SlideShare a Scribd company logo
1 of 10
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-1
Wireless LANs
Understanding
WLAN Security
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-2
Wireless LAN Security Threats
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-3
Mitigating the Threats
Control and Integrity
Privacy and
Confidentiality
Protection and
Availability
Authentication Encryption
Intrusion Prevention
System (IPS)
Ensure that legitimate
clients associate with
trusted access points.
Protect data as it is
transmitted and
received.
Track and mitigate
unauthorized access
and network attacks.
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-4
WEP
 Basic
encryption
 No strong
authentication
 Static,
breakable keys
 Not scalable
 MAC filters and
SSID-cloaking
also used to
complement
WEP
Evolution of Wireless LAN Security
1997 2001
802.1x EAP
 Dynamic keys
 Improved
encryption
 User
authentication
 802.1X EAP
(LEAP, PEAP)
 RADIUS
2003
WPA
 Standardized
 Improved
encryption
 Strong, user
authentication
(such as,
LEAP, PEAP,
EAP-FAST)
2004 to Present
802.11i / WPA2
 AES strong
encryption
 Authentication
 Dynamic key
management
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-5
Wireless Client Association
 Access points send out beacons
announcing SSID, data rates, and
other information.
 Client scans all channels.
 Client listens for beacons and
responses from access points.
 Client associates to access point with
strongest signal.
 Client will repeat scan if signal
becomes low to reassociate to another
access point (roaming).
 During association, SSID, MAC
address, and security settings are sent
from the client to the access point and
checked by the access point.
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-6
How 802.1X Works on the WLAN
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-7
WPA and WPA2 Modes
WPA WPA2
Enterprise mode
(Business, education,
Government)
Authentication:
IEEE 802.1X/EAP
Encryption:
TKIP/MIC
Authentication:
IEEE 802.1X/EAP
Encryption:
AES-CCMP
Personal mode
(SOHO, home and
personal)
Authentication:
PSK
Encryption:
TKIP/MIC
Authentication:
PSK
Encryption:
AES-CCMP
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-8
Summary
 It is inevitable that hackers will attack unsecured WLANs.
 The fundamental solution for wireless security is authentication
and encryption to protect wireless data transmission.
 WLAN standards evolved to provide more security.
– WEP
– 802.1x EAP
– WPA
– 802.11i/WPA2
 Access points send out beacons announcing SSIDs, data rates,
and other information.
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-9
Summary (Cont.)
 With 802.1X, the access point, acting as the authenticator at the
enterprise edge, allows the client to associate using open
authentication.
 WPA provides authentication support via IEEE 802.1X and PSK.
– Enterprise mode is a term given to products that are tested to
be interoperable in both PSK and IEEE 802.1x/EAP modes of
operation for authentication.
– Personal mode is a term given to products tested to be
interoperable in the PSK-only mode of operation for
authentication.
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-10

More Related Content

What's hot (20)

