Lecure#5 - Local Area Network
Lecure#5 - Local Area Network
Wireless LAN
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Introduction to Wireless
Benefits of Wireless
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Introduction to Wireless
Types of Wireless Networks
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Introduction to Wireless
Wireless Technologies
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Introduction to Wireless
Wireless Technologies (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Introduction to Wireless
802.11 Standards
802.11 WLAN standards define how radio frequencies are used for wireless links.
IEEE Standard Radio Frequency Description
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Introduction to Wireless
Wireless Standards Organizations
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
5.2 WLAN Components
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
WLAN Components
• Wireless NICs
• Antennas
• Wireless Router
• Internet Port
• Wireless Access Point
• Autonomous and controller-based access points
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
WLAN Components
Wireless NICs
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
WLAN Components
Wireless Home Router
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
WLAN Components
Wireless Access Point
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
WLAN Components
AP Categories
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
WLAN Components
Wireless Antennas
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
WLAN Operation
802.11 Wireless Topology Modes
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
WLAN Operation
BSS and ESS
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
WLAN Operation
802.11 Frame Structure
The 802.11 frame format is similar to the Ethernet frame format, except that
it contains more fields.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
WLAN Operation
CSMA/CA
• WLANs are half-duplex and a client cannot “hear” while it is sending, making it
impossible to detect a collision.
• WLANs use carrier sense multiple access with collision avoidance (CSMA/CA) to
determine how and when to send data. A wireless client does the following:
1) Listens to the channel to see if it is idle, i.e. no other traffic currently on the channel.
2) Sends a ready to send (RTS) message the AP to request dedicated access to the
network.
3) Receives a clear to send (CTS) message from the AP granting access to send.
4) Waits a random amount of time before restarting the process if no CTS message
received.
5) Transmits the data.
6) Acknowledges all transmissions. If a wireless client does not receive an
acknowledgment, it assumes a collision occurred and restarts the process
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
WLAN Operation
Wireless Client and AP Association
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
WLAN Operation
Wireless Client and AP Association (Cont.)
• SSID – The client needs to know the name of the network to connect.
• Password – This is required for the client to authenticate to the AP.
• Network mode – The 802.11 standard in use.
• Security mode – The security parameter settings, i.e. WEP, WPA, or WPA2.
• Channel settings – The frequency bands in use.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
WLAN Operation
Passive and Active Discover Mode
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
CAPWAP Operation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
CAPWAP Operation
Introduction to CAPWAP
• Based on LWAPP but adds additional security with Datagram Transport Layer
Security (DLTS).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
CAPWAP Operation
Split MAC Architecture
The CAPWAP split MAC concept does all AP MAC Functions WLC MAC Functions
the functions normally performed by Beacons and probe Authentication
individual APs and distributes them responses
between two functional components: Packet Association and re-
acknowledgements association of roaming
and retransmissions clients
• AP MAC Functions Frame queueing and Frame translation to
• WLC MAC Functions packet prioritization other protocols
MAC layer data Termination of 802.11
encryption and traffic on a wired
decryption interface
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
CAPWAP Operation
DTLS Encryption
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
CAPWAP Operation
Flex Connect APs
FlexConnect enables the configuration and control of Aps over a WAN link.
There are two modes of option for the FlexConnect AP:
• Connected mode – The WLC is reachable. The FlexConnect AP has CAPWAP connectivity
with the WLC through the CAPWAP tunnel. The WLC performs all CAPWAP functions.
• Standalone mode – The WLC is unreachable. The FlexConnect AP has lost CAPWAP
connectivity with the WLC. The FlexConnect AP can assume some of the WLC functions such
as switching client data traffic locally and performing client authentication locally.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Channel Management
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Channel Management
Frequency Channel Saturation
• If the demand for a specific wireless channel is too high, the channel may become
oversaturated, degrading the quality of the communication.
• Channel saturation can be mitigated using techniques that use the channels more
efficiently.
§ Direct-Sequence Spread Spectrum (DSSS) - A modulation technique designed to spread
a signal over a larger frequency band. Used by 802.11b devices to avoid interference from
other devices using the same 2.4 GHz frequency.
§ Frequency-Hopping Spread Spectrum (FHSS) - Transmits radio signals by rapidly
switching a carrier signal among many frequency channels. Sender and receiver must be
synchronized to “know” which channel to jump to. Used by the original 802.11 standard.
§ Orthogonal Frequency-Division Multiplexing (OFDM) - A subset of frequency division
multiplexing in which a single channel uses multiple sub-channels on adjacent frequencies.
OFDM is used by a number of communication systems including 802.11a/g/n/ac.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Channel Management
Channel Selection
• The 2.4 GHz band is subdivided into multiple channels each allotted 22 MHz bandwidth
and separated from the next channel by 5 MHz.
• A best practice for 802.11b/g/n WLANs requiring multiple APs is to use non-overlapping
channels such as 1, 6, and 11.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Channel Management
Channel Selection (Cont.)
• For the 5GHz standards 802.11a/n/ac, there are 24 channels. Each channel is
separated from the next channel by 20 MHz.
• Non-overlapping channels are 36, 48, and 60.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Channel Management
Plan a WLAN Deployment
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
5.4 WLAN Threats
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
WLAN Threats
Wireless Security Overview
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
WLAN Threats
DoS Attacks
To minimize the risk of a DoS attack due to improperly configured devices and
malicious attacks, harden all devices, keep passwords secure, create backups, and
ensure that all configuration changes are incorporated off-hours.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
WLAN Threats
Rogue Access Points
• A personal network hotspot could also be used as a rogue AP. For example, a user
with secure network access enables their authorized Windows host to become a
Wi-Fi AP.
§ To prevent the installation of rogue APs, organizations must configure WLCs with rogue
AP policies and use monitoring software to actively monitor the radio spectrum for
unauthorized APs.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
WLAN Threats
Man-in-the-Middle Attack
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Secure WLANs
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Secure WLANs
SSID Cloaking and MAC Address Filtering
To address the threats of keeping wireless intruders out and protecting data, two early
security features were used and are still available on most routers and APs:
• SSID Cloaking - APs and some wireless routers allow the SSID beacon frame to
be disabled. Wireless clients must be manually configured with the SSID to
connect to the network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Secure WLANs
802.11 Original Authentication Methods
The best way to secure a wireless network is to use authentication and encryption
systems. Two types of authentication were introduced with the original 802.11
standard:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Secure WLANs
Shared Key Authentication Methods
There are currently four shared key authentication techniques available, as shown in
the table.
Authentication Method Description
Wired Equivalent Privacy The original 802.11 specification designed to secure the data using
(WEP) the Rivest Cipher 4 (RC4) encryption method with a static key. WEP
is no longer recommended and should never be used.
Wi-Fi Protected Access A Wi-Fi Alliance standard that uses WEP but secures the data with
(WPA) the much stronger Temporal Key Integrity Protocol (TKIP) encryption
algorithm. TKIP changes the key for each packet, making it much
more difficult to hack.
WPA2 It uses the Advanced Encryption Standard (AES) for encryption. AES
is currently considered the strongest encryption protocol.
WPA3 This is the next generation of Wi-Fi security. All WPA3-enabled
devices use the latest security methods, disallow outdated legacy
protocols, and require the use of Protected Management Frames
(PMF).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Secure WLANs
Authenticating a Home User
Home routers typically have two choices for authentication: WPA and WPA2, with
WPA 2 having two authentication methods.
• Personal – Intended for home or small office networks, users authenticate using a pre-
shared key (PSK). Wireless clients authenticate with the wireless router using a pre-
shared password. No special authentication server is required.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Secure WLANs
Encryption Methods
• Temporal Key Integrity Protocol (TKIP) – Used by WPA and provides support for
legacy WLAN equipment. Makes use of WEP but encrypts the Layer 2 payload
using TKIP.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Secure WLANs
Authentication in the Enterprise
Enterprise security mode choice requires an Authentication, Authorization, and
Accounting (AAA) RADIUS server.
Note: User authentication and authorization is handled by the 802.1X standard, which provides a
centralized, server-based authentication of end users.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Secure WLANs
WPA 3
Because WPA2 is no longer considered secure, WPA3 is recommended when
available. WPA3 Includes four features:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48