Why Wireless? What Makes Wireless Networks Different a Network by Any Other Name

Total Page:16

File Type:pdf, Size:1020Kb

Why Wireless? What Makes Wireless Networks Different a Network by Any Other Name 802.11® Wireless Networks The Definitive Guide By Matthew Gast ............................................... Publisher: O'Reilly Pub Date: April 2005 ISBN: 0-596-10052-3 Pages: 656 Table of Contents | Index As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain. The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start. This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on: deployment considerations network monitoring and performance tuning wireless security issues how to use and select access points network monitoring essentials wireless card configuration security issues unique to wireless networks With wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence. 802.11® Wireless Networks The Definitive Guide By Matthew Gast ............................................... Publisher: O'Reilly Pub Date: April 2005 ISBN: 0-596-10052-3 Pages: 656 Table of Contents | Index Copyright Foreword Preface Prometheus Untethered: The Possibilities of Wireless LANs Audience Overture for Book in Black and White, Opus 2 Conventions Used in This Book How to Contact Us Safari Enabled Acknowledgments Chapter 1. Introduction to Wireless Networking Why Wireless? What Makes Wireless Networks Different A Network by Any Other Name... Chapter 2. Overview of 802.11 Networks IEEE 802 Network Technology Family Tree 802.11 Nomenclature and Design 802.11 Network Operations Mobility Support Chapter 3. 802.11 MAC Fundamentals Challenges for the MAC MAC Access Modes and Timing Contention-Based Access Using the DCF Fragmentation and Reassembly Frame Format Encapsulation of Higher-Layer Protocols Within 802.11 Contention-Based Data Service Frame Processing and Bridging Chapter 4. 802.11 Framing in Detail Data Frames Control Frames Management Frames Frame Transmission and Association and Authentication States Chapter 5. Wired Equivalent Privacy (WEP) Cryptographic Background to WEP WEP Cryptographic Operations Problems with WEP Dynamic WEP Chapter 6. User Authentication with 802.1X The Extensible Authentication Protocol EAP Methods 802.1X: Network Port Authentication 802.1X on Wireless LANs Chapter 7. 802.11i: Robust Security Networks, TKIP, and CCMP The Temporal Key Integrity Protocol (TKIP) Counter Mode with CBC-MAC (CCMP) Robust Security Network (RSN) Operations Chapter 8. Management Operations Management Architecture Scanning Authentication Preauthentication Association Power Conservation Timer Synchronization Spectrum Management Chapter 9. Contention-Free Service with the PCF Contention-Free Access Using the PCF Detailed PCF Framing Power Management and the PCF Chapter 10. Physical Layer Overview Physical-Layer Architecture The Radio Link RF Propagation with 802.11 RF Engineering for 802.11 Chapter 11. The Frequency-Hopping (FH) PHY Frequency-Hopping Transmission Gaussian Frequency Shift Keying (GFSK) FH PHY Convergence Procedure (PLCP) Frequency-Hopping PMD Sublayer Characteristics of the FH PHY Chapter 12. The Direct Sequence PHYs: DSSS and HR/DSSS (802.11b) Direct Sequence Transmission Differential Phase Shift Keying (DPSK) The "Original" Direct Sequence PHY Complementary Code Keying High Rate Direct Sequence PHY Chapter 13. 802.11a and 802.11j: 5-GHz OFDM PHY Orthogonal Frequency Division Multiplexing (OFDM) OFDM as Applied by 802.11a OFDM PLCP OFDM PMD Characteristics of the OFDM PHY Chapter 14. 802.11g: The Extended-Rate PHY (ERP) 802.11g Components ERP Physical Layer Convergence (PLCP) ERP Physical Medium Dependent (PMD) Layer Chapter 15. A Peek Ahead at 802.11n: MIMO-OFDM Common Features WWiSE TGnSync Comparison and Conclusions Chapter 16. 802.11 Hardware General Structure of an 802.11 Interface Implementation-Specific Behavior Reading the Specification Sheet Chapter 17. Using 802.11 on Windows Windows XP Windows 2000 Windows Computer Authentication Chapter 18. 802.11 on the Macintosh The AirPort Extreme Card 802.1X on the AirPort Chapter 19. Using 802.11 on Linux PCMCIA Support on Linux Linux Wireless Extensions and Tools Agere (Lucent) Orinoco Atheros-Based cards and MADwifi 802.1X on Linux with xsupplicant Chapter 20. Using 802.11 Access Points General Functions of an Access Point Power over Ethernet (PoE) Selecting Access Points Cisco 1200 Access Point Apple AirPort Chapter 21. Logical Wireless Network Architecture Evaluating a Logical Architecture Topology Examples Choosing Your Logical Architecture Chapter 22. Security Architecture Security Definition and Analysis Authentication and Access Control Ensuring Secrecy Through Encryption Selecting Security Protocols Rogue Access Points Chapter 23. Site Planning and Project Management Project Planning and Requirements Network Requirements Physical Layer Selection and Design Planning Access-Point Placement Using Antennas to Tailor Coverage Chapter 24. 