Lesson #9: Exploring Wireless LANs Wireless LANs / Wi-FiThe popularity of WLANs is undeniable. The following three main driving forces play in favor of WLANs:
WLANs let users access servers, printers, and other network resources regardless of their location, within the wireless reach. This flexibility means that, for example, a user's laptop stays connected working from a colleague's cubicle, from a small meeting room, or from the cafeteria. Recognizing the benefits brought about by WLAN flexibility, businesses are now deploying WLANs in record numbers. According to a 2003 NOP World research study, WLAN users stayed connected to their corporate network 3.64 hours per day longer than their wired peers, thus increasing their productivity by 27 percent. Through the flexibility of WLANs, not only does the productivity go up, but the response times are also significantly improved. The benefits of wireless mobility don’t stop at laptops and personal digital assistants (PDAs). IP telephony and videoconferencing are also supported over WLANs, integrating quality of service (QoS) to ensure that the interactive traffic has priority over the less-time-sensitive data transfers. Another significant benefit of WLANs is their low-cost deployment in locations where the costs of running LAN wire would be prohibitive. The total cost of ownership (TCO) of a WLAN is very low compared to the benefits they bring to an organization, providing that a WLAN is secured and managed properly. Companies that are not deploying WLANs quickly enough find that employees take the matter in their own hands and install their own WLANs, potentially creating significant breaches in the corporate network security infrastructure. Therefore, wireless security is an important topic to discuss in conjunction with wireless design. WLANs, seen just a few years ago as a novelty, are now seen as critical to corporate productivity.
Wireless Technology OverviewIn its most simplistic form, a WLAN is an LAN that uses radio frequency (RF) to communicate instead of using copper wire cabling. As shown below, wireless clients connect to wireless access points (WAPs) also refered to as just access points (APs). Wired and Wireless Networks
However, wireless communication brings a trade-off between flexibility and
mobility versus battery life and usable bandwidth. Wireless StandardsWLAN standards that are currently supported by major vendors were developed by
the Working Group 11 of the Institute of Electrical and Electronics Engineers
(IEEE) 802 committee. The most common standards are shown in
this table:
The 802.11a standard operates in the unlicensed 5 GHz band, which makes the transmission vulnerable to interference from microwave ovens and cordless phones. The strength of 802.11b and 802.11g signals, which operate in the 2.4 GHz band, is affected negatively by water, metal, and thick walls. The 802.11b and 802.11g standards divide the 2.4 GHz band into 14 overlapping individual channels. The overlap spans a width of 5 adjacent channels, therefore channels 1, 6, and 11 do not overlap and therefore can be used to set up multiple networks. The 802.11a standard is an amendment to the original standard. The advantage of using 802.11a is that it suffers less from interference, but its use is restricted to almost line of sight, thus requiring the installation of more access points than 802.11b to cover the same area. The medium access method of the IEEE 802.11 standards, called the Distribution Coordination Function (DCF), is similar to the Carrier Sense Multiple Access with Collision Detect (CSMA/CD) access method used by Ethernet. The following types of frames are transferred over the airwaves:
Other Wireless Standards
Wireless ComponentsThe main components of wireless networks are as follows: Wireless Access Points Integrated Access Point Integrating Routing and Wireless Functionality Wireless Client DevicesA wireless client device is equipped with a wireless interface card (WIC), which the device uses to communicate over RF with WAPs. Wireless clients can be the following items, among other things:
User Workstations and Laptops: Ad-Hoc
Network Smart Phone & PDA Wi-Fi
access Wireless IP Phones Deploying Wireless IP Phones Wireless Security: 802.11i & 802.1xAlthough security was originally included with 802.11 standards, it soon became obvious that it wasn’t enough. Wireless security— or the lack of it— has been a major contributor to IT managers’ reluctance to adapt wireless LANs. Recently, wireless security has improved dramatically, providing IT managers with an acceptable level of comfort to proceed with the installation of WLANs. IEEE 802.11i, released in June 2004, addresses current security concerns. In addition to the 802.11 suite of standards, the 802.1x standard can be used for wireless security. More precisely, 802.1x addresses port-based access control. Wireless Security IssuesA main issue with wireless communication is unauthorized access to network traffic or, more precisely, the watching, displaying, and logging of network traffic, also known as sniffing. Contrary to a wired network, where a hacker would need to be physically located at the corporate premises to gain access through a network drop, —with a wireless network, the intruder can access the network from a location outside the corporate building. WLANs use radio frequencies, and their signals propagate through ceilings and walls. Therefore, wireless eavesdropping, also known as war driving or walk-by hacking, —and rogue Access Points, unauthorized WAPs that allow a hacker access to a network, —are two significant security issues with wireless networks. In addition, wireless equipment tends to ship with open access. Not only is traffic propagated in clear text, but WAPs also voluntarily broadcast their identity, known as the Service Set Identifier (SSID). Wireless Threat MitigationThanks to the wireless open-access default mode, we can join a Wi-Fi network from our favorite coffee shop or hotel room; however, this unrestricted access is not advisable for corporate or SOHO networks. Wireless network security can be classified into the following three categories:
Basic Wireless SecurityBasic wireless security is provided by the following built-in functions:
SSIDs By default, a WAP broadcasts its SSID every few seconds. This broadcast can be stopped so that a drive-by hacker can’t automatically discover the SSID and hence the WAP. However, because the SSID is included in the beacon of every wireless frame, it is easy for a hacker equipped with sniffing equipment to discover the SSID and fraudulently join the network. Beacon Frame Being able to join a wireless network by the mere fact of knowing the SSID is referred to as open authentication. WEP -Wired Equivalent Privacy Note: Even if a user manages to proceed with open authentication —for example, he guesses the SSID, if WEP is activated, he could not communicate with the AP until he obtains the authentication keys. However, WEP is not considered secure: A hacker sniffing first the challenge and then the encrypted response could reverse-engineer the process and deduce the keys used by the client and WAP. MAC Address Verification Unfortunately, this method is also not secure because frames could be sniffed to discover a valid MAC address, which the hacker could then spoof. Enhanced Wireless SecurityThe stronger security standards, shown below, were created to replace the weaknesses in WEP.
802.1x Depending on the authentication method used, 802.1x can also provide
encryption. Based on the IEEE Extensible Authorization Protocol
(EAP), 802.1x allows WAPs and clients to share and
exchange WEP encryption keys automatically. The access point
acts as a proxy, doing the heavier computational load
of encryption. The 802.1x standard also supports a centralized key
management for WLANs. WPA -Wi-Fi Protected Access When WPA is implemented, access to the WAP is provided only to clients that have the right passphrase. Although WPA is more secure than WEP, if the preshared key is stored on the wireless client and the client is stolen, a hacker could get access to the wireless network. WPA supports both authentication and encryption. Authentication done through preshared keys is known as WPA Personal; when done through 802.1x, it is known as WPA Enterprise. WPA offers Temporal Key Integrity Protocol
(TKIP) as an encryption algorithm and a new
integrity algorithm known as
Michael. WPA is a subset of the
802.11i specification. WPA2 -802.11i WPA2 is the product certification given to wireless equipment compatible with the 802.11i standard. WPA2 certification provides support for additional mandatory 802.11i security features that are not included in WPA. WPA2, like WPA, supports both Enterprise and Personal modes for authentication. In addition to stricter encryption requirements, WPA2 also adds enhancements to support fast roaming of wireless clients by allowing a client to preauthenticate with the access point toward which it is moving, while maintaining a connection to the access point that it is moving away from. Wireless Intrusion Detection WLAN RoamingWLANs are relatively inexpensive to deploy compared to wired networks, and because, as shown above, throughput is directly related to the proximity of WAPs. Network managers often install WAPs to provide overlapping signals, as shown below. Using this overlapping design, coverage (radius) area is traded for improved throughput. Overlapping Signals Eliminate Dead SpotsNote: these overlapping signals must be in nonoverlapping channels. This scenario, however, requires WLAN roaming. WLAN roaming plans consider that as a user moves away from a WAP and is therefore losing signal strength, his connection should seamlessly jump to a WAP that provides a stronger signal. Point-to-Point Bridging This page is maintained by:
Prof.
Michael P. Harris, CCNA, CCAI
|