Logo
CAR REVIEW
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
PREGNANCY
 
 
Windows Server

Windows Server 2003 : Designing a Security Infrastructure - Securing a Wireless Network

5/23/2011 6:21:04 PM
Wireless networking has existed for many years, but it is only recently, with the publication of the 802.11 series of standards by the Institute of Electrical and Electronics Engineers (IEEE), that wireless local area networking (WLAN) technologies have become mainstream products. WLANs enable home and business users to set up computer networks between places that were previously inaccessible, and enable portable computer users to roam freely while connected to the network. However, wireless networking creates unique security challenges that administrators must address.

Understanding Wireless Networking Standards

Until recently, wireless networking was based on standards defining physical layer technologies that, while reasonably effective, were much slower than the average network and not altogether reliable. These technologies were also expensive and difficult to implement. However, in 1999, the Institute of Electrical and Electronics Engineers (IEEE) released the first standard in the 802.11 working group, called “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” defining a new series of technologies for the WLAN physical layer. For the wireless networking industry, the key document in this series of standards was IEEE 802.11b, “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications—Amendment 2: higher-speed Physical Layer (PHY) extension in the 2.4 GHz band.”

The 802.11b standard defines a physical layer specification that enables WLANs to run at speeds up to 11 megabits per second (Mbps), slightly faster than a standard Ethernet network. When products conforming to this standard arrived on the market, they quickly became a popular solution, both for home and business use. Prices dropped accordingly and, for the first time, wireless networking became a major force in the industry.

Development continues on standards that are designed to provide even higher WLAN transmission speeds. The 802.11a standard, “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment 1: High-speed Physical Layer in the 5 GHz band” defines a medium with speeds running up to 54 Mbps, while 802.11g, “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications—Amendment 4: Further Higher Data Rate Extension in the 2.4 GHz Band,” calls for higher transmission speeds using the same 2.4 GHz frequencies as 802.11b.

See Also

For more information on IEEE standards, and to obtain the standards themselves, see the IEEE Web site at http://www.ieee.org.


Wireless Networking Topologies

In computer networking, the term topology typically refers to the pattern of the cables used to connect the computers. Wireless networks do not use cables, but they still have a topology, which defines how the wireless devices interact at the physical layer. At the physical layer, IEEE 802.11b WLANs use direct sequence spread spectrum communications at a frequency of 2.4 GHz, and the devices can communicate with each other using two basic topologies: ad hoc and infrastructure.

Off the Record

Cabled networks are sometimes referred to as bounded media, because their signals are confined to a given space, that is, the interior of the cable. Wireless networks are therefore called unbounded media, because their signals are not physically restricted in this way.


An ad hoc network consists of two or more wireless devices communicating directly with each other. The signals generated by WLAN network interface adapters are omnidirectional out to a range that is governed by environmental factors, as well as the nature of the equipment involved. This range is called a basic service area (BSA). When two wireless devices come within range of each other, as shown in Figure 1, they are able to connect and communicate, immediately forming a two-node network. Wireless devices within the same basic service area are called a basic service set (BSS).

Figure 1. An ad hoc network


Other wireless devices coming within the transmission range of the first two can also participate in the network. Ad hoc networking is not transitive, however. A wireless device that comes within range of another device, but still lies outside the range of a third, can only communicate with the device in its range.

Note

The ad hoc topology is most often used on home networks, or for very small business that have no cabled network components at all.


An infrastructure network uses a wireless device called an access point as a bridge between wireless devices and a standard cabled network. An access point is a small unit that connects to an Ethernet network (or other cabled network) by cable, but that also contains an 802.11b-compliant wireless transceiver. Other wireless devices coming within range of the access point are able to communicate with the cabled network, just as though they were connected by a cable themselves (see Figure 2). The access point functions as a transparent bridge, effectively extending the cabled local area network (LAN) to include the wireless devices.

Figure 2. An infrastructure network


Note

On an infrastructure network, wireless devices communicate only with the access point; they do not communicate with each other directly. Therefore, even if two wireless computers are within range of each other, they must still use the access point to communicate.


Most business networks use the infrastructure topology because it provides complete connectivity between wireless devices and the cabled network.

Understanding Wireless Network Security

Unlike bounded media, in which every device on the network must be physically connected to a cable for communication to occur, wireless networks transmit signals in all directions, and any compatible device coming within transmission range may be able to connect to the network. Depending on how many access points you have and where they are located, the boundary of your equipment’s effective range can easily fall outside a controllable area. For example, placing an access point near a building’s outer wall can enable an unauthorized user with a wireless-equipped laptop to access your network from a car parked outside the building.

For this reason, security should be a major concern for all wireless network installations. The two primary threats when it comes to wireless networking are as follows:

  • Unauthorized access An unauthorized user with a wireless workstation connects to the network and accesses network resources. This is the functional equivalent of a user connecting to a cabled network by plugging into an available jack or splicing into the cable, but on a wireless network, the process of making the network connection is much easier. On an infrastructure network, this type of attack compromises the entire network because the user may be able to access bounded as well as unbounded resources. To prevent unauthorized users from connecting to a wireless network, you must implement a system that authenticates and authorizes users before they receive significant access.

