Transforming Your WiFi Network Into A Secure Wireless LAN A FORTINET WHITE PAPER Fortinet White Paper Introduction There have been a number of moments in the IT and network industry that can be considered as a “Paradigm Shift”. The personal computer, Ethernet over twisted pair, Digital Subscriber Line (DSL) and Voice over IP (VoIP) are just some of these. The introduction of Wireless LAN (WLAN) is certainly another one of these moments. The ability to cut loose from the tether of the Ethernet cable has revolutionized the workplace and completely changed the role and use of computers and other devices at home. But the time has come to look more closely at WLAN technology in the 21st century, a century full of user trends and cyber threats that are exploiting the rapid growth and deployment of WLANs and their inherent weaknesses. Attacks on enterprise networks are constantly increasing as are their level of sophistication and their success in passing through a network’s defenses. In such context, WLANs can no longer be treated as an “overlay” network that may or may not have some degree of integration with the primary wired network. To effectively combat today’s cyber threats, enterprise WLAN networks must be fully integrated into the overall network and protected by a robust, end-to-end security infrastructure. A Historical Perspective When compared with the traditional Local Area Network (LAN), WLANs come up short from a security perspective. This issue has nothing to do with technology but rather with history. Since the beginning of networking time, computers have been connected together by cables to form a LAN. In fact, the evolution of computers has been in lockstep with the evolution of LANs. As computers became cheaper, faster and smaller, the network has evolved as well, adding new features and capabilities including many elements of security that were integrated into the fabric of the network. Convenience, Convenience, Convenience Into this environment came the WLAN offering convenience and freedom. No matter where you went you could still be connected to the network, which brought an unprecedented level of convenience to users. Such convenience led WLAN technology to be rapidly adopted for facilitating access to the Internet from public places. Because the technology did not have any inherent security capabilities, most public WLANs adopted an approach of logging into a secure server to gain access to the Internet. For most network administrators, the requirement of needing some sort of login credentials was sufficient to control access to the network. It did not however keep a user off of the actual WLAN and a sufficiently skilled user could bypass the access control server. The risk, however, was limited to a loss of revenue, not a loss of data, and was considered acceptable. Eventually, a stronger security solution was developed through the introduction of a basic access control mechanism via a pre-shared key. Without the key it was not possible to connect to the WLAN. While flaws have been discovered, new versions of the mechanism have been developed and the majority of WLANs rely on this basic security strategy. The use of a pre-shared key alone cannot however be considered as a robust security solution. In a typical environment, the access key to the network is widely distributed and is rarely changed, automatically weakening its capability. Regardless of which version of the algorithm is used, as long as a pre-shared access key is used the problem remains the same - once the access code is compromised the network is no longer “secure”. Disparate Approach to WLAN Security WLAN solutions found a sweet spot in the consumer, Small Office/Home Office (SOHO) and small enterprise markets because they were cost effective, easy to use and their security limitations were acceptable. However, in order to be adopted by medium and large enterprises, they needed to evolve so that they could address the specific requirements of these markets, such as extended RF coverage, throughput, scalability and most importantly security. Unless the WLAN and its security mechanism could integrate into the existing security environment, medium and large enterprises would be slow to adopt it. Such integration had to happen at the network’s access layer. Indeed, large enterprises tend to regard the network as having separate Infrastructure and Access layers. This separation is the result of the evolution of the requirements and features of the two layers. Fortinet White Paper Access Layer SECURITY Infrastructure Layer Large Enterprise Small/Medium Enterprise Integration with Radius Authentication Server Standalone Pre-Shared Key Subsequently, access solutions for the large enterprise need to support both wired and wireless access. Once integrated into a unified access layer, the WLAN would benefit from integrated security infrastructure with simplified control and policy enforcement. As a result, a natural division occurred in the WLAN market based on market segments and the level of security required. Large enterprises required solutions that offered both a unified access layer and an inherent security mechanism that could integrate with the existing security architecture. As this type of enterprise-grade WLAN solution evolved so did its cost, putting it out of the reach of small to medium organizations. In order to take advantage of WLAN technology, these companies have thus been constrained to rely on lower-cost solutions with limited security capabilities. In spite of their costs, limitations and restrictions, companies of all sizes have widely adopted WLANs. Convenience, an ability to quickly respond to new connectivity requirements and the rapid growth in mobility applications are some of the factors that have driven their adoption. However, over the past two to three years, the significance of these limitations and restrictions has been driven home by a key trend in the market. From WiFi to a Secure Wireless LAN Securing the WLAN has never been as important as it is now. The primary reason for the increased scrutiny of the security capabilities of WLAN is not a change in purpose but rather a change in user behavior – the growing trend of using Wi-Fi equipped personal devices in the workplace known as Bring Your Own Device (BYOD). With the wide scale adoption of smart phones and tablets for accessing content anywhere and at anytime, employees are using their personal devices in the workplace not only for personal use but also for accessing corporate resources. While on the surface BYOD might seem as a way to promote productivity, there are a number of challenges with the use of these personal devices in a corporate setting. The first is the likely risk that the mobile device is infected with some sort of malware. Over the past several years, the rise of mobile malware has grown exponentially with the number of devices themselves. An infected device means that viruses, worms and other forms of malware may have bypassed the traditional security defenses of the organization and have infected corporate resources. The mobile device may also be part of a botnet under the control of a Command and Control server. If there is one infected device in the network, there is the very real possibility that there are multiple infected devices on the network. When activated, these devices will consume bandwidth, affecting end users and applications. Large Enterprise Small/Medium Enterprise Integrated Security & Secure Wireless LAN The second issue with an uncontrolled BYOD environment is that users access from their own devices their favorite applications and web sites while at work, which means lost productivity and wasted bandwidth.But the problems aren’t confined only to personal devices. Company supplied devices are equally susceptible. Trying to limit the use of mobile devices, whether personal or corporate, has shown to be ineffective. In such a context, there is an urgent need for a secure WLAN strategy that can address the security problems posed by BYOD, while being affordable for the small and medium enterprise and yet still meet the security requirements of the large enterprise. Such a strategy is based on a security-centric infrastructure approach. Fortinet White Paper The Fortinet Secure Wireless LAN Solution The Fortinet Secure Wireless LAN Solution starts with the premise that there is ONE network, regardless of how users are connected to it – wired access, wireless access or remote access. Integrated into the network’s fabric is a single, comprehensive security infrastructure with a common set of rules and policies that determine the level of access a user is granted, based on their needs, not by which access method they use. A Security Centric Infrastructure At the center of the solution is the FortiGate, Fortinet’s high performance, multi-function network security appliance. Built on an ASIC-based architecture, the FortiGate consolidates a number of different security functions onto a single platform – Firewall, Intrusion Prevention System (IPS), Anti-Virus and Anti-Spam are some of these. Because of this capability, the FortiGate is already the preferred choice of IT security professionals to simplify and reduce the cost of their network security solution. Complementing the FortiGate’s security capabilities is its ability to provide a unified access layer for all users. Working in conjunction with Fortinet’s security aware Ethernet switch, the FortiSwitch, the FortiGate provides a common set of authentication and network security policies to all Ethernet connected users. But the FortiGate is also designed to support the wireless component of the network through an integrated wireless controller and a wide range of wireless Access Points (FortiAP). The wireless controller is a standard feature of all FortiGate appliances and does not require any additional licensing. Once the appropriate model of FortiGate is chosen for the network, the only additional cost is the number and type of FortiAPs needed in the network. Fortinet White Paper For smaller deployments, the FortiGate is available with both the wireless controller and access point integrated into the appliance. A convenient and cost effective “allin-one” solution, the FortiWiFi is particularly well suited for branch offices, small enterprises or distributed environments such as retail and hospitality. For larger installations, which require a more extensive coverage area, Fortinet’s FortiAPs come in a variety of form factors and capabilities for both interior and exterior environments. They support mesh networking including the ability to provide a bridge between physically separate LAN segments over the mesh backhaul. Most FortiAPs also support Power over Ethernet (PoE), greatly simplifying deployment. Depending upon the scale of the installation and the model of FortiGate to be used, the PoE power source can either be the FortiGate itself or a FortiSwitch. The combination of the FortiWiFi, FortiGate and FortiAP products allow you to support a wide range of wireless network requirements, for both indoor and outdoor environments. Authentication and Identification With a single access layer in place, the focus is now on controlling who can access the network, regardless from where they’re connected – wireless, wired or remote. Although wired networks have always had authentication as part of their security architecture, typically it was only the large enterprise that was able to extend this feature to the WLAN. As described earlier, small and medium enterprises were forced to rely on the use of a pre-shared key to control access to the network. The Fortinet solution brings the benefit of authentication to all networks, regardless of size, due to its ability to integrate with a wide range of authentication systems. A long-standing issue with authentication remains in that a user may have to login multiple times during the course of the day. For example, the first login would be to the PC, then to the company intranet and then finally to whatever server he/she may need to access. The login process can be greatly simplified with the addition of Fortinet’s user identity management appliance, FortiAuthenticator. FortiAuthenticator interacts with any other authentication servers that may be in the network, acting as a central repository for user identification. In this role, FortiAuthenticator provides the ability to have a Single Sign On (SSO), improving the user experience by reducing the number of logins that a user must execute. FortiAuthenticator can also add strong authentication capabilities to the network such as 802.1x Port Access Control and Two-Factor Authentication, supporting both tokens and certificates. While authentication is absolutely necessary as part of an overall security architecture, it also serves a second important role – identification. By identifying users, either by their name or by device, it is then possible to apply a set of policies defining their resource access rights. Fortinet White Paper Policy, Control and Client Reputation As the central component in the security architecture, Fortinet’s FortiGate is the logical place to define and implement these policies. FortiGate’s operating system, FortiOS, is the core of Fortinet’s Smart Policies and Client Reputation capabilities. The evolution towards Advanced Targeted Attacks (ATA) has driven Fortinet to develop more intelligent security features to provide organizations with control and knowledge – ie. knowledge of who is connected to the network and the type of device being used. Based on this information, intelligent policies can be applied to the user, restricting access to parts of the network or applications as defined in the policy – for greater control. Identification is also crucial to the FortiOS client reputation capability. Client reputation is a real-time analysis of the users’ online behaviors compared to their predefined policy. Knowing when users are behaving in an unusual manner, as compared to their past known behaviour, is an excellent first warning alert of a potential threat, particularly in addressing Zero Day Threats. Definition of those policies and their distribution to the appropriate appliance is one of the many roles of FortiManager, Fortinet’s network management platform. FortiManager allows the network administrator to easily, centrally and effectively configure and manage the whole of the Fortinet solution from a single console. To reduce the complexity of managing a potentially large number of access points, FortiManager provides centralized management of all the FortiAPs on the network with detailed views of the clients connected to an individual AP and if any rogue APs have been detected in the network. SSID management and centralized firmware upgrades are also part of the FortiManager’s role in the Secure WLAN. While FortiManager provides a certain level of analysis and reporting, more in-depth capabilities are available when the FortiManager is integrated with FortiAnalyzer, Fortinet’s centralized logging, analysis and reporting platform. FortiAnalyzer is the central collection point for all security events that occur in the network transforming individual alarms and events into a cohesive and comprehensive view of the security state of the network. FortiAnalyzer also plays an important role in regulatory compliance through the Wireless PCI compliance report, providing detailed information on APs, clients, SSID, the type and number of devices and any rogue APs that have been detected on the network. Fortinet White Paper Summary Now that WLANs have become a standard part of an enterprise network and their role is becoming increasingly important due to BYOD, it is time to make sure that they have the same level of security and capabilities as the wired LAN. In fact, because of its ubiquity and relative ease of access, strong security of the WLAN should be a major priority for any network administrator. Cost Security Access The Fortinet Secure Wireless LAN Solution allows a network of any size to take advantage of wireless technology without compromising the network’s security by focusing on three key characteristics – A Unified Access Layer, Cost Effectiveness and Integrated Security. SECURE WIRELESS LAN Strong authentication, smart policies based on user identity and device identification and a sophisticated client reputation capability give not only the WLAN but the whole network the ability to effectively combat the increasingly sophisticated attacks that enterprise networks are constantly encountering. Fortinet White Paper About Fortinet Fortinet is a global provider of high-performance network security solutions that provide our customers with the power to protect and control their IT infrastructure. Our purpose-built, integrated security technologies, combined with our FortiGuard security intelligence services, provide the high performance and complete content protection our customers need to stay abreast of a constantly evolving threat landscape. More than 125,000 customers around the world - including the majority of the Global 1,000 enterprises, service providers and governments - are utilizing Fortinet’s broad and deep portfolio to improve their security posture, simplify their infrastructure, and reduce their overall cost of ownership. From endpoints and mobile devices, to the perimeter and the core - including databases, messaging and Web applications - Fortinet helps protect the constantly evolving networks in every industry and region around the world. AMERICAS HEADQUARTERS EMEA HEADQUARTERS APAC HEADQUARTERS 1090 Kifer Road Sunnyvale, CA 94086 United States Tel +1.408.235.7700 Fax +1.408.235.7737 www.fortinet.com/sales 120 rue Albert Caquot Sophia Antipolis France 06560 Tel +33.4.8987.0510 Fax +33.4.8987.0501 300 Beach Road 20-01 The Concourse Singapore 199555 Tel +65.6513.3734 Fax +65.6295.0015 www.fortinet.com Copyright© 2013 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, and FortiGuard®, are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance metrics contained herin were attained in internal lab tests under ideal conditions, and performance may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet's General Counsel, with a purchaser that expressly warrants that the identified product will perform according to the performance metrics herein. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet's internal lab tests. Fortinet disclaims in full any guarantees. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Fortinet White Paper