Implementing Security for Wireless Networks Presenter Name Job Title Company Session Prerequisites Hands-on experience with Microsoft® Windows® server and client operating systems and Active Directory® Basic understanding of wireless LAN technology Basic understanding of Microsoft® Certificate Services Basic understanding of RADIUS and remote access protocols Level 300 Agenda Overview of Wireless Solutions Securing a Wireless Network Implementing a Wireless Network Using Password Authentication Configuring Wireless Network Infrastructure Components Configuring Wireless Network Clients Identifying the Need to Secure a Wireless Network When designing security for a wireless network consider: Network authentication and authorization Data protection Wireless access point configuration Security management The abuse of Wireless Networks is growing! Common Security Threats to Wireless Networks Security Threats Include: Disclosure of confidential information Unauthorized access to data Impersonation of an authorized client Interruption of the wireless service Unauthorized access to the Internet Accidental threats Unsecured home wireless setups Unauthorized WLAN implementations Understanding Wireless Network Standards and Technologies Standard 802.11 802.11a 802.11b 802.11g Description A base specification that defines the transmission concepts for Wireless LANs Transmission speeds up to 54 megabits (Mbps) per second 11 Mbps Good range but susceptible to radio signal interference 54 Mbps Shorter ranges than 802.11b 802.1X - a standard that defines a port-based access control mechanism of authenticating access to a network and, as an option, for managing keys used to protect traffic Wireless Network Implementation Options Wireless network implementation options include: Wi-Fi Protected Access with Pre-Shared Keys (WPA-PSK) Wireless network security using Protected Extensible Authentication Protocol (PEAP) and passwords Wireless network security using Certificate Services Choose the Appropriate Wireless Network Solution Passwords Used for Client Authentication Typical Data Encryption Method None NO YES Uses WPA encryption key to authenticate to network WPA Small to medium organization Internet Authentication Services (IAS) Certificate required for the IAS server NO However, a certificate is issued to validate the IAS server YES WPA or Dynamic WEP Medium to large organization Internet Authentication Services (IAS) Certificate Services YES NO Certificates used but may be modified to require passwords WPA or Dynamic WEP Typical Environment Wi-Fi Protected Access with Pre-Shared Keys (WPA-PSK) Small Office/Home Office (SOHO) Password-based wireless network security Certificate-based wireless network security Additional Infrastructure Components Required? Certificates Used for Client Authentication Wireless Network Solution Agenda Overview of Wireless Solutions Securing a Wireless Network Implementing a Wireless Network Using Password Authentication Configuring Wireless Network Infrastructure Components Configuring Wireless Network Clients Understanding Elements of WLAN Security To effectively secure a wireless network consider: Authentication of the person or device connecting to the wireless network Authorization of the person or device to use the WLAN Protection of the data transmitted over the WLAN Audit WLAN Access Providing Effective Authentication and Authorization Standard Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) Protected Extensible Authentication ProtocolMicrosoft-Challenge Handshake Authentication Protocol v2 (PEAP-MS-CHAP v2) Tunneled Transport Layer Security (TTLS) Description Uses public key certificates to authenticate clients A two-stage authentication method using a combination of TLS and MSCHAP v2 for password authentication A two-stage authentication method similar to PEAP Microsoft does not support this method Protecting WLAN Data Transmissions Wireless data encryption standards in use today include: Wired Equivalent Privacy (WEP) Dynamic WEP, combined with 802.1X authentication, provides adequate data encryption and integrity Compatible with most hardware and software devices (How is this a “wired equivalent”?! Trust me: WEP sucks) http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html Wi-Fi Protected Access (WPA) Changes the encryption key with each packet Uses a longer initialization vector Adds a signed message integrity check value Incorporates an encrypted frame counter (WPA is only if you are serious about security) Alternative Approaches to Encrypt WLAN Traffic Alternatives used to protect WLAN traffic include the use of: Virtual Private Network (VPN) Internet Protocol Security (IPSec) System Requirements for Implementing 802.1X Components Requirements Client devices Windows XP and Pocket PC 2003 provide built-in support Microsoft provides an 802.1X client for Windows 2000 operating systems RADIUS/IAS and certificate servers Windows Server 2003 Certificate Services and Windows Server 2003 Internet Authentication Service (IAS) are supported Wireless access points At a minimum, should support 802.1X authentication and 128-bit WEP for data encryption Guidelines for Securing Wireless Networks Require data protection for all wireless communications Require 802.1X authentication to help prevent spoofing, wardrivers, and accidental threats to your network Use software scanning tools to locate and shut down rogue access points on your corporate network Agenda Overview of Wireless Solutions Securing a Wireless Network Implementing a Wireless Network Using Password Authentication Configuring Wireless Network Infrastructure Components Configuring Wireless Network Clients Components Required to Implement PEAP-MS-CHAP v2 Components Wireless Client Explanation Requires a WLAN adapter that supports 802.1X and dynamic WEP or WPA encryption User and computers accounts are created in the domain Must support 802.1X and dynamic WEP or WPA encryption Wireless Access Point The wireless access point and RADIUS server have a shared secret to enable them to securely identify each other