CCNA Icnd110 s02l06
CCNA Icnd110 s02l06CCNA Icnd110 s02l06
CCNA Icnd110 s02l06
 
CCNA Icnd110 s03l04
CCNA Icnd110 s03l04CCNA Icnd110 s03l04
CCNA Icnd110 s03l04
 
CCNA Icnd110 s02l08
 CCNA Icnd110 s02l08 CCNA Icnd110 s02l08
CCNA Icnd110 s02l08
 
CCNA Icnd110 s02l01
CCNA Icnd110 s02l01CCNA Icnd110 s02l01
CCNA Icnd110 s02l01
 
CCNA Icnd110 s04l04
CCNA Icnd110 s04l04CCNA Icnd110 s04l04
CCNA Icnd110 s04l04
 
CCNA Icnd110 s02l03
CCNA Icnd110 s02l03CCNA Icnd110 s02l03
CCNA Icnd110 s02l03
 
CCNA Icnd110 s01l03
CCNA Icnd110 s01l03CCNA Icnd110 s01l03
CCNA Icnd110 s01l03
 
CCNA Icnd110 s01l09
CCNA Icnd110 s01l09CCNA Icnd110 s01l09
CCNA Icnd110 s01l09
 
CCNA Icnd110 s02l02
CCNA Icnd110 s02l02CCNA Icnd110 s02l02
CCNA Icnd110 s02l02
 
CCNA Icnd110 cag
CCNA Icnd110 cagCCNA Icnd110 cag
CCNA Icnd110 cag
 
CCNA Icnd110 lg
CCNA Icnd110 lgCCNA Icnd110 lg
CCNA Icnd110 lg
 
CCNA Icnd110 s01l06
CCNA Icnd110 s01l06CCNA Icnd110 s01l06
CCNA Icnd110 s01l06
 
CCNA Icnd110 s04l03
CCNA Icnd110 s04l03CCNA Icnd110 s04l03
CCNA Icnd110 s04l03
 
CCNA Icnd110 s01l01
CCNA Icnd110 s01l01CCNA Icnd110 s01l01
CCNA Icnd110 s01l01
 
CCNA Icnd110 s05l02
CCNA Icnd110 s05l02CCNA Icnd110 s05l02
CCNA Icnd110 s05l02
 
Icnd210 s02l04
Icnd210 s02l04Icnd210 s02l04
Icnd210 s02l04
 
CCNA Icnd110 s01l08
CCNA Icnd110 s01l08CCNA Icnd110 s01l08
CCNA Icnd110 s01l08
 
CCNA Icnd110 s00
CCNA Icnd110 s00CCNA Icnd110 s00
CCNA Icnd110 s00
 
CCNA Icnd110 s04l10
CCNA Icnd110 s04l10CCNA Icnd110 s04l10
CCNA Icnd110 s04l10
 
CCNA Icnd110 s04l08
CCNA Icnd110 s04l08CCNA Icnd110 s04l08
CCNA Icnd110 s04l08
 

Viewers also liked

Viewers also liked (7)

CCNA Icnd110 s05l03
CCNA Icnd110 s05l03CCNA Icnd110 s05l03
CCNA Icnd110 s05l03
 
CCNA Icnd110 s04l06
CCNA Icnd110 s04l06CCNA Icnd110 s04l06
CCNA Icnd110 s04l06
 
Icnd210 s02l02
Icnd210 s02l02Icnd210 s02l02
Icnd210 s02l02
 
Icnd210 s08l04
Icnd210 s08l04Icnd210 s08l04
Icnd210 s08l04
 
Eigrp authentication
Eigrp authenticationEigrp authentication
Eigrp authentication
 
Cours Cisco
Cours CiscoCours Cisco
Cours Cisco
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 

Similar to CCNA Icnd110 s03l02

Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-accessbhanu4ugood1
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.pptSagarBedarkar3
 
#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome Henry#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome HenryITSitio.com
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssueIshan Girdhar
 
Network Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptxNetwork Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptxSamatarHussein
 
謝續平
謝續平謝續平
謝續平9577601
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxAmanuelZewdie4
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Wireless Security
Wireless SecurityWireless Security
Wireless SecuritysiDz
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansVuz Dở Hơi
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless TechnologyNetwax Lab
 

Similar to CCNA Icnd110 s03l02 (20)

Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.ppt
 
#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome Henry#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome Henry
 
Icnd210 s08l01
Icnd210 s08l01Icnd210 s08l01
Icnd210 s08l01
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 
Network Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptxNetwork Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptx
 
謝續平
謝續平謝續平
謝續平
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
ccna 001 course goal
ccna 001 course goalccna 001 course goal
ccna 001 course goal
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 

More from computerlenguyen (20)

Icnd210 s08l05
Icnd210 s08l05Icnd210 s08l05
Icnd210 s08l05
 
Icnd210 s08l03
Icnd210 s08l03Icnd210 s08l03
Icnd210 s08l03
 
Icnd210 s08l02
Icnd210 s08l02Icnd210 s08l02
Icnd210 s08l02
 
Icnd210 s07l03
Icnd210 s07l03Icnd210 s07l03
Icnd210 s07l03
 
Icnd210 s07l02
Icnd210 s07l02Icnd210 s07l02
Icnd210 s07l02
 
Icnd210 s07l01
Icnd210 s07l01Icnd210 s07l01
Icnd210 s07l01
 
Icnd210 s06l03
Icnd210 s06l03Icnd210 s06l03
Icnd210 s06l03
 
Icnd210 s06l02
Icnd210 s06l02Icnd210 s06l02
Icnd210 s06l02
 
Icnd210 s06l01
Icnd210 s06l01Icnd210 s06l01
Icnd210 s06l01
 
Icnd210 s05l03
Icnd210 s05l03Icnd210 s05l03
Icnd210 s05l03
 
Icnd210 s05l02
Icnd210 s05l02Icnd210 s05l02
Icnd210 s05l02
 
Icnd210 s04l03
Icnd210 s04l03Icnd210 s04l03
Icnd210 s04l03
 
Icnd210 s04l02
Icnd210 s04l02Icnd210 s04l02
Icnd210 s04l02
 
Icnd210 s04l01
Icnd210 s04l01Icnd210 s04l01
Icnd210 s04l01
 
Icnd210 s03l03
Icnd210 s03l03Icnd210 s03l03
Icnd210 s03l03
 
Icnd210 s03l02
Icnd210 s03l02Icnd210 s03l02
Icnd210 s03l02
 
Icnd210 s03l01
Icnd210 s03l01Icnd210 s03l01
Icnd210 s03l01
 
Icnd210 s02l06
Icnd210 s02l06Icnd210 s02l06
Icnd210 s02l06
 
Icnd210 s02l05
Icnd210 s02l05Icnd210 s02l05
Icnd210 s02l05
 
Icnd210 s02l03
Icnd210 s02l03Icnd210 s02l03
Icnd210 s02l03
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

CCNA Icnd110 s03l02

  • 1. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security
  • 2. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-2 Wireless LAN Security Threats
  • 3. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-3 Mitigating the Threats Control and Integrity Privacy and Confidentiality Protection and Availability Authentication Encryption Intrusion Prevention System (IPS) Ensure that legitimate clients associate with trusted access points. Protect data as it is transmitted and received. Track and mitigate unauthorized access and network attacks.
  • 4. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-4 WEP  Basic encryption  No strong authentication  Static, breakable keys  Not scalable  MAC filters and SSID-cloaking also used to complement WEP Evolution of Wireless LAN Security 1997 2001 802.1x EAP  Dynamic keys  Improved encryption  User authentication  802.1X EAP (LEAP, PEAP)  RADIUS 2003 WPA  Standardized  Improved encryption  Strong, user authentication (such as, LEAP, PEAP, EAP-FAST) 2004 to Present 802.11i / WPA2  AES strong encryption  Authentication  Dynamic key management
  • 5. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-5 Wireless Client Association  Access points send out beacons announcing SSID, data rates, and other information.  Client scans all channels.  Client listens for beacons and responses from access points.  Client associates to access point with strongest signal.  Client will repeat scan if signal becomes low to reassociate to another access point (roaming).  During association, SSID, MAC address, and security settings are sent from the client to the access point and checked by the access point.
  • 6. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-6 How 802.1X Works on the WLAN
  • 7. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-7 WPA and WPA2 Modes WPA WPA2 Enterprise mode (Business, education, Government) Authentication: IEEE 802.1X/EAP Encryption: TKIP/MIC Authentication: IEEE 802.1X/EAP Encryption: AES-CCMP Personal mode (SOHO, home and personal) Authentication: PSK Encryption: TKIP/MIC Authentication: PSK Encryption: AES-CCMP
  • 8. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-8 Summary  It is inevitable that hackers will attack unsecured WLANs.  The fundamental solution for wireless security is authentication and encryption to protect wireless data transmission.  WLAN standards evolved to provide more security. – WEP – 802.1x EAP – WPA – 802.11i/WPA2  Access points send out beacons announcing SSIDs, data rates, and other information.
  • 9. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-9 Summary (Cont.)  With 802.1X, the access point, acting as the authenticator at the enterprise edge, allows the client to associate using open authentication.  WPA provides authentication support via IEEE 802.1X and PSK. – Enterprise mode is a term given to products that are tested to be interoperable in both PSK and IEEE 802.1x/EAP modes of operation for authentication. – Personal mode is a term given to products tested to be interoperable in the PSK-only mode of operation for authentication.
  • 10. © 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-10

Editor's Notes

  1. Tổng quan Một lợi ích rõ ràng nhất mà hệ thống không dây mang lại đó là khả năng giảm chi phí. Bên cạnh việc tăng hiệu suất, hệ thống WLAN cũng làm tăng chất lượng làm việc. Tuy nhiên chỉ cần một lỗ hổng xảy ra trên bất kỳ một Access Point nào cũng gây ảnh hưởng nghiêm trọng hay thậm chí có thể phá hủy cả một tổ chức. Hiểu được khái niệm bảo mật trong hệ thống mạng WLAN và làm thế nào để giảm thiểu các rủi ro này là một vấn đề khá quan trọng. Mục tiêu Sau khi hoàn tất bài học, bạn có khả năng mô tả các vấn đề liên quan đến việc bảo mật trên môi trường WLAN và những tính năng sẵn sàng nhằm tăng khả năng bảo mật trên hệ thống mạng. Khả năng này được thể hiện qua các nhiệm vụ sau: - Mô tả những nguy cơ trong các dịch vụ WLAN - Mô tả những phương pháp làm giảm nhẹ các mối nguy hiểm trong dịch vụ WLAN - Mô tả sự tiến triển của các công nghệ bảo mật trong WLAN - Mô tả quá trình liên kết của các WLAN Client - Mô tả quá trình tăng cường khả năng bảo mật của IEEE 802.1X - Mô tả các kiểu WPA
  2. Với những hệ thống IEEE 802.11b/g giá thành thấp, chúng ta không thể tránh được khả năng hacker sẽ có thêm những hệ thống WLAN không bảo mật để lựa chọn. Ta có thể dùng khá nhiều những phần mềm mã nguồn mở để thu thập vào khai thác những điểm yếu trong phương thức bảo mật WEP (Wired Equivalent Privacy) của chuẩn 802.11. Một số phầm mềm sniffer cho phép những kỹ sư mạng có thể thu thập dữ liệu đễ phân tích, kiểm tra và chỉnh sửa những vấn đề tồn tại trong hệ thống mạng của họ. Tuy nhiên cũng chính những phần mềm này có thể sẽ được sử dụng bởi những hacker để dò tìm và khai thác các lỗ hổng bảo mật trên mạng. Thuật ngữ “war driving” ban đầu được dùng với nghĩa là dùng một thiết bị quét số điện thoại di động (cell phone) nhằm tìm ra một số điện thoại nào đó để khai thác. Giờ đây, thuât ngữ này lại lại được hiểu như việc dùng một laptop như một Client để dò tìm một hệ thống WLAN 802.11b/g nào đó. Hầu hết các thiết bị được bán ra hiện nay đều được tính hợp sẵn khả năng WLAN. Người dùng đầu cuối thường thì cũng không chỉnh những thông số mặc định của nhà sản xuất hoặc chỉ sử dụng chuẩn bảo mẫt WEP, điều này không tối ưu hóa được quá trình bảo mật trong mạng WLAN. Với việc kích hoạt chuẩn mã hóa WEP cơ bản hay thậm chí là không bảo mật, việc bị thu thập và lấy đi một số thông tin nhạy cảm như thông tin đăng nhập, số tài khoản và một số thông tin riêng tư khác là hoàn toàn có thể. Một rogue Access point là một Access point đặt trong môi trường mạng WLAN, Access point này được sử dụng để can thiệp vào sự vận hành bình thường của hệ thống mạng. Nếu một rogue Access point được thiết lập với từ khóa WEP đúng đang dùng trong mạng, dữ liệu phía người dùng có thể bị nghe lén. Một rogue Access point cũng có thể được cấu hình để cung cấp cho những người dùng không có quyền trên hệ thống những thông tin như địa chỉ MAC của các người dùng khác trong mạng cả mạng không dây và có dây, hay có thể thu thập và tạo ra những gói dữ liệu giả, hay thậm chí là chiếm quyến vào truy xuất vào các máy chủ. Kiểu thông dụng và đơn giản nhất để thiết lập một rogue Access point là được cài đặt bởi người dùng hợp lệ trong hệ thống. Những người dùng thiết lập các Access point để sử dụng cho mục tiêu gia đình trên hệ thống mạng doanh nghiệp mà không quan tâm đến vấn đề bảo mật sẽ tạo ra những nguy cơ bảo mật khá lớn.
  3. Chủ đề này mô tả quá trình làm giảm nhẹ các mối nguy hiểm về vấn đề bảo mật trên hệ thống WLAN Để bảo vệ hệ thống WLAN, yêu cầu phải thực hiện thông qua các bước sau: - Xác thực người dùng, mục tiêu nhằm đảm bảo những người dùng hợp pháp có thể truy xuất vào hệ thống mạng thông qua những Access point tin cậy. - Mã hóa, mục tiêu nhằm tạo sự riêng tư và bí mật - Triển khai hệ thống phát hiện xâm nhập (IDS – Intrusion Detection System) và hệ thống ngăn chặn xâm nhập (IPS – Intrusion Prevention System) để bảo vệ hệ thống mạng trước những nguy cơ bảo mật Một giải pháp cơ bản cho vấn đề bảo mật mạng không dây là triển khai tính năng xác thực và mã hóa để bảo vệ dữ liệu. Hai giải pháp này có thể được triển khai theo từng cấp độ tùy thuộc vào quy mô hệ thống mạng. Những hệ thống mạng doanh nghiệp lớn hơn cần có thêm những cấp độ bảo mật được mang lại bởi những thiết bị như IPS. Hiện tại IPS không những có khả năng phát hiện các cuộc tấn công vào mạng không dây mà còn có thể bảo vệ hệ thống mạng trước những người dùng không hợp pháp.
  4. The figure shows the evolution of wireless LAN (WLAN) security. Initially, IEEE 802.11 security only defined 64-bit static WEP keys for both encryption and if used authentication. The 64-bit key contained the actual 40-bit key plus 24-bit Initialization Vector (IV). The authentication method was not strong and the keys were eventually compromised. Because the keys were administered statically, this method of security was not scalable to large enterprise environments. Enterprise companies tried to supplement this weakness with techniques using SSID and MAC address filtering. The SSID is a network-naming scheme and configurable parameter that both the client and the AP must share. If the client does not have the proper SSID advertised from the access point configured to not broadcast the SSID (SSID Cloaking), it is unable to associate with the AP and would have no access to the network. The problem with the effort was that 802.11 allows wireless client to use a null string (no value entered into the SSID field) thereby requesting that the AP to broadcast its SSID rendering the security effort ineffective. Access point also supported filtering using a MAC address. Tables are manually constructed on the AP to allow or disallow clients based upon their physical hardware address. However MAC addresses may be relatively easily spoofed and MAC address filtering is not considered a security feature either. While 802.11 committee then began the process of upgrading the security of the WLAN, Enterprise customers needed wireless security immediately to enable deployment. Driven by customer demand, Cisco introduced early proprietary enhancements to RC4-based WEP encryption. Cisco implemented Cisco’s Temporal Key Integrity Protocol (CKIP) per-packet keying or hashing and Cisco’s Message Integrity Check (CMIC) to protect WEP keys. Cisco also adapted the use of IEEE 802.1X wired authentication protocols on wireless and dynamic keys using Lightweight EAP (LEAP) to a centralized database. Soon after Cisco wireless security implementation, the Wi-Fi Alliance introduced Wi-Fi Protected Access (WPA) as an interim solution that was a subset of the expected 802.11i security standard for WLANs using 802.1X authentication and improvements to WEP encryption. The newer key hashing (TKIP versus CKIP) and message integrity check (MIC versus CMIC) where similar in feature but not compatible. Today IEEE 802.11i has been ratified and Advanced Encryption Standard (AES) has replaced Wired Equivalent Privacy (WEP) as the latest and most secure method of encrypting data. Wireless intrusion detection systems are available to identify and protect the WLAN from attacks. The Wi-Fi Alliance certifies 802.11i devices under Wi-Fi Protected Access 2 (WPA2).
  5. Access points send out beacons announcing one or more SSIDs, data rates, and other information. The client scans all the channels and listens for beacons and responses from the access points. The client associates to the access point that has the strongest signal. If the signal becomes low, the client repeats the scan to associate with another access point (roaming). During association, the SSID, MAC address, and security settings are sent from the client to the access point and checked by the access point Wireless client’s association to a selected access point is actually the 2nd of a two step process. Both authentication and association must occur in that order before an 802.11 client can pass traffic through the access point to another host on the network. Client authentication at this initial process is not the same as network authentication, entering username and password to get access to the network. Authentication is simply the first step (followed by association) between the wireless client and access point only to establish communication. The 802.11 standard only specified two different methods of authentication Open Authentication or Shared Key Authentication. Open authentication is simply the exchange of four hello type packets with no client or access point verification to allow ease of connectivity. Shared Key authentication uses a static defined WEP key know between the client and access point for verification. This same key may or may not be used to encrypt the actual data passing between wireless client and access point based on user configuration.
  6. The access point, acting as the authenticator at the enterprise edge, allows the client to associate using open authentication. The access point then encapsulates any 802.1X traffic bound for the authentication server and sends it to the server. All other network traffic is blocked, meaning that all other attempts to access network resources are blocked. Upon receiving RADIUS traffic bound for the client, the access point encapsulates it and sends the information to the client. Although the server authenticates the client as a valid network user, this process allows the client to validate the server as well, ensuring that the client is not logging into a phony server. While an enterprise network will use a centralized authentication server, smaller offices or business might simply use the access point with preshared keys as the authentication server for wireless clients.
  7. WPA provides authentication support via IEEE 802.1X and Preshared Key (PSK) (IEEE 802.1X recommended for enterprise deployments). WPA provides encryption support via TKIP. TKIP includes message identity check (MIC) and per-packet keying (PPK) via initialization vector (IV) hashing and broadcast key rotation. In comparison to WPA, WPA2 authentication is not changed but encryption used is AES-CCMP. Enterprise Mode Enterprise Mode is a term given to products that are tested to be interoperable in both PSK and IEEE 802.1x/EAP modes of operation for authentication. When IEEE 802.1x is used, an authentication, authorization, and accounting (AAA) server (the RADIUS protocol for authentication and key management and centralized management of user credentials) is required. Enterprise Mode is targeted to enterprise environments. Personal Mode Personal Mode is a term given to products tested to be interoperable in the PSK-only mode of operation for authentication. It requires manual configuration of a pre-shared key on the AP and clients. PSK authenticates users via a password, or identifying code, on both the client station and the AP. No authentication server is needed. Personal Mode is targeted to SOHO environments.