throbber

`
`802.11 Network Deployment
`
`CHAPTER 15
`
`Deploying a wireless LAN is a considerable undertaking. Significant planning is
`required before you can even touch the hardware. Deploying a wireless networkis not
`simply a matter of identifying user locations and connecting them to the backbone.
`Wireless LANs provide mobility through roaming capabilities, but this feature comes
`with a price. Wireless LANs are much moresusceptible to eavesdropping and unau-
`thorized access. Working to mitigate the security problems while offering high levels
`of service makes large wireless LAN deployments topologically more complex, espe-
`cially because solving security problems means that a great deal of integration work
`maybe required to getall the different pieces of the solution workingin concert.
`
`Wireless networks require far more deployment planning because of the nature of
`the radio link. Every building has its own personality with respect to radio transmis-
`sions, and unexpected interference can pop up nearly everywhere because of micro-
`wave ovens, electrical conduits, or severe multipath interference. As a result, each
`wireless LAN deployment is unique in many respects, and careful planning and a
`meticulous site survey are required before removing any equipmentfrom the box.
`
`Beyond considerations due to the physical environment, wireless networks often
`extend an existing wired infrastructure. The wired infrastructure may be quite com-
`plex to begin with, especially if it spans several buildings in a campussetting. Wire-
`less networks depend on having a solid, stable, well-designed wired network in
`place. If the existing network is not stable, chances are the wireless extension is
`doomedtoinstability as well.
`
`This chapter is about deployment considerations for wireless LANs, written from a
`technical perspective. How do the features of wireless LANs influence network
`topology? Besides the 802.11 equipment, what do you need to deploy a network?
`How should the logical network be constructed for maximum mobility? What do
`you need to lookfor in a site survey to make a deploymentsuccessful?
`
`
`
`
`
`
`
`DELL-1031, Part 3
`10,079,707
`
`DELL-1031, Part 3
`10,079,707
`
`

`

` ' O
`
`lPAeeSe
`
`
`
`
`Access control device
`(router, firewall, VPN,etc.)
`
`DHCPserver
`(Web documentation,
`drivers, etc.)
`
`i APT mo AP2 Y AP3
`
`=
`
`Ww
`
`Access point backbone
`network
`
`J
`4)’
`
`c¢€(
`
`c
`
`Wirelessclient
`
`——es
`
`Figure 15-1. Standard wireless LAN deployment topology
`
`Some deployments may look like multiple instances of Figure 15-1. The topology
`shownin thefigure provides seamless mobility between the access points connected
`to the access point backbone network. In very large deployments, such as a campus-
`wide deploymentacross a large numberof buildings, it may be desirable to limit the
`coverage areas in which seamless roaming is provided. One commonstrategy is to
`provide seamless mobility within individual buildings, but not provide roaming
`between buildings. Each building would have a wireless LAN that looked something
`like Figure 15-1, and all the access point backbone networks would ultimately con-
`nect to a campus backbone.
`
`
`294
`|
`Chapter 15: 802.11 Network Deployment
`
`
`
`The Topology Archetype
`Figure 15-1 shows how manywireless LAN deployments evolve. This figure serves as
`the road map for this chapter. The guiding principle of Figure 15-1 is that mobility
`must be limited to the link layer, because network-layer mobility is not generally
`available on IP networks. The other design decisions help augmentthe access con-
`trol of the wireless device and lower management overhead by taking advantage of
`existing services, each of which will be considered in turn.
`
`Fs
`<a
`y
`ail:
`ai
`RADIUS
`server
`
`o oS
`#
`sa
`Al)
`Server
`
`i (
`
`7 _ Internal
`Sj
`a
`PKI
`Mainfirewall
`
`i
`
`network = Internet
`f6
`
`