  • Data interception A user running a protocol analyzer with a wireless network interface adapter may be able to capture all the packets transmitted between the other wireless devices and the access point. In this case, the device can be as simple as a laptop running Microsoft Network Monitor with a network interface adapter that supports promiscuous mode operation. This type of attack endangers only the data transmitted over the air, but it also leaves no traces, so it is virtually undetectable. The only way to protect against this type of attack is to encrypt all packets transmitted over wireless connections. This does not prevent intruders from capturing the packets, but it does prevent them from reading the data inside.

Controlling Wireless Access Using Group Policies

Windows Server 2003 provides security capabilities for wireless networking in the form of group policies that you can use to restrict users’ wireless access to the network. In the Group Policy Object Editor console, you can create a policy in the Computer Configuration\Windows Settings\Security Settings\Wireless Network (IEEE 802.11) Policies subheading that enables you to specify whether wireless-equipped computers can connect to ad hoc networks only, infrastructure networks only, or both (see Figure 3).

Figure 3. The New Wireless Network Policy Properties dialog box


In the Preferred Networks tab, you can specify the networks to which users can connect and set properties for the IEEE 802.1X security protocol, such as which authentication protocol to use (see Figure 4). Using these group policy settings, you can configure the wireless networking properties for all the computers on your WLAN.

Figure 4. The New Preferred Setting Properties dialog box


Authenticating Users

You can use several methods to authenticate users attempting to connect to your WLAN and to prevent unauthorized access by outsiders. The IEEE 802.11 standard itself defines two methods: Open System authentication and Shared Key authentication, and Windows Server 2003 supports a third method, based on another standard called IEEE 802.1X.

Open System Authentication

Open System authentication is the default authentication method used by IEEE 802.11 devices, and it actually provides no authentication at all. Open System authentication is simply an exchange of messages in which one system identifies itself to another and the other system replies. There is no exchange of passwords, keys, or any other type of credential, and there is no way for a device configured to use Open System authentication to refuse authentication to another.

Shared Key Authentication

Shared Key authentication is a system by which wireless devices authenticate each other using a secret key that both possess. The key is assumed to have been shared before authentication using a secure channel independent of 802.11 communications to prevent it from being compromised during transmission. Shared Key authentication is not a particularly secure method because all the computers in the same BSS must possess the same key. Compromising the key on one system nullifies the authentication security for the entire BSS.

Important

Shared Key authentication requires the use of the Wired Equivalent Privacy (WEP) algorithm. If WEP is not implemented, Shared Key authentication is not available.


During a Shared Key authentication, messages are exchanged between the requester and the responder as follows:

  1. The system requesting authentication asserts its identity to the other system, using a message that contains a value that identifies the shared key (not the shared key itself) that the system is using.

  2. The system receiving the authentication request responds with a message containing the authentication result. If the authentication is successful, the response message includes a 128-byte block of challenge text generated by the WEP pseudo-random number generator.

  3. The requester copies the challenge text from the response message to a new message and encrypts it with WEP, using the shared key as an encryption key.

  4. The responder decrypts the message and compares the decrypted challenge text with the text the system transmitted in step 2. If the values match, the responder grants the authentication.

IEEE 802.1X Authentication

The IEEE 802.1X standard, “Port Based Network Access Control,” defines a method of authenticating and authorizing users connecting to an IEEE 802 LAN, and blocking those users’ access to the LAN should the authentication fail. IEEE 802.1X can authenticate users connecting to any type of LAN, such as Ethernet or Token Ring, but in this case, it is particularly valuable in the case of IEEE 802.11 wireless LANs.

Most IEEE 802.1X implementations function as clients of a server running a Remote Authentication Dial-In User Service (RADIUS), such as the Internet Authentication Service (IAS) included with Windows Server 2003. The RADIUS server provides centralized authentication and authorization services for the entire network; for WLAN authentication, RADIUS typically uses one of the following two authentication protocols:

  • Extensible Authentication Protocol-Transport Level Security (EAP-TLS)— EAP is an authentication protocol that is designed to be adaptable, so that it can carry a variety of authentication mechanisms within a given packet framework. TLS is an authentication mechanism that transports its messages within EAP packets and provides mutual authentication, integrity-protected negotiation of cryptographic service providers, and secret key exchange between two systems that use public key cryptography. The networks that use EAP-TLS typically have a public key infrastructure (PKI) in place and use certificates for authentication, that are stored on the computer or on smart cards.

  • Protected EAP-Microsoft Challenge Handshake Authentication Protocol, version 2 (PEAP-MS-CHAP v2)— PEAP is a variation on EAP that is designed for use on wireless networks that do not have a PKI in place. With PEAP, you can use a password-based authentication method, such as MS-CHAP, to securely authenticate wireless connections. PEAP creates an encrypted channel before the password-based authentication occurs. Therefore, password-based authentication exchanges such as those that occur in MS-CHAP v2 are not subject to offline dictionary attacks. (Put simply, an offline dictionary attack uses a brute force dictionary attack to make repeated attempts to decrypt captured packets that use an encryption key derived from a user’s password. This process is made easier for the intruder when the encryption key is derived from a weak password.)