802.11 Network Analysis Network Analyzers Ethereal 802.11 Network Analysis Checklist Other Tools Chapter 25. 802.11 Performance Tuning 802.11 Performance Calculations Improving Performance Tunable 802.11 Parameters Chapter 26. Conclusions and Predictions Standards Work Current Trends in Wireless Networking The End glossary About the Author Colophon Index 802.11® Wireless Networks: The Definitive Guide, Second Edition by Matthew S. Gast Copyright © 2005 Matthew S. Gast. All rights reserved. Printed in the United States of America. Published by O'Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O'Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Mike Loukides Production Editor: Colleen Gorman Cover Designer: Ellie Volckhausen Interior Designer: David Futato Printing History: April 2002: First Edition. April 2005: Second Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly Media, Inc. 802.11® Wireless Networks: The Definitive Guide, Second Edition, the image of a horseshoe bat, and related trade dress are trademarks of O'Reilly Media, Inc. 802.11® and all 802.11-based trademarks and logos are trademarks or registered trademarks of IEEE, Inc. in the United States and other countries. O'Reilly Media, Inc. is independent of IEEE. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O'Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. ISBN: 0-596-10052-3 [M] Foreword Matthew Gast was my mentor long before I met him. I began reporting on wireless data networking in October 2000 when I discovered that Apple's claims for its 802.11b-based AirPort Base Station were actually true. I'd been burned with another form of wireless networking that used infrared, and had spent many fruitless hours using other "interesting" networking technologies that led to dead ends. I figured 802.11b was just another one. Was I glad I was wrong! This discovery took me down a path that led, inexorably, to the first edition of 802.11 Wireless Networks. How did this stuff actually work as advertised? I knew plenty about the ISO model, TCP/IP, and Ethernet frames, but I couldn't reconcile a medium in which all parties talked in the same space with what I knew about Ethernet's methods of coping with shared contention. Matthew taught me through words and figures that I didn't originally understand, but returned to again and again as I descended further into technical detail in my attempts to explain Wi-Fi to a broader and broader audience through articles in The New York Times, The Seattle Times, PC World, and my own Wi-Fi Networking News (http://www.wifinetnews.com) site over the last five years. I starting learning acronyms from 802.11 Wireless Networks and used Matthew's book to go beyond
Recommended publications
  • Secure Device Bootstrapping with the Nimble out of Band Authentication Protocol
    Raghavendra Mudugodu Seetarama Secure Device Bootstrapping with the Nimble Out of Band Authentication Protocol School of Electrical Engineering Thesis submitted for examination for the degree of Master of Science in Technology. Espoo 14.05.2017 Thesis supervisor: Prof. Tuomas Aura Thesis advisor: Mohit Sethi, D.Sc. (Tech.) aalto university abstract of the school of electrical engineering master’s thesis Author: Raghavendra Mudugodu Seetarama Title: Secure Device Bootstrapping with the Nimble Out of Band Authentication Protocol Date: 14.05.2017 Language: English Number of pages: 8+63 Department of Computer Science Professorship: Secure Systems Code: S-55 Supervisor: Prof. Tuomas Aura Advisor: Mohit Sethi, D.Sc. (Tech.) The smart personal and business appliances which form the Internet of Things are expected to become ubiquitous and to make our daily life more convenient. Most of these devices are connected though wireless networks to cloud-based online ser- vices. However, such devices may be vulnerable to various attacks which could compromise the users’ security and privacy and even cause physical harm. There- fore, securing the network connection for the devices is of utmost importance. In order to secure the network connections, the devices need to be configured with the necessary keys and other connection parameters. There is not yet any widely adopted generic solution for this secure bootstrapping. One proposed solution is out-of-band (OOB) authentication with a protocol called EAP-NOOB, which is a new method for the EAP and IEEE 802.1X authentication framework. The goal of this thesis is to build a prototype of the EAP-NOOB protocol and deploy the prototype to test it with the real-world scenarios.
