54
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

  • View
    216

  • Download
    2

Embed Size (px)

Citation preview

Page 1: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1

Security

Olga Torstensson

Halmstad University

Page 2: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-2

Key terms

• WEP• TKIP• MIC• EAP• 802.1X• WPA• CCKM• RADIUS• SSH• Encryption

•RSA RC4 (WEP)•DES, 3DES, AES

• Cipher• BKR

Page 3: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-3

Advanced Security Terms

• WEP – Wired Equivalent Privacy

• EAP – Extensible Authentication Protocol

• TKIP – Temporal Key Integrity Protocol

• CKIP – Cisco Key Integrity Protocol

• CMIC – Cisco Message Integrity Check

• Broadcast Key Rotation – Group Key Update

• WPA – Wi-Fi Protected Access (WPA)

Page 4: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-4

Security Fundamentals

Balancing Security and Access

Page 5: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-5

Vulnerabilities

•Technology– TCP/IP– WEP and Broadcast SSID– Association Process– Wireless Interference

•Configuration– Default passwords– Unneeded Services enabled– Few or no filters– Poor device maintenance

•Policy– Weak Security Policy– No Security Policy– Poorly enforced Policy– Physical Access– Poor or no monitoring

Page 6: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-6

Threats

•Internal

•External

•Structured

•Unstructured

Page 7: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-7

The Security Attack—Recon and Access

Page 8: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-8

The Security Attacks—DoS

Page 9: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-9

WLAN Security Wheel

Always have a good WLAN Security Policy in place. Secure the network based on the policy

Page 10: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-10

WLAN Security Considerations

Authentication – only authorized users and devices should be allowed.

Encryption – traffic should be protected from unauthorized access.

Administration Security – only authorized users should be able to access and configure the AP configuration interfaces.

Page 11: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-11

Common Protocols which use Encryption

When using a public network such as a WLAN, FTP, HTTP, POP3, and SMTP are insecure and should be avoided whenever possible. Utilize protocols with encryption.

TrafficTraffic No Encryption

No Encryption

EncryptionEncryption

Web BrowsingWeb Browsing HTTPS *HTTPS *HTTPHTTP

File TransferFile Transfer TFTP or FTPTFTP or FTP SCPSCP

EmailEmail

Remote MgmtRemote Mgmt

POP3 or SMTPPOP3 or SMTP SPOP3 *SPOP3 *

TelnetTelnet SSHSSH

* SSL/TLS

Page 12: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-12

WLAN Security Hierarchy

VirtualPrivate

Network (VPN)

No Encryption, Basic Authentication

Public “Hotspots”

Open Access 40-bit or 128-bitStatic WEP Encryption

Home Use

Basic Security 802.1x,TKIP/WPA Encryption,Mutual Authentication,

Scalable Key Mgmt., etc.

Business

Enhanced Security

Remote Access

Business Traveler,

Telecommuter

Page 13: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-13

Basic WLAN Security

Admin Authentication on AP To prevent unauthorized access to the AP

configuration interfaces:

•Configure a secret password for the privileged mode access. (good)

•Configure local usernames/passwords. (better)

•Configure AP to utilize a security server for user access. (best)

Page 14: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-14

User Manager

Page 15: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-15

Admin Access CLI View

Page 16: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-16

Console Password

Page 17: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-17

SSID Manager

Page 18: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-18

SSID Manager (cont)

Page 19: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-19

Global SSID Properties

Page 20: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-20

SSID CLI View

Page 21: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-21

WEP

WEP is a key.

WEP scrambles communications between AP and client.

AP and client must use same WEP keys.

WEP keys encrypt unicast and multicast.

WEP is easily attacked

Page 22: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-22

Supported Devices

What can be a client?•Client

•Non-Root bridge

•Repeater access point

•Workgroup Bridge

Authenticator?•Root access point

•Root bridge

?

Page 23: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-23

Enabling LEAP on the Client

Page 24: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-24

Configuring LEAP on the Client

Page 25: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-25

WEP Encryption Keys

Page 26: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-26

Enterprise WLAN AuthenticationAuthentication Types

• Open Authentication to the Access Point

• Shared Key Authentication to the Access Point

• EAP Authentication to the Network

• MAC Address Authentication to the Network

• Combining MAC-Based, EAP, and Open Authentication

• Using CCKM for Authenticated Clients

• Using WPA Key Management

Page 27: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-27

WLAN Security:802.1X Authentication

Mutual Authentication

EAP-TLS•EAP-Transport Layer Security•Mutual Authentication implementation•Used in WPA interoperability testing

LEAP•“Lightweight” EAP•Nearly all major OS’s supported:–WinXP/2K/NT/ME/98/95/CE, Linux, Mac, DOS

PEAP•“Protected” EAP•Uses certificates or One Time Passwords (OTP)•Supported by Cisco, Microsoft, & RSA•GTC (Cisco) & MSCHAPv2 (Microsoft) versions

Client

APRadiusServer

Page 28: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-28

EAP

Extensible Authentication Protocol (802.1x authentication)

Provides dynamic WEP keys to user devices.

Dynamic is more secure, since it changes.

Harder for intruders to hack…by the time they have performed the calculation to learn the key, they key has changed!

Page 29: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-29

Basic RADIUS Topology

RADIUS can be implemented:

• Locally on an IOS AP

• Up to 50 users

• On a ACS Server

Page 30: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-30

Local Radius Server

Page 31: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-31

Local Radius Server Statistics

Page 32: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-32

Radius Server User Groups

Page 33: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-33

ACS Server Options

Cisco Secure ACS Software

Cisco ACS Solution Engine

Page 34: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-34

Backup Security Server Manager

Page 35: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-35

Global Server Properties

Page 36: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-36

Enterprise Encryption WPA

Interoperable, Enterprise-Class Security

Page 37: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-37

Cipher “Suite”

Cipher suites are sets of encryption and integrity algorithms.

Suites provide protection of WEP and allow use of authenticated key management.

Suites with TKIP provide best security.

Must use a cipher suite to enable:•WPA – Wi-Fi Protected Access

•CCKM – Cisco Centralized Key Management

Page 38: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-38

Configuring the Suite

Create WEP keys

Enable Cipher “Suite” and WEP

Configure Broadcast Key Rotation

Follow the Rules

Page 39: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-39

WEP Key Restrictions

Security Configuration WEP Restriction

CCKM or WPA key mgt. No WEP in slot 1

LEAP or EAP No WEP in slot 4

40-bit WEP No 128-bit key

128-bit WEP No 40-bit key

TKIP No WEP keys

TKIP and 40 or 128 WEP No WEP in slot 1 and 4

Static WEP w/MIC or CMIC

WEP and slots must match on AP & client

Broadcast key rotation Keys in slots 2 & 3 overwritten

Page 40: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-40

Security Levels

Page 41: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-41

Enterprise WLAN Security Evolution

TKIP/WPA•Successor to WEP

•Cisco’s pre-standard TKIP has been shipping since Dec.’01

•Cisco introduced TKIP into 802.11i committee

•802.11i-standardized TKIP part of Wi-Fi Protected Access (WPA)

•WPA software upgrade now available for AP1100 & AP1200

AES•The “Gold Standard” of encryption

•AES is part of 802.11i standard–- AES will be part of WPA2 standard (expected in 2004)

Page 42: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-42

Encryption Modes

Page 43: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-43

Encryption Global Properties

Page 44: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-44

Matching Client to AP

Page 45: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-45

Matching Client to AP

Page 46: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-46

Matching Client to AP

Page 47: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-47

Matching Client to AP

Page 48: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-48

Matching Client to AP

Page 49: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-49

Matching Client to AP

Page 50: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-50

Advanced Security: MAC Authentication

Page 51: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-51

Adv. Security: EAP Authentication

Page 52: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-52

Adv. Security: Timers

Page 53: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-53

VLANs

Configuring your access point to support VLANs is a three-step process:

Assign SSIDs to VLANs.

Assign authentication settings to SSIDs.

Enable the VLAN on the radio and Ethernet ports.

Page 54: © 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University

© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-54

Using VLANs for Security

SSID: dataSecurity: PEAP + AES

802.1Q wired network w/ VLANs

SSID: visitorSecurity: None

AP Channel: 6SSID “data” = VLAN 1SSID “voice” = VLAN 2 SSID “visitor” = VLAN 3

SSID: voiceSecurity: LEAP + WPA