Wireless LAN, WLAN Security, and VPN

Slides:



Advertisements
Similar presentations
Wireless Technology.
Advertisements

Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Allied Telesyn Wireless LAN Solutions AT-WL2411 Access Point AT-WR2411 Wireless LAN PCMCIA Card.
Presented by Serge Kpan LTEC Network Systems Administration 1.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Wi-Fi Structures.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN bridge.
Remote Networking Architectures
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
1 Chapter Overview Wireless Technologies Wireless Security.
Wireless Infrastructures Wireless. Wireless Infrastructures Wireless LAN Predominantly IEEE A, B, G, N Wireless MAN WiMax and its.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Wireless Networking.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
PRESENTATION ON WI-FI TECHNOLOGY
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
A PRESENTATION ON “Wireless Networks”
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Networking Devices.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Networks The Big Picture. Three Great Leaps of Civilization.
 Router › A router is the networking device that integrates two or more networks together, while controlling the data traffic over the entire network.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
PRESENTED BY MUHAMMAD ZAMIR BIN ROSLAN. Gateway for home Universal Dual Band WiFi Range Extender, 4-port WiFi Adapter (WN2500RP) UNIVERSAL WIFI.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Networks (VPN)
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Chapter 4: Wireless LANs
Wireless LAN Security 4.3 Wireless LAN Security.
Virtual Private Network
Presentation transcript:

Wireless LAN, WLAN Security, and VPN 麟瑞科技 台南辦事處 技術經理 張晃崚

WLAN & VPN FAQ What is WLAN?802.11a?802.11b?802.11g? Which standard (product) should we use? How to deploy WLAN? How to block intruders? How to authenticate users? How to keep data secure? What is roaming? How to provide a fast path for some VIP users? How to exchange data securely between offices?

Agenda Introduction to Wireless LAN WLAN deployments WLAN security issues WLAN security solutions VPN solutions

Agenda Introduction to Wireless LAN WLAN deployments WLAN security issues WLAN security solutions VPN solutions

What is Wireless Network 802.11x standards (Wi-Fi) Cell phones Bluetooth HomeRF Fixed Broadband wireless, IEEE 802.16 Mobile broadband Optical point-to-point wireless

What is Wireless LAN IEEE 802.11-based networks Bluetooth is regarded as a PAN (Personal Area Network) Need Wireless NIC and Access Point(AP)

Wireless LAN vs. Wired LAN Media Access CSMA/CA CSMA/CD -10 Bit error rate 0.1% 10 Duplex half half/full Speed slow fast Throughput Reduce 50-60% N/A

Wireless LAN vs. Wired LAN All 802 WLANs employ handshaked transmission to compensate WLAN just like PUSH-to-TALK radio WLAN will be a step backward: slower speed, half duplex, shared media. BUT, gain FREEDOM AP usually is a Layer 2 bridge (between wired LAN and wireless LAN) Spanning Tree Protocol issue

Distance for half speed Wireless LAN Standards 802.11b 802.11a 802.11g Frequency 2.4 GHz 5 GHz 2.4 GHz Channel 3 8 3 Max speed 11Mbps 54Mbps 54Mbps Real throughput 4-6 Mbps 22-27 Mbps 22-27 Mbps Interference Yes No Yes Distance for max speed 120-140 ft. 1-2 ft. 120-140 ft. 120-140 ft. 60 ft. ??? ft. Distance for half speed Maturity Very mature Early No product

802.11b+ IEEE 802.11g will be finalized in May 2003 Not a formal IEEE specification Texas Instruments (TI) applied PBCC to enable 22Mbps data rate Interoperable with 802.11b device at 11Mbps Must use TI’s chip to enable 22Mbps

Other 802.11x standard 802.11d: Multiple regulatory domains 802.11e: QoS 802.11f: Inter-Access Point Protocol (IAPP) 802.11h: Dynamic Frequency Selection(DFS) and Transmit Power Control (TPC) 802.11i: Security

Which Technology should you use? Decision should be based on requirements of system/users User bandwidth requirements User density Overall implementation cost Upgrade requirements Client availability Client platform features

Agenda Introduction to Wireless LAN WLAN deployments WLAN security issues WLAN security solutions VPN solutions

Typical WLAN Topologies Wireless “Cell” Wireless “Cell” Channel 1 Channel 6 LAN Backbone Access Point Access Point Wireless Clients Wireless Clients

Wireless Repeater Topology Wireless Repeater “Cell” Channel 1 LAN Backbone Channel 1 Access Point Access Point Wireless Clients

Hot Standby LAN Backbone Monitored AP Standby AP Wireless Clients

Multi-rate Implementations 2 Mbps 5.5 Mbps 11 Mbps

Vendor Offering Higher and variable transmission power External antennas Little throughput degradation with encryption Line-power via the wired Ethernet cable Dual-band: 802.11b + 802.11a AP load balancing Roaming between IP subnets Hot Standby AP VLAN support Lockable case Enhanced security features: 802.1x, 802.11i draft, etc.

Agenda Introduction to Wireless LAN WLAN deployments WLAN security issues WLAN security solutions VPN solutions

WLAN Security Issues Wireless is like having an RJ45 jack in the parking lot Need to deny access to intruders Need to secure message with good encryption technology

WLAN Security Issues Managing the security side of you networks requires several things Protecting the ‘network’ from intruders Requires authentication for users Protecting the Wireless DATA from sniffers Requires some type of encryption Protecting you RF networks from being detected The ability to MANAGE you users credentials Includes WEP keys, users names, passwords, etc. Protecting your wireless infrastructure from improper configuration Required a good user manager interface on APs

WLAN Security Issues Managing the security side of you networks requires several things To dynamically assign user’s IP address, gateway, etc. Deploy DHCP server To let roaming users be authenticated by their original account and passwords Requires authentication roaming features for authentication servers

Agenda Introduction to Wireless LAN WLAN deployments WLAN security issues WLAN security solutions VPN solutions

Authentication Techniques Open System Authentication No security SSID Authentication SSID is broadcast in clear text form Can be obtained by snooping on traffic Shared key Authentication (WEP) Key stolen Employee leaves

Authentication Techniques MAC address Authentication MAC is sent in clear form Can be obtained be snooping Attackers may change their MAC to match Not flexible and scalable 802.1x and Extensible Authentication Protocol (EAP) Secure not only client but also devices Only Windows XP and few vendors support this technique

Authentication Techniques VPN client Authentication Does good authentication and encryption Variable authentication and encryption method to choose Need VPN client software installed Wireless Gateway Authentication No need to install any client software Pop up authentication window when initiating connection (use web browser) Easy to install and configure One wireless gateway for a subnet

Wireless Gateway Topology

Blocking Inter-client communication PSPF—Publicly Secure Packet Forwarding Prevents WLAN inter-client communication Relies on MAC address Same subnet devices only

Encryption Techniques Key Management Can be painful Requires a power tool to manage keys Easy to hack with well-know single key Key Rotation Changing the user’s key periodically Broadcast Key Rotation WEP Encryption 128 bit WEP IPsec

Encryption Techniques IEEE 802.11i TKIP (Data Integrity) MIC (Data Integrity) AES (Encryption) Not yet complete

WLAN Security Solution Product Wireless Gateway Bluesocket Vernier ReefEdge VPN Cisco VPN concentrator/router/client NetScreen Authentication Server Cisco ACS (RADIUS, TACACS, LEAP) RADIUS

WLAN Security Solution Product Campus switch DHCP&AAA Server Wireless Gateway (Bluesocket) Or VPN Gateway (Cisco/NetScreen) Cisco Aironet 1100 (802.11b, 802.11g) Mobile IP VLAN Cisco Aironet 1200 (802.11a, 802.11b, 802.11g) External Antenna

Cisco Aironet 1200 AP Modular platform for single or dual band operation Field upgradeable radios Modular design enhances future upgrade ability Simultaneous dual radio operation 10/100 Ethernet LAN uplink

Cisco Aironet 1100 AP VLAN support 802.11b, 802.11g (2.4 GHz)

Bluesocket Wireless Gateway

Agenda Introduction to Wireless LAN WLAN deployments WLAN security issues WLAN security solutions VPN solutions

Extend Connectivity Increased Bandwidth VPN Type and Applications Type Application As Alternative To Benefits Remote Access VPN Dedicated Dial ISDN Remote Dial Connectivity Ubiquitous Access Lower Cost Site-to-Site Internal Connectivity Leased Line Frame Relay ATM Site-to-Site VPN Extend Connectivity Increased Bandwidth Lower Cost Biz-to-Biz External Connectivity Fax Mail EDI Extranet VPN Facilitates E-Commerce

VPN Type and Applications Extranet Business Partner Central Site Mobile User POP Internet VPN DSL Cable Home Telecommuter Site-to-Site Remote Office

Microsoft Win 9x/NT (PPTP) Remote Access VPN Cisco VPN Clients Microsoft Win 2000 (IPSec) Microsoft Win 9x/NT (PPTP) WAN Router PIX Firewall Cisco VPN 3000 Concentrator Cisco Secure ACS (AAA) Telecommuter Internet VPN POP Central Site Mobile Customer

Site-to-Site VPN Remote Campus Main Campus Remotel Campus Internet Small Office/ Home Office

Extranet VPN ISP Network DMZ Corporate Intranet Remote Office Supplier ISP Gateway Firewall Security Server Supplier ISP Network DMZ Corporate Intranet