August 27, 2003 Evaluation of WiNc Manager A Wireless Network Management Software from Cirond Technologies Inc. by Kassim Olawale Radio Science Laboratory.

Slides:



Advertisements
Similar presentations
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Advertisements

Filtering and Security By Mohammad Shanehsaz June 2004.
USRobotics Professional Access Point  Yosi Rafael.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Allied Telesyn Wireless LAN Solutions AT-WL2411 Access Point AT-WR2411 Wireless LAN PCMCIA Card.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
1 實驗五:媒介存取協定模擬 教師: 助教:. 2 Outline  Background  Transmission Protocols  ALOHA  CSMA/CD  CSMA/CA  Network Devices  Hub  Switch  Access Point (AP)
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Security Awareness: Applying Practical Security in Your World
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Chapter 9 Connecting to and Setting up a Network
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Connecting LANs, Backbone Networks, and Virtual LANs
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Securing a Wireless Network
Ch. 5 – Access Points. Overview Access Point Connection.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
1 Chapter Overview Wireless Technologies Wireless Security.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Working with Mobile Computers Lesson 12. Skills Matrix Technology SkillObjective DomainObjective # Configuring Vista Wireless Networking Use the Network.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Networking Functions of windows NT Sever
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Presented by: Dr. Munam Ali Shah
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Designing for High Density Wireless LANs Last Update Copyright Kenneth M. Chipps Ph.D.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
Wireless Networking Nandakumar.P. Web Resource
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Setting Wireless Network At Home By: Parveen Sharma.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
WEEK 11 – TOPOLOGIES, TCP/IP, SHARING & SECURITY IT1001- Personal Computer Hardware System & Operations.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
Understand Wireless Security LESSON Security Fundamentals.
IFIP-UNU ADVANCED COURSE ON NETWORKING AND SECURITY Module II-Wireless Communications Section 5 Access Points.
Instructor Materials Chapter 6 Building a Home Network
Wireless Network Computer Science Engineering Technical English II
Wireless Technologies
SUBMITTED BY DINEEJ A 28 S3 EC
Presentation transcript:

August 27, 2003 Evaluation of WiNc Manager A Wireless Network Management Software from Cirond Technologies Inc. by Kassim Olawale Radio Science Laboratory Department of Electrical and Computer Engineering The University of British Columbia

Evaluation of WiNc Manager Outline  WiNc Manager Testing  Features  Further testing of features  Recommendations

Evaluation of WiNc Manager WiNc Manager Testing  Beta testing started in June  Software downloaded and installed  APs were set up and connected to a wired network for testing  Assessments based on the software documentation and tests

Evaluation of WiNc Manager WiNc Manager Features  Summary of Important features Basic AP configurations Network load balancing Channel Assignment Security Mapview  Advantages and disadvantages relative to campus network

Evaluation of WiNc Manager Basic Access Point Configurations  read, set or change most variables that configure an Access Point  Communicates with APs using Simple Network Management Protocol (SNMP)  If the AP does not support SNMP, Hypertext Transfer Protocol (HTTP) is used

Evaluation of WiNc Manager Basic Access Point Configurations  Access Point Name  Manufacturer  Firmware Version  Regulatory Domain  SSID  Description of AP  Channel number to use  MAC Address  IP Address  Subnet Mask  Gateway  Wireless Transmit Rate  Wireless Transmit Power  MAC Address Filter Lists  MAC Address Access Control Lists (ACLs)  Packet Fragmentation Threshold  RTS Threshold  Statistics

Evaluation of WiNc Manager Basic Access Point Configurations

Evaluation of WiNc Manager Basic Access Point Configurations

Evaluation of WiNc Manager Basic Access Point Configurations

Evaluation of WiNc Manager Basic Access Point Configurations  Advantages Enables a single location for changing AP configurations for entire network. Changes can be applied to any number of APs at once (depending on variable being changed).  Disadvantages Not all variables are available for editing. WiNc Manager currently does not support Cisco Aironet AP1200 running IOS. It supports VxWorks on AP1200 and IOS on AP1100

Evaluation of WiNc Manager Network Load Balancing  Load balancing using number of clients in network  Threshold number of clients beyond which redistribution is triggered can be manually set  If no threshold specified, the software attempts to keep number of clients on all APs equal

Evaluation of WiNc Manager Network Load Balancing

Evaluation of WiNc Manager Network Load Balancing

Evaluation of WiNc Manager Network Load Balancing  Advantages Constantly overloaded APs could be easily relieved requires that such APs’ coverage areas overlap those of other AP(s) with smaller number of clients  Disadvantages Aggregate throughput on an AP could reach a maximum even with low number of users

Evaluation of WiNc Manager Channel Assignment Can assign channels to APs automatically using four of the eleven channels in the IEEE b standard

Evaluation of WiNc Manager Channel Assignment  Advantages Manual management of channel allocations to APs, while still possible, is not necessary Capacity is increased by one-third over the traditional three-channel network deployments  Disadvantages Research suggests that it should be possible to use more than four of the eleven channels provided in the IEEE b standard. This depends on the physical distance between the APs with overlapping coverage area and their transmit power.

Evaluation of WiNc Manager Security  Use of Wired Equivalent Privacy (WEP) with automatically rotated keys  MAC Address filter list  Provisioning of network access for clients

Evaluation of WiNc Manager Use of Wired Equivalent Privacy  Four keys can be provided at a time  Supports keys of length 64, 128 and 256 bits  Same WEP keys can be provided to multiple APs at the same time by selecting the APs before making key changes  WEP will be used for data transmission, but may also be used for authentication  AutoKey (optional) Automatic distribution of WEP keys to clients using Cirond Technologies WiNc or pocketWiNc software Automatic key rotations (following a specified schedule)

Evaluation of WiNc Manager WEP : AutoKey

Evaluation of WiNc Manager Use of Wired Equivalent Privacy  Advantages Data is protected when transmitted with WEP encryption AutoKey eliminates the need for network users to manually enter unfamiliar WEP keys on their user equipment AutoKey also allows rotation of keys on schedule  Disadvantages AutoKey requires that users install Cirond Technologies software on their user equipment Without AutoKey, users have to manually enter WEP keys in their equipment WEP keys cannot be changed regularly enough to defeat an intruder’s effort to learn the keys from transmitted packets.

Evaluation of WiNc Manager MAC Address filter list  Clients may be allowed or disallowed access to wireless network based on their MAC addresses  Different MAC Address Access Control Lists (ACL) for different APs on the network is possible Access control lists programmed onto the APs New lists (external to the APs)

Evaluation of WiNc Manager MAC Address filter list  Advantages This may serve as an additional security feature in the network  Disadvantages It will be difficult to manage MAC Address lists for a large network such as that in UBC MAC addresses can also be copied by potential intruders

Evaluation of WiNc Manager Provisioning of Network Access  WiNc Manager creates an encrypted provisioning data file  The file is used once by the client to connect to the network and register access requires that the client be running Cirond Technologies software  WiNc Manager maintains automatic key distribution to the client (if WEP keys are set and AutoKey enabled)

Evaluation of WiNc Manager Provisioning of Network Access

Evaluation of WiNc Manager Provisioning of Network Access  Advantages If provisioning is enabled, only clients that have been provisioned can access the network Access to the network can be denied to specific clients by disabling their access provisioning  Disadvantages Provisioning of network access requires that clients run Cirond Technologies software

Evaluation of WiNc Manager Mapview  Real-time graphical presentation of the wireless network Shows APs and clients in the network  Background will represent plan of the physical location of the APs (optional)  APs not configured will be shown as rogue APs  Physical location of APs require an initial setup in WiNc Manager This is easy to achieve using the various setup and calibration tools provided  Links are drawn between each client shown and all the APs it is associated with  Location of clients are estimated using the location of the APs they are associated with

Evaluation of WiNc Manager Mapview

Mapview  Advantages Useful in assessment of network performance and load (in terms of number of clients) Easier to explain why some APs are overloaded compared with others in the same building or environment APs that are offline and rogue APs are easy to spot  Disadvantages Relies on clients running Cirond Technologies software to report rogue APs Location of clients may not be very reliable, unless they run Cirond Technologies software

Evaluation of WiNc Manager Further Testing  Set up clients to APs use Orinoco RG1000 as clients  Test network load balancing

Evaluation of WiNc Manager Conclusions  Some features in WiNc Manager are only available or practical when clients run Cirond Technologies software (WiNc for clients or pocketWiNc).  Examples of these features include the use of WEP with AutoKey reporting rogue APs on Mapview positioning of clients on Mapview provisioning of network access to clients  In a network that uses WiNc Manager, use of Cirond Technologies software in clients is recommended

Evaluation of WiNc Manager Conclusions  Software was assessed for use in UBC wireless network  The advantages and disadvantages listed will help in deciding suitability of the software  Additional considerations on WiNc Manager include Cirond Technologies should enable support for Cisco Aironet AP1200 running IOS No other software is available to provide throughput load balancing Research on use of channel assignment algorithms better than a four-point autochannel is still ongoing Mapview, included in the software, is valuable for real-time visual evaluation of the performance of the network