Uses Active Directory to verify the credentials of WLAN clients RADIUS/IAS Server Makes authorization decisions based upon an access policy May also collect accounting and audit information Certificate installed to provide server authentication Design Criteria for PEAP-MS-CHAP v2 Solution Security Requirements Scalability Availability Platform Support Extensibility Standards Conformance How 802.1X with PEAP and Passwords Works Wireless Access Point Wireless Client 1 Radius (IAS) Client Connect 2 Client Authentication Server Authentication Key Agreement 4 WLAN Encryption Key Distribution Authorization 5 Internal Network 3 Identifying the Services for the PEAP WLAN Network Branch Office IAS/DNS/DC Headquarters LAN Primary Secondary Access Points Secondary IAS/CA/DC Access Points LAN IAS/DNS/DC Primary DHCP WLAN Clients WLAN Clients • • • • • Domain Controller (DC) RADIUS (IAS) Certification Authority (CA) DHCP Services (DHCP) DNS Services (DNS) Agenda Overview of Wireless Solutions Securing a Wireless Network Implementing a Wireless Network Using Password Authentication Configuring Wireless Network Infrastructure Components Configuring Wireless Network Clients Preparing the Environment Install the WLAN Scripts using: Microsoft WLAN-PEAP.msi Install the additional tools on the IAS servers: Group Policy Management Console CAPICOM DSACLs.exe The .MSI is on the DVD you’ll get today! Preparing the Environment Creating Security Groups demo Installing CAPICOM Configuring the Network Certification Authority The CA is used to issue Computer Certificates to the IAS Servers To install Certificate Services, log on with an account that is a member of: Enterprise Admins Domain Admins Consider that Certificate Services in Window Server 2003 Standard Edition does not provide: Auto enrollment of certificates to both computers and users Version 2 certificate templates Editable certificate templates Archival of keys Reviewing the Certification Authority Installation Parameters Certificate Templates Available: Computer (Machine) Drive and path of CA request files: C:\CAConfig Length of CA Key: 2048 bits Validity Period: 25 years Validity Period of Issued Certificates: 2 years CRL Publishing Interval: 7 days CRL Overlap Period: 4 days Installing the Certification Authority 1. Run MSSsetup CheckCAenvironment 2. Run MSSsetup InstallCA 3. Run MSSsetup VerifyCAInstall 4. Run MSSsetup ConfigureCA 5. Run MSSSetup ImportAutoenrollGPO 6. Run MSSsetup VerifyCAConfig (*You can do all this in the GUI….but why?) Configuring the Certification Authority Configuring Post-Installation Settings demo Importing the Automatic Certificate Request GPO Verifying the Configuration - Configuring Internet Authentication Services (IAS) IAS uses Active Directory to verify and authenticate client credentials and makes authorization decisions based upon configured policies. IAS configuration categories include: IAS Server Settings IAS Access Policies RADIUS Logging Reviewing IAS Configuration Parameters IAS parameters that are to be configured include: IAS Logging to Windows Event Log IAS RADIUS Logging Remote Access Policy Remote Access Policy Profile Installing the IAS Server 1. Run MSSsetup CheckIASEnvironment 2. Run MSSsetup InstallIAS 3. Register the IAS server into Active Directory 4. Restart server to automatically enroll the IAS server certificate 5. Configure logging and the remote access policy 6. Export IAS settings to be imported to another server Configuring the IAS Server Validating the IAS Environment Verifying IAS Server Certificate Deployment demo Post-Installation Configuration Tasks Modifying the WLAN Access Policy Profile Settings Verifying the Connection Request Policy for WLAN Exporting the IAS Settings - Configuring Wireless Access Points 1. Run MssTools AddRadiusClient 2. Run MssTools AddSecRadiusClients 3. Configure the Wireless Access Points Wireless Access Point Configuration Parameters Configure the basic network settings such as : IP configuration of the access point Friendly name of the access point Wireless network name (SSID) Typical Settings for a Wireless Access Point include: Authentication parameters Encryption parameters RADIUS authentication RADIUS accounting Wireless Access Point Configuration demo Adding Access Points to the Initial IAS Server Configuring Wireless Access Points Agenda Overview of Wireless Solutions Securing a Wireless Network Implementing a Wireless Network Using Password Authentication Configuring Wireless Network Infrastructure Components Configuring Wireless Network Clients Controlling WLAN Access Using Security Groups IAS enables you to control access to the wireless network using Active Directory security groups that are linked to a specific remote access policy Security Group Default Members Wireless LAN Access Wireless LAN Users Wireless LAN Computers Wireless LAN Users Domain Users Wireless LAN Computers Domain Computers Configuring Windows XP WLAN Clients 1. Install required patches and updates 2. Create the WLAN client GPO using GPMC 3. Deploy the WLAN settings Reviewing WLAN Client Parameters Parameter Group to allow WLAN access Group to allow WLAN access for users Group to allow WLAN access for computers Setting Wireless LAN Access Wireless LAN Users Wireless LAN Computers WLAN GPO Name WLAN Client Settings GPO filtering security group Wireless LAN Computer Settings Wireless network policy name Windows XP WLAN Client Settings (PEAP-WEP) WLAN network name (SSID) Northwind (change this to your SSID) EAP type PEAP PEAP authentication method Secured Password (EAP-MSCHAP v2) PEAP fast reconnect Enabled Creating the WLAN Client Settings GPO demo Create a WLAN Client GPO Using the GPMC Session Summary There are bad people out there who want your WLAN, but you can deploy this securely! Determine your organization’s wireless requirements Require 802.1X authentication Implement the PEAP and Passwords solution for organizations that do not utilize a PKI infrastructure Use the scripts provided by the PEAP and Passwords solution Use security groups and Group Policy to control WLAN client access