Transcript
Veilige indoor wireless oplossingen 12 november 2007
2
Agenda
– Wie is Newtel – Evolutie in Wireless LAN – Wireless Security – De standaarden
1
3
Newtel •
Newtel is telefonie en data integrator
•
Omzetcijfer Newtel
Operationele winst Newtel
2004: 4 Meuro 2005: 6,5 Meuro 2006 forecast: 7,7 Meuro
2004: 350 Keuro 2005: 400 Keuro 2006 forecast: 500 Keuro
•
50 personen
•
Onderhoud van 3.000 installaties
•
24/24 service voor alle producten
•
Aktief over heel België, aanwezigheid in elke provincie
•
Projectaanpak of totaaloplossingen
4
Newtel Oplossingen I N F R A S T R U C T U U R
Klassieke Telefonie IP- Telefonie LAN switching Draadloze oplossingen Netwerk Beveiliging
D I E N S T E N
Kostenanalyse operatoren
2
5
Zij zijn tevreden over ons … •
Telefonie klanten: Dexia, CBC Banque, Ziekenhuis AZ Halle, Clinique Malmédy, Neckermann, BBL Ticket, Brico, De Lijn, AMP, Facq, Jungheinrich, Syntra West, …
•
LAN switching klanten: Ziekenhuis St Elisabeth Zottegem, Ministère des Equipements et Transport, CHU Brugmann, Banca Monte Paschi, Provincie Vlaams Brabant, …
•
Security klanten: Provincie Vlaams Brabant, Lanier, OPZ Rekem, Miele, CBF, CHU Brugmann, Stad St.-Truiden, …
•
En vele honderden KMO’s vanaf 15 werknemers waaronder vele overheidsinstellingen, rusthuizen en familiale hotels
6
Agenda
– Wie is Newtel – Evolutie in Wireless LAN – Wireless Security – De standaarden
3
7
Wireless LAN : Fat vs Thin AP’s FAT access points: - ‘Old’ way of WLAN - Wireless infrastructure = Access Point: - Radio +Antenna - Intelligence (Access Control) - Connection to wired network - Used for ‘simple’ setup like Soho
8
Wireless LAN : Fat vs Thin AP’s Thin access points: - Wireless infrastructure = Access Point(s) + Wireless switch - Access Point = Radio + Antenna - All intelligence in wireless switch - Wired connection - Access Control - Management of the whole Mobility domain
4
9
Wireless LAN : Thin AP’s
AP
AP
AP Authentication Data Authorisation
Wireless Switch
AP
Wireless LAN : Thin AP’s, switch redundancy
1 0
?
5
1 1
Wireless LAN : VLAN support User A VLAN A
AP
VLAN B
User B
User A ~ VLAN A User B ~ VLAN B AP
Wireless LAN : VLAN support (2)
Wireless Switch
1 2
User UserBA
6
Wireless LAN : Thin AP’s, autotune
1 3
- The wireless system knows the RF topology - Total coverage -> every AP sees its neighbours - Signal strengths from neighbouring AP’s are passed to wireless switch
The wireless system can automatically re-tune itself to avoid influence from interfering devices
Wireless LAN : Thin AP’s
1 4
Advantages of Thin access points: - Total Infrastructure management - Easy deployment of new AP’s - No network re-engineering - Security - VLAN support - Extended redundancy - Extra functionality - Auto-tune - Rogue detection - …
7
1 5
Agenda
– Wie is Newtel – Evolutie in Wireless LAN – Wireless Security – De standaarden
Security and WLAN
1 6
Secure networks aren’t mobile
Mobile networks aren’t secure
8
1 7
Security and WLAN : Securing the wireless communication Wired Equivalent Privacy (WEP) - Provide comparable confidentiality to a traditional wired network - part of the IEEE 802.11 standard - stream cipher RC4 with 40 bit or 128 bit key for encryption - CRC-32 checksum for integrity
1 8
Security and WLAN : Securing the wireless communication, WEP
•
Airsnort needs only 5 minutes (550K packets) to crack a WEP key
9
Security and WLAN : Securing the wireless communication, MAC authentication
1 9
Is MAC address authentication safe? -
MAC addresses are not encrypted (L2) MAC addresses can easely be spoofed
No safe form of authentication
2 0
Security and WLAN : Securing the wireless communication, WPA & WPA2 WiFi Protected Access - Created in response to several serious weaknesses found in WEP - Data is encrypted using the RC4 (WPA) or AES (WPA2) - Temporal Key Integrity Protocol (TKIP) dynamically changes keys - Message Integrity ensured by ‘Michael’ <-> ‘CRC4’ (WEP) - WPA ‘personal’ uses Pre-shared Key authentication (pass phrase) - WPA ‘enterprise’ uses 802.1x authentication server
10
2 1
Security and WLAN : Securing the wireless communication, WPA & WPA2 WPA2 PSK: - Pre-shared Key (pass phrase) stored on AP - User enters PSK to gain access to network - TKIP dynamically changes encryption keys - Payload encryption with AES
WPA2 enterprise: - User needs username/password - Credentials checked with 802.1x server
2 2
Security and WLAN : Securing the wireless communication, 802.1x
- IEEE standard for port-based network access control - Provides a means of authenticating and autorizing devices to attach to a LAN port - Defines the Extensible Authentication Protocol (EAP) - Can make use of various types of authentication servers like RADIUS
11
Security and WLAN : Securing the wireless communication, EAP
2 3
Extensible Authentication Protocol EAP has a number of variants (40) backed by different vendors - EAP MD5 : basic security, several vulnerabilities - EAP TLS : one of the most secure EAP standards, uses PKI for secured RADIUS communication. Complex setup - EAP TTLS : using PKI certificates only on the authentication server. Less complex setup. - LEAP : Lightweight EAP : Cisco proprietary - PEAP : Joint proposal by Cisco Systems, Microsoft and RSA Security Similar in design to EAP-TTLS Native support in Microsoft, Cisco, Apple, Linux, open source …
2 4
Security and WLAN : Securing the wireless communication, 802.1x How it works, client configuration
12
2 5
Security and WLAN : Securing the wireless communication, 802.1x How it works, server configuration: - Radius server based - 802.1x uses certificates for server authentication - Server returns autorisation information: VLAN - IAS (free with MS server 200x) can be configured as a 802.1x radius server AND integrates with AD - Other 802.1x servers like Steelbelted Radius add functionality like end-point integrity check - Machine hardware authentication
2 6
Security and WLAN : Securing the wireless communication, 802.1x How it works:
Radius
PEAP
EAPoL
13
Security and WLAN :
2 7
Security issue: ‘All in one’ (soho) wifi solutions are cheap and plug-and-play BUT: - Often installed without telling administrator - Very often badly configured - Important security threat - Difficult to detect
Need to secure the waves !
Security and WLAN : Securing the waves
2 8
Wireless security = preventing ‘unmanaged’ access-points (rogues) from offering a backdoor to the network
14
Security and WLAN : Securing the waves, how it works
•
RF-fingerprint is known to wireless system
•
Changes in RF signaling are immediatelly detected
•
Countermessures can be launched through nearest AP’s
Security and WLAN : Securing the waves, how it works
2 9
3 0
Rogue detection - All AP’s can scan for unknown wireless traffic parallel to normal operation - Passive: listen for beacons & probes - Active: send ‘Probe Any’ - Classification : Rogue / interfering device - Once a rogue is detected, the closest AP can launch countermeasures
15
Security and WLAN : Securing the waves
3 1
Rogue detection - Countermeasures - Disturb normal operation of the Rogue - Closest legitimate AP will spoof various 802.11 control messages to Rogue - Clients are prevented from communicating, associating and authenticating with the Rogue
! Not all Rogues are hostile
3 2
Security and WLAN
What if you’re really paranoid?
16
Security and WLAN •
The signals measured from the different antenna’s can be used to locate the wireless LAN users
Security and WLAN •
3 3
3 4
Access-rights can depend on the physical location of where the user is located
17
Security and WLAN : RF firewall
3 5
3 6
Agenda
– Wie is Newtel – Evolutie in Wireless LAN – Wireless Security – De standaarden
18
3 7
WLAN PHY standards : IEEE 802.11b Taskgroup b produced 802.11b standard on 16th september 1999 – Uses Complementary Code Keying (CCK) Modulation to achieve a ‘High Rate’ extention to original standard – Rates: 11, 5.5, 2, 1 – Uses DSSS in the 2,4 Ghz ISM band – Range ~ 100m
11Mbps 5.5Mbp s 2Mbps 1Mbps
3 8
WLAN PHY standards : IEEE 802.11b Disadvantages: – 2,4 Ghz ISM band is overcrowded (Bluetooth – Microwave ovens) – DSSS channels are 30Mhz wide providing only 3 non-overlapping channels in the 2,4 Ghz band
2.417 2.427 2.437 2.447 2.457 2.467
1
2
3
4
5 6
7
8
9
10 13 12 11
2.412 2.422 2.432 2.442 2.452 2.462 2.472
2.484
19
WLAN PHY standards : IEEE 802.11a
3 9
Taskgroup a produced 802.11a standard on 12th september 1999 Products came available late 2001 (US), first certified products in januari 2003 – Uses Orthogonal Freqency Division Multiplexing (OFDM) to offer significantly higher bitrates – Rates: 54, 48, 36, 24, 18, 12, 9 or 6 Mbps – Uses less crowded 5 Ghz ISM band – 8 non-overlapping 20Mhz channels can be used in same location
WLAN PHY standards : IEEE 802.11a
4 0
Disadvantages: – Reduced range owing to higher operating frequency (~ 50m) – No backward compatibility with 802.11 and 802.11b products -> vendors have created dual radio solutions – Many regulatory issues with its deployment • 802.11d (power attenuation - channel selection); 802.11h (Europe) ; 802.11j (Japan)
20
WLAN PHY standards : IEEE 802.11g
4 1
Taskgroup g produced 802.11g standard on 12th june 2003 – Offers 54Mb in the 2,4Ghz band – Backward compatible with 802.11b – Uses CCK for compatibility with 802.11b – Uses OFDM for 802.11a rates in the 2,4Ghz band – Rates: 54, 22, 11, 5.5, 2 or 1 Mbps – Range: 30% more than 802.11a – Power consumption: lower than 802.11a – 802.11 a/b/g equipment available
WLAN PHY standards roadmap : IEEE 802.11n
4 2
“Standard for Enhancements for Higher Throughput” Taskgroup n first proposals: august 2004
Goal: improve WLAN performance to challenge ethernet -> real TCP/IP troughput of 100Mb or more Uses MIMO
21
4 3
WLAN PHY standards : Spatial Multiplexing MIMO
Spatial multiplexing concept: – However, there are cross-paths between antennas – The correlation must be decoupled by digital signal processing algorithms
Bits
Bit Split
DSP
Radio
Radio
DSP
DSP
Radio
Radio
DSP
TX
WLAN PHY standards roadmap : IEEE 802.11n
Bit Merge
Bits
RX
4 4
Constraints – Pre-n standard equipment available but consumer-oriented and propriarty – Timeline for ratification (draft1 – draft2) : Q1 2008 ? WiFi plans pre-n standard ratification mid 2007 – Will 802.3af (15,4W) be sufficient? -> new 802.3at high power PoE in development – Wireless to Wired bandwith used will grow -> Centrallised controller may become bottleneck
22
WLAN PHY standards roadmap : IEEE 802.11n
4 5
Known developments: - New types of Access Points (multiple antena’s) backward compatible - More intelligence in the access points - Traffic will selectively be switched on AP - Probably no implications on wireless switch
WLAN PHY standards roadmap : IEEE 802.11n
4 6
Example Trapeze: Smart Mobile - Application driven switching
23
WLAN PHY standards roadmap : IEEE 802.11n
4 7
Example Trapeze: Smart Mobile - Application driven switching
WLAN PHY standards roadmap : IEEE 802.11n
4 8
Example Trapeze: Smart Mobile - Application driven switching
24
4 9
WLAN PHY standards roadmap : IEEE 802.11n
Conclusion: - IEEE is not ready - WiFi is getting ready
- Industry is ready ! !
5 0
Overview 802.11 PHY WLAN Standards
802.11b
802.11a
802.11g
802.11n
Standard Approved
Sept. 1999
Sept. 1999
June 2003
?
Available Bandwidth
83.5 MHz
580 MHz
83.5 MHz
83.5/580 MHz
Frequency Band of Operation
2.4 GHz
5 GHz
2.4 GHz
2.4/5 GHz
# Non-Overlapping Channels
3
8
3
3/8
1 – 11 Mbps
6 – 54 Mbps
1 – 54 Mbps
1 – 600 Mbps
100m
50m
100m
100m / 50m
Data Rate per Channel
Range
25
WLAN netto data troughput
5 1
- Data rate (11Mb – 54Mb) = radio data rate ! - Important overhead due to radio communication - Wlan = half duplex <-> Ethernet = full duplex - Radio waves = shared medium (cfr hub) - 802.11b netto data rate ~ 2.5 Mb Full duplex - 802.11a/g netto data rate ~ 12 Mb Full duplex - Ex. 20 users in one 802.11b cell ~ 125 Kb per user
Scaling of WLAN implementation not only for Wireless coverage but also for concurrent users
The Trapeze productline
5 2
26
5 3
The Mobility Exchange™
5 4
Mobility Exchange Comparison
Model
MXR-2
MX-8
Ports
Power
# MPs active
2 • • 1
x 10/100 1 x uplink 1 x PoE x Console
External A/C converter
3
8 • • 1
x 10/100 2 x uplink 6 x PoE x Console
Single or dual internal power supplies
12
MX-200
2 x GigE (SFP) 1 x 10/100 management 1 x Console
Single or dual internal power supplies
32, 64, 96, 128
16 x 10/100 PoE 1 x 10/100 management 2 x GigE (SFP) 1 x Console
Single or dual internal power supplies
MX-216
32, 64, 96, 128
4 x GigE (GBIC or RJ45) 1 x Console 1 x Flash card slot
Dual internal hotswappable power supplies
MX-400
40, 80, 120
27
Mobility Point™
Q&A
5 5
5 6
28