3.4 - Given a scenario, install and configure wireless security settings. Flashcards

1
Q

Cryptographic protocols

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WiFi Protected Access 2 (WPA2)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WiFi Protected Access 3 (WPA3)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Counter-mode/CBC-MAC Protocol (CCMP)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SAE - Simultaneous Authentication
of Equals

A

– A Diffie-Hellman derived key exchange with an
authentication component
– Everyone uses a different session key, even with
the same PSK
– An IEEE standard - the dragonfly handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication protocols

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EAP

A

Extensible Authentication Protocol

-auth. framework

-usually used 4 wireless net auth.

-many diff. implementations (EAP-TLS, LEAP, EAP-TTLS)
->each of those protocols implements EAP msgs using protocols msging standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PEAP - Protected Extensible Authentication Protocol

A

– Protected EAP
– Created by Cisco, Microsoft, and RSA Security

Also encapsulates EAP in a TLS tunnel
– AS uses a digital certificate instead of a PAC
– Client doesn’t use a certificate

User authenticates with MSCHAPv2
– Authenticates to Microsoft’s MS-CHAPv2 databases

User can also authenticate with a GTC
– Generic Token Card, hardware token generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EAP-FAST (EAP Flexible Authentication via Secure Tunneling)

A

– Authentication server (AS) + supplicant share a
protected access credential (PAC) (shared secret)

-Supplicant receives the PAC

-Supplicant + AS mutually authenticate +
negotiate a Transport Layer Security (TLS) tunnel

-User authentication occurs over the TLS tunnel

-Need a RADIUS server
->Provides auth database +
EAP-FAST services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EAP-TLS

A

-EAP Transport Layer Security
->Strong security, wide adoption
– Support from most of the industry

Requires digital certificates on the AS and all other devices
– AS and supplicant exchange certificates for mutual authentication
– TLS tunnel is then built for the user
authentication process

Relatively complex implementation
– Need a public key infrastructure (PKI)
– Must deploy and manage certificates to
all wireless clients
– Not all devices can support the use of digital certificates

Chapple 435
Weiss 377,379,633
Gibson 120

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EAP-TTLS (Tunneled Transport Layer Security)

A

*EAP Tunneled Transport Layer Security
– Support other authentication protocols
in a TLS tunnel

Requires a digital certificate on the AS
– DOES NOT REQUIRE digital certs on every device
– Builds a TLS tunnel using this digital certificate

Use any auth method inside the TLS tunnel
– Other EAPs
– MSCHAPv2
– Anything else

Chapple 435
Weiss 378
Gibson 120

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IEEE 802.1X

A

-standard for NAC (net. access ctrl)
-used 4 authentication 4 devices wanting to connect to a net.
-supplicants send authentication reqs. to authenticators (net. switches, access points, wireless controllers)
-controllers connect to authentication server (usually via RADIUS)
-RADIUS servers rely on backend directory using LDAP or AD as source of identity info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Remote Authentication Dial-in
User Service (RADIUS) Federation

A

-Use RADIUS with federation

-common authentication, authorization, accounting (AAA) sys. 4 net. devices, wireless nets, etc.

-can operate via TCP + UDP

-operates in client server model

-sends pswds obfuscated by sharing secret + MD5 hash = pswd sec. not v strong

-traffic btwn RADIUS net. access server + RADIUS server usually encrypted using IPSec tunnels

– Members of one organization can authenticate to
the network of another organization
– Use their normal credentials

-Use 802.1X as the authentication method
->And RADIUS on the backend - EAP to authenticate

Driven by eduroam (education roaming)
– Educators can use their normal authentication
when visiting a different campus https://www.eduroam.org/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pre-shared key (PSK) vs. Enterprise vs. Open

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WiFi Protected Setup (WPS)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Captive portals

A

*
Authentication to a network - Common on wireless networks
*
Access table recognizes a lack of authentication
– Redirects your web access to a captive portal page
*
Username / password - And additional authentication factors
*
Once proper authentication is provided, the
web session continues
– Until the captive portal removes your access

17
Q

Site surveys

A

*
Determine existing wireless landscape
– Sample the existing wireless spectrum
*
Identify existing access points
– You may not control all of them
*
Work around existing frequencies
– Layout and plan for interference
*
Plan for ongoing site surveys
– Things will certainly change
*
Heat maps - Identify wireless signal strengths

18
Q

Heat maps

A
19
Q

WiFi analyzers

A
20
Q

Channel overlaps

A

Overlapping channels
– Frequency conflicts - use non-overlapping channels
– Automatic or manual configurations

21
Q

Wireless access point (WAP) placement

A
22
Q

Controller and access point security

A

*
Minimal overlap
– Maximize coverage, minimize the number
of access points
*
Avoid interference
– Electronic devices (microwaves)
– Building materials
– Third-party wireless networks
*
Signal control
– Place APs where the users are
– Avoid excessive signal distance