`

`
`
`serves as
`mobility
`enerally
`ess con-
`
`otage of
`
`
`
`ology
`ected
`
`ipus-
`it the
`is to
`ming
`hing
`con-
`
`Roaming and Mobility
`In Figure 15-1, the network linking all the access points, whichI call the access point
`backbone,is a single IP subnet. To allow users to roam between access points, the
`network should be a single IP subnet, evenif it spans multiple locations, because IP
`does not generally allow for network-layer mobility. To understand this design
`restriction,it is importantfirst to appreciate the difference between true mobility and
`mere portability.’
`Portability certainly results in a net productivity gain because users can access infor-
`mation resources whereverit is convenient to do so. At the core, however, portabil-
`ity removes only the physical barriers to connectivity. It is easy to carry a laptop
`between several locations, so people do. Butportability does not changetheritual of
`connecting to networks at each new location.It isstill necessary to physically con-
`nect to the network and reestablish network connections, and network connections
`cannotbe used while the device is being moved.
`Mobility, on the other hand,is a far more powerful concept: it removes furtherbarri-
`ers, most of which are based on the logical network architecture. Network connec-
`tions stay active even while the device is in motion. Thisis critical for tasks requiring
`persistent,
`long-lived connections, which may be found in database applications.
`Support personnel frequently access a tracking database that logs questions, prob-
`lems, and resolutions. The same argument can be made for a number of tracking
`applications in a health care setting. Accessing the database through a wireless net-
`work can boost productivity becauseit allows people to add small amountsofinfor-
`mation from different locations without needing to reconnect to the database each
`time. Inventory applications are another example and one of the reasons whyretail
`andlogistics are two of the markets that have been quicker to adopt 802.11. When
`taking inventory, it makes far more sense to count boxes or products wheretheysit
`and relay data over a wireless network than to record data on paper andcollate the
`data at the end of the process.
`I can take my laptop
`Traditional wired Ethernet connections provide portability.
`computer anywhere on the campus at work and plugin. (If I’m willing to tolerate
`slow speeds, I can even make a phone call and access my corporate network from
`anywhere in the world.) Each time I access the network, though, I’m starting from
`scratch, I have to reestablish connections,even if I only moved a few feet. What I’d
`really like is to walk into the conference room and connectto the corporate network
`without doing anything.
`
`* The exceptionto this generalruleis, of course, a network in which Mobile IP is deployed. I am enthusiastic
`about Mobile IP, especially on wireless networks, but it is far from ubiquitous as I write this book. Most net-
`work engineersare, therefore, designing networks withoutthe benefit of network-layer mobility,
`
`
`The Topology Archetype
`|
`295
`
`
`
`

`

`
`
` Andtherein lies the rub. 802.11 is implemented atthe link layer and provides link-
`
`layer mobility. IP affords the network designer no such luxury. 802.11 hosts can
`move within the last network freely, but IP, as it is currently deployed, provides no
`way to move across subnet boundaries. To the IP-based hosts of the outside world,
`the VPN/access control boxes of Figure 15-1 are the last-hop routers. To get to an
`802.11 wireless station with an IP address on the wireless network, simply go
`throughthe IP router to that network. It doesn’t matter whether a wireless station is
`connected to the first or third access point because it is reachable through the last-
`hoprouter. Asfar as the outside world cantell, the wireless station mightas well be a
`workstation connected to an Ethernet.
`A second requirementfor mobility is that the IP address does not change when con-
`necting to any of the access points. New IP addresses interrupt open connections.If a
`wireless station connects to the first access point, it must keep the same address
`whenit connectsto the third access point.
`A corollary to the second requirementis thatall the wireless stations must be on the
`same IP subnet. As long asa station stays on the sameIP subnet, it does not needto
`reinitialize its networking stack and can keep its TCP connections open.Ifit leaves
`the subnet, though,it needs to get a IP new address andreestablish any open connec-
`tions. The purpose of the design in Figure 15-1 is to assign a single IP subnetto the
`wireless stations and allow them to movefreely between access points. Multiple sub-
`nets are not forbidden, but if you have different IP subnets, seamless mobility
`between subnetsis not possible.
`The “single IP subnet backbone”restriction of the design in Figure 15-1 is a reflec-
`tion on the technology deployed within most organizations. Mobile IP was standard-
`ized in late 1996 in RFC 2002, butit has yet to see widespread deployment. (See the
`sidebar for a description of how Mobile IP allowsstations to change IP addresses
`without interrupting connections.) Until Mobile IP can be deployed, network design-
`ers must live within the limitations of IP and design networks based on fixed loca-
`tions for IP addresses. In Figure 15-1, the backbone network maybe physically large,
`butit is fundamentally constrained by the requirementthat all access points connect
`directly to the backbonerouter (and each other) at the link layer.
`
`Spanning multiple locations with an 802.11 network
`Access points that cooperate in providing mobility need to be connected to each
`other at layer 2. One method ofdoing this, shown in Figure 15-2a, builds the wire-
`less infrastructure of Figure 15-1 in parallel to the existing wired infrastructure.
`Access points are supported by a separate set of switches, cables, and uplinks in the
`core network. Virtual LANs (VLANs) can be employed to cut down on the required
`physical infrastructure, as in Figure 15-2b. Rather than acting as a simple layer-2
`
`
`
`296
`
`| Chapter 15: 802.11 Network Deployment
`
`
`
`

`

`
`
`repeater, the switch in Figure 15-2b can logically divide its ports into multiple layer-2
`networks. The access points can be placed on a separate VLAN from theexisting
`wired stations, and the “wireless VLAN” can be given its own IP subnet. Frames
`leaving the switch for the network core are tagged with the VLAN numberto keep
`them logically distinct and may be sent to different destinations based on thetag.
`Multiple subnets can be run over the same uplink because the VLAN tag allows
`frames to be logically separated. Incoming frames for the wired networks are tagged
`with one VLAN identifier, and frames for the wireless VLAN are tagged with a differ-
`ent VLANidentifier. Frames are sent only to ports on the switch thatare part of the
`same VLAN, so incoming frames tagged with the wireless VLAN are delivered only
`to the access points.
`
`
`
`a: Non-VLAN deployment
`
`b: VLAN deployment
`
`Network
`4 core f
`
`fe \
`
`| =
`Wired switch
`
`= “
`:
`Wireless switch
`
`aaetotleeciom
`User ports on wired network
`|
`AP
`
`i AP
`
`ww
`va
`
`CCCr+
`
`Network")
`core 4
`
`Taggedlink
`
`1 a
`Switch
`
`AP
`
`AP
`
`‘a
`ed
`al
`—_
`
`
`(r+
`
`Wireless coverage area
`
`
`
`
`Figure 15-2. Physical topologies for 802.11 network deployment
`
`Even better, VLANs can easily span long distances. VLAN-aware switches can be
`connected to each other, and the tagged link can be used to join multiple physical
`locationsinto a single logical network. In Figure 15-3, two switches are connected by
`a tagged link, and all four access points are assigned to the same VLAN. The four
`access points can be put on the same IP subnet and will act as if they are connected
`to a single hub. The taggedlink allows the two switches to be separated, and the dis-
`tance can depend onthe technology. By using fiber-optic links, VLANs can be made
`to go between buildings, so a single IP subnet can be extended across as many build-
`ings as necessary.
`
`meeOo
`
`
`
`
`
`~The Topology Archetype
`
`|
`
`297
`
`

`

`
`
`
`
`
`
`
`
`
`
`Physical topology
`
`SS
`
`lagged link
`
`“a
`
`Spey
`Switch
`
`VY
`wt
`
`~~
`
`CCC(-4
`
`mt AP a mie
`
`a
`
`—— ~—,
`
`EYted
`Switch
`
`aa SingleIPsubnet
`
`m"
`
`=
`Ne AP
`
`ss decpsemenettiaa cman Sy
`
`
`
`=
`a AP
`CCC
`Figure 15-3. Using VLANsto span multiple switches
`Tagged links can vary widely in cost and complexity. To connect different physical
`locations in one building, you can use a regular copper Ethernet cable. To connect
`two buildings together, fiber-optic cable is a must. Different buildings are usually at
`different voltage levels relative to each other. Connecting two buildings with a con-
`ductor such as copper would enable current to flow between (and possibly through)
`the two Ethernet switches, resulting in expensive damage. Fiber-optic cable does not
`conductelectricity and will not pick up electrical noise in the outdoor environment,
`whichis a particular concern during electrical storms. Fiber also has the added bene-
`fit of high speeds for long-distance transmissions. If several Fast Ethernet devices are
`connected to a switch, the uplink will be a bottleneckif it is only a Fast Ethernet
`interface. For best results on larger networks, uplinks are typically Gigabit Ethernet.
`For very large organizations with very large budgets, uplinks do not need to be Ether-
`net. One companyI have worked with uses a metro-area ATMcloudto connect build-
`ings throughout a city at
`the link layer. With appropriate translations between
`Ethernet and ATM,sucha service can be used as a trunk between switches. Computer
`trade shows such as Comdex and Interop regularly use metro-area networks to show-
`case both the metro-area services and the equipment used to access those services.
`
`
`
`Are
`L
`
`Limits on mobility
`The access point backbone network must be a single IP subnet andasingle layer-2
`connection throughout an area over which continuous coverage is provided. It may
`span multiple locations using VLANs. Large campuses maybeforced to break up the
`
`
`298
`|
`Chapter 15: 802.11 Network Deployment
`
`
`
`

`

` access point backbone network into several smaller networks, each of which resem-
`
`bles Figure 15-1.
`802.11 allows an ESS to extend across subnet boundaries, as in Figure 15-4a. Users
`can roam throughouteach “island” of connectivity, but network connections will be
`interrupted when moving betweenislands. One solution is to teach users one SSID
`and let them know that mobility is restricted; another alternative is to name each
`SSID separately. Both solutions have advantages. In thefirst case, there is only one
`SSID and nouserconfusion, but there may be complaintsif the coverage areas do not
`provide mobility in the right ways. In the secondcase, mobility is always provided
`within an SSID, but there are several SSIDs and more opportunity for user confusion.
`
`
`b: Multiple SSIDs
`a: Single SSID
`West WLAN —— East WLAN
`WLAN
`WLAN a oe
`—192.168.252/24
`Y_192.168.253/24
`192,168.252/24
`_192.168,253/24
`———|
`Core ee eS Core —————————
`a4
`i
`%
`
`WLAN
`192.168.251/24
`
`South WLAN
`192,168,251/24
`
`Figure 15-4. Noncontiguous deployments
`
`When a campusis broken into several disjointed coverage areas as in Figure 15-4, be
`sure to preserve the mobility most important to the users. In mostcases, mobility
`within a building will be the most important, so each building’s wireless network can
`be its own IP subnet. In some environments, mobility mayberestricted to groups of
`several buildings each,so theislands in Figure 15-4 may consist of multiple buildings.
`
`Address assignment through DHCP
`Multiple independent data sets that must be synchronized are an accident waiting to
`happen in anyfield. With respect to wireless LANs, they presenta particular prob-
`lem for DHCPservice. To makelife as easy as possible for users, it would bebestif
`Stations automatically configured themselves with IP network information, DHCPis
`the best way to do this. Access points frequently include DHCP servers, but it would
`be folly to activate the DHCP server on every access point. Multiple independent
`DHCPlease databases are the network equivalent of a tanker-truck pile-up waiting
`to happen. To avoid the “multiple independent database” problem, have a single
`source for IP addressing information. Furthermore, some access points may reclaim
`addresses if an association lapses, regardless of whether the lease has expired. For
`these reasons, I recommendusing an existing DHCPserverorinstalling a new server
`specifically to support wireless clients. Depending on the importance of the wireless
`infrastructure, it may be worth considering a backupserveras well.
`
`ical
`rect
`
`y at
`‘on-
`
`igh)
`not
`
`ent,
`ne-
`are
`
`net
`
`her-
`tild-
`‘een
`iter
`ow-
`
`21-2
`
`nay
`the
`
`
`299
`
`The Topology Archetype
`
`
`
`|
`
`

