IT tutorials
 
Technology
 

Windows Small Business Server 2011 : Managing Local Connectivity - Wireless Connectivity

10/28/2013 9:03:30 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Wireless connectivity has become an essential business tool. We expect to be able to connect wirelessly wherever we go and, increasingly, our expectations are met. But providing wireless access inside your SBS network is a bit different. You still generally need to do it, but you need to take serious precautions to ensure that you don’t compromise security.

We’ve heard arguments on all sides of the wireless security question, from those who appear to think that simply hiding your wireless network is all that’s required, to those who claim there is no such thing as a secure wireless network and we shouldn’t ever use or allow it. Well, as with most such arguments, the answer is somewhere in the middle.

Exactly where in the middle is really about your own comfort level and perception of risk. There are ways to implement full Two Factor Authