27 Implementing Wireless Security Configurations
27 Implementing Wireless Security Configurations
Introduction
Cryptographic Protocols
Authentication Protocols
Installation Considerations
EAP
PEAP
EAP-TLS
EAP-TTLS
802.1x
WPA2
WPA3
Learning Outcomes
In this module, you will complete the following exercises:
Cryptographic Protocols
Authentication Protocols
Methods
Installation Considerations
Exam Objectives
The following exam objectives are covered in this lab:
Cryptographic Protocols
Authentication Protocols
Methods
Installation Considerations
in more detail.
Lab Duration
It will take approximately 45 minutes to complete this lab.
Lab Topology
This module contains supporting materials for Security+.
802.11a
This runs at 54 Mbps and is not compatible with 802.11b as it
operates at the 5 GHz band. This standard was the first amendment
of the original legacy IEEE 802.11 standard (1997) improving data
rates from up to 2 Mbps of the original standard. It can cover an
indoor area ranging from 35m to 125m.
802.11b
This provides a range of 150 feet and is the oldest standard still in
use and supported by wireless routers. This is widely supported by
wireless devices. IEEE 802.11b provides data rates of up to 11
Mbps using the 2.4 GHz band. This standard provides lower
maximum data rates, but a greater range than the 802.11a
standard since the 2.4 GHz frequencies used are not as readily
absorbed by walls and obstacles as the 5 GHz frequencies used in
802.11a are.
802.11g
This is supported by all wireless devices and network equipment
today and is an economical option for buying a wireless access
point. 802.11g is the same speed as 802.11a, however, it has a
longer range of 170 feet and supports the 2.4 GHz frequency band.
IEEE 802.11g provides data rates of up to 54 Mbps. This functions
in the 2.4 GHz band (like 802.11b) but uses the same Orthogonal
Frequency-Division Multiplexing (OFDM)-based transmission
scheme as 802.11a. Since the wireless keyboard also operates at
2.4 GHz band, it is likely to cause interference with the 802.11b
network.
802.11n
This is faster than 802.11g and supported by network devices.
802.11n has a network speed of 600 Mbps and a maximum range of
230 feet. This standard uses multiple input/multiple output (MIMO)
and may cause interference with nearby 802.11b/g networks.
802.11n has a higher price point than 802.11g.
802.11ac
This offers a speed of 1.33 Gigabits and a similar range to 802.11n
(230 feet). IEEE 802.11ac is an amendment that improves upon the
previous IEEE 802.11 standards. Characteristics of this standard
include the introduction of wider channels (80 or 160 MHz
compared to 40 MHz for 802.11n) in the 5 GHz band, more spatial
streams (up to 8), and the addition of Multi-User MIMO (MU-
MIMO). 802.11ac is capable of transmitting data at 1300 Mbps
(megabits per second) or 162.5 Mbps (megabytes per second).
In this exercise, you will learn about wireless networks and their
security.
Learning Outcomes
After completing this exercise, you should have further knowledge
of:
Cryptographic Protocols
Authentication Protocols
Methods
Installation Considerations
Your Devices
This exercise contains supporting materials for Security+.
Cryptographic Protocols
IV Size: 48-bits
The key advantage of SAE is that each time the session key is
uniquely generated. If one key is compromised, the other sessions
are not impacted.
Authentication Protocols
IEEE 802.1X
IEEE 802.1X uses port-based network access control. When a
device attempts to connect to the network, it authenticates the
device and then opens a virtual port on the wireless access point.
However, if authentication fails, then the device is not allowed to
access the network. Essentially, there are three components that
play a critical role:
After a secure tunnel is created, the suppliant can use the user
credentials to authenticate itself with the authentication server.
Because the tunnel is secured, it prevents any type of attack, such
as eavesdropping, to take place for intercepting the user
credentials.
Methods
In the pre-shared mode, the client and the wireless access point
must exchange and negotiate a key before the communication can
begin. It does not utilize the RADIUS server as the communication
is directly between the client and the wireless access point. In the
open mode, there is no authentication and is unsecured. It is usually
used in public wireless access points where there is no access to
the sensitive data.
In the open mode, there is no authentication performed when a user
attempts to connect to the wireless network. User simply selects
the network and connects to it without providing a password.
First, you have to press the WPS button, which enables the wireless
devices discovery. From the device, such as a mobile phone or
printer, you have to select the SSID of the wireless network, after
which device can automatically connect to it. There is no need to
provide a password.
Captive Portals
You may have visited to a hotel or the airport lounge where you get
free wireless connectivity. However, these wireless networks are
not open, which means they are secured by taking a password as an
input. However, the process of captive portal differs. When you
connect to a captive portal, you are prompted to accept the
Acceptable Usage Policy (AUP) document, which is to ensure that
you do not misuse the Internet connectivity for illegal activities.
After a user accepts the policy, he is allowed to access the wireless
network.
A captive portal may also prompt for the mobile number on which
the user credentials are sent. Once the credentials are fed into the
captive portal, the user is allowed to access the Internet. However,
the user still has to accept the AUP.
Installation Considerations
Site Surveys
Conducting a site survey is typically the first step in implementing a
wireless network. A site survey helps to determine where to place
Wi-Fi access points for the maximum coverage while minimizing the
number of access points needed for that coverage. It also reveals
the location of signal interference from other Radio Frequency (RF)
sources as well as interference caused by physical obstacles.
With the help of site survey you need to figure out the suitability of
installing WAPs. With the layout of the building, you would be able
to determine the number of WAPs required. You would also be able
to determine the type of antennas that may be suitable. For
example, should you use the unidirectional antennas if the signals
have to be sent to a single direction. If the building has several
rooms, then this point becomes critical in deciding the number of
WAPs that are required.
Another point that you need to explore in site survey is the number
of users who would be connecting to the wireless network. If it is a
large room with a big crowd, then you may need more than one
WAP to handle to load. Other point that you need to explore is the
type of ceiling because this would help you determine the mounting
hardware for the WAPs.
Manual site survey can help you determine several of these factors.
However, you can explore the possibility of using software like
Survey Pro that can help you decide the location of the WAPs.
Heat Maps
When you install a WAP, you may want to verify the coverage of the
wireless network. In a building, there can be a possibility that
several areas, whether they are far away or have interfering
objects, such as walls, do not receive signals. Without using a heat
map, it is not possible to find the areas that have either good or bad
coverage. For examples, wireless network signals are often blocked
by walls, ceilings, wireless radios, or even other wireless networks.
You can use software to generate a heat map to detect the signal
strengths.
You can explore dead zones, which do not receive any wireless
signals. If there are such areas, then you may either move the WAP
to another location or install a wireless network range extender,
which can be located near the dead zones. It will catch the WAP
signals and further broadcast them, which increases the wireless
network range.
WiFi Analyzers
Just like an Ethernet or wired network, you also need to analyze the
wireless network on regular basis. You may have the wireless
network installed and configured, but you cannot be sure whether it
is providing the best performance. With a Wi-Fi analyzer, you can
analyze its performance and review several parameters, such as:
SSID
Signal strength
Minimum, maximum, and average signal strength
Channel and band being used
Figure 1.1 Screenshot of NetSpot: Showing the status of various
wireless networks.
Channel Overlays
Different wireless networks have different speeds. However, most
commonly 2.4 GHz radio band is used in wireless networks. The 2.4
GHz is divided into 11 channels. Most channels overlay or overlap
with others, but channels 1, 6, and 11 do not overlay or overlap
with the other channels.
If these points are not considered, then you play the WAP in an
inappropriate location.
Keep all devices that you have powered on in their current state
Review
Well done, you have completed the Implementing Wireless
Security Configurations Practice Lab.
Summary
You completed the following exercises:
Cryptographic Protocols
Authentication Protocols
Methods
Installation Considerations
Feedback
Shutdown all virtual machines used in this lab. Alternatively, you