Wireless security by the numbers

 

Connecting state and local government leaders

Battening down a wireless LAN means keeping track of a lot of moving parts; here's how to get what you need.

Like other types of information technology, wireless networks offer a mix of benefits and security threats. While the potential threats are enough to make security officers cringe, the user benefits are enough to make them lay out their own cash to set up access. Like it or not, agencies had better be prepared to install and secure a wireless LAN or people will start looking to deploy one of their own.'You are battling the fact that people can purchase and deploy a wireless network easily,' said Stan Gatewood, information security officer for the University of Georgia at Athens. 'They can go downtown and buy an access point for under $50.'Then there's the matter of securing mobile devices that access a WLAN. Don Rhodes, a civilian IT specialist at Fort Dix, N.J., said soldiers coming to the base for training prior to deploying to the Middle East expect to use their personal computers for both work and sending an e-mail home to their parents. The choices are either strictly police users' computer habits or, as Rhodes is doing, make the WLAN itself secure.'Even if you tell them not to, users are going to use their personal PCs to conduct government business,' Rhodes said. 'We would rather have a network that has some security on it rather than a wide-open system like we had before.'Earlier this year, the Agriculture and Defense departments released directives on securing wireless LANs. Whether or not you work for those agencies, both documents provide a good overview of the steps anyone should take in procuring and deploying a secure wireless network.Securing a wired or a wireless network involves a mix of hardware, software, policies and training. In setting up a system, however, an agency needs to consider the end-to-end network and ensure that all pieces work together. For example, if different parts of the WLAN are operating on disparate encryption schemes, the network will default to the lowest standard.'If you're using an older security standard such as WPA (Wireless Protected Access) or multimode security, you are only as secure as your weakest link,' said Peter Firstbrook, research director in information security and privacy for Gartner Inc. of Stamford, Conn.Similarly, unless the agency is providing client hardware to all potential users, the WLAN must accommodate a wide variety of connecting devices without compromising security.'Many solutions are vendor-specific to the client device and therefore are not protecting everything over a wide range of clients,' cautioned Sonny Gutierrez, LAN/WAN security specialist for CDW Government in Herndon, Va.The wireless policies from DOD and USDA both take an end-to-end view of wireless networks. While the directives differ in specifics, they also address certain common areas that are applicable to securing any wireless network. These include:Following standards. Wireless systems must comply with the IEEE 802.11 family of wireless standards.Encryption. Data must be encrypted in transit. 802.11i is the IEEE standard and federal standards are covered under Federal Information Processing Standards 140-2 (FIPS-140-1 validation is no longer acceptable to DOD and USDA). Most wireless devices sold within the last year support these standards, but only if all components in the network are up to that standard.Authentication. The wireless standard for authentication is 802.1x, which incorporates the Extensible Authentication Protocol, an authentication method that also works on Ethernet and Token Ring networks.Interoperability. Not all equipment, even if built to the same standards, works together. The Wi-Fi Alliance tests and certifies equipment that meets 802.11 standards and interoperates. The Alliance classifies devices which meet both the 802.11i encryption standard and 801.1x authentication standard as being WPA2-certified. According to Michael Disabato, senior analyst for the Burton Group, 'WPA2 provides an enterprise-class security solution for user authentication and encryption.'Client security. Notebook PCs or other devices accessing the WLAN should be running a personal firewall that meets National Information Assurance Partnership Common Criteria standards. Companies such as Zone Labs LLC and Symantec Corp. offer centrally managed personal firewalls and antivirus programs for mobile devices. These let administrators lock down security settings. The security server will also scan devices to ensure the firewall and AV signatures are up-to-date before allowing clients to connect to the network.Wireless intrusion detection. Administrators must also be on the lookout for attempts at unauthorized access. In addition to the usual method of examining packets, sensors can be installed on a wireless network that detect mobile devices. One method is to set up a network of active or passive devices that detect RF frequencies and identify any unauthorized users.Some wireless access points are designed to switch between providing access and listening for intruders. When an unauthorized user or access point is detected, the management software should be able to evaluate the device's signal strength and pinpoint its location on a CAD drawing of the premises.[IMGCAP(2)]Gartner's Firstbrook recommends using passive sensors. 'A passive sensor is harder for the attacker to identify,' he said. 'It gives you the ability to monitor them without triggering their defenses.' AirDefense Inc. of Alpharetta, Ga., has hardware that will direct a packet flood at a rogue device to knock it off the network.Configuration management. Finally, no matter what hardware or software your agency installs, there is still a matter of correctly configuring the devices.