Lesson 10: Installing and Configuring Wireless and Physical Access Security Flashcards
wireless networking
- uses electromagnetic radio waves to carry data signals over the air
- “unguided media”
- wireless networks configured in one of two modes:
• Ad hoc—the wireless adapter allows connections to and from other devices (a peer-to-peer WLAN). In 802.11 documentation, this is referred to as an independent basic service set (IBSS).
• Infrastructure—the adapter is configured to connect through an access point (AP) to other wireless and wired devices (according to 802.11 documentation, basic service set, BSS | more than one BSS can be grouped in an extended service set (ESS))
service set identifier (SSID)
- all wireless devices operating on a WLAN must be configured with the same network name, referred to as the service set identifier (SSID)
- when multiple access points are grouped into an extended service set, this is more properly called the extended SSID (ESSID)
- this just means that all the APs are configured with the same SSID
wireless controller
- allow for centralized management and monitoring of the access points on the network
- this may be achieved through use of a dedicated hardware device (a wireless controller), which typically implements the required functionality through additional firmware in a network switch
fat AP
access point whose firmware contains enough processing logic to be able to function autonomously and handle clients without the use of a wireless controller
thin AP
one that requires a wireless controller in order to function
lightweight access point protocol (LWAPP)
- Cisco wireless controllers usually communicate with the access points
- allows an AP configured to work in lightweight mode to download an appropriate SSID, standards mode, channel, and security configuration
control and provisioning of wireless access points (CAPWAP)
alternatives to LWAPP include the derivative control and provisioning of wireless access points (CAPWAP) protocol or a proprietary protocol
VLAN pooling
- automated VLAN pooling ensures that the total number of stations per VLAN is kept within specified limits, reducing excessive broadcast traffic
- another function of a hardware controller is to supply power to wired access points, using Power over Ethernet (PoE)
bands
Wi-Fi products work in either the 2.4 GHz band or the 5 GHz band
802.11a
legacy products working in the 5 GHz band only
802.11bg
legacy products working in the 2.4 GHz band only
802.11n
products can be either dual band (supporting both 2.4 GHz and 5 GHz operation) or 2.4 GHz only
802.11ac
Most access points supporting 802.11ac are dual band but use the 2.4 GHz band for legacy clients (802.11bgn) only
rubber ducky antennas
plastic-coated variants often used on access points
directional antennas
- extend signal range at a particular point (gain, measured in dBi (decibel isotropic)
- directional antennas:
- Yagi, bar with fins
- parabolic (dish or grid) antennas, useful for point-to-point connections (wireless bridge)
access point and antenna placement considerations
- device supporting the Wi-Fi standard should have a maximum indoor range of up to about 30m (100 feet), though the weaker the signal, the lower the data transfer rate
- radio signals pass through solid objects, such as ordinary brick or drywall walls, but can be weakened or blocked by particularly dense or thick material and metal
coverage
- means that the WLAN delivers acceptable data rates to the supported number of devices in all the physical locations expected
- to maximize coverage and minimize interference, position the AP as high as possible and set the channels of other nearby APs to different settings
- at least 25 MHz spacing should be allowed between channels to operate without co-channel interference (CCI)
- 2.4 GHz band no more than three nearby 802.11b/g access points can have non-overlapping channels
- 5 GHz band for 802.11a or 802.11n/ac, the best option is usually to allow the AP to auto-detect the best channel (can obtain more bandwidth with the option to use two adjacent 20 MHz channels as a single 40 MHz channel (channel bonding))
site survey
- process of selecting optimum positions for access points and antennas by analyzing the building infrastructure and testing signal strength at different locations
- rom a security perspective, an additional step would be to use the plan of WLAN zones to identify areas where there is leakage of signals. Depending on the level of security required, you may then want to install shielding at strategic locations to contain the WLAN zones
signal strength
- amount of power used by the radio in an access point or station
- simply increasing power output is not always reliable. As you increase power, you also increase the chance of the signal bouncing, causing more interference, especially if there are multiple APs
received signal strength indicator (RSSI)
- shows the strength of the signal from the transmitter
- relative indicator
war driving
- to turn the power output on an AP down and ensure strategic AP device placement to prevent war driving
- main problem with this approach is that it requires careful configuration to ensure that there is acceptable coverage for legitimate users
- can also expose yourself slightly to “evil twin” attacks, as users may expect to find the network at a given location and assume that the rogue AP is legitimate
MAC filtering
means specifying which MAC addresses are allowed to connect to the AP
data emanation
as unguided media, wireless networks are subject to data emanation or signal “leakage.”
Wired Equivalent Privacy (WEP)
- original encryption scheme and still supported on old and new devices
- encryption system, based on the RC4 cipher, is flawed and WEP should no longer be used, if at all possible
- main problem with WEP is the 24-bit initialization vector (IV). The IV is supposed to change the key stream each time it is used
WEP cracking
- laws in WEP allow attackers using WEP cracking tools, such as Aircrack-NG (https://aircrack-ng.org) or AirSnort (https://airsnort.soft112.com), to decrypt and eavesdrop traffic
- to crack WEP, a type of replay attack is used to make the access point generate lots of packets, usually by replaying ARP packets at it, and cycle through IV values quickly
Wi-Fi Protected Access (WPA)
- first version of Wi-Fi Protected Access (WPA) was designed to fix the security problems with WEP
- version 1 of WPA still uses the RC4 cipher but adds a mechanism called the Temporal Key Integrity Protocol (TKIP) to make it stronger
- TKIP fixes the checksum problem in WEP (Message Integrity Check), uses a larger IV (48-bit) to ensure a unique keystream, transmits it as an encrypted hash rather than in plaintext, and adds a sequence counter to resist replay attacks
WPA2
- fully compliant with the 802.11i WLAN security standard
- main difference to the original iteration of WPA is the use of Advanced Encryption Standard (AES) for encryption
- AES is stronger than RC4/TKIP
- AES is deployed within the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
- AES replaces RC4 and CCMP replaces TKIP