    [Show full text]
  • Radiator EAP-SIM Support
    June 16, 2016 Radiator EAP-SIM, EAP-AKA Radiator and EAP-AKA’ Support Copyright (C) 2003-2016 Open System Consultants Pty. Ltd. White paper discussing EAP-SIM, EAP-AKA and EAP-AKA’ authentication support for Radiator. For Radiator SIM support version 2.0 1.0 Introduction This document describes the EAP-SIM, EAP-AKA and EAP-AKA’ authentication stan- dard for Wireless LANs, and outlines the support for EAP-SIM, EAP-AKA and EAP- AKA’ authentication available with Radiator, the full source Radius server from Open System Consultants (www.open.com.au/radiator). Note: See the separate Radiator 3GPP AAA Server white paper for more information about using Radiator as a 3GPP AAA Server. Radius is the de-facto standard protocol for authenticating users and for recording accounting information for wireless and wired LANs. See RFCs 2865 and 2866 for more details on the Radius protocol. EAP is the Extensible Authentication Protocol, which can be used to create new types of authentication protocols for Radius. See RFCs 3748 and 2869 for more details on EAP authentication for Radius. These new types of authentication are commonly used in Wireless LAN systems. EAP-SIM is an EAP authentication protocol, designed for use with existing GSM mobile telephone authentication systems and SIMs (Subscriber Identity Modules) for mobile phones. The EAP-SIM standard allows Wireless LAN users to authenticate access to a Wireless LAN network using a mobile phone SIM card. EAP-AKA is an EAP authentication protocol, designed for use with 3GPP authentica- tion system and USIM (Universal Subscriber Identity Modules) cards for mobile phones.
    [Show full text]
  • Migrating Your LAN to IEEE 802.1X
    Migrating Your LAN to IEEE 802.1X Gaweł Mikołajczyk [email protected] Consulting Systems Engineer, Emerging Markets East CCIE #24987, CISSP-ISSAP Session Objectives At the end of the session, you should understand: • How 802.1X works • The benefits of deploying 802.1X • How to configure and deploy 802.1X using Cisco switches, ACS 5.1 and various supplicants. • How to integrate existing technologies such as IP telephony, guest access, PXE, etc • The value and application of deployment scenarios • How to make this work when you get back to your lab You should also: • Provide us with feedback! Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 2 Identity and Authentication Overview Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Why Identity Is Important Who are you? 1 802.1X (or supplementary method) Keep the authenticates the user Outsiders Out Where can you go? Keep the 2 Based on authentication, user is Insiders placed in correct VLAN Honest What service level to you receive? Personalize 3 The user can be given per-user the Network services (ACLs today, more to come) What are you doing? Increase 4 The user‘s identity and location can Network be used for tracking and accounting Visibility Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 4 IEEE 802.1X: The Foundation of Identity EAP over LAN RADIUS R A (EAPoL) D I U S Supplicant Authenticator (802.1X Client) (e.g. Switch, Authentication Access Point) Server IEEE 802.1 working group standard Provides port-based access control using authentication Enforcement via MAC- Defines encapsulation for based filtering and port- Extensible Authentication state monitoring Protocol (EAP) over IEEE 802 media— ―EAPoL‖ Presentation_ID © 2009 Cisco Systems, Inc.
    [Show full text]
  • Understanding WPA Supplicant
    Understanding WPA Supplicant Chaitanya Ganoo 08-03-2009 Introduction • Q: What is WPA Supplicant? • It is the IEEE 802.1X/WPA component in the client stations. • Q: What is wpa_supplicant? • It is an implementation of the WPA Supplicant component from the HostAP project. • Runs on Linux, BSD, MAC OS X and Windows. • In nature, it is a daemon program and acts as the backend component controlling wireless connection (in the client). • Q: What are the alternatives to wpa_supplicant? • XSupplicant from the Open1X project. • Microsoft Windows XP+ and Mac OS X have built-in pre-compiled supplicants. • Aegis (now CSSC- Cisco Secure Services Client) by Cisco. • Odyssey by Juniper networks. • SecureW2 by SecureW2 Introduction The bigger picture: • HostAP project aims to transform linux boxes into clients, Access Points and Authentication Servers supporting IEEE 802.11i • Code written by Jouni Malinen. 1. hostAP Linux driver for Conexant (formerly Intersil) Prism chipsets. 2. wpa_supplicant runs on clients which can typically be laptop computers or embedded systems. 3. Hostapd is a user space daemon for APs and Authentication Servers. Functionality Q: What does wpa_supplicant exactly do? 1. Requests kernel driver to scan neighboring BSSes. 2. Selects a BSS based on its configuration. 3. Request kernel driver to associate with the chosen BSS. 4. If WPA -PSK : Uses PSK as MSK. 5. If WPA-Enterprise: Integrated IEEE 802.1X Supplicant completes EAP authentication with the Authentication server (proxied by the Authenticator) and through this MSK is received form the IEEE 802.1X supplicant. 6. Now wpa_supplicant completes 4–Way Handshake and Group Key Handshake with the authenticator.
    [Show full text]
  • Non-Binary Authentication: Supplicant
    Non-binary Authentication: Supplicant HENGCHONG ZHANG KTH Information and Communication Technology Master of Science Thesis Stockholm, Sweden 2009 COS/CCS 2009-01 Non-binary Authentication: Supplicant Hengchong Zhang [email protected] Supervisor and Examiner: Professor Gerald Q. Maguire Jr. Master of Science Thesis Department of Communication Systems School of Information and Communication Technology Royal Institute of Technology (KTH) Stockholm, Sweden February 24th, 2009 Abstract There are a number of authentication methods for wireless local area networks. The IEEE 802.1x standard is one such method. This standard specifies a port-based access control protocol. There are three entities involved: a supplicant (a device that wishes to have network access and perhaps other services), an Access Point (AP) or other port to which access is to be controlled, and an Authentication Server (AS). The goal of this project was to design, implement, and evaluate a prototype of a non-binary alternative to IEEE 802.1x authentication. This report focuses on the supplicant. Specifically it describes the design, implementation, and evaluation of a supplicant program to test and stress the authenticator, in order to evaluate a non-binary authentication process. Following, a brief introduction is given to the problem that is to be solved, a number of existing IEEE 802.1x supplicants are described and compared. Following this, a number of potential non-binary authentication processes are analyzed. The ability of a supplicant to send and receive packets before and after authentication is also examined. Based upon our implementation and evaluation of a supplicant and an emulation of the non-binary authentication process, we conclude that non-binary authentication is both feasible and valuable.
    [Show full text]
  • The SU1X 802.1X Configuration Deployment Tool
    Published on Jisc community (https://community.jisc.ac.uk) Home > Network and technology service docs > eduroam > Info for sys admins and implementers > The SU1X 802.1X Configuration Deployment Tool The SU1X 802.1X Configuration Deployment Tool The SU1X 802.1X Configuration Deployment Tool Configuring Windows supplicant software is not technically a difficult task, even with the additional complication of including details about an institutional RADIUS server certificate or certificate distribution. However users are generally students and staff who don’t have much knowledge about or interest in wireless networks or login mechanisms. For such users, configuring devices properly for use on 802.1X networks can be difficult. Due to the nature of the many different configuration options, step by step instruction guides, even with screen- shots, can be quite daunting for the average user who does not wish to know about wireless ciphers; username including realm; domain blank; roaming identity; authentication type: EAP TTLS/PAP, EAP TTLS/MSCHAP, PEAP/MSCHAPv2; RADIUS server certificate validation; RADIUS server name. A major step has now been taken towards solving at least this latter problem of wide scale deployment of 802.1X configuration on Windows devices. Janet is pleased to have supported the development of the open source SU1X 802.1X Configuration Deployment Tool developed by Gareth Ayres at Swansea University in association with Loughborough University. The SU1X Tool is now for available for general use by network managers and can be freely downloaded, complete with comprehensive documentation. [1] The zip file contains a package including: two executables su1x-setup.exe and getprofile.exe; readme file; User Guide; Case Study.
    [Show full text]
  • 802.1X Port-Based Authentication HOWTO 1
    802.1X Port-Based Authentication HOWTO 1 802.1X Port-Based Authentication HOWTO Lars Strand 2004-08-18 Revision History Revision 1.0 2004-10-18 Revised by: LKS Initial Release, reviewed by TLDP. Revision 0.2b 2004-10-13 Revised by: LKS Various updates. Thanks to Rick Moen for language Lars Strand 2 review. Revision 0.0 2004-07-23 Revised by: LKS Initial draft. This document describes the software and procedures to set up and use IEEE 802.1X Port-Based Network Access Control using Xsupplicant as Supplicant with FreeRADIUS as a back-end Authentication Server. ----- Table of Contents 1. Introduction 1.1. What is 802.1X? 1.2. What is 802.11i? 1.3. What is EAP? 1.4. EAP authentication methods 1.5. What is RADIUS? 2. Obtaining Certificates 3. Authentication Server: Setting up FreeRADIUS 3.1. Installing FreeRADIUS 3.2. Configuring FreeRADIUS 4. Supplicant: Setting up Xsupplicant 4.1. Installing Xsupplicant Lars Strand 3 4.2. Configuring Xsupplicant 5. Authenticator: Setting up the Authenticator (Access Point) 5.1. Access Point 5.2. Linux Authenticator 6. Testbed 6.1. Testcase 6.2. Running some tests 7. Note about driver support and Xsupplicant 8. FAQ 9. Useful Resources 10. Copyright, acknowledgments and miscellaneous 10.1. Copyright and License 10.2. How this document was produced 10.3. Feedback 10.4. Acknowledgments A. GNU Free Documentation License A.1. PREAMBLE A.2. APPLICABILITY AND DEFINITIONS Lars Strand 4 A.3. VERBATIM COPYING A.4. COPYING IN QUANTITY A.5. MODIFICATIONS A.6. COMBINING DOCUMENTS A.7. COLLECTIONS OF DOCUMENTS A.8.
    [Show full text]
  • 802.1X Port-Based Authentication HOWTO
    802.1X Port−Based Authentication HOWTO Lars Strand <lars strand (at) gnist org> 2004−08−18 Revision History Revision 1.0 2004−10−18 Revised by: LKS Initial Release, reviewed by TLDP. Revision 0.2b 2004−10−13 Revised by: LKS Various updates. Thanks to Rick Moen <rick (at) linuxmafia com> for language review. Revision 0.0 2004−07−23 Revised by: LKS Initial draft. This document describes the software and procedures to set up and use IEEE 802.1X Port−Based Network Access Control using Xsupplicant as Supplicant with FreeRADIUS as a back−end Authentication Server. 802.1X Port−Based Authentication HOWTO Table of Contents 1. Introduction.....................................................................................................................................................1 1.1. What is 802.1X?................................................................................................................................1 1.2. What is 802.11i?...............................................................................................................................3 1.2.1. WEP.........................................................................................................................................3 1.2.2. 802.11i.....................................................................................................................................3 1.2.3. Key Management....................................................................................................................3 1.2.4. TSN (WPA) / RSN (WPA2)...................................................................................................5
    [Show full text]
  • Session Hijacking Attacks in Wireless Local Area Networks
    Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2004-03 Session hijacking attacks in wireless local area networks Onder, Hulusi Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/1641 MONTEREY, CALIFORNIA THESIS SESSION HIJACKING ATTACKS IN WIRELESS LOCAL AREA NETWORKS by Hulusi ONDER March 2004 Thesis Advisor: Geoffrey XIE Second Reader: John GIBSON Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED March 2004 Master’s Thesis 4. TITLE AND SUBTITLE: Session Hijacking attacks in Wireless Local Area 5. FUNDING NUMBERS Networks 6. AUTHOR Hulusi ONDER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING Naval Postgraduate School ORGANIZATION REPORT Monterey, CA 93943-5000 NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING/MONITORING AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S.