Important

To use PEAP-MS-CHAP v2 for wireless network authentication, the wireless client must be running either Windows Server 2003 or Windows XP with SP1 installed.


With this system in place, an access point receiving a connection request from a wireless client forwards the request to the RADIUS server, which uses information in a data store, such as the Active Directory database, to determine whether the client should be granted access to the network.

Encrypting Wireless Traffic

To prevent data transmitted over a wireless network from being compromised through unauthorized packet captures, the IEEE 802.11 standard defines an encryption mechanism called Wired Equivalent Privacy (WEP). WEP is an encryption system that uses the RC4 cryptographic algorithm developed by RSA Security Inc. WEP depends on encryption keys that are generated by a mechanism external to WEP itself. In cases where WEP is used with IEEE 802.1X to create a comprehensive wireless security solution for the Windows operating system, WEP uses the keys generated by the EAP-TLS or PEAP-MS-CHAP v2 authentication protocol to encrypt the data in the packets.

Off the Record

Microsoft recommends using the WEP and IEEE 802.1X combination as a suitable security configuration for wireless clients running the Windows operating system.


The degree of protection that WEP provides is governed by configurable parameters that control the length of the keys used to encrypt the data and the frequency with which the systems generate new keys. Longer and more frequently changed keys produce better security.

Tip

Be sure you are familiar with the security hazards inherent in wireless networking, and with the mechanisms that Windows operating systems can use to authenticate wireless clients and encrypt their traffic.

Other -----------------
- Windows Server 2003 : Designing a Security Infrastructure - Planning a Security Update Infrastructure
- Windows Server 2008 : Network Addressing (part 3) - IPv4 to IPv6 Transitional Techniques
- Windows Server 2008 : Network Addressing (part 2) - Addressing IPv6
- Windows Server 2008 : Network Addressing (part 1) - Addressing and Subnetting IPv4
- Exchange Server 2010 : Implementing Compliance (part 4) - Implementing a Discovery Search & Creating and Configuring Ethical Walls
- Exchange Server 2010 : Implementing Compliance (part 3) - Using MailTips
- Exchange Server 2010 : Implementing Compliance (part 2) - Configuring Journaling
- Exchange Server 2010 : Implementing Compliance (part 1) - Configuring IRM
- Windows Server 2003 : Troubleshooting Name Resolution
- Windows Server 2003 : Planning DNS Security
- Windows Server 2003 : Implementing a NetBIOS Name Resolution Strategy
- BizTalk 2010 Recipes : Business Activity Monitoring - Deploying BAM Activities and Views
- BizTalk 2010 Recipes : Business Activity Monitoring - Creating BAM Activities and Views
- SharePoint 2010 Command Line Backup and Restore: Setting the Stage
- SharePoint 2010 Command Line Backup and Restore: Granular Backup and Restore via PowerShell
- SharePoint 2010 Command Line Backup and Restore: Reviewing Your Backup and Restore History
- Windows Server 2008 : Choosing Server Roles
- Windows Server 2008 : Overview of Site and Replication Topology
- Windows Server 2008 : Overview of Physical Requirements and Physical Topology
- Windows Server 2008 : Overview of Forest and Domain Trust Models
 
 
Most view of day
- Microsoft Project 2010 : Creating a Budget for Your Project (part 2) - Adding Values to Budget Resources, Pairing Resources with Budgets
- Windows Phone 8 : Configuring Basic Device Settings - Phone Storage
- Microsoft Systems Management Server 2003 : Analysis and Troubleshooting Tools - Using SMS Trace (part 1) - Obtaining SMS Trace
- Windows Phone 7 : The Silverlight Controls (part 3) - Line, Polyline, and Polygon Controls
- Microsoft Dynamics AX 2009 : Integration with Microsoft Office - Exporting data to Microsoft Project
- Editing Digital Video with Windows Live Movie Maker (part 6) - Editing Your Video - Trimming Video and Audio
- Windows Phone 8 : Phone-Specific Design (part 2) - Using the Panorama Control in Blend
- Windows Small Business Server 2011 : Disaster Planning - Preparing for a Disaster, Restoring from Backup
- Fine-Tuning MDT Deployments : Working with the MDT Database (part 3) - Filling the MDT Database Using PowerShell
- Microsoft Visio 2010 : Working with Text (part 3) - Text Resizing Behavior
Top 10
- Windows Phone 8 : Scheduled Tasks - Scheduled Task API Limitations
- Windows Phone 8 : Scheduled Tasks - Updating Tiles Using a Scheduled Task Agent
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 5) - Editing an Existing To-Do Item
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 4) - Creating the To-Do Item Shell Tile, Saving a To-Do Item
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 3) - Debugging Scheduled Tasks
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 2) - TodoService, TodoItemViewModel
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 1) - TodoItem,TodoDataContext
- Windows Phone 8 : Scheduled Tasks - Using Scheduled Tasks
- Windows Phone 8 : Scheduled Tasks - Background Agent Types
- Windows Phone 8 : Windows Phone Toolkit Animated Page Transitions - Reusing the Transition Attached Properties
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro