEEE Std 802.1X 2001 (2001) IEEE Standard for Local an Metropolitan Area Network Port based Network Access Control, The Institute of Electrical and Electronics Engineers, Inc. [2] The Microsoft Solution for Security (MSS) Group (2004) Securing Wireless LANs with Certificate Service Release 1.6, Microsoft Corporation. [3] Nirmala Lubusu (2003) Implementation and Performance Analysis of the Protected Extensible Authentication Protocol, Department of Computer Science, UCCS.