`

`
`
`
`
`Mobile IP and Roaming
`802.11 performsa sleight-of-hand trick with MAC addresses: stations communicate
`with a MAC address as if it were fixed in place, just like any other Ethernet station.
`Instead of being fixed in a set location, however, access points note when the mobile
`station is nearby and relay frames from the wired networkto it over the airwaves. It
`does not matter which access point the mobile station associates with because the
`appropriate access point performstherelay function. The station on the wired network
`can communicate with the mobile station asif it were directly attached to the wire.
`Mobile IP performs a similar trick with IP addresses. The outside world uses a single
`IP address that appears to remain inafixed location, called the homelocation. Rather
`than being serviced by a user’s system, however, the IP address at the homelocation
`(the home address) is serviced by whatis called the home agent. Like the access point,
`the homeagent is responsible for keeping track of the currentlocation of the mobile
`node. When the mobile nodeis “at home,” packets can simply be delivered directly to
`it. If the mobile node attaches to a different network (called a foreign network orvisited
`network), it registersits so-called foreign location with the homeagentso that the home
`agent can redirectall traffic from the home address to the mobile node on the foreign
`network.
`
`—continued—
`
`
`
`i}
`
`Consider an example in which two wireless LANsare built on different IP subnets. On
`its home subnet, a wireless station can send andreceivetraffic “normally,” since it is
`on its home network.
`
`When the wireless station moves from its home subnet to the second subnet, it
`attachesto the network using the normal procedure.It associates with an access point
`and probably requests an IP address using DHCP. Onawireless station that is unable
`to use Mobile IP, connections are interrupted at this point because the IP address
`changes suddenly, invalidating the state of all open TCP connections.
`Wireless stations equipped with MobileIP software, however, can preserve connection
`state by registering with the home agent. The homeagent can accept packets for the
`mobile station, check its registration tables, and then send the packets to the mobile
`station at its current location. The mobile station has, in effect, two addresses. It has
`its home address, and it can continue to use this address for connections that were
`established using the home address.It mayalso use the address it has been assigned on
`the foreign network. No TCPstate is invalidated because the mobile station never
`stoppedusing its home address.
`
`—aaa
`
`
`
`
`
`300
`
`| Chapter 15: 802.11 Network Deployment
`
`
`
`

`

`
`
`
`
`
`Naturally, this sidebar has omitted a great dealof the detail of the protocoloperations.
`Designing a protocol to allow a station to attach anywhere in the world and use an
`address from its home networkis a significant engineering endeavor. Several security
`problemsare evident, mostnotably the authentication of protocol operations and the
`security of the redirected packets from the home network to the mobile station’s cur-
`rent location. Maintaining accurate routing information, both thetraditional forward-
`ing tables at Internet gateways and the Mobile IP agents, is a major challenge. And,of
`course, the protocol must work with both IPv4 and IPv6. For a far moredetailed treat-
`ment of Mobile IP, I highly recommend Mobile IP: Design Principles and Practices by
`Charles Perkins (Prentice Hall).
`
`
`
`Within the context of Figure 15-1, there are two places to put a DHCPserver. Oneis
`on the access point backbone subnetitself. A standalone DHCP server would be
`responsible for the addresses available for wireless stations on the wireless subnet.
`Each subnet would require a DHCP serveras part of the rollout. Alternatively, most
`devices capable of routing also include DHCPrelay. The security device shown in
`Figure 15-1 includes routing capabilities, and many firewalls and VPN devices
`include DHCP relay. With DHCP relay, requests from the wireless network are
`bridged to the access point backbone bythe access point and then furtherrelayed by
`the access controller to the main corporate DHCPserver. If your organization cen-
`tralizes address assignment with DHCP, take advantage of the established,reliable
`DHCPservice by using DHCPrelay. One drawback to DHCPrelay is that the relay
`process requires additional time and notall clients will wait patiently, so DHCPrelay
`may notbe an option.
`
`Static addressing is acceptable, of course. The drawback to static addressing is that
`more addresses are required becauseall users, active or not, are using an address. To
`minimize end user configuration,it is worth considering using DHCPtoassignfixed
`addresses to MAC addresses.
`
`Asa final point, there may be an interaction between address assignment and secu-
`rity. If VPN solutions are deployed, it is possible to use RFC 1918 (private) address
`space for the infrastructure. DHCP servers could hand out private addresses that
`enable nodes to reach the VPN servers, and the VPN servers hand out routable
`addresses once VPN authentication succeeds.
`@ a,
`.
`.
`_¢,
`Use a single DHCPserverper access point backbone or DHCPrelay at
`eS
`the access point network router to assign addresses to wireless sta-
`as:
`__"*4s tions. Static addressing or fixed addressing through DHCPis also
`"acceptable.
`
`
`
`
`301
`The Topology Archetype
`|
`
`
`
`
`
`

`

` Security
`
`
`
`Informally, data security is defined in terms of three attributes, all of which must be
`maintained to ensure security:”
`
`Integrity
`Broadly speaking, integrity is compromised when data is modified by unautho-
`rized users. (“Has somebody improperly changed the data?”)
`Secrecy
`Of the three items, secrecy is perhaps the easiest to understand. Weall have
`secrets and can easily understand the effect of a leak. (“Has the data been
`improperly disclosed?”)
`Availability
`Data is only as good as yourability to use it. Denial-of-service attacks are the
`most commonthreat to availability. (“Can I read my data when I want to?”)
`
`Wireless LAN technology has taken a fair number of knocks forits failures in all
`three areas. Most notably,
`though, wireless LANs have two major failings with
`respect to the informal definition of security. First, secrecy is difficult on a wireless
`network. Wireless networks do not have firm physical boundaries, and frames are
`transmitted throughout a general area. Attackers can passively listen for frames and
`analyze data. To defeat attacks against secrecy, network security engineers must
`employ cryptographic protocols to ensure the confidentiality of data as it travels
`across the wireless medium. WEP has beena failure in this respect, but other proto-
`cols and standards may be employedinstead ofor in addition to WEP.
`
`integrity may be compromised by wireless hosts. Quick wireless LAN
`Second,
`deployments are often connected directly to a supposedly secure internal network,
`allowing attackers to bypass the firewall. In many institutions, internal stations are
`afforded higher levels of access privileges. Physical security may have made some
`additional privileges rational or inevitable, but wireless stations may not necessarily
`be trusted hosts run by internal users. Attacks against integrity may frequently be
`defeated by strong access control.
`
`Vendors often tout WEPasa security solution, but the proven flaws in the design of
`WEPshould give even the most freewheeling security administrators cause for con-
`cern. WEPis, in the words of one industry observer, “unsafe at any key length.”
`Future approaches based on 802.1x and EAP may improvethe picture, but current
`deployments must depend on solutions that are available now. Although products
`
`* Mydefinitions here are not meant to be formal. In this section, I’m trying to take a fundamental approach
`to security by showing how wireless LAN security fails and how someofthefailures can be solved by apply-
`ing solutionsthe industry has already developed.
`+t Or, in the wordsof one reviewer, “WEPis trash that just gets in the way.”
`
`
`302
`|
`Chapter15: 802.11 Network Deployment
`
`
`
`

