SlideShare a Scribd company logo
1 of 21
Security with Aruba Wireless
              VFM Systems & Services (P) Ltd.
Enterprises Around the World
Depend on Aruba Networks
   High Tech       Internet         Finance       Media & Ent.




   Education     Government        Healthcare        Retail




   Hospitality   Public Transit   Public Venues    Services




  Oil and Gas    Manufacturing      Logistics      Telecom
Is this how you think about Wireless? (Unlikely..)


                                  Wireless is
                                   more secure
                                   than wired

                                  It is true …..
                                   If you do it
                                   right
Wired Network Security Questions


  On your wired Network
        Do you authenticate your users?
        Do you encrypt all traffic?
        Do you control access to Network resources
         based on user identity?


  Aruba Wireless lets you do all this by
   design.
The Pillars of Aruba Wireless Security




                                        Stateful Firewall
                                                               Intrusion
   Authentication       All wireless     to monitor all
                                                            Prevention for
      before        traffic encrypted       wireless
                                                            identifying and
   Admission into     from client to      packets and
                                                               thwarting
     Network            controller        admit/deny
                                                               intruders
                                            passage
All at one place

        • Know the User                                    • No
          Identity                                           eavesdropping




                          Authentication    Encryption




                            Intrusion
                                           Authorization
                           Prevention

        • Detect and                                       • Clear set of
          Contain                                            Allows and
          rogues                                             Denys
Aruba Unified Access Architecture


    Centralized controller enables distributed networks




       Access Points                         Network Services
                         Aruba Mobility
                           Controller


        End-to-end Multi-vendor AirWave Network Management
Mobility Controller
          Connects to Network
          Backbone at the DC / Core
          Switch through standard
          CAT 5 cable




Access Points are placed at appropriate
locations in the offices (walls / false roofs)
and connect to the wired backbone
through standard CAT 5 cable
Authentication


  802.1x / Captive Portal / VPN
  Authentication with 802.1x
        Authenticate users before granting access to
         L2 media
        Makes use of EAP (All forms of EAP
         supported)
        On successful authentication IP address is
         assigned
Encryption of Wireless Traffic

   Traffic is encrypted as it leaves a Wireless Client and is decrypted only at
    the Controller (and not at the AP),as only the controller has the decryption
    keys.
         Someone tapping to the airwaves sees only encrypted traffic
         Someone tapping into the Access Point sees only encrypted traffic
         Someone tapping into the wire between the AP and the controller sees only
          encrypted traffic
         Risk of Loss of corporate information through man-in-the-middle eavesdropping
          is completely ruled out
   This architecture is superior to decryption at the AP as then
         The AP is a vulnerable point for hacking and gaining decryption credentials to
          eavesdrop
         The wire connecting the AP and the controller can be tapped to listen into
          wireless traffic
         Risks of Man-in-the middle eavesdropping is very high
   Encryption Protocols Supported
         WPA/TKIP
         WPA2/AES
Wireless Users Access Restrictions

  Once admitted into the wireless network after
   stringent authentication, what a wireless user
   can do is subject to policies defined in the
   Stateful Inspection Firewall in the Controller
        Every wireless packet is decrypted and based on the
         identity of the user – passed through the policies
         defined for the user
        Unauthorized access of network resources is denied
        The firewall is ICSA certified, stateful and provides for
         much higher level of security compared to stateless
         ACLs
What does the Firewall do?
The Stateful Firewall in the Aruba Controller

   The firewall being in the controller is integrated to the
    point of authentication and the point of decryption is able
    to provide “User-centric” Network access policies by
        User name / User Groups provided by AD
        The source IP information of the data
        The destination IP information of the data
        The application data streams the client is generating
        The network protocol in use
        The required Quality of Service needs for that data stream
        Time of the Day ….. And so on.
   Thus the stateful firewall prevents unauthorized access
    by users of the wireless network
User-Centric Networks Enable Mobility

                                                Role-Based                  AAA
                                               Access Control           FastConnect
                                                       Access Rights
                  SSID-Based
      Staff      Access Control   Executive                                       RADIUS
                                                                                  LDAP
                                                                                  AD
                  Virtual AP 1
                  SSID: Corp      Finance
   Contractors                                                             Corporate
                                                                            Services
                                    Legal
      Voice

