Symantec Wlan Security
Symantec Wlan Security
Symantec Wlan Security
INSIDE
INSIDE Wireless LAN Technology
Benefits of Wireless LANs Security Risks and Technical Challenges Recommendations
Contents
Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless LAN Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Benefits of Wireless LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Simplified Implementation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Extended Reach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Increased Worker Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Reduced Total Cost of Ownership and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Security Risks and Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Leaky Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Unapproved Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Exposure of Wireless Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Signal Interference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Evolving IEEE Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Establish Wireless LAN Security Policies and Practices . . . . . . . . . . . . . . . . . . . . . . 7 Design for Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Logically Separate Internal Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Enable VPN Access Only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Remove Unnecessary Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Restrict AP Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Protect Wireless Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Executive summary
Motivated by the need to reduce IT costs while increasing employee productivity, enterprise-wide wireless local area network (LAN) solutions are becoming increasingly viable. Proliferation of mobile computing devices has boosted employee demand for access to their organizations network beyond the tether of their office workstation. Meanwhile, accelerated wireless transmission rates and increasing vendor adherence to standards-based interoperability are enhancing the practicality of wireless LANs. Yet the same wireless technologies that can erase the physical limitations of wired communications to increase user flexibility, boost employee productivity, and lower cost of network ownership also expose network-based assets to considerable risks. The security embedded in wireless LAN technologies falls short of providing adequate protection. Early-adopting organizations have found that evaluating, and where possible, mitigating these risks before deploying a wireless LAN is beneficial. This white paper summarizes wireless network security planning by providing an overview of the security risks and technical challenges in this area, as well as summarizing key recommendations for secure wireless LANs.
IEEE and its member organizations are working to address many of these limitations and vulnerabilities. Efforts include new wireless LAN standards to increase security, bandwidth, and range, as well as reduce power consumption. For example, the 802.11a standard, scheduled for 2002 release, is expected to support speeds up to 54 Mbps. Visit the IEEE Web site for more information on upcoming wireless LAN standards.
Wireless APs can be placed in the ceiling, where they can accommodate a virtually endless variety of office configurations (see Figure 2). Wired LANs, in contrast, consume time and resources to run cables from a network closet to users desktops and to difficult-to-service areas such as conference room tables and common areas. With a wired LAN, each additional user or modification to the floor plan necessitates adjustments to the cabling system.
EXTENDED REACH
Wireless LANs enable employees to access company resources from any location within an APs transmission range. This flexibility and convenience can directly improve employee productivity.
INCREASED WORKER MOBILITY
The roaming benefits of wireless LANs extend across all industries and disciplines. The shop foreman can manage logistics from the warehouse as easily as office-based employees move about the building with their laptops or PDAs. And field sales employees can connect to public wireless LANs in coffee shops and airport lounges.
REDUCED TOTAL COST OF OWNERSHIP AND OPERATION
The cumulative benefits of simplified implementation and maintenance, an extended LAN reach, and the freedom to roam minimize expenses and improve organizational and employee productivity. The result is reduced total cost of ownership and operation.
HR
Finance
Laptop
Laptop
Laptop
Workstation
Workstation
HR
Finance
Workstation
PDA
Laptop
Wireless LAN radio signals can extend beyond the intended perimeter and leak through the physical boundaries of a floor or building. As these transmissions seep into common, public, or private areas such as roads, parking lots, and other buildings, they may fall prey to war driving or a drive-by hacking attack. Using off-the shelf hardware and freely available Internet software, unscrupulous individuals can defeat WEP encryption capabilities and access corporate wireless data.
UNAPPROVED DEPLOYMENTS
Insiders, including employees and contractors, may choose not to wait for the IT Department. They succumb to the low price and easy installation of WiFi starter kits (two wireless NICs and a WiFi Access Point), which can be purchased for about US$300 and set up with minimal technical know-how in under ten minutes. When unapproved technology is plugged into a corporate network, a number of challenges ensue, including end user and equipment support difficulties as well as potential disruptions to existing services. Malicious outsiders who gain office physical access could quickly place an unobtrusive wireless AP in a conference room or lobby area. Such devices are easy to hide and simple to implement; history is replete with stories of such bugs even in supposedly secure foreign embassies. Operating from a nearby location, malicious outsiders can capture data, access company resources, and interrupt services.
EXPOSURE OF WIRELESS DEVICES
Many of todays laptops ship with embedded WiFi capabilities. Hackers can access a devices data and the organizations wireless LAN even if that particular device has never been used to send or receive wireless transmissions. Most new machines, including gateway servers, do not ship with optimal security settings. The default settings are intended for easy installation and deployment, not for protecting assets.
