wiley & sons - building secure wireless networks with 802.11.pdf

(6083 KB) Pobierz
Building Secure Wireless Networks with 802
Building Secure Wireless Networks with 802.11
1363099.001.png
Table of Contents
Building Secure Wireless Networks with 802.11............................................................................1
Introduction........................................................................................................................................4
Who Should Read This Book...................................................................................................4
What You Need to Know..........................................................................................................5
How This Book Is Organized...................................................................................................5
Part I: Introduction to Wireless Local Area Networks (LANs).......................................................8
Chapter Lis..............................................................................................................................8
Part Overview.....................................................................................................................8
Chapter 1: Networking Basics........................................................................................................10
Highlights...............................................................................................................................10
Development of Computer Networks: An Overview...............................................................10
Network Types.......................................................................................................................13
Peer−to−Peer Networks...................................................................................................13
Local Area Networks (LANs)............................................................................................13
Wide Area Networks (WANs)...........................................................................................14
Personal Area Networks (PANs)......................................................................................15
The Interne......................................................................................................................15
Virtual Private Networks (VPNs)......................................................................................16
Network Topologies...............................................................................................................16
Three Commonly Used Topologies..................................................................................16
Choosing the Right Topology...........................................................................................18
Network Hardware and Software...........................................................................................18
Networking Components..................................................................................................19
Networking Software........................................................................................................26
Networking Protocol: TCP/IP...........................................................................................27
Putting It All Together............................................................................................................29
Summary................................................................................................................................30
Chapter 2: Wireless LANs...............................................................................................................31
Highlights...............................................................................................................................31
Evolution of Wireless LANs: An Overview.............................................................................31
A Basic Wireless LAN............................................................................................................32
Basic Architecture of a Wireless LAN....................................................................................33
Wireless LAN Adapters....................................................................................................33
Access Points (APs.........................................................................................................39
Wireless LAN Configurations.................................................................................................40
Ad−Hoc Mode..................................................................................................................40
Infrastructure Mode..........................................................................................................40
Distribution Service Systems (DSSs)...............................................................................40
Existing Wireless LAN Standards..........................................................................................42
IEEE 802.11.....................................................................................................................42
IEEE 802.11 b..................................................................................................................42
IEEE 802.11 a..................................................................................................................42
HomeRF...........................................................................................................................42
Bluetooth..........................................................................................................................42
Are Wireless LANs Risks to Health?......................................................................................43
Security Risks........................................................................................................................43
i
Table of Contents
Chapter 2: Wireless LANs
Summary................................................................................................................................43
Chapter 3: The Institute of Electrical and Electronics Engineers (IEEE) 802.11 Standards.....44
Overview................................................................................................................................44
History of IEEE.......................................................................................................................44
IEEE 802 Wireless Standards................................................................................................45
The 802.11 Working Group..............................................................................................45
The 802.15 Working Group..............................................................................................45
The 802.16 Working Group..............................................................................................46
The 802.11 Family of Standards............................................................................................46
The 802.11 Standard Details...........................................................................................46
802.11 Security................................................................................................................48
Operating Modes..............................................................................................................49
Roaming...........................................................................................................................50
The 802.11 Extensions..........................................................................................................50
802.11b............................................................................................................................50
802.11 a...........................................................................................................................52
802.11g............................................................................................................................53
802.11 Shortcomings.............................................................................................................54
Wireless Standards Comparison...........................................................................................55
Summary................................................................................................................................55
Chapter 4: Is Wireless LAN Right for You?...................................................................................56
Benefits of Wireless LANs.....................................................................................................56
Deployment Scenarios...........................................................................................................57
Small Office Home Office (SoHo)....................................................................................57
Enterprise.........................................................................................................................58
Wireless Internet Service Providers (WISPs...................................................................59
Costs Associated with Wireless LANs...................................................................................61
SoHo................................................................................................................................61
Enterprise.........................................................................................................................61
WISPs..............................................................................................................................61
Deployment Issues................................................................................................................61
SoHo................................................................................................................................61
Enterprise.........................................................................................................................62
WISPs..............................................................................................................................62
Security..................................................................................................................................62
Health Concerns....................................................................................................................63
Summary................................................................................................................................63
Part II: Secure Wireless LANs........................................................................................................64
Chapter Lis............................................................................................................................64
Part Overview...................................................................................................................64
Chapter 5: Network Security...........................................................................................................65
Overview................................................................................................................................65
Network Operational Security................................................................................................65
Physical Security..............................................................................................................66
Common Network Attacks on Operational Security...............................................................71
ii
Table of Contents
Chapter 5: Network Security
External Network Attacks.................................................................................................71
Internal Network Attacks..................................................................................................76
Network Data Security...........................................................................................................77
Resident−Data or File Security........................................................................................78
Protecting Data Using Cryptographic Primitives..............................................................78
Network Data Transmission and Link Security......................................................................79
Securing Network Transmission......................................................................................80
Summary................................................................................................................................86
Chapter 6: Securing the IEEE 802.11 Wireless LANs...................................................................87
Wireless LAN Security Requirements....................................................................................87
Wireless LAN Operational Security Requirements..........................................................88
Wireless LAN Data Security.............................................................................................90
The Institute of Electrical and Electronics Engineers (IEEE) 802.11 Standard Security........90
Service Set Identifiers (SSID)..........................................................................................91
Wired Equivalent Privacy (WEP) Protocol.......................................................................91
IEEE 802.11 WEP Protocol Weaknesses and Shortcomings................................................95
The Future of 802.11 Standard Security................................................................................96
Common Security Oversights................................................................................................96
Using Default or Out−of−the−Box Security......................................................................96
Using Fixed Shared Keys.................................................................................................97
Using Far−Too−Strong Radio Signals.............................................................................97
Extending Wireless LAN Security..........................................................................................97
The 802.1X Authentication Protoco.................................................................................97
Virtual Private Networks (VPNs)......................................................................................99
Securing Wireless LAN........................................................................................................100
User Authentication........................................................................................................101
Data Confidentiality and Privacy....................................................................................101
Wireless LAN Passwords and Usage Policies...............................................................102
Frequent Network Traffic and Usage Analysis...............................................................102
Summary..............................................................................................................................102
Part III: Building Secure Wireless LANs......................................................................................103
Chapter Lis..........................................................................................................................103
Part Overview.................................................................................................................103
Chapter 7: Planning Wireless LANs.............................................................................................104
Overview..............................................................................................................................104
Step 1: Understanding Your Wireless LAN Needs..............................................................104
Step 2: Planning the Scope of Rollout.................................................................................106
Step 3: Performing Site Survey............................................................................................106
Considering the Geographic Coverage Area.................................................................107
Per−Site Security Requirements....................................................................................107
Profiling Wireless LAN Users and Devices....................................................................107
Step 4: Setting Up Requirements and Expectations............................................................108
Network Bandwidth and Speed......................................................................................108
Coverage Area and Range of Wireless LANs................................................................108
Security..........................................................................................................................109
Step 5: Estimating the Required Wireless LAN Hardware and Software.............................109
iii
Table of Contents
Chapter 7: Planning Wireless LANs
Basic Wireless LAN Hardware.......................................................................................109
Software.........................................................................................................................111
Conventional Hardware Requirements for Various Deployment Scenarios...................112
Step 6: Evaluating the Feasibility of Wireless LANs and the Return on Investment
(ROI)...................................................................................................................................113
Step 7: Communicating the Final Plan with Higher Executives and Potential Users...........114
An Example of Wireless LAN Planning: Bonanza Corporation............................................114
Step 1: Bonanza Wireless LAN Needs..........................................................................114
Step 2: Planning the Rollou...........................................................................................115
Step 3: Site Survey........................................................................................................115
Step 4: Setting Up Requirements and Expectations......................................................116
Step 5: Estimating the Required LAN Hardware and Software......................................117
Step 6: Evaluating the Feasibility of Wireless LANs and Estimating Return on
Investment (ROI).....................................................................................................117
Step 7: Communicating the Wireless LAN Deployment Plan with Executives...............118
Summary..............................................................................................................................118
Chapter 8: Shopping for the Right Equipment...........................................................................119
Overview..............................................................................................................................119
Making Your Wireless LAN Equipment Shopping List.........................................................119
Explore the LAN Technologies Available in the Market.......................................................120
Wireless LAN Technologies...........................................................................................120
Wired LAN Ethernet Equipment Technologies...............................................................120
Virtual Private Network (VPN) Gateways and Clients....................................................121
Remote Authentication Dial−in User Service (RADIUS) Server....................................121
Wireless LAN Supporting Operating Systems...............................................................121
Major 802.11 Equipment Vendors and Their Products........................................................122
Cisco Systems...............................................................................................................122
Agere Systems/ORiNOCO.............................................................................................124
Linksys...........................................................................................................................126
NetGea..........................................................................................................................127
Xircom/Intel Corporation................................................................................................129
Decide Your Shopping Parameters.....................................................................................132
Shopping for LAN Equipment..............................................................................................132
Shopping on the Interne................................................................................................132
Shopping Using Mail−Order Catalogs............................................................................134
Shopping at a Local Computer Hardware or Office Supply Store..................................134
Shopping Tips......................................................................................................................134
Summary..............................................................................................................................135
Chapter 9: Equipment Provisioning and LAN Setup..................................................................136
Before We Start...................................................................................................................136
Identifying the Wireless LAN Components..........................................................................136
Wireless LAN Adapters..................................................................................................137
Wireless LAN Access Points (APs)................................................................................138
Wireless LAN Antennas.................................................................................................139
Networking Support Servers..........................................................................................139
Setting Up a Wireless LAN for the 802.11 Infrastructure Mode...........................................139
Setting Up a Wireless LAN Access Poin.......................................................................140
iv
Zgłoś jeśli naruszono regulamin