WI-FI Standards Version Q3 7 (17.01.07)
WI-FI Standards Version Q3 7 (17.01.07)
WI-FI Standards Version Q3 7 (17.01.07)
Version:
Status:
Page 1 of 17
Reviewers:
This document has been reviewed by the following.
Name
Date
Approvers:
This document has been approved by the following:
Name
Date
Forecast changes:
Anticipated Change
Date
Annual Review
January 2008
Page 2 of 17
Contents
1
Introduction..................................................................................................................... 4
1.1
1.2
Background.............................................................................................................4
1.3
Disclaimer............................................................................................................... 4
3.1
Physical considerations..........................................................................................6
3.2
Technological considerations..................................................................................6
3.2.1
Wireless encryption.............................................................................................6
3.2.2
3.2.3
Encryption............................................................................................................... 9
4.2
Authentication.........................................................................................................9
4.2.1
EAP protocols.....................................................................................................9
4.3
Device authentication............................................................................................12
4.4
4.5
Intrusion detection................................................................................................12
4.6
4.7
Auditing................................................................................................................. 13
4.8
Penetration testing................................................................................................13
Site surveys.......................................................................................................... 14
5.2
High availability.....................................................................................................14
5.3
5.4
Hardware.............................................................................................................. 15
5.5
Policies................................................................................................................. 15
Glossary............................................................................................................................... 16
Page 3 of 17
1 Introduction
This document describes security measures that must be followed when deploying Wireless
LANs within sites connected to dawn2 (NHS Wales Network). It does not cover public
access wireless networks, or site to site (including building to building) wireless links. You will
find guidance on:
The minimum standards for Wireless Local Area Networks (WLANs) deployed within
dawn2 connected networks.
The procedures and mechanisms for the control of Wireless Local Area Networks in
an NHS Wales environment.
Connecting for Healths Wireless Local Area Network (WLAN) Technologies: Good
Practice Guidelines,
1.2 Background
dawn2 is a private Network. Connection is therefore strictly limited to authorised endpoints.
All organisations wishing to make a new connection to dawn2 are responsible for ensuring
that their connection to dawn2 does not compromise the security measures already in place.
Trust Chief Executives have signed up to a Code of Connection agreement which is
designed to ensure the on-going integrity of dawn2. Information is often unencrypted when
transmitted over the network therefore confidentiality of sensitive information within dawn2
cannot automatically be assumed. It is therefore imperative that Wireless LANs are deployed
in such a manner that does not comprise the integrity and availability of dawn2.
1.3 Disclaimer
Reference to any specific commercial product, process or service by trade name, trademark
manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation,
or favouring by Informing HealthCare. The views and opinions of authors expressed within
this document shall not be used for advertising or product endorsement purposes. Informing
HealthCare shall also accept no responsibility for any errors or omissions contained within
this document. In particular, Informing HealthCare shall not be liable for any loss or damage
whatsoever, arising from the usage of information contained in this document.
Page 4 of 17
Operating
Frequency
Available Data
Rates (Mbps)
802.11a
5 GHz
802.11b
2.4 GHz
802.11g
2.4 GHz
Number of
channels in
UK
12 (8 for indoor
and 4 point-topoint)
13
Number of nonoverlapping
channels
12
(8 for indoor)
Typical
Indoor
Range1
21m at
54 Mbps
13
30m at
11 Mbps
27m at
54 Mbps
802.11i is an amendment to the 802.11 standard and specifies security mechanisms for
Wireless Networks. WPA and WPA2 are trademarks of the Wi-Fi Alliance. All products that
are Wi-Fi CERTIFIED for WPA2 are based on the IEEE 802.11i standard. WPA is based
on a sub-set of an 802.11i draft amendment.
802.11n is a proposed standard and is currently estimated to be approved in July 2007. This
uses Multiple-Input Multiple-Output (MIMO) technology for increasing data throughput and
range.
Figures from www.cisco.com. These are typical operating distances. Eavesdropping can be achieved from much further away.
Page 5 of 17
Consider signal dispersion issues when choosing access points. Seek advice from
equipment vendors on suitable positioning, suitable antennae and signal
configuration parameters.
Reduce the radiation of signals outside the building perimeter by using a higher
number of access points at moderate power levels. This is preferable to configuring
access points with high power to obtain maximum coverage from fewer devices.
Ensure that the connection of wireless access points to the wired network
infrastructure is via individual switched Ethernet network ports - not by connection to
an Ethernet hub. This will help to prevent the propagation of unnecessary data onto
the wireless network from the wired network.
Consider the physical security of the WLAN access points and clients. Steps should
be taken to ensure that they are not easily stolen or damaged.
Page 6 of 17
The WEP encryption method has a number of well publicised vulnerabilities. As such
its use is prohibited as it does not provide a sufficient level of wireless LAN
Encryption. Any existing devices using WEP should be disconnected from the
network, or upgraded to WPA or WPA2.
WPA addresses many of the weaknesses found in WEP, while also adding further features
to enhance security across wireless networks. WPA offers support for strong encryption and
various authentication mechanisms, offering protection from unauthorised access. WPA
uses the Temporal Key Integrity Protocol (TKIP) for encryption and employs IEEE 802.1X
authentication with one of the standard Extensible Authentication Protocol (EAP) types
currently available.
The newer Wi-Fi Protected Access 2 (WPA2) standard offers the same authentication and
message integrity features as WPA. It also adds a new encryption scheme using the
Advanced Encryption Standard (AES). Enterprises running the existing WPA encryption
will be able to upgrade to WPA2 in a secure and gradual manner, using the WPA2 mixedmode functionality available within the protocol.
IT Managers should ensure that WPA2 is available for all new purchases of wireless
equipment. Please seek assistance from hardware vendors regarding existing installations
as many manufacturers offer updated firmware to add WPA and WPA2 support to existing
equipment.
The WLAN client (known in 802.1x terms as the Supplicant), associates with the
access-point (the Authenticator)
If both sides accept the credentials, a key is created and passed to the access-point
and client.
Data sent between the access-point and the client is encrypted using the key. The
key is automatically changed periodically.
This process helps to ensure the confidentiality, integrity and availability of the wireless
network.
A rogue access point is one that has been installed by an employee without approval from the I.T.
department, or one that has been installed with malicious intent (e.g. by a hacker)
Page 7 of 17
By using the Media Access Control (MAC) address. Every wireless network device
will have a unique MAC address. As such, filters can be applied which will only allow
approved MAC addresses to connect to the WLAN. The MAC address is sent in
clear text over the Wireless Network and therefore approved MAC addresses can be
obtained by a potential hacker. Additionally, it is possible to spoof a MAC address,
and therefore a hacker could use this technique to overcome MAC address security.
As such, while MAC address security provides an additional layer of protection, it
should only be used in conjunction with an additional authentication method as
described in Section 3.2.2.
Page 8 of 17
4.1 Encryption
WPA2/802.11i should be used for encryption as it uses AES as the encryption algorithm. If
this is not practical, WPA can be used. A vendors proprietary equivalent of WPA may also
be used while migration to WPA2 is undertaken.
WEP must not be used, due to extensive security issues within the protocol. Most enterprise
grade network equipment vendors should offer upgraded firmware or software to allow the
use of WPA/WPA2 in replacement of the insecure WEP protocol.
Key management should be done using 802.1X and EAP.
4.2 Authentication
Implementing WPA/WPA2 will need a deployment of an 802.1X based authentication
infrastructure. A suitable installation will include the following:
Smaller environments, such as GP surgeries, may lack both the budget and qualified IT staff
to support and administer a RADIUS based authentication platform. In these cases, a
central/regional organisation (e.g. the LHBs/BSCs or HSW) may wish to host a WLAN
authentication service which can be shared by a number of smaller organisations. The use
of WPA/WPA2 Pre Shared Keys (PSK) is not permitted due to the risk of inappropriate
access to the WLAN from devices that have been lost or stolen.
Typically, an existing directory service (e.g. Microsoft Active Directory or Novell e-Directory)
will be used to store the authentication details. In order to reduce the risk of unauthorised
access to the WLAN, access should only be given to users that need the WLAN
functionality. Measures should be taken to ensure that strong passwords are forced onto
those users accounts.
Page 9 of 17
security and integrity provided is considered one of the most secure authentication
mechanisms available and offers universal support across wireless systems.
The use of EAP-TLS relies not only on server-side certificates, but also on the presence of
a client-side certificate which is how the standard gains particular strength over other
mechanisms. A compromised password is not enough to access a properly secured
infrastructure using EAP-TLS for authentication. For instance, if the client certificate was
stored on a smartcard it could only be stolen if the card itself was stolen, thus allowing
administrators to quickly revoke individual access rights in response to a theft or other
security issue. This process is clearly much more problematic if the employment of other
less robust authentication systems (such as those based on single passwords or network
keys) is standard.
The security offered by EAP-TLS is high. However, PKI deployment and management can
be unduly complex for some organisations. For those with a PKI already in place, this is the
currently the most secure mechanism available.
PEAPv0 (EAP-MSCHAPv2)
PEAPv0 is the most common version of PEAP. It is supported on the Client and Server side
by various vendors, including Microsoft and Cisco. PEAP creates an encrypted SSL/TLS
channel between the client and the authentication server, and the channel then protects the
subsequent user authentication exchange.
To create the secure channel between client and authentication server, the PEAP client first
authenticates the PEAP authentication server using digital certificate authentication. This
technique is widely used to protect Web transactions (using SSL) and requires only the
server to own a digital certificate.
Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2) is used to
perform user authentication. This information is sent through the secure channel.
PEAPv1 (EAP-GTC)
PEAPv1/EAP-GTC was created by Cisco as an alternative to PEAPv0. It allows the use of
an inner authentication protocol other than Microsofts MSCHAPv2. Even though Microsoft
co-invented the PEAP standard, Microsoft never added support for PEAPv1 in general,
which means PEAPv1/EAP-GTC has no native Windows OS support.
Page 10 of 17
By defining new attributes to support them it is easy to extend TTLS to work with new
protocols. EAP-TTLS offers support across multiple vendors, and has a good foothold in the
marketplace with interoperability across different platforms.
The manual provisioning of PAC files onto devices can be utilised to mitigate this risk,
so this process should be followed for deployment onto devices which require access
via EAP-FAST. This process will inevitably incur an extra administrative overhead for
larger networks.
The EAP-FAST protocol has proven useful in certain environments for Voice over Internet
Protocol (VoIP) phones and other latency sensitive devices which require roaming ability and
thus low latency authentication. When using a Cisco WLAN infrastructure, the EAP-FAST
protocol should help to ensure that devices re-authenticate in the fastest possible manner
whilst roaming between wireless access points within a campus.
When considering the manual PAC file provisioning process, in addition to the fact that EAPFAST is proprietary, it is recommended that EAP-FAST be used only for devices which
require the specific benefits of the protocol and seek alternatives for deployment on other
systems.
A hash of the password is sent over the WLAN and this hash can be sniffed. In
some cases, the passwords can be recovered by performing off-line brute force
attacks (e.g. dictionary attack).
Page 11 of 17
As such, LEAP should only be used when supporting legacy hardware (e.g. VoIP WLAN
phones) and should be deployed as follows:
A dedicated logical network segment is used on the wired LAN (e.g. a VLAN). Traffic
from users authenticated using LEAP must be restricted to this dedicated network
and this network must be segmented from the rest of hospital network using an EAL4
certified firewall.
Due to the significant security weaknesses within the protocol the use of LEAP to
connect any devices onto data networks is extremely unsafe and not recommended.
The WLAN access point can be configured to accept Open Authentication, but MAC
address authentication should still be used to control which devices can access the
WLAN.
The WLAN access points must be configured such that WLAN devices cannot
communicate with other WLAN devices prior to the VPN tunnel being established.
A dedicated logical network segment must be used on the wired LAN (e.g. a VLAN).
When the VPN is not established, all traffic from the WLAN users must be restricted
Page 12 of 17
to this dedicated network and this network must be segmented from the rest of
hospital network using an EAL4 certified firewall.
Access-lists will need to be applied on the EAL4 firewall to ensure that traffic from the
devices on the WLAN can only communicate with a VPN device such as a VPN
concentrator or Firewall.
VPN client software will need to be installed and configured on all client devices.
VPN clients must be configured so that all traffic is sent down the VPN tunnel. I.e.
split tunnelling must be disabled.
Access-lists must be applied to the traffic emerging from the VPN device, as
described in Section 4.4.
4.7 Auditing
A log of access to the WLAN infrastructure must be kept, and this should also include
access attempts. These logs should be checked regularly to see if any unauthorised
access is being attempted. Logs need to be kept for a minimum period of 2 years.
Where possible, WLAN access points should be configured to report any unknown
access points. This will increase the probability of a rogue access point being
detected.
In addition to the above, regular manual WLAN sweeps of all sites should be
undertaken to highlight any rogue access points
Page 13 of 17
Appropriate channels and power ratings are selected to reduce the risk of
interference with other radio sources.
Signals from access points are overlapped to ensure that service is maintained in
the event of a failure of a single access point.
Access points should be connected to different switches to ensure that some WLAN
coverage is maintained, even in the event of a switch failure.
All underlying systems that support the WLAN (e.g. DHCP servers, authentication
and authorisation servers, etc) should be installed in a resilient manner. Failure of
any single component should not result in a total outage of the WLAN.
Where possible, access points and aerials should be installed where they cannot be
seen (e.g. above false ceilings). This is to reduce the chances of them being stolen.
Access Points should be secured so that they cannot easily be removed (e.g. using
padlocks).
Access points should be set-up to load their configuration over the network. This will
ensure that no sensitive information (e.g. IP addressing schemes, secret keys, etc)
will be divulged if access-points are lost or stolen. Several modern WLAN solutions
are based around thin access-points which are controlled from a central controller.
With most of these systems, no configuration data is stored on the access-point.
Usernames and passwords (including those used to manage the access points)
should not be stored on the device itself, but rather on a secured
authentication/authorisation server. Typically, a fallback username/password
combination will be stored on the access point such that it can still be managed if the
Page 14 of 17
as
any
5.4 Hardware
Any equipment that is purchased should support multiple SSIDs (with different EAP methods
for each SSID). This will allow for a future National WLAN Authentication method to be used
in parallel with existing local implementations.
5.5 Policies
A WLAN security policy is required in each organisation covering who may install the
technology, the standards for user access control, encryption and other security controls. It
should also include the responsibilities of both the IM&T department and the users of this
technology. See the Guidance for the Secure Implementation of Wireless Networking
document for further information.
Page 15 of 17
Glossary
802.1x
802.11
A set of standards defined by IEEE for Wireless LANs. The original 802.11
standard supported speeds of 1 and 2 Mbps and operated in the 2.4 GHz
frequency range.
802.11a
802.11b
802.11g
802.11i
802.11n
AES
Authentication
Server
A server that holds user credentials and is used for authenticating users as
part of 802.1x.
Authenticator
Certificate
dawn2
Digital All Wales Network. The private network that connects NHS Wales
organisations.
DSSS
EAP
IEEE
MAC address
MIMO
Page 16 of 17
OFDM
OTP
One-Time Password. A password that is valid for one use only. Typically a
OTP is generated using a hardware token or key card.
The comprehensive system required to provide public-key encryption and
digital signature services is known as a Public-Key Infrastructure (PKI).
PKI
RADIUS
SSL
A predecessor to SSL.
Supplicant
In 802.1x terms this is the client device (i.e. the device attempting to
authenticate to a wireless network).
TKIP
TLS
WEP
Wi-Fi
Wi-Fi Alliance
The Wi-Fi Alliance is a trade group that owns the trademark to Wi-Fi
WLAN
WPA
WPA2
WPA2 is the Wi-Fi Alliances term for the full implementation of the
802.11i standard.
Page 17 of 17