Wireless Networking On the St. Clair County ISD Network

Download Report

Transcript Wireless Networking On the St. Clair County ISD Network

Wireless Networking On the
St. Clair County ISD Network
Dennis Buckmaster
Network Engineer,
St. Clair County ISD
Why Consider
Implementation?





Expanded opportunities for technology use
within the Schools
Potential Cost Savings
Catalyst for Other Technologies
Demand from end users!
(if it is not there now it will be shortly)
Goal is to Plan for what the users need in a
secure way before the users start to add the
technology in an insecure way without our
knowledge.
h
Why Be Concerned?

Wireless Coverage Range
– Physical security is no longer a sufficient
– Wiretapping (WarDriving, WarChalking, and
WarPlugging)
– Internet Leach
– Traditional Security Issues Expanded due to
ease of access
– Additional Wireless issues to consider
Wiretapping Issues

Wiretapping
– Free tools such as NetStumbler, Kismet and
even Pocket Warrior
– Access to Clear text network traffic
including potentially confidential
information
– Vendors will claim this is addressed with
SSID, MAC authentication tables, and
WEP. Is it?
Netstumbler
Kismet
Traditional Security
Issues Magnified

Gaining access is one of the first tasks in any
“Hacking” attempt
 Tracking Origination is the first step in
Prosecution
 How do you determine where a wireless Attack
originates from
 Wireless Networks should be treated as an
insecure environment just as the Public Internet
and Dial Up RAS connections are
Additional Wireless Issues

Site Survey
–
–
–
–

Dead Spots
Coverage
Signal Leak
Rouge Access Points!!
Interference
– Mostly Unintentional


Blue Tooth
Cordless Phones
– Intentional
Technologies to Consider

802.11
 802.11b = 11mb 2.4 ghz
 802.11a = 54 mb 5 – 6 ghz
 802.11g = 54 mb 2.4 ghz
 802.11x = port level access control
 802.11i / WPA
 802.16 = WIMAX - Wireless Broadband
• WIMAX is not yet Ratified
Wireless Network
Access

What network access is needed?
– Internet
– Internal Networks

Who needs access?
– Staff
– Students
– Public

What type of data will be accessed?
 When Is Access Needed?
 What equipment is available?
 What Budget is available?
Steps to Secure Wireless
(Basic Settings)

Do not Broadcast SSID (This may exclude
some cheaper Access Points
 Change the default settings
– SSID
– Address Ranges
– Passwords

Choose SSID that does not easily associate
to the entity owning the access point
Steps to Secure Wireless
(Encryption)





Enable Wireless Encryption Protocol
Some vendors offer advanced Protocols such as
Cisco’s LEAP but this usually requires a single
vendor solution
Provides reasonable security for low risk
data such as public internet traffic
Does not provide adequate security for critical
systems (AIRSNORT)
WPA and 802.1x Can be used if supported
Steps to Secure Wireless
(Addresses)

MAC address filters
– Difficult to manage, Not Scaleable
– MAC Can easily be Spoofed

IP Address
– Not using DHCP assigned addresses
can be one more barrier
– Do Not use default Addresses for access points
Steps to Secure Wireless
(Firewall)





Provide only limited (VPN Encrypted)
connections to Internal network.
Treat Wireless machines as if they are public
internet machines. (Use Host based Firewall
Software for machines that are usually on)
Disable ALL unneeded services on Wireless
Machines and regularly apply security patches
Use rules that require authentication to validate
Network Access
Limit Bandwidth and usage times when possible
Network Diagram
h
Wireless Building Diagram