[IMGCAP(2)]'The largest threat is misconfiguration or taking an access point out of the box and leaving the default settings in place,' said Alex Zaltsman, managing partner of Exigent Technologies LLC of Morristown, N.J. 'Default administrator passwords can be easily obtained by downloading a user manual and access points come with encryption disabled.'The client devices also need to be configured so they only access the official network, not some other signal that might bleed over into the office from a neighbor.'You don't want people jumping from WLAN to WLAN, you want them to be stuck to the WLAN you want them to use,' Firstbrook said. 'Unfortunately most of the WLAN drivers are very promiscuous; Microsoft will join any WLAN that is available.'Although there are general guidelines to setting up a secure wireless LAN, each system still needs to be designed to meet the business and security needs of the particular organization. Just as in the wired world, networks vary in terms of openness, flexibility and secrecy. When it's time for your agency to build out its WLAN, consider the following examples to see which most closely matches your requirements.WLAN 1: Maximum security: The Joint Forces Command's Joint Futures Lab in Suffolk, Va., set up a WLAN for mobile workers and guests in the three buildings on its campus. Users can access voice, video, data, Web sites and e-mail. The network has 130 access points and a 2-gigabit backbone supporting 802.11 a/b/g devices, and uses 802.16d wireless MAN (metropolitan area network) between buildings. The network employs a five-layer, defense-in-depth architecture and a wide array of security technologies, including Air Fortress encryption gateways from Fortress Technologies; Bluesocket wireless gateways and firewalls; AirDefense wireless IDS; virtual private networking over IPSec from Cisco Systems; and a wireless management platform from Airwave Wireless Inc. [for more, see GCN.com/676].Planned enhancements include full disk encryption, a Layer 2 VPN, policy enforcement agents and end-point management. Jared Judy, wireless network engineer, said that one of the biggest challenges was 'getting vendors to play together for integration purposes so administrators don't have to bounce between three, four or five different console screens to be able to monitor and manage the system.'WLAN 2: Public access network. The city of Burbank, Calif., last year set up a metropolitan wireless network covering its downtown areas. The square-mile hot spot uses ruggedized 802.11b/g access points from M-Gravity LLC of Torrance, Calif., which connect to a Proxim MP.11a system. A Bluesocket WG1100 wireless gateway controls bandwidth, session time limits and authentication. Internal security is tighter.'The city of Burbank uses wireless capabilities to extend the reach of the local area network to buildings not connected via fiber optics,' said Perry Jarvis, the city's chief information security officer. 'We run many mission-critical applications over our citywide wireless bridge network and offer free WiFi in many locations.'To protect the network, the city has multiple firewalls and intrusion detection/prevention appliances placed at key points around the network. 'The city uses many common security practices such as MAC [Media Access Control] filtering, encryption, hidden SSIDs [service set identifiers] and strong passwords to secure our wireless network,' Jarvis said.WLAN 3: For work and play. Don Rhodes is setting up a dual-purpose wireless network at Fort Dix. Troops training at the base will be able to use personal computers for public Internet access, and base staff will be able to use it for official business.'We are approaching the project from a security perspective as well as a business perspective, and I believe we have balanced both,' Rhodes said.Currently the system is undergoing evaluation, testing and certification, so no official business is being conducted over it. In the meantime, however, there are hundreds of morale, welfare and recreation users. Both categories of users share the same access points, which cover dormitory day rooms and outside spaces and provide network access to devices in buildings not connected to the fiber network. The wireless traffic goes through an Aruba 5000 controller where it's then routed to separate virtual LANs.'If you don't have FIPS encryption, the [Common Access Card] card and proper authentication, it won't let you onto the government network, it will send you to the Internet,' Rhodes said. Although it has not been approved yet, he feels it will meet the base's security needs. 'The Aruba controller gives us confidence that the traffic coming across our wired network is secure.'However your agency chooses to approach a wireless LAN, deploying the network involves balancing usability with the need to enforce security standards. It requires a complete analysis of the business needs and budget, as well as the technology to be used. See the accompanying checklist for questions you should ask when writing a request for wireless LAN proposals.If you do your homework and press your contractor partners to hew to an internal policy that you write up or model on other agencies', it's possible to create a wireless network that's as secure as a wired LAN.

LOCKDOWN: BlueSocket controllers authenticate wireless users.

Cisco makes a variety of controllers and wireless access points.











Common components



































Applying security principles




















Do your homework



X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.