Securing Wireless LANs A Windows Server 2003 Certificate Services Solution Ian Hellen – Principal Consultant Stirling Goetz – Principal Consultant.

Slides:



Advertisements
Similar presentations
Implementing Network Security – Wireless Security Segway! Steve Lamb Technical Security Advisor
Advertisements

Securing Your Wireless Network
Security Features in Microsoft® Windows® XP James Noyce, Senior Consultant Security Solutions Team, Business Critical Services Microsoft Security Solutions,
Encrypting Wireless Data with VPN Techniques
Network Security.
Selecting the Right Network Access Protection (NAP) Architecture Infrastructure Planning and Design Published: June 2008 Updated: November 2011.
Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Licia Florio EUNIS05, Manchester 1 Eduroam EUNIS Conference, June Licia Florio.
Wireless LAN  Setup & Optimizing Wireless Client in Linux  Hacking and Cracking Wireless LAN  Setup Host Based AP ( hostap ) in Linux & freeBSD  Securing.
無線區域網路安全 Wireless LAN Security. 2 Outline  Wireless LAN – b  Security Mechanisms in b  Security Problems in b  Solutions for b.
Implementing Security for Wireless Networks Presenter Name Job Title Company.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
MITP | Master of Information Technology Program Securing Wireless LAN using Cisco-based technology Campus Crew Study Group Paul Matijevic Ed McCulloch.
Wireless Security without a VPN! Stirling Goetz, Microsoft Consulting Services.
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
802.1x EAP Authentication Protocols
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Mobile and Wireless Security INF245 Guest lecture by Bjorn Jager Molde University College.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
1 Wireless LAN Security Kim W. Tracy NEIU, University Computing
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
Windows 2003 and 802.1x Secure Wireless Deployments.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Secure Systems Research Group - FAU Wireless Web Services Security Christopher Lo.
WIRELESS LAN SECURITY Using
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Secure connections.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Selecting the Right Network Access Protection Architecture
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Securing your wireless LAN Paul DeBeasi VP Marketing
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
IEEE i WPA2. IEEE i (WPA2) IEEE i, is an amendment to the standard specifying security mechanisms for wireless networks. The.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
Wireless Technology x: Wi-Fi Standards - Cutting Through The Confusion Rob Karnbach Wireless ME May 2003.
Lecture 24 Wireless Network Security
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless security Wi–Fi (802.11) Security
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Advancing Security Progress and Commitment Stuart Okin Chief Security Advisor – Microsoft UK Delivering on security (an update on progress)
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Web Services Security Mike Shaw Architectural Engineer.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Understand Wireless Security LESSON Security Fundamentals.
A Wireless LAN Security Protocol
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
Presentation transcript:

Securing Wireless LANs A Windows Server 2003 Certificate Services Solution Ian Hellen – Principal Consultant Stirling Goetz – Principal Consultant

Agenda Introduction to Solutions for Security Introduction to Solutions for Security Wireless LAN Security – selecting the right option Wireless LAN Security – selecting the right option Solution Architecture Solution Architecture RADIUS Design RADIUS Design PKI Design PKI Design Solution Guidance Solution Guidance

Trustworthy Computing Microsoft is committed to Trustworthy Computing: Microsoft is committed to Trustworthy Computing: Security Security Privacy Privacy Reliability Reliability Business Integrity Business Integrity Trustworthy computing can only be achieved through partnership & teamwork Trustworthy computing can only be achieved through partnership & teamwork Trustworthy Computing is a journey with a long term vision and highlights and obstacles along the road Trustworthy Computing is a journey with a long term vision and highlights and obstacles along the road

Trustworthy Computing Security Privacy Reliability Business Integrity Resilient to attack Protects confidentiality, integrity, availability and data Dependable Available when needed Performs at expected levels Individuals control personal data Products and Online Services adhere to fair information principles Vendors provide quality products Product support is appropriate

Microsoft Solutions for Security (MSS) Aimed at complex or difficult problem areas Aimed at complex or difficult problem areas Prescriptive guidance – one good way Prescriptive guidance – one good way Based on experience in field and from MS internal deployments Based on experience in field and from MS internal deployments Built and Tested in MS Labs Built and Tested in MS Labs Modular (PKI and RADIUS) Modular (PKI and RADIUS)

Wireless LANs Benefits of WLANs Benefits of WLANs Increased staff productivity Increased staff productivity Mobility and flexible working Mobility and flexible working Information access with lower cost Information access with lower cost Problems Problems Early security standards had issues Early security standards had issues Some people dont even take basic precautions Some people dont even take basic precautions Proliferation of solutions cause confusion Proliferation of solutions cause confusion

Solution Options 802.1X with WLAN protection 802.1X with WLAN protection The native route The native route VPN or IPsec VPN or IPsec Dont deploy WLANs Dont deploy WLANs But prepare for rogue WLANs But prepare for rogue WLANs Use basic security Use basic security …and hope for the best …and hope for the best

802.1X with WLAN protection 802.1X 802.1X Ratified by the IEEE Ratified by the IEEE Embraced by the WLAN vendor community Embraced by the WLAN vendor community EAP-TLS EAP-TLS Strong credentials Strong credentials Mutual authentication Mutual authentication WLAN encryption key generation WLAN encryption key generation WLAN security WLAN security WEP (128 bit) and WPA (TKIP) WEP (128 bit) and WPA (TKIP) Pending: TGi work on RSN (802.11i) Pending: TGi work on RSN (802.11i)

WLAN Solution Architecture RADIUS Infrastructure Services PKI

Head Office Branch Office Solution Design

Scaling & Extension Scale Up Scale Down VPN Wired 802.1X

RADIUS Architecture Scale up or out

RADIUS Placement

PKI Architecture

Securing Wireless LANs Guidance Planning guide Planning guide Build guide Build guide Operations guide Operations guide Test guide Test guide Delivery guide Delivery guide Tools and Templates Tools and Templates

More Information… Download Securing Wireless LANs from: Download Securing Wireless LANs from: Microsoft Solutions: Microsoft Solutions: For a copy of this presentation visit: For a copy of this presentation visit: For regular information subscribe at: For regular information subscribe at: subscribeMe.asp?lcid=1033&id=155 For the MS security resource toolkit visit: For the MS security resource toolkit visit:

Additional URLs ?url=/technet/itsolutions/msm/swdist/pmsmsog.asp ?url=/technet/itsolutions/msm/swdist/pmsmsog.asp

Microsoft - Stand 670 Firewall and VPN Firewall and VPN Identity Management Identity Management Securing Windows Securing Windows Windows Server 2003 Security Windows Server 2003 Security Wireless LAN Security Wireless LAN Security

Microsoft Security Seminars

Call to action 1. For a copy of this presentation visit: 2. For regular information subscribe at: register.microsoft.com/subscription/subscribeMe.asp?lcid=1033&id= For the Microsoft security resource toolkit visit:

Questions? Visit the Microsoft stand. Well be there for 1 hour after this session. Thank You!

Trustworthy Computing Stirling Goetz – Principal Consultant Ian Hellen – Principal Consultant