SIGNAL INTERFERENCE
Walls, columns, and other building features can reduce signal strength between a wireless NIC and an AP, severely limiting a wireless LANs range and connection quality. These problems may be mitigated with additional equipment. Other wireless technologies sharing the same public
spectrumsuch as Bluetooth, cordless phones, and other wireless equipmentcan also adversely impact transmission range and quality.
EVOLVING IEEE STANDARDS
Organizations contemplating a wireless LAN deployment can choose to implement an 802.11b-based wireless LAN today, or wait for upcoming variations, which are intended to address performance and security issues. IEEE and its workgroups are continually defining and refining standards in light of emerging needs and perceived weaknesses in existing technologies. To the extent that vendors 802.11 implementations deviate from the various IEEE standards, their equipment can create interoperability challenges.
Recommendations
Even as new 802.11 vulnerabilities are identified and exploited, organizations can mitigate or eliminate many of wireless LANs security risks with careful education, planning, implementation, and management. The following steps aid this process: Establish wireless LAN security policies and practices Design for security Logically separate internal networks Enable VPN access only Remove unnecessary protocols Restrict AP connections Protect wireless devices.
The cornerstone of an effective wireless LAN strategy involves defining, standardizing, documenting, disseminating, and enforcing wireless LAN security policies and practices. These include specifying the make, model, configuration, and settings of the wireless LAN equipment authorized for use, as well as documenting and managing the APs and connected network infrastructure. Employee education increases awareness of security risks. Some employees may not realize that deploying an unauthorized wireless LAN or using a WiFi product out of the box may increase security risks. Clear and frequently conveyed guidelines usually promote active cooperation.
DESIGN FOR SECURITY
When placing wireless APs for strategic coverage, installers should consider signal bleed into uncontrolled areas where transmissions can be intercepted. Wireless coverage should be implemented only where needed.
LOGICALLY SEPARATE INTERNAL NETWORKS
The LAN segments that connect to wireless APs should connect to a corporate Virtual Private Network (VPN) gateway, but not directly to the production network. Eliminating APs from the production network minimizes the risk of attack techniques such as packet sniffing.
Requiring users to connect to the wireless LAN via a VPN is recommended. Once authenticated, authorized users communicate using an encrypted tunnel between the connecting device and the LAN, reducing the risk that a transmission will be captured.
RESTRICT UNNECESSARY PROTOCOLS
Restricting unnecessary or redundant protocols from the LAN segments that connect the APs to the VPN gateway reduces the possibility of unidentified holes and vulnerabilities. Retaining the Domain Name System (DNS) and IP Security (IPSec) protocols is recommended to support the VPN.
RESTRICT AP CONNECTIONS
Administrators can use authorization tables to selectively enable LAN connections only to devices with approved NIC addresses. Each NIC has a unique address that can be added to a table of authorized users; most vendors APs support Media Access Control (MAC) restrictions through the use of authorization tables. As a result, instead of editing each AP individually, APs can be pointed to a centrally managed database.
HR
Finance
VPN/Firewall
VPN
FW FW
Firewall VPN
PDA Laptop
VPN
Personal firewalls can protect individual devices from attacks launched via the air connection or from the Internet. IT administrators should disable all unused features of new client devices (e.g., shared drive access) and reconfigure default settings according to the organizations particular needs.
Conclusion
Like most advances, wireless LANs pose both opportunities and risks. The technology can represent a powerful complement to an organizations networking capabilities, enabling increased employee productivity and reducing IT costs. To minimize the attendant risks, IT administrators can implement a range of measures, including establishment of wireless security policies and practices, as well as implementation of various LAN design and implementation measures. Achieving this balance of opportunity and risk allows enterprises to confidently implement wireless LANs and realize the benefits this increasingly viable technology offers.
Glossary
802.11: Broad heading for IEEE wireless LAN focus groups 802.11a: Improves 802.11 bandwidth to 5 GHz 802.11b: Wireless LAN standard for up to 11 Mbps at 2.4 GHz Access Point: (AP), wireless network hub Bluetooth: Short-range wireless technology developed by the Bluetooth Special Interest Group
(www.bluetooth.org)
IEEE: Institute of Electrical and Electronics Engineers (www.ieee.org) Ethernet Hub: A connection point between devices on a network LAN: Local Area Network MAC: Media Access Control NIC: Network Interface Card PDA: Personal Digital Assistant VPN: Virtual Private Network WiFi: 802.11b wireless Ethernet standard WEP: Wired Equivalent Privacy
10
References
1. Nikita Borisov, Ian Goldberg, and David Wagner, UC Berkeley, Security of the WE Algorithm, (http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html) 2. Wayne Caswell, Wireless Home Networks: Disconnected Connectivity, Home Toys, April 2000 (http://www.hometoys.com/mentors/caswell/apr00/wireless.htm) 3. Joel Conover, Wireless LANs Work Their Magic, Networking Computing, July 2000 (http://www.networkcomputing.com/1113/1113f2full.html) 4. Joel Conover, First Things FirstTop 10 Things to Know About Wireless, Networking Computing, July 2000 (http://www.networkcomputing.com/1113/1113f2side2.html) 5. John Cox, LAN Services Set to Go Wireless, Network World, August 20, 2001 (http://www.nwfusion.com/news/2001/0820wireless.html) 6. Andy Dornan, Emerging Technology: Wireless LAN Standards, 2/6/02, NetworkMagazine.com (http://networkmagazine.com/article/NMG20020206S0006) 7. Dale Gardner, Wireless Insecurities, Information Security magazine, January 2002 (http://www.infosecuritymag.com/articles/january02/cover.shtml) 8. 9. IEEE Working Group for WLAN Standards (http://grouper.ieee.org/groups/802/11/index.html) Dave Molta, The Road Ahead for Wireless, Network Computing, July 9, 2001 (http://www.networkcomputing.com/1214/1214colmolta.html) 10. Practically Networked, Wireless Encryption Help (http://www.practicallynetworked.com/ support/wireless_encrypt.htm) 11. Practically Networked, Securing Your Wireless Network (http://www.practicallynetworked.com/ support/wireless_secure.htm) 12. Practically Networked, Mixing WEP Encryption Levels (http://www.practicallynetworked.com/ support/mixed_wep.htm) 13. Practically Networked, Should I Use NetBeui? (http://www.practicallynetworked.com/ sharing/netbeui.htm) 14. Peter Rysavy, Break Free with Wireless LANs, Network Computing, October 29, 2001 (http://www.networkcomputing.com/1222/1222f1.html) 15. Search Networking.com, Wireless LAN links (http://searchnetworking.techtarget.com/ bestWebLinks/0,289521,sid7_tax286426,00.html) 16. Vicomsoft Wireless Networking Q&A (http://www.vicomsoft.com/knowledge/reference/ wireless1.html) 17. Wireless Within Corporate Reach eWeek, May 3, 2000 (http://techupdate.zdnet.com/ techupdate/stories/main/0,14179,2530201-1,00.html)
11
SYMANTEC, THE WORLD LEADER IN INTERNET SECURITY TECHNOLOGY, PROVIDES A BROAD RANGE OF CONTENT AND NETWORK SECURITY SOFTWARE AND APPLIANCE SOLUTIONS TO INDIVIDUALS, ENTERPRISES AND SERVICE PROVIDERS. THE COMPANY IS A LEADING PROVIDER OF VIRUS PROTECTION, FIREWALL AND VIRTUAL PRIVATE NETWORK, VULNERABILITY ASSESSMENT, INTRUSION PREVENTION, INTERNET CONTENT AND EMAIL FILTERING, AND REMOTE MANAGEMENT TECHNOLOGIES AND SECURITY SERVICES TO ENTERPRISES AND SERVICE PROVIDERS AROUND THE WORLD. SYMANTECS NORTON BRAND OF CONSUMER SECURITY PRODUCTS IS A LEADER IN WORLDWIDE RETAIL SALES AND INDUSTRY AWARDS. HEADQUARTERED IN CUPERTINO, CALIF., SYMANTEC HAS WORLDWIDE OPERATIONS IN 38 COUNTRIES. FOR MORE INFORMATION, PLEASE VISIT WWW.SYMANTEC.COM
WORLD HEADQUARTERS
20330 Stevens Creek Blvd. Cupertino, CA 95014 U.S.A. 1.408.253.9600 1.800.441.7234 For Product Information In the U.S., call toll-free 800-745-6054.
www.symantec.com
The information in this document is subject to change without notice and must not be construed as a commitment on the part of Symantec Corporation. Symantec assumes no responsibility for any errors that may appear in this document. Symantec and the Symantec logo are U.S. registered trademarks of Symantec Corporation. Other brands and products are trademarks of their respective holders. Copyright 2002 Symantec Corporation. All rights reserved. Printed in the U.S.A. 05/02 09-71-00424