14. Wireless Security Fundamentals Flashcards
What does MIC stand for and what does it do?
Message Integrity Check
MIC is calculated on the data being encrypted and it ensures that someone didn’t alter the message.
What are the 4 categories of wireless security threats listed in the guide?
Rogue devices
Ad hoc networks
Client association issues
Passive or active attacks
What is a rogue client?
Any client that is associated to a rogue AP (an AP that is not a part of your network but can be heard by an AP on your network)
What does wIPS stand for?
Wireless Intrusion Protection System
What algorithm does WEP use?
RC4 cipher algorithm
How long are WEP keys?
40 or 104 bits long
represented by 10 or 26 hex digits
How is WEP used for authentication by an AP?
AP sends a challenge phrase which the client encrypts with the WEP key.
802.1x requires authentication before a client has access to what?
Wired network
What does EAP stand for?
Extensible Authentication Protocol
It is a framework for authentication
There are 3 roles in the 802.1x client authentication. What are they and who are they?
Supplicant - client
Authenticator - typically WLC
Authentication server (AS) - typically Radius server
LEAP (Lightweight EAP) uses what type of encryption?
RC4 cipher algorithm (this is why it shouldn’t be used)
What kind of keys does LEAP use?
Dynamic WEP keys
EAP-FAST, PEAP, and EAP-TLS all have an inner authentication and an outer authentication that uses what kind of tunnel for protection?
Transport Layer Security (TLS)
What are the differences between EAP-FAST, PEAP, and EAP-TLS in the way they do the inner authentication?
EAP-FAST uses PACs
PEAP uses a digital certificate from the AS but doesn’t require a certificate from the user
EAP-TLS require supplicant and AS to present digital certificates
What does TKIP stand for?
Temporal Key Integrity Protocol
What is the underlying encryption of TKIP?
WEP
What does CCMP stand for?
Counter/CBC-MAC Protocol
CCMP consists of what 2 algorithms?
AES counter mode encryption
Cipher Block Chaining Message Authentication Code (CBC-MAC) used for message integrity check
How do you know if a device supports CCMP?
WPA2 designation
Difference between WPA and WPA2
WPA can use either TKIP or AES(CCMP)
WPA2 only uses AES(CCMP)
WPA and WPA2 support what two authentication modes?
Personal mode uses pre-shared key
Enterprise mode uses 802.1x EAP
Cisco developed what to secure management frames?
Management Frame Protection (MFP)
To use client MFP, client device must support what version of CCX and use what version of WPA
CCXv5
WPA2
Wireless security is configured on a per what basis?
per WLAN
What is local EAP?
The controller has a built in authentication server that supports LEAP, EAP-FAST, PEAP, EAP-TLS.
What are the components of wireless security?
Authentication
Message privacy (encryption)
Message integrity
Intrusion protection