                  Virtual AP 2       HR
      Video      SSID: GUEST
                                                                  Secure Tunnel
                                   Guest                            To DMZ
                                            Captive Portal

     Guest                                                                        DMZ
The Wireless Intrusion Prevention System

   Contain uncontrolled Wireless devices
        Rogue Aps
        Laptops acting as bridges
        Ad-hoc networks
   Attacks against WLAN infrastructure
        Denial of Service/Flooding
        Forged deauthenticate/disassociate
        Man-in-the-middle
        WEP Cracking/ WPA-PSK cracking



                      “Protect the Air”
Wireless Intrusion Prevention Work Cycle


  Discover                                                    Classify
  Complete 802.11 Spectrum Monitoring
                                         Policy-Based Threat Prioritization

  Continuous RF monitoring of
  wireless devices, activity and           Automatic classification of threats
  configuration across all 802.11            and non-threats is critical to RF
  channels                                                            security




  Alert and Audit                                              Contain
  Automated Compliance Reporting
                                              Automated Threat Mitigation

  Automated logging and report           Automated containment to block any
  distribution ensures compliance with                     rogue or intruder
  wireless security policies and
  regulations
Controlling Rogue APs

                        1. AP Detection
                            1. See all Aps

                        2. AP Classification
                            Are they
                            neighbors?
                            Are they rogues?

                        3. Rogue Containment
                            Stop users from
                            accessing Rogues
                            Over wire and
                            wireless
                            Leave neighbors
                            alone

                        4. Locate rogue.
                             Find where it is
                             and disconnect.
Intrusion Detection & Protection
Wireless Intrusion Prevention Features
      Feature

      Air monitor (2.4 and 5GHz)                              
      Wireless rogue scanning and identification              
      Wired rogue containment                                 
      Wireless rogue containment via de-authorization         
      Wi-Fi interference detection                            
      Spectrum analysis                                       
      Wi-Fi interference classification                       
      Wi-Fi interference visualization                        
      Wireless intrusion detection system attack signatures   
      Security threat management visualization                
      Wireless intrusion configuration wizard                 
      Total Watch enhanced air monitoring                     
      Air monitoring of all bands (2.4, 4.9 and 5GHz)         
      Dynamic channel dwell times                             
      In-between channels rogue scanning                      
      Automated rule-based rogue classification               
      Advanced wireless rogue containment via tarpitting      
      Detect and contain Windows Bridge                       
      Security events correlation                             
The Pillars of Aruba Wireless Security




  Authentication          All wireless           Stateful Firewall        Intrusion
  before                  traffic encrypted      to monitor all           Prevention for
  Admission into          from client to         wireless packets         identifying and
  Network                 controller             and admit/deny           thwarting
  • Certificate + AD      • No loss of           passage                  intruders
    credentials granted     information to       • All wireless traffic   • Continuous
    Corporate SSID          eavesdropping          subject to Firewall      monitoring of RF
  • Guest users with      • No risk to man in      policies                 space to identify
    Credentials granted     the middle attacks   • Restrict SSIDs by        intruders – rouge
    Guest SSID            • Leaves APs free to     time of Day              APs, unauthorized
  • Others not granted      monitor RF space     • Restrict Users by        employee APs,
    access                                         time of day, by          Hackers – and
                                                   destination IP, by       block them.
                                                   Protocol
For your attention and time.
Questions?
Write to : solutions@vfmindia.biz
Response Guaranteed

More Related Content

What's hot

Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC PresentationCloudComputing
 
Data Access Network for Monitoring and Troubleshooting
Data Access Network for Monitoring and TroubleshootingData Access Network for Monitoring and Troubleshooting
Data Access Network for Monitoring and TroubleshootingGrant Swanson
 
Wifi
WifiWifi
Wifinil65
 
Ch20 Wireless Security
Ch20 Wireless SecurityCh20 Wireless Security
Ch20 Wireless Securityphanleson
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortTen Sistemas e Redes
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santossantosomar
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin RodillasTI Safe
 
When WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksWhen WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksAirTight Networks
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- DatasheetINSPIRIT BRASIL
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
 
Porque cambiar de IPSec a SSL VPN
Porque cambiar de IPSec a SSL VPNPorque cambiar de IPSec a SSL VPN
Porque cambiar de IPSec a SSL VPNaloscocco
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
Plugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowPlugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowNetFlow Analyzer
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSonionid12
 
Signaling network vulnerabilities exposed, protection strategies for operator...
Signaling network vulnerabilities exposed, protection strategies for operator...Signaling network vulnerabilities exposed, protection strategies for operator...
Signaling network vulnerabilities exposed, protection strategies for operator...Xura
 

What's hot (20)

Day1
Day1Day1
Day1
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
C2MS
C2MSC2MS
C2MS
 
Data Access Network for Monitoring and Troubleshooting
Data Access Network for Monitoring and TroubleshootingData Access Network for Monitoring and Troubleshooting
Data Access Network for Monitoring and Troubleshooting
 
Wifi
WifiWifi
Wifi
 
Ch20 Wireless Security
Ch20 Wireless SecurityCh20 Wireless Security
Ch20 Wireless Security
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
When WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksWhen WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS Attacks
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- Datasheet
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Porque cambiar de IPSec a SSL VPN
Porque cambiar de IPSec a SSL VPNPorque cambiar de IPSec a SSL VPN
Porque cambiar de IPSec a SSL VPN
 
VoIP security
VoIP securityVoIP security
VoIP security
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Plugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowPlugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlow
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
 
Signaling network vulnerabilities exposed, protection strategies for operator...
Signaling network vulnerabilities exposed, protection strategies for operator...Signaling network vulnerabilities exposed, protection strategies for operator...
Signaling network vulnerabilities exposed, protection strategies for operator...
 
Datasheet stonegate ips-allinone
Datasheet stonegate ips-allinoneDatasheet stonegate ips-allinone
Datasheet stonegate ips-allinone
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 

Viewers also liked

Joseph Indolos Sales Certified – ClearPass Sales Specialist (CPSS) [2017]
Joseph Indolos  Sales Certified – ClearPass Sales Specialist (CPSS) [2017]	Joseph Indolos  Sales Certified – ClearPass Sales Specialist (CPSS) [2017]
Joseph Indolos Sales Certified – ClearPass Sales Specialist (CPSS) [2017] Joseph Indolos
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate wayvfmindia
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfmvfmindia
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate wayvfmindia
 
Vfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi frameworkVfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi frameworkvfmindia
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reportervfmindia
 
Rise Above the Ruckus: Hot Topics in Philanthropy
 Rise Above the Ruckus: Hot Topics in Philanthropy Rise Above the Ruckus: Hot Topics in Philanthropy
Rise Above the Ruckus: Hot Topics in PhilanthropyRHB_Solutions
 
Vfm strategic benefits from caching
Vfm strategic benefits from cachingVfm strategic benefits from caching
Vfm strategic benefits from cachingvfmindia
 
Vfm corporate presentation v1
Vfm corporate presentation v1Vfm corporate presentation v1
Vfm corporate presentation v1vfmindia
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportWireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportCisco Mobility
 
7 Essential Services Every Data Center Solutions Provider Should Have
7 Essential Services Every Data Center Solutions Provider Should Have7 Essential Services Every Data Center Solutions Provider Should Have
7 Essential Services Every Data Center Solutions Provider Should HaveSirius
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityDImension Data
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesCisco Mobility
 
Vfm packetshaper presentation
Vfm packetshaper presentationVfm packetshaper presentation
Vfm packetshaper presentationvfmindia
 

Viewers also liked (16)

Joseph Indolos Sales Certified – ClearPass Sales Specialist (CPSS) [2017]
Joseph Indolos  Sales Certified – ClearPass Sales Specialist (CPSS) [2017]	Joseph Indolos  Sales Certified – ClearPass Sales Specialist (CPSS) [2017]
Joseph Indolos Sales Certified – ClearPass Sales Specialist (CPSS) [2017]
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate way
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfm
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate way
 
Vfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi frameworkVfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi framework
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporter
 
Rise Above the Ruckus: Hot Topics in Philanthropy
 Rise Above the Ruckus: Hot Topics in Philanthropy Rise Above the Ruckus: Hot Topics in Philanthropy
Rise Above the Ruckus: Hot Topics in Philanthropy
 
Vfm strategic benefits from caching
Vfm strategic benefits from cachingVfm strategic benefits from caching
Vfm strategic benefits from caching
 
Vfm corporate presentation v1
Vfm corporate presentation v1Vfm corporate presentation v1
Vfm corporate presentation v1
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportWireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
 
7 Essential Services Every Data Center Solutions Provider Should Have
7 Essential Services Every Data Center Solutions Provider Should Have7 Essential Services Every Data Center Solutions Provider Should Have
7 Essential Services Every Data Center Solutions Provider Should Have
 
Technology Keynote
Technology KeynoteTechnology Keynote
Technology Keynote
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Vfm packetshaper presentation
Vfm packetshaper presentationVfm packetshaper presentation
Vfm packetshaper presentation
 

Similar to Vfm security with aruba wireless

Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalMahmoud Yassin
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn securityJack Melson
 
[DSBW Spring 2009] Unit 08: WebApp Security
[DSBW Spring 2009] Unit 08: WebApp Security[DSBW Spring 2009] Unit 08: WebApp Security
[DSBW Spring 2009] Unit 08: WebApp SecurityCarles Farré
 
Wireless Security
Wireless SecurityWireless Security
Wireless SecuritysiDz
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Advanced Wi-Fi pentesting
Advanced Wi-Fi pentestingAdvanced Wi-Fi pentesting
Advanced Wi-Fi pentestingYunfei Yang
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pkslucpaquin
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)Jeff Green
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)Jeff Green
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprisesshrutisreddy
 

Similar to Vfm security with aruba wireless (20)

Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn security
 
Network security
Network securityNetwork security
Network security
 
[DSBW Spring 2009] Unit 08: WebApp Security
[DSBW Spring 2009] Unit 08: WebApp Security[DSBW Spring 2009] Unit 08: WebApp Security
[DSBW Spring 2009] Unit 08: WebApp Security
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Advanced Wi-Fi pentesting
Advanced Wi-Fi pentestingAdvanced Wi-Fi pentesting
Advanced Wi-Fi pentesting
 
Ct 1 Danielson
Ct 1 DanielsonCt 1 Danielson
Ct 1 Danielson
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pks
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
 
Unit 08: Security for Web Applications
Unit 08: Security for Web ApplicationsUnit 08: Security for Web Applications
Unit 08: Security for Web Applications
 
Wlan security
Wlan securityWlan security
Wlan security
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Ad enterprise datasheet
Ad enterprise datasheetAd enterprise datasheet
Ad enterprise datasheet
 

Vfm security with aruba wireless

  • 1. Security with Aruba Wireless VFM Systems & Services (P) Ltd.
  • 2. Enterprises Around the World Depend on Aruba Networks High Tech Internet Finance Media & Ent. Education Government Healthcare Retail Hospitality Public Transit Public Venues Services Oil and Gas Manufacturing Logistics Telecom
  • 3. Is this how you think about Wireless? (Unlikely..) Wireless is more secure than wired It is true ….. If you do it right
  • 4. Wired Network Security Questions On your wired Network  Do you authenticate your users?  Do you encrypt all traffic?  Do you control access to Network resources based on user identity? Aruba Wireless lets you do all this by design.
  • 5. The Pillars of Aruba Wireless Security Stateful Firewall Intrusion Authentication All wireless to monitor all Prevention for before traffic encrypted wireless identifying and Admission into from client to packets and thwarting Network controller admit/deny intruders passage
  • 6. All at one place • Know the User • No Identity eavesdropping Authentication Encryption Intrusion Authorization Prevention • Detect and • Clear set of Contain Allows and rogues Denys
  • 7. Aruba Unified Access Architecture Centralized controller enables distributed networks Access Points Network Services Aruba Mobility Controller End-to-end Multi-vendor AirWave Network Management
  • 8. Mobility Controller Connects to Network Backbone at the DC / Core Switch through standard CAT 5 cable Access Points are placed at appropriate locations in the offices (walls / false roofs) and connect to the wired backbone through standard CAT 5 cable
  • 9. Authentication 802.1x / Captive Portal / VPN Authentication with 802.1x  Authenticate users before granting access to L2 media  Makes use of EAP (All forms of EAP supported)  On successful authentication IP address is assigned
  • 10. Encryption of Wireless Traffic  Traffic is encrypted as it leaves a Wireless Client and is decrypted only at the Controller (and not at the AP),as only the controller has the decryption keys.  Someone tapping to the airwaves sees only encrypted traffic  Someone tapping into the Access Point sees only encrypted traffic  Someone tapping into the wire between the AP and the controller sees only encrypted traffic  Risk of Loss of corporate information through man-in-the-middle eavesdropping is completely ruled out  This architecture is superior to decryption at the AP as then  The AP is a vulnerable point for hacking and gaining decryption credentials to eavesdrop  The wire connecting the AP and the controller can be tapped to listen into wireless traffic  Risks of Man-in-the middle eavesdropping is very high  Encryption Protocols Supported  WPA/TKIP  WPA2/AES
  • 11. Wireless Users Access Restrictions Once admitted into the wireless network after stringent authentication, what a wireless user can do is subject to policies defined in the Stateful Inspection Firewall in the Controller  Every wireless packet is decrypted and based on the identity of the user – passed through the policies defined for the user  Unauthorized access of network resources is denied  The firewall is ICSA certified, stateful and provides for much higher level of security compared to stateless ACLs
  • 12. What does the Firewall do?
  • 13. The Stateful Firewall in the Aruba Controller  The firewall being in the controller is integrated to the point of authentication and the point of decryption is able to provide “User-centric” Network access policies by  User name / User Groups provided by AD  The source IP information of the data  The destination IP information of the data  The application data streams the client is generating  The network protocol in use  The required Quality of Service needs for that data stream  Time of the Day ….. And so on.  Thus the stateful firewall prevents unauthorized access by users of the wireless network
  • 14. User-Centric Networks Enable Mobility Role-Based AAA Access Control FastConnect Access Rights SSID-Based Staff Access Control Executive RADIUS LDAP AD Virtual AP 1 SSID: Corp Finance Contractors Corporate Services Legal Voice Virtual AP 2 HR Video SSID: GUEST Secure Tunnel Guest To DMZ Captive Portal Guest DMZ
  • 15. The Wireless Intrusion Prevention System  Contain uncontrolled Wireless devices  Rogue Aps  Laptops acting as bridges  Ad-hoc networks  Attacks against WLAN infrastructure  Denial of Service/Flooding  Forged deauthenticate/disassociate  Man-in-the-middle  WEP Cracking/ WPA-PSK cracking “Protect the Air”
  • 16. Wireless Intrusion Prevention Work Cycle Discover Classify Complete 802.11 Spectrum Monitoring Policy-Based Threat Prioritization Continuous RF monitoring of wireless devices, activity and Automatic classification of threats configuration across all 802.11 and non-threats is critical to RF channels security Alert and Audit Contain Automated Compliance Reporting Automated Threat Mitigation Automated logging and report Automated containment to block any distribution ensures compliance with rogue or intruder wireless security policies and regulations
  • 17. Controlling Rogue APs 1. AP Detection 1. See all Aps 2. AP Classification Are they neighbors? Are they rogues? 3. Rogue Containment Stop users from accessing Rogues Over wire and wireless Leave neighbors alone 4. Locate rogue. Find where it is and disconnect.
  • 18. Intrusion Detection & Protection
  • 19. Wireless Intrusion Prevention Features Feature Air monitor (2.4 and 5GHz)  Wireless rogue scanning and identification  Wired rogue containment  Wireless rogue containment via de-authorization  Wi-Fi interference detection  Spectrum analysis  Wi-Fi interference classification  Wi-Fi interference visualization  Wireless intrusion detection system attack signatures  Security threat management visualization  Wireless intrusion configuration wizard  Total Watch enhanced air monitoring  Air monitoring of all bands (2.4, 4.9 and 5GHz)  Dynamic channel dwell times  In-between channels rogue scanning  Automated rule-based rogue classification  Advanced wireless rogue containment via tarpitting  Detect and contain Windows Bridge  Security events correlation 
  • 20. The Pillars of Aruba Wireless Security Authentication All wireless Stateful Firewall Intrusion before traffic encrypted to monitor all Prevention for Admission into from client to wireless packets identifying and Network controller and admit/deny thwarting • Certificate + AD • No loss of passage intruders credentials granted information to • All wireless traffic • Continuous Corporate SSID eavesdropping subject to Firewall monitoring of RF • Guest users with • No risk to man in policies space to identify Credentials granted the middle attacks • Restrict SSIDs by intruders – rouge Guest SSID • Leaves APs free to time of Day APs, unauthorized • Others not granted monitor RF space • Restrict Users by employee APs, access time of day, by Hackers – and destination IP, by block them. Protocol
  • 21. For your attention and time. Questions? Write to : solutions@vfmindia.biz Response Guaranteed