16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Implementing Advanced <strong>Wireless</strong> <strong>Security</strong> 537<br />

randomization is a fairly new practice. Another new addition is Cisco’s proprietary<br />

offering (now being used by many third-party vendors), Lightweight Extensible<br />

Authentication Protocol (LEAP).<br />

LEAP is one of approximately 30 different variations of the Extensible Authentication<br />

Protocol (EAP). Other variants include Extensible Authentication Protocol-Message Digest<br />

Algorithm 5 (EAP-MD5), Extensible Authentication Protocol-Transport Layer <strong>Security</strong><br />

(EAP-TLS), Extensible Authentication Protocol-Tunneled TLS (EAP-TTLS), and Protected<br />

Extenstible Authentication Protocol (PEAP). EAP allows other security products (such<br />

as LEAP) to be used to provide additional security to Point-to-Point Protocol (PPP) links<br />

through the use of special Application Programming Interfaces (APIs) that are built into<br />

operating systems and, in the case of the Cisco Aironet hardware, hardware device firmware.<br />

LEAP (also known as EAP-Cisco <strong>Wireless</strong>) uses dynamically generated WEP keys,<br />

802.1x port access controls, and mutual authentication to overcome the problems inherent<br />

in WEP. 802.1x is an access control protocol that operates at the port level between any<br />

authentication method (LEAP in this case) and the rest of the network. 802.1x does<br />

not provide authentication to users; rather, it translates messages from the selected<br />

authentication method into the correct frame format being used on the network. In the<br />

case of our example, the correct frame format is 802.11, but 802.1x can also be used on<br />

802.3 (Ethernet) and 802.5 (Token Ring) networks, to name a few. When you use 802.1x,<br />

the choice of the authentication method and key management method are controlled by<br />

the specific EAP authentication being used (LEAP in this case).<br />

NOTE<br />

RADIUS is defined by Requests for Comments (RFC) 2865. The behavior of<br />

RADIUS with EAP authentication is defined in RFC 2869. RFC can be searched and<br />

viewed online at www.rfc-editor.org . 802.1x is defined by the IEEE in the document<br />

located at http://standards.ieee.org/getieee802/download/802.1X-2001.<strong>pdf</strong> .<br />

LEAP creates a per-user, per-session dynamic WEP key that is tied to the network logon,<br />

thereby addressing the limitations of static WEP keys. Since authentication is performed<br />

against a back-end RADIUS database, administrative overhead is minimal after initial<br />

installation and configuration.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!