ONT10无线QOSS06L02.ppt
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_05.gif)
《ONT10无线QOSS06L02.ppt》由会员分享,可在线阅读,更多相关《ONT10无线QOSS06L02.ppt(44页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、Implement Wireless Scalability,Introducing 802.1x,The Need for WLAN Security,The Need for WLAN Security,IEEE 802.11 equipment is widely available and inexpensive. The 802.11 standard is designed for ease of use and deployment. Many sniffers are available. Statistics on WLAN security are not encourag
2、ing. Media reports about hot spots, WLAN hacking, and war driving are frequent. Encryption is not optimally implemented in standard WEP. Authentication is vulnerable.,Security MethodsAuthentication and Encryption,Security MethodsAuthenticationand Encryption,Authentication: Proves that you belong on
3、the network Encryption: Protects the data traversing the network Both authentication and encryption are needed and mandated by standards.,WLAN Security Issues,Rogue access points Weakness of older forms of security: Service set identifier (SSID) Authentication controlled by MAC Static WEP keys Nonmu
4、tual authenticationone way only,WEP Attacks,Weak, static WEP key Passive or weak initialization vector (IV) attack details Active or “bit flipping” and replay attack Authentication dictionary attacks,Overview of WLAN Security,802.11 WEP,IEEE standard for encryption Uses RC4 algorithmknown vulnerabil
5、ities Keys can be static and shared among many clients Or keys can be dynamic and unique for each client(as with 802.1x) per session,802.11 Open Authentication,802.11 Shared Key Authentication,Cisco Enhanced 802.11 WEP Security,Cisco Enhanced 802.11 WEP Security,Cisco Prestandard enhancements Implem
6、ented in 2001 and 2002 Authentication: 802.1x and Extensible Authentication Protocol (EAP) protocols User, token, machine credentials Dynamic encryption key generation Encryption: Cisco Key Integrity Protocol (CKIP) Cisco Message Integrity Check (CMIC),Enhanced 802.11 Security,Encryption: Temporal K
7、ey Integrity Protocol and Message Integrity Check Wi-Fi Protected Access (WPA)TKIP encryption WPA2Advanced Encryption Standard (AES) Authentication: 802.1x and Extensible Authentication Protocol (EAP) protocols User, token, machine credentials Dynamic encryption key generation IEEE 802.11i,Encryptio
8、nTKIP and MIC,Enhancements to RC4-based WEP: Key hashing for unique seed values per packet MIC from Michael algorithm Broadcast key rotation Key hashing protects against WEP initialization vector vulnerabilities, whereas MIC protects against man-in-the-middle or replay attacks.,EncryptionAES,Specifi
9、ed in 802.11i 128-bit block ciphercryptographically more robustthan RC4 Part of WPA2 Requires new radio cards on clients and access points because more CPU power is required,802.1x Overview,802.1x Authentication Overview,Extensible and Interoperable supports: Different EAP authentication methods or
10、types May be used with multiple encryption algorithms Depends on client capability Supported by Cisco since December 2000.,802.1x Authentication Key Benefits,Mutual authentication between client and authentication (RADIUS) server Encryption keys derived after authentication Centralized policy contro
11、l,802.1x and EAP Authentication Protocols,Lightweight Extensible Authentication Protocol(LEAP)EAP Cisco Wireless EAP-Flexible Authentication via Secure Tunneling(EAP-FAST) EAP-Transport Layer Security (EAP-TLS) Protected EAP (PEAP): PEAP-GTC PEAP-MSCHAPv2,Components Required for 802.1x Authenticatio
12、n,Authentication server = EAP-capable RADIUS server: Cisco Secure ACS, Microsoft IAS, Meetinghouse Aegis Local authentication service on Cisco IOS access point May use either local RADIUS database or an external database server such as Microsoft Active Directory or RSA SecurID Authenticator = 802.1x
13、-capable access point Supplicant = EAP-capable client: Requires 802.1x-capable driver Requires an EAP supplicanteither available with client card, native in operating system, or from third-party software,EAP-Cisco Wireless,Cisco LEAP,Client support: Windows 98-XP, Windows CE, Macintosh OS 9.X or 10.
14、X, and Linux Kernel 2.2 or 2.4 Cisco Compatible Extensions Clients (CCXv1) RADIUS server: Cisco Secure ACS and Cisco Access Registrar Meetinghouse Aegis Interlink Merit Microsoft domain or Active Directory (optional) for back-end authentication (must be Microsoft format database) Device support: Cis
15、co autonomous access points and bridges Cisco lightweight access points and WLAN controllers Cisco Unified Wireless IP Phone 7920 (VoIP) handset,Cisco LEAP Authentication,EAP-FAST,EAP-FAST: Flexible Authentication via Secure Tunneling,Considered in three phases: Protected access credential is genera
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ont10 无线 qoss06l02
![提示](https://www.taowenge.com/images/bang_tan.gif)
限制150内