    [Show full text]
  • Korisničko Uputstvo Za Instalaciju I Podešavanje Securew2 Programa
    Korisničko uputstvo za instalaciju i podešavanje securew2 programa za pristup eduroam servisu Termin supplicant se koristi u IEEE 802.1X standardu. U širem značenju, ovaj termin predstavlja entitet (korisnik ili uređaj) koji zahteva da bude autentifikovan u datom sistemu. U praksi, supplicant je program koji je instaliran na korisnikovom računaru. Korisniku je potreban supplicant program kako bi na siguran način pristupio datim mrežnim resursima i uz pomoć neophodnih podataka (npr. korisničkog imena i lozinke) izvršio proces autentifikacije. Supplicant program je u većini slučajeva neophodan, jer standardne distribucije operativnih sistema nemaju podršku za korišćenje protokola koji omogućavaju visok stepen zaštite pri komunikaciji. Supplicant programi koji su danas najviše u upotrebi su: SecureW2 (napravljen od strane SecuereW2 organizacije), Aegis (Cisco), Odyssey (Juniper Networks), wpa_supplicant i Xsupplicant. SecureW2 U ovom dokument biće opisan rad sa SecureW2 programom koji trenutno pruža podršku samo za Windows platformu (Windows XP Service Pack 2 (minimum), Windows Vista, Windows 7 i Windows Mobile). SecureW2 EapSuite je projekat koji dodaje EAP (Extensible Authentication Protocol ) metode na Windows platformu. Sigurnost korišćenja EAP metoda sastoji se u stvaranju TLS (Transport Layer Security ) tunela između korisnika i servera koji vrši autentifikaciju. Dati tunel se stvara pre slanja korisnikovih identifikacionih podataka (korisničko ime i lozinka), čime se postiže zaštita poslatih identifikacionih podataka. Takođe je moguće i verifikovati autentifikacioni server na osnovu datih sertifikata. Trenutno, EAP Suite podržava sledeće protokole: EAP-TTLS, EAP-GTC, EAP-PEAP (verzije 0 i 1) i EAP-SIM. Za AMRES korisnike, obezbeđena je verzija Securew2 programa sa određenim predefinisanim parametrima specifičnim za AMRES eduroam servis. Ova verzija programa se može preuzeti na adresi www.eduroam.ac.rs/downloads/SecureW2_AMRES.exe .
    [Show full text]
  • Mobile Ad-Hoc Wireless Access in Academia (MAWAA) Project
    Mobile Ad-Hoc Wireless Access in Academia (MAWAA) Project Towards Seamless Wireless Mobility for UK Academic Networks Project Summary Report 3: Deployment Experience Editor: Dr T J Chown School of Electronics and Computer Science, University of Southampton, Southampton, SO17 1BJ, United Kingdom [email protected] Version 1.0 30 June 2004 The MAWAA project was funded by the Joint Information Systems Committee (JISC) Mobile Ad-Hoc Wireless Access in Academia (MAWAA) Report 3: Deployment Experience Contents 1 INTRODUCTION ...................................................................................................3 1.1 MAWAA PROJECT REPORTS............................................................................... 3 1.2 DEPLOYMENT EXPERIENCE................................................................................. 3 2 CHOICE OF DEPLOYMENT TECHNOLOGY.....................................................4 2.1 ORIGINAL SYSTEM ............................................................................................. 4 2.2 WLAN TECHNOLOGY DISCUSSION ...................................................................... 4 2.2.1 Simplicity...................................................................................................4 2.2.2 Cost...........................................................................................................5 2.2.3 Roaming support ........................................................................................6 2.2.4 IPv6 support...............................................................................................6
    [Show full text]
  • IEEE 802.1X Implementation at Janet-Connected Organisations
    Published on Jisc community (https://community.jisc.ac.uk) Home > Advisory services > Wireless Technology Advisory Service > Guides > IEEE 802.1X implementation at Janet- connected organisations IEEE 802.1X implementation at Janet- connected organisations IEEE 802.1X implementation at Janet-connected organisations 022 (04/08) This document was produced to share knowledge, experience and current developments surrounding campus 802.1X implementation within the JANET community. Readers are assumed to have a basic knowledge of networking concepts and preventive security awareness. A companion technical guide Security Matters is available [1]. Scope and Audience Providing network access within large organisations is at best challenging and at worst near impossible. Users want the ability to be able to start up their operating system and have instantaneous network access. However this is usually in conflict with the organisational need to prevent unauthorised access to the network and also to provide accountability of users actions. An IEEE standard 802.1X [2] see provides a mechanism for network port access control and manages the process of authenticating and authorising attached devices by extending the EAP protocol over the network. Network access ports can take various forms such as: a network socket, switch port, or wireless access point. EAP (Extensible Authentication Protocol) is a powerful tool in the network administrator’s tool box for providing flexible network access through authentication, authorisation and accounting. EAP is an authentication framework which provides multiple methods for authentication (Aboba, Blunk, Vollbrecht, Carlson, & Levkowetz, 2004 [3]). Through the use of 802.1X and 802.11i, EAP can be used to provide enterprise network access control (NAC) for both wireless and wired networks.
    [Show full text]