`

`
`
`claiming to support 802.1x are currently appearing on the market, they haveyet to
`establish a track record with respectto either securi ty or interoperabilty.
`
`nust be
`
`1autho-
`
`ul have
`a been
`
`are the
`”)
`
`3 in all
`‘s with
`vireless
`les are
`
`es and
`3 must
`
`travels
`
`proto-
`
`i LAN
`twork,
`ms are
`some
`
`ssarily
`itly be
`
`ign of
`rt con-
`
`eth.”
`urrent
`
`»ducts
`
`‘proach
`‘apply-
`
`Access control and authentication
`Connecting to wireless networks is designed to be easy. In fact, the ease of connec-
`tion is one of the major advantages to many newerwireless technologies. 802.11 net-
`works announce themselves to anybody willing to listen for the Beacon frames, and
`access controlis limited by the primitive tools supplied by 802.11 itself. To protect
`networks againstthe threat of unauthorized access, strong access control should be
`applied. A helpful rule of thumbis to treat wireless access points like open network
`dropsin the building lobby. 802.11 networks can benefit from access control at two
`points:
`* Before associating with an access point, wireless stations mustfirst authenticate.
`At present, this processis either nonexistent or based on WEP.
`* After association with the access point, the wireless station is attached to the
`wireless network. However,strong authentication can be applied to any wireless
`stations to ensure that only authorized users are connecting to protected
`resources. This form of access control is no different from the access control
`widely enforcedbyfirewalls today.
`Atthe present time, the initial authentication during the association processis piti-
`fully weak. Current deployments must depend on two methods, one of which was
`never specified by the standard but is widely used.
`One approach is to allow only a specified set of wireless LAN interface MAC
`addresses to connectto access points. Maintainingthelist is its own administrative
`headache. Distributingthelist to access points may be even worse. In a network with
`access points from multiple vendors, the script may need to massagethelist into dif-
`ferentfile formats to cope with whatdifferent products require. Frequently, the list
`of allowed devices must be distributed by TFTP. Even if the distribution is auto-
`mated by administrative scripts, TFTP comes with its own security woes. Further-
`more,
`like wired Ethernet cards, 802.11 cards may change the transmitter MAC
`address, which totally undermines the use of the MAC address as an access control
`token. Attackers equipped with packet sniffers can easily monitor successful associa-
`tions to acquirea list of allowed MAC addresses.
`A second approach is to allow connections from stations that possess a valid WEP
`key. Stations that pass the WEP challenge are associated, andstations that fail are
`not. As noted in Chapter5, this methodis not very strong because WEP is based on
`RC4,andit is possible to fake a legitimate response to a WEP challenge without any
`knowledge of the WEPkey. In spite ofits limitations, WEP makes a useful speed
`bumpforattackers to jumpover. Useit, but be aware ofits limitations. Or disableit,
`but be cognizantofthefact that associationis unrestricted.
`
`
`
`
`303
`The Topology Archetype
`|
`
`
`

`

`
`
`
`
`
`these methods may be combined. However, both are easily
`In some products,
`defeated. Maintaining strong security over a wireless LAN requires solutionsoutside
`the scope of 802.11, in large part to augment the relatively weak access control sup-
`plied by 802.11.
`Many networks deploy firewalls to protect against unauthorized access and use of
`systems by outsiders. In many respects, wireless stations should be considered
`untrusted until they prove otherwise, simply because of the lack of control over the
`physical connection. In the network topology shown in Figure 15-1, an access con-
`trol device is used to protect the internal network from wireless stations. This access
`control device could be oneofseveral things: a firewall, a VPN termination device, or
`a custom solutiontailored to the requirements of 802.11 networks.
`Atthe time this book was written, many security-conscious organizations opted to
`use existing firewalls or VPN devices or build systems to meet their own internal
`requirements. Firewalls are well-knownfor providing a numberof strong authentica-
`tion mechanisms, and they have a provenability to integrate with one-time pass-
`word systems such as RSA’s SecurID tokens. New releases of IPSec VPN devicesalso
`increasingly have this capability. Initial versions of the IPSec specification allowed
`authentication only through digital certificates. Certificates work well for site-to-site
`VPNs,buttheideaofrolling out a public-key infrastructure (PKI) to support remote
`access was frightening for most users. As a result, several new approachesallow for
`traditional (“legacy”) user authentication mechanisms by passing VPN user authenti-
`cation requests to a RADIUSserver. Several mechanisms were in draft form as this
`book was written: Extended Authentication (XAUTH), Hybrid Mode IKE, and
`CRACK(Challenge/Responsefor Authenticated Control Keys).
`Several wireless LAN vendors havealso stepped up to the plate to offer specialized
`“wireless access controller” devices, which typically combine packet
`filtering,
`authentication, authorization, and accounting services (AAA), and a DHCPserver;
`many devicesalso include a DNSserver and VPN termination. AAA features are typi-
`cally provided by an interface to an existing corporate infrastructure such as
`RADIUS, which frequently has already been configured for remote access purposes.
`Someproducts mayalso include dynamic DNSso that a domain nameis assigned to
`a user, but the IP number can beassigned with DHCP.
`Several vendors have access controller solutions. Cisco offers an external access con-
`trol server for the Aironet productline. Lucent’s ORINOCO AS-2000 access server has
`an integrated RADIUSserver. Nokia’s P020 Public Access Zone Controlleris an inte-
`grated network appliance with a RADIUSclient and DHCPserver, and the compan-
`ion P030 Mobility Services Manageroffers the RADIUSserver andbilling functions.
`
`
`
`|J*
`
`s
`
`Recognize the limitations of WEP. Treat wireless stations as you would
`treat untrusted external hosts. Isolate wireless LAN segments with fire-
`\ walls, and use strong authentication for access control. Consider using
`~ existing user databasesas partof the authentication roll-out.
`
`
`304
`| Chapter 15: 802.11 Network Deployment
`
`
`
`

`

`
`
`easily
`utside
`| sup-
`
`ise of
`dered
`er the
`; con-
`iccess
`
`ce, Or
`
`ed to
`sernal
`ntica-
`
`pass-
`3 also
`owed
`o-site
`mote
`
`w for
`lenti-
`
`3 this
`and
`
`lized
`ring,
`Iver;
`typi-
`h as
`oses.
`
`2d to
`
`con-
`
`thas
`inte-
`pan-
`
`Confidentiality: WEP, IPSec, or something else?
`Confidentiality is the second major goal in wireless LAN deployments. Traffic is left
`unprotected by default, and this is an inappropriate security posture for most organi-
`zations. Users can choose amongthree options:
`* Use WEP.
`
`* Use a proven cryptographic product based on openprotocols.
`* Use a proprietary protocol.
`Option three locks you into a single vendor and leaves you at their mercy for
`upgrades and bug fixes. Proprietary cryptographic protocols also have a poor track
`record at ensuring security. In the end, the choice really comes down to whether
`WEPis good enough. Giventhe insecurity of WEP,there are two questionsto ask:
`“Does the data onthis network needto stay secretfor more than a week?” WEP is
`not strong encryption by any stretch of the imagination, and you should assume
`that a sufficiently motivated attacker could easily capturetraffic from the wire-
`less network, recover the WEPkey, and decrypt any data.
`“Dousers needto be protectedfrom each other?” In most WEP deployments, keys
`are distributed to every authorized station. When all users have access to the
`key, the data is protected from outsiders only. WEP does not protect an autho-
`rized user with the key from recovering the data transmitted by another autho-
`rized user. If users need to be protected from each other, which is a common
`requirement in many computing environment

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket