Foreword |
|
xxv | |
Introduction |
|
xxvii | |
Assessment Test |
|
xxxviii | |
Chapter 1 WLAN Security Overview |
|
1 | (28) |
|
|
3 | (9) |
|
International Organization for Standardization (ISO) |
|
|
3 | (1) |
|
Institute of Electrical and Electronics Engineers (IEEE) |
|
|
4 | (1) |
|
Internet Engineering Task Force (IETF) |
|
|
5 | (2) |
|
|
7 | (5) |
|
|
12 | (2) |
|
|
14 | (4) |
|
|
14 | (2) |
|
Authentication, Authorization, Accounting (AAA) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (3) |
|
802.11i Security Amendment and WPA Certifications |
|
|
18 | (2) |
|
Robust Security Network (RSN) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (2) |
|
|
24 | (5) |
Chapter 2 Legacy 802.11 Security |
|
29 | (32) |
|
|
30 | (5) |
|
Open System Authentication |
|
|
31 | (2) |
|
Shared Key Authentication |
|
|
33 | (2) |
|
Wired Equivalent Privacy (WEP) Encryption |
|
|
35 | (5) |
|
|
40 | (4) |
|
Virtual Private Networks (VPNs) |
|
|
44 | (5) |
|
Point-to-Point Tunneling Protocol (PPTP) |
|
|
46 | (1) |
|
Layer 2 Tunneling Protocol (L2TP) |
|
|
46 | (1) |
|
Internet Protocol Security (IPsec) |
|
|
47 | (1) |
|
Secure Sockets Layer (SSL) |
|
|
47 | (1) |
|
VPN Configuration Complexity |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
51 | (3) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
56 | (5) |
Chapter 3 Encryption Ciphers and Methods |
|
61 | (26) |
|
|
62 | (5) |
|
Symmetric and Asymmetric Algorithms |
|
|
63 | (2) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
68 | (2) |
|
|
70 | (2) |
|
|
70 | (2) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
73 | (5) |
|
|
76 | (2) |
|
|
78 | (1) |
|
Future Encryption Methods |
|
|
79 | (1) |
|
Proprietary Layer 2 Implementations |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
82 | (5) |
Chapter 4 802.1X/EAP Authentication |
|
87 | (64) |
|
WLAN Authentication Overview |
|
|
89 | (1) |
|
|
90 | (5) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
93 | (2) |
|
|
95 | (11) |
|
|
96 | (3) |
|
|
99 | (3) |
|
|
102 | (4) |
|
|
106 | (8) |
|
|
106 | (1) |
|
|
107 | (2) |
|
Protected Access Credentials (PACs) |
|
|
109 | (1) |
|
|
109 | (1) |
|
Smart Cards and USB Tokens |
|
|
110 | (2) |
|
|
112 | (2) |
|
802.1X/EAP and Certificates |
|
|
114 | (6) |
|
Server Certificates and Root CA Certificates |
|
|
115 | (4) |
|
|
119 | (1) |
|
|
120 | (1) |
|
Legacy Authentication Protocols |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (22) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
126 | (2) |
|
|
128 | (2) |
|
|
130 | (3) |
|
|
133 | (1) |
|
|
134 | (2) |
|
|
136 | (5) |
|
Miscellaneous EAP Protocols |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
142 | (2) |
|
|
144 | (1) |
|
|
144 | (2) |
|
|
146 | (5) |
Chapter 5 802.11 Layer 2 Dynamic Encryption Key Generation |
|
151 | (42) |
|
Advantages of Dynamic Encryption |
|
|
152 | (32) |
|
Robust Security Network (RSN) |
|
|
156 | (5) |
|
|
161 | (5) |
|
Authentication and Key Management (AKM) |
|
|
166 | (4) |
|
|
170 | (4) |
|
|
174 | (3) |
|
|
177 | (2) |
|
|
179 | (1) |
|
|
180 | (1) |
|
RSNA Security Associations |
|
|
181 | (1) |
|
Passphrase-to-PSK Mapping |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
184 | (2) |
|
|
186 | (7) |
Chapter 6 PSK Authentication |
|
193 | (22) |
|
|
194 | (14) |
|
Preshared Keys (PSK) and Passphrases |
|
|
195 | (5) |
|
|
200 | (1) |
|
|
201 | (2) |
|
|
203 | (2) |
|
Simultaneous Authentication of Equals (SAE) |
|
|
205 | (3) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
209 | (6) |
Chapter 7 802.11 Fast Secure Roaming |
|
215 | (42) |
|
History of 802.11 Roaming |
|
|
216 | (4) |
|
Client Roaming Thresholds |
|
|
217 | (1) |
|
|
218 | (2) |
|
|
220 | (7) |
|
|
221 | (3) |
|
|
224 | (1) |
|
|
225 | (2) |
|
Opportunistic Key Caching (OKC) |
|
|
227 | (3) |
|
|
230 | (1) |
|
|
231 | (12) |
|
|
235 | (1) |
|
FT Initial Mobility Domain Association |
|
|
236 | (2) |
|
Over-the-Air Fast BSS Transition |
|
|
238 | (1) |
|
Over-the-DS Fast BSS Transition |
|
|
239 | (4) |
|
|
243 | (3) |
|
|
246 | (1) |
|
|
247 | (1) |
|
|
248 | (2) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
251 | (2) |
|
|
253 | (4) |
Chapter 8 WLAN Security Infrastructure |
|
257 | (34) |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
259 | (1) |
|
Management, Control, and Data Planes |
|
|
259 | (2) |
|
|
260 | (1) |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
261 | (14) |
|
Autonomous WLAN Architecture |
|
|
261 | (2) |
|
Centralized Network Management Systems |
|
|
263 | (2) |
|
|
265 | (1) |
|
Centralized WLAN Architecture |
|
|
265 | (5) |
|
Distributed WLAN Architecture |
|
|
270 | (2) |
|
Unified WLAN Architecture |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
274 | (1) |
|
|
275 | (4) |
|
|
275 | (2) |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
Infrastructure Management |
|
|
279 | (6) |
|
|
280 | (5) |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
286 | (5) |
Chapter 9 RADIUS and LDAP |
|
291 | (28) |
|
|
292 | (1) |
|
|
293 | (14) |
|
Authentication and Authorization |
|
|
294 | (1) |
|
|
295 | (1) |
|
|
296 | (2) |
|
|
298 | (1) |
|
|
299 | (4) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
WLAN Devices as RADIUS Servers |
|
|
306 | (1) |
|
Captive Web Portal and MAC Authentication |
|
|
306 | (1) |
|
|
307 | (1) |
|
|
307 | (4) |
|
Vendor-Specific Attributes |
|
|
308 | (1) |
|
|
309 | (1) |
|
Role-Based Access Control |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
311 | (2) |
|
|
313 | (6) |
Chapter 10 Bring Your Own Device (BYOD) and Guest Access |
|
319 | (46) |
|
|
322 | (14) |
|
Company-Issued Devices vs. Personal Devices |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
325 | (4) |
|
|
329 | (2) |
|
|
331 | (1) |
|
|
332 | (3) |
|
|
335 | (1) |
|
Self-Service Device Onboarding for Employees |
|
|
336 | (3) |
|
|
337 | (1) |
|
|
338 | (1) |
|
MDM vs. Self-Service Onboarding |
|
|
339 | (1) |
|
|
339 | (13) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
341 | (1) |
|
|
342 | (3) |
|
Client Isolation, Rate Limiting, and Web Content Filtering |
|
|
345 | (1) |
|
|
345 | (2) |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
349 | (2) |
|
|
351 | (1) |
|
Network Access Control (NAC) |
|
|
352 | (6) |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
354 | (1) |
|
RADIUS Change of Authorization |
|
|
355 | (1) |
|
|
356 | (2) |
|
|
358 | (1) |
|
|
359 | (1) |
|
|
360 | (5) |
Chapter 11 Wireless Security Troubleshooting |
|
365 | (32) |
|
Five Tenets of WLAN Troubleshooting |
|
|
366 | (6) |
|
Troubleshooting Best Practices |
|
|
366 | (3) |
|
Troubleshoot the OSI Model |
|
|
369 | (1) |
|
Most Wi-Fi Problems Are Client Issues |
|
|
370 | (2) |
|
Proper WLAN Design Reduces Problems |
|
|
372 | (1) |
|
WLAN Always Gets the Blame |
|
|
372 | (1) |
|
|
372 | (2) |
|
802.1X/EAP Troubleshooting |
|
|
374 | (8) |
|
802.1X/EAP Troubleshooting Zones |
|
|
375 | (1) |
|
Zone 1: Backend Communication Problems |
|
|
376 | (2) |
|
Zone 2: Supplicant Certificate Problems |
|
|
378 | (2) |
|
Zone 2: Supplicant Credential Problems |
|
|
380 | (2) |
|
|
382 | (2) |
|
|
384 | (3) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
388 | (9) |
Chapter 12 Wireless Security Risks |
|
397 | (42) |
|
Unauthorized Rogue Access |
|
|
398 | (6) |
|
|
398 | (4) |
|
|
402 | (2) |
|
|
404 | (7) |
|
|
404 | (2) |
|
|
406 | (1) |
|
|
407 | (2) |
|
|
409 | (1) |
|
|
409 | (2) |
|
Denial-of-Service Attacks |
|
|
411 | (21) |
|
|
412 | (4) |
|
|
416 | (4) |
|
|
420 | (3) |
|
|
423 | (4) |
|
Management Interface Exploits |
|
|
427 | (1) |
|
Vendor Proprietary Attacks |
|
|
428 | (1) |
|
Physical Damage and Theft |
|
|
428 | (2) |
|
|
430 | (2) |
|
Guest Access and WLAN Hotspots |
|
|
432 | (1) |
|
|
433 | (1) |
|
|
433 | (1) |
|
|
434 | (5) |
Chapter 13 Wireless LAN Security Auditing |
|
439 | (30) |
|
|
440 | (17) |
|
|
442 | (5) |
|
|
447 | (2) |
|
|
449 | (4) |
|
Wired Infrastructure Audit |
|
|
453 | (1) |
|
|
453 | (1) |
|
|
454 | (1) |
|
|
455 | (1) |
|
|
456 | (1) |
|
WLAN Security Auditing Tools |
|
|
457 | (5) |
|
|
459 | (3) |
|
|
462 | (1) |
|
|
463 | (1) |
|
|
464 | (5) |
Chapter 14 Wireless Security Monitoring |
|
469 | (46) |
|
Wireless Intrusion Detection and Prevention Systems (WIDS and WIPS) |
|
|
470 | (10) |
|
WIDS/WIPS Infrastructure Components |
|
|
471 | (3) |
|
WIDS/WIPS Architecture Models |
|
|
474 | (4) |
|
|
478 | (1) |
|
|
479 | (1) |
|
|
480 | (14) |
|
|
482 | (4) |
|
|
486 | (3) |
|
|
489 | (5) |
|
|
494 | (7) |
|
|
494 | (1) |
|
|
495 | (1) |
|
|
496 | (2) |
|
|
498 | (1) |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
501 | (5) |
|
|
501 | (2) |
|
|
503 | (2) |
|
|
505 | (1) |
|
|
506 | (1) |
|
|
506 | (2) |
|
|
508 | (1) |
|
|
509 | (1) |
|
|
509 | (2) |
|
|
511 | (4) |
Chapter 15 Wireless Security Policies |
|
515 | (36) |
|
|
517 | (4) |
|
|
517 | (3) |
|
|
520 | (1) |
|
|
521 | (7) |
|
|
522 | (1) |
|
|
523 | (1) |
|
|
524 | (1) |
|
Authentication and Encryption Policy |
|
|
524 | (1) |
|
|
525 | (1) |
|
|
525 | (1) |
|
|
526 | (1) |
|
|
527 | (1) |
|
|
527 | (1) |
|
Government and Industry Regulations |
|
|
528 | (14) |
|
The U.S. Department of Defense (DoD) Directive 8420.1 |
|
|
529 | (1) |
|
Federal Information Processing Standards (FIPS) 140-2 |
|
|
530 | (2) |
|
The Sarbanes-Oxley Act of 2002 (SOX) |
|
|
532 | (2) |
|
Graham-Leach-Bliley Act (GLBA) |
|
|
534 | (2) |
|
Health Insurance Portability and Accountability Act (HIPAA) |
|
|
536 | (2) |
|
Payment Card Industry (PCI) Standard |
|
|
538 | (3) |
|
|
541 | (1) |
|
802.11 WLAN Policy Recommendations |
|
|
542 | (1) |
|
|
543 | (1) |
|
|
543 | (2) |
|
|
545 | (6) |
Appendix A Answers to Review Questions |
|
551 | (44) |
|
Chapter 1: WLAN Security Overview |
|
|
552 | (2) |
|
Chapter 2: Legacy 802.11 Security |
|
|
554 | (2) |
|
Chapter 3: Encryption Ciphers and Methods |
|
|
556 | (3) |
|
Chapter 4: 802.1X/EAP Authentication |
|
|
559 | (3) |
|
Chapter 5: 802.11 Layer 2 Dynamic Encryption Key Generation |
|
|
562 | (3) |
|
Chapter 6: PSK Authentication |
|
|
565 | (3) |
|
Chapter 7: 802.11 Fast Secure Roaming |
|
|
568 | (3) |
|
Chapter 8: WLAN Security Infrastructure |
|
|
571 | (3) |
|
Chapter 9: RADIUS and LDAP |
|
|
574 | (2) |
|
Chapter 10: Bring Your Own Device (BYOD) and Guest Access |
|
|
576 | (3) |
|
Chapter 11: Wireless Security Troubleshooting |
|
|
579 | (3) |
|
Chapter 12: Wireless Security Risks |
|
|
582 | (3) |
|
Chapter 13: Wireless LAN Security Auditing |
|
|
585 | (3) |
|
Chapter 14: Wireless Security Monitoring |
|
|
588 | (4) |
|
Chapter 15: Wireless Security Policies |
|
|
592 | (3) |
Appendix B Abbreviations and Acronyms |
|
595 | (18) |
|
|
596 | (1) |
|
Organizations and Regulations |
|
|
596 | (1) |
|
|
597 | (1) |
|
|
597 | (16) |
Index |
|
613 | |