SlideShare a Scribd company logo
1 of 19
Download to read offline
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved 1
WLAN SECURITY
FUNDAMENTALS
Presented by
Neil Bhave
Channel Enablement Manager
2 2
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
Better visibility, better control, seamless mobility
“Thin”
Access Points
Centralized
Mobility Controller
802.11a/b/g
Antennas
Policy
Mobility
Forwarding
Encryption
Authentication
Management
“Fat”
Access Points
Centralized Architecture = More Secure
3 3
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
Controlling Rogue APs
1. AP detection!
•  See all APs"
2. AP classification!
•  Are they neighbors?"
•  Or are they a threat?"
3. Rogue containment!
•  Stop users from
accessing rogue APs
over the wire & over
wireless "
•  Leave neighbors alone"
4. Locate Rogue !
•  Find where it is and
disconnect"
4 4
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
Aruba Air
Monitor
Client
Client Tarpit Containment
•  Does not waste air-time during threat mitigation
•  Works against any brand and type of wireless device
Aruba Air
Monitor
Œ

Œ
Client is trying to
associate to rogue AP
Air Monitor creates
tarpit with fake channel
or fake BSSID

Client associates to
Air Monitor tarpit in
preference to rogue
Ž
Client stops
association attempts
to rogue


Ž
Interfering
Access
Point
Interfering
Access
Point
Client
5 5
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
Controlling Uncontrolled Wireless
Windows XP
Laptop
Internal Network
Public Network
Bridge
6 6
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
Wireless Intrusion Prevention - RFProtect
•  Uncontrolled wireless devices
–  Rogue APs
–  Laptops acting as bridges
–  Misconfigured laptops
–  Ad-Hoc networks
•  Attacks against the WLAN
–  Denial of Service/flooding
–  Forged de-authenticate/disassociate
–  Man-in-the-Middle
–  WEP cracking
–  WPA-PSK cracking
7 7
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
TotalWatch Full Spectrum Monitoring
•  Complete Coverage
–  2.4-GHz and 5-GHz scanning
–  4.9-GHz public safety band
•  5-MHz channel increment scanning
–  Rogue detection in-between channels
2.4 GHz 4.9 GHz 5.0 GHz
5-MHz channel scanning
8 8
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
Authentication
•  802.1X is best for Wi-Fi.
Works with all modern client
operating systems
•  Makes use of EAP
(Extensible Authentication
Protocol)
•  802.1X authentication
happens at L2 – users will be
authenticated before an IP
address is assigned
9 9
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
Authentication with 802.1X: PEAP
EAPOL (EAP over LAN) RADIUS
Encrypted Tunnel
Authentication
Server
AP/Controller
STA
10 10
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
Encrypt the Data
• If intruders can’t read the data,
there’s no need to worry where it goes
–  WEP
•  Simple to do, easy to crack
•  No key management
•  Don’t do it
–  TKIP (Temporal Key Integrity Protocol)
•  Works on legacy hardware (pre-2003)
•  First major flaw published in November 2008
•  Flaw is getting worse with more research
•  Not currently recommended
–  CCMP/AES
•  Encryption using AES
•  Considered state-of-the-art
•  Government approved (FIPS, CESG, etc.)
•  Works on all modern hardware
11 11
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
Combining Authentication & Encryption: WPA
•  WPA == Wi-Fi Protected Access
•  WPA
–  Wi-Fi Alliance “standard” based on pre-802.11i
–  Includes TKIP for encryption
•  WPA2
–  Wi-Fi Alliance “standard” based on ratified 802.11i
–  Includes TKIP and CCMP for encryption
•  For both:
–  WPA-Enterprise == 802.1X for authentication, dynamic
encryption keys
–  WPA-Personal == pre-shared authentication key – careful!
12 12
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
WPA-Personal? Be careful..
•  WPA Personal does not use 802.1X
•  Pre-shared key
•  Easier
•  But less secure
•  Problem 1: Scalability
•  Need to re-key any time an employee/user leaves the
organization
•  Problem 2: Using weak keys
•  WPA-PSK keys that are weak can be cracked (dictionary attack)
13 13
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
Configure WPA Properly
•  Configure the Common Name
of your RADIUS server
(matches CN in server
certificate)
•  Configure trusted CAs (an in-
house CA is better than a
public CA)
•  ALWAYS validate the server
certificate
•  Do not allow users to add new
CAs or trust new servers
•  Enforce with group policy
14 14
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
Authorize the Data
•  Most organizations do a decent job of authentication (who
the user is), but a poor job of authorization (what the user
is allowed to do)
•  Mobile networks are typically multi-use
•  Authentication provides you with user identity – now use
it! Identity-aware firewall policies can restrict what a user
can do, based on that user’s needs
Virtual AP 1
SSID: CORP
Virtual AP 2
SSID: GUEST
Guest user
Employee
VoIP Device
Contractor
Default VLAN
Layer 2
Switch
Router
Firewall
Captive
Portal
Radius Server
DHCP
Pool
Firewall
Virtual AP 1
SSID: CORP
Virtual AP 2
SSID: GUEST
Guest user
Employee
VoIP Device
Contractor
Default VLAN
Layer 2
Switch
Router
Firewall
Captive
Portal
Radius Server
DHCP
Pool
Firewall
15 15
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
Why Worry About Authorization?
Where is the “network perimeter” today?
§  Mobility brings us:
§  Disappearance of physical
security
§  New mobile users, devices
appearing everyday
§  Increased exposure to
malware
§  Assuming that “the bad guys
are outside the firewall, the
good guys are inside” is a
recipe for disaster
We meet
again, 007!
16 16
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
PEF to Control Wireless Performance
Multicast/
Broadcast
Chatty
Protocols
Power Users
Stealing B/W
Malicious or
Misconfigured
Clients
Lack of Policy Impacts Network
Reliability & Performance!
•  What are Multicast and Broadcast currently being used for?"
•  What problems am I creating by using large VLANs to solve
mobility issues?"
•  What non-critical applications are consuming bandwidth?"
•  Should users be connecting to 3rd party WLANs?"
•  Should users be setting up their own WLANs?"
•  Should users be connected to wireless while wired?"
•  How are “Power” Users affecting others?"
•  How are unauthorized users affecting network availability"
Bonjour!
17 17
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
Network Access Control (NAC)
•  Identity-Based Policy Control
–  Assess user role, device, location, time,
application.
–  Policies follow users throughout network
–  (Aruba PEF)
•  Health-Based Assessment
–  Client health validation
–  Remediation
–  Ongoing compliance
–  (ClearPass OnGuard)
•  Network-Based Protection
–  Stateful firewalls to enforce policies
and quarantine
–  User/device blacklisting based
on Policy Validation
–  (Integration with ESI)
Network-Based
Protection
Identity-Based
Policy Control
Health-Based
Assessment
18 18
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved
Today’s Wireless Gold Standard
•  Centralized wireless
•  Keep clients updated – drivers too!
•  Wireless intrusion detection
–  Control uncontrolled wireless
–  Locate and protect against rogue APs
•  WPA-2
–  Authentication using 802.1X and EAP-TLS
–  AES for link-layer encryption
•  Strong passwords
–  SecureID or other token-card products
–  Strong password policies
•  Authorization with identity-aware firewalls
–  Enforce principle of least privilege
–  Provide separation of user/device classes
CONFIDENTIAL
© Copyright 2012. Aruba Networks, Inc.
All rights reserved 1919

More Related Content

What's hot

8 software defined networking and traffic engineering partha narasimhan_ash c...
8 software defined networking and traffic engineering partha narasimhan_ash c...8 software defined networking and traffic engineering partha narasimhan_ash c...
8 software defined networking and traffic engineering partha narasimhan_ash c...Aruba, a Hewlett Packard Enterprise company
 

What's hot (20)

Air heads rio 2010 aruba pef overview
Air heads rio 2010   aruba pef overviewAir heads rio 2010   aruba pef overview
Air heads rio 2010 aruba pef overview
 
Industry breakout government military forum_jon green_stuart schulte
Industry breakout government military forum_jon green_stuart schulteIndustry breakout government military forum_jon green_stuart schulte
Industry breakout government military forum_jon green_stuart schulte
 
2012 ah vegas rf troubleshooting
2012 ah vegas   rf troubleshooting2012 ah vegas   rf troubleshooting
2012 ah vegas rf troubleshooting
 
Advanced rf troubleshooting_peter lane
Advanced rf troubleshooting_peter laneAdvanced rf troubleshooting_peter lane
Advanced rf troubleshooting_peter lane
 
Wlan designfor highdensityenvironments_chuck lukaszewski
Wlan designfor highdensityenvironments_chuck lukaszewskiWlan designfor highdensityenvironments_chuck lukaszewski
Wlan designfor highdensityenvironments_chuck lukaszewski
 
8 software defined networking and traffic engineering partha narasimhan_ash c...
8 software defined networking and traffic engineering partha narasimhan_ash c...8 software defined networking and traffic engineering partha narasimhan_ash c...
8 software defined networking and traffic engineering partha narasimhan_ash c...
 
2012 ah emea advanced mobility design
2012 ah emea   advanced mobility design2012 ah emea   advanced mobility design
2012 ah emea advanced mobility design
 
2012 ah vegas wlan design for high density
2012 ah vegas   wlan design for high density2012 ah vegas   wlan design for high density
2012 ah vegas wlan design for high density
 
Mobility access switches_madani adjali
Mobility access switches_madani adjaliMobility access switches_madani adjali
Mobility access switches_madani adjali
 
Spectralink airheads 2013
Spectralink airheads 2013Spectralink airheads 2013
Spectralink airheads 2013
 
Airheads barcelona 2010 rf design for retail warehousing manufacturing
Airheads barcelona 2010   rf design for retail warehousing manufacturingAirheads barcelona 2010   rf design for retail warehousing manufacturing
Airheads barcelona 2010 rf design for retail warehousing manufacturing
 
2012 ah apj rf troubleshooting
2012 ah apj   rf troubleshooting2012 ah apj   rf troubleshooting
2012 ah apj rf troubleshooting
 
Aruba networks webinar_wi-fi_without_interruption_sep20_2012
Aruba networks webinar_wi-fi_without_interruption_sep20_2012Aruba networks webinar_wi-fi_without_interruption_sep20_2012
Aruba networks webinar_wi-fi_without_interruption_sep20_2012
 
Mobility switch security architecture scott calzia madani adjali
Mobility switch security architecture scott calzia madani adjaliMobility switch security architecture scott calzia madani adjali
Mobility switch security architecture scott calzia madani adjali
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
 
Airheads scottsdale 2010 maximizing 11n performance
Airheads scottsdale 2010   maximizing 11n performanceAirheads scottsdale 2010   maximizing 11n performance
Airheads scottsdale 2010 maximizing 11n performance
 
1 voice and video over wi fi-balajee krishnamurthy
1 voice and video over wi fi-balajee krishnamurthy1 voice and video over wi fi-balajee krishnamurthy
1 voice and video over wi fi-balajee krishnamurthy
 
Building an aruba proof of concept lab javier urtubia
Building an aruba proof of concept lab javier urtubiaBuilding an aruba proof of concept lab javier urtubia
Building an aruba proof of concept lab javier urtubia
 
2012 ah vegas wlan design fundamentals
2012 ah vegas   wlan design fundamentals2012 ah vegas   wlan design fundamentals
2012 ah vegas wlan design fundamentals
 
2012 ah apj mobile device fundamentals
2012 ah apj   mobile device fundamentals2012 ah apj   mobile device fundamentals
2012 ah apj mobile device fundamentals
 

Similar to 2012 ah apj wlan security fundamentals

80211 the end of wireles or is it
80211 the end of wireles or is it80211 the end of wireles or is it
80211 the end of wireles or is itInterop
 
Breakout - Airheads Macau 2013 - Microsoft Lync, Unified Communications, Clou...
Breakout - Airheads Macau 2013 - Microsoft Lync, Unified Communications, Clou...Breakout - Airheads Macau 2013 - Microsoft Lync, Unified Communications, Clou...
Breakout - Airheads Macau 2013 - Microsoft Lync, Unified Communications, Clou...Aruba, a Hewlett Packard Enterprise company
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
asdasdsadsadasdasdaddasdasdasdasdweqweqewqe
asdasdsadsadasdasdaddasdasdasdasdweqweqewqeasdasdsadsadasdasdaddasdasdasdasdweqweqewqe
asdasdsadsadasdasdaddasdasdasdasdweqweqewqealmondzzzz938
 
How to Quickly Implement a Secure Cloud for Government and Military | Webinar
How to Quickly Implement a Secure Cloud for Government and Military | WebinarHow to Quickly Implement a Secure Cloud for Government and Military | Webinar
How to Quickly Implement a Secure Cloud for Government and Military | WebinarPLUMgrid
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Cisco Russia
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallMundo Contact
 
aruba network
aruba networkaruba network
aruba networkLeo Thiha
 

Similar to 2012 ah apj wlan security fundamentals (20)

Airheads dallas 2011 wireless security
Airheads dallas 2011   wireless securityAirheads dallas 2011   wireless security
Airheads dallas 2011 wireless security
 
2012 ah vegas remote networking fundamentals
2012 ah vegas   remote networking fundamentals2012 ah vegas   remote networking fundamentals
2012 ah vegas remote networking fundamentals
 
80211 the end of wireles or is it
80211 the end of wireles or is it80211 the end of wireles or is it
80211 the end of wireles or is it
 
2012 ah apj keynote - technology update
2012 ah apj   keynote - technology update2012 ah apj   keynote - technology update
2012 ah apj keynote - technology update
 
2012 ah vegas unified access fundamentals
2012 ah vegas   unified access fundamentals2012 ah vegas   unified access fundamentals
2012 ah vegas unified access fundamentals
 
Breakout - Airheads Macau 2013 - Microsoft Lync, Unified Communications, Clou...
Breakout - Airheads Macau 2013 - Microsoft Lync, Unified Communications, Clou...Breakout - Airheads Macau 2013 - Microsoft Lync, Unified Communications, Clou...
Breakout - Airheads Macau 2013 - Microsoft Lync, Unified Communications, Clou...
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
2012 ah vegas mobile device fundamentals
2012 ah vegas   mobile device fundamentals2012 ah vegas   mobile device fundamentals
2012 ah vegas mobile device fundamentals
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
asdasdsadsadasdasdaddasdasdasdasdweqweqewqe
asdasdsadsadasdasdaddasdasdasdasdweqweqewqeasdasdsadsadasdasdaddasdasdasdasdweqweqewqe
asdasdsadsadasdasdaddasdasdasdasdweqweqewqe
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 
Instant overview gokul_rajagopalan
Instant overview gokul_rajagopalanInstant overview gokul_rajagopalan
Instant overview gokul_rajagopalan
 
How to Quickly Implement a Secure Cloud for Government and Military | Webinar
How to Quickly Implement a Secure Cloud for Government and Military | WebinarHow to Quickly Implement a Secure Cloud for Government and Military | Webinar
How to Quickly Implement a Secure Cloud for Government and Military | Webinar
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
 
Mobile Devices and Wi-Fi
Mobile Devices and Wi-FiMobile Devices and Wi-Fi
Mobile Devices and Wi-Fi
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 
2012 ah vegas wlan design for voice video
2012 ah vegas   wlan design for voice video2012 ah vegas   wlan design for voice video
2012 ah vegas wlan design for voice video
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
aruba network
aruba networkaruba network
aruba network
 

More from Aruba, a Hewlett Packard Enterprise company

More from Aruba, a Hewlett Packard Enterprise company (20)

Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba CentralAirheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
 
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard AgentsAirheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
 
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.xAirheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.x
 
EMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba CentralEMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba Central
 
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.xEMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
 
EMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS SwitchEMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS Switch
 
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS SwitchEMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
 
Introduction to AirWave 10
Introduction to AirWave 10Introduction to AirWave 10
Introduction to AirWave 10
 
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS SwitchEMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
 
EMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant APEMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant AP
 
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.xEMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
 
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
EMEA Airheads-  Getting Started with the ClearPass REST API – CPPMEMEA Airheads-  Getting Started with the ClearPass REST API – CPPM
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
 
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP DeploymentEMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
 
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.xEMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
 
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)
 
EMEA Airheads - What does AirMatch do differently?v2
 EMEA Airheads - What does AirMatch do differently?v2 EMEA Airheads - What does AirMatch do differently?v2
EMEA Airheads - What does AirMatch do differently?v2
 
Airheads Meetups: 8400 Presentation
Airheads Meetups: 8400 PresentationAirheads Meetups: 8400 Presentation
Airheads Meetups: 8400 Presentation
 
Airheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau PresentationAirheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau Presentation
 
Airheads Meetups- High density WLAN
Airheads Meetups- High density WLANAirheads Meetups- High density WLAN
Airheads Meetups- High density WLAN
 
Airheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes ArubaAirheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes Aruba
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

2012 ah apj wlan security fundamentals

  • 1. CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved 1 WLAN SECURITY FUNDAMENTALS Presented by Neil Bhave Channel Enablement Manager
  • 2. 2 2 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved Better visibility, better control, seamless mobility “Thin” Access Points Centralized Mobility Controller 802.11a/b/g Antennas Policy Mobility Forwarding Encryption Authentication Management “Fat” Access Points Centralized Architecture = More Secure
  • 3. 3 3 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved Controlling Rogue APs 1. AP detection! •  See all APs" 2. AP classification! •  Are they neighbors?" •  Or are they a threat?" 3. Rogue containment! •  Stop users from accessing rogue APs over the wire & over wireless " •  Leave neighbors alone" 4. Locate Rogue ! •  Find where it is and disconnect"
  • 4. 4 4 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved Aruba Air Monitor Client Client Tarpit Containment •  Does not waste air-time during threat mitigation •  Works against any brand and type of wireless device Aruba Air Monitor Œ  Œ Client is trying to associate to rogue AP Air Monitor creates tarpit with fake channel or fake BSSID  Client associates to Air Monitor tarpit in preference to rogue Ž Client stops association attempts to rogue   Ž Interfering Access Point Interfering Access Point Client
  • 5. 5 5 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved Controlling Uncontrolled Wireless Windows XP Laptop Internal Network Public Network Bridge
  • 6. 6 6 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved Wireless Intrusion Prevention - RFProtect •  Uncontrolled wireless devices –  Rogue APs –  Laptops acting as bridges –  Misconfigured laptops –  Ad-Hoc networks •  Attacks against the WLAN –  Denial of Service/flooding –  Forged de-authenticate/disassociate –  Man-in-the-Middle –  WEP cracking –  WPA-PSK cracking
  • 7. 7 7 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved TotalWatch Full Spectrum Monitoring •  Complete Coverage –  2.4-GHz and 5-GHz scanning –  4.9-GHz public safety band •  5-MHz channel increment scanning –  Rogue detection in-between channels 2.4 GHz 4.9 GHz 5.0 GHz 5-MHz channel scanning
  • 8. 8 8 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved Authentication •  802.1X is best for Wi-Fi. Works with all modern client operating systems •  Makes use of EAP (Extensible Authentication Protocol) •  802.1X authentication happens at L2 – users will be authenticated before an IP address is assigned
  • 9. 9 9 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved Authentication with 802.1X: PEAP EAPOL (EAP over LAN) RADIUS Encrypted Tunnel Authentication Server AP/Controller STA
  • 10. 10 10 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved Encrypt the Data • If intruders can’t read the data, there’s no need to worry where it goes –  WEP •  Simple to do, easy to crack •  No key management •  Don’t do it –  TKIP (Temporal Key Integrity Protocol) •  Works on legacy hardware (pre-2003) •  First major flaw published in November 2008 •  Flaw is getting worse with more research •  Not currently recommended –  CCMP/AES •  Encryption using AES •  Considered state-of-the-art •  Government approved (FIPS, CESG, etc.) •  Works on all modern hardware
  • 11. 11 11 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved Combining Authentication & Encryption: WPA •  WPA == Wi-Fi Protected Access •  WPA –  Wi-Fi Alliance “standard” based on pre-802.11i –  Includes TKIP for encryption •  WPA2 –  Wi-Fi Alliance “standard” based on ratified 802.11i –  Includes TKIP and CCMP for encryption •  For both: –  WPA-Enterprise == 802.1X for authentication, dynamic encryption keys –  WPA-Personal == pre-shared authentication key – careful!
  • 12. 12 12 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved WPA-Personal? Be careful.. •  WPA Personal does not use 802.1X •  Pre-shared key •  Easier •  But less secure •  Problem 1: Scalability •  Need to re-key any time an employee/user leaves the organization •  Problem 2: Using weak keys •  WPA-PSK keys that are weak can be cracked (dictionary attack)
  • 13. 13 13 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved Configure WPA Properly •  Configure the Common Name of your RADIUS server (matches CN in server certificate) •  Configure trusted CAs (an in- house CA is better than a public CA) •  ALWAYS validate the server certificate •  Do not allow users to add new CAs or trust new servers •  Enforce with group policy
  • 14. 14 14 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved Authorize the Data •  Most organizations do a decent job of authentication (who the user is), but a poor job of authorization (what the user is allowed to do) •  Mobile networks are typically multi-use •  Authentication provides you with user identity – now use it! Identity-aware firewall policies can restrict what a user can do, based on that user’s needs Virtual AP 1 SSID: CORP Virtual AP 2 SSID: GUEST Guest user Employee VoIP Device Contractor Default VLAN Layer 2 Switch Router Firewall Captive Portal Radius Server DHCP Pool Firewall Virtual AP 1 SSID: CORP Virtual AP 2 SSID: GUEST Guest user Employee VoIP Device Contractor Default VLAN Layer 2 Switch Router Firewall Captive Portal Radius Server DHCP Pool Firewall
  • 15. 15 15 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved Why Worry About Authorization? Where is the “network perimeter” today? §  Mobility brings us: §  Disappearance of physical security §  New mobile users, devices appearing everyday §  Increased exposure to malware §  Assuming that “the bad guys are outside the firewall, the good guys are inside” is a recipe for disaster We meet again, 007!
  • 16. 16 16 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved PEF to Control Wireless Performance Multicast/ Broadcast Chatty Protocols Power Users Stealing B/W Malicious or Misconfigured Clients Lack of Policy Impacts Network Reliability & Performance! •  What are Multicast and Broadcast currently being used for?" •  What problems am I creating by using large VLANs to solve mobility issues?" •  What non-critical applications are consuming bandwidth?" •  Should users be connecting to 3rd party WLANs?" •  Should users be setting up their own WLANs?" •  Should users be connected to wireless while wired?" •  How are “Power” Users affecting others?" •  How are unauthorized users affecting network availability" Bonjour!
  • 17. 17 17 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved Network Access Control (NAC) •  Identity-Based Policy Control –  Assess user role, device, location, time, application. –  Policies follow users throughout network –  (Aruba PEF) •  Health-Based Assessment –  Client health validation –  Remediation –  Ongoing compliance –  (ClearPass OnGuard) •  Network-Based Protection –  Stateful firewalls to enforce policies and quarantine –  User/device blacklisting based on Policy Validation –  (Integration with ESI) Network-Based Protection Identity-Based Policy Control Health-Based Assessment
  • 18. 18 18 CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved Today’s Wireless Gold Standard •  Centralized wireless •  Keep clients updated – drivers too! •  Wireless intrusion detection –  Control uncontrolled wireless –  Locate and protect against rogue APs •  WPA-2 –  Authentication using 802.1X and EAP-TLS –  AES for link-layer encryption •  Strong passwords –  SecureID or other token-card products –  Strong password policies •  Authorization with identity-aware firewalls –  Enforce principle of least privilege –  Provide separation of user/device classes
  • 19. CONFIDENTIAL © Copyright 2012. Aruba Networks, Inc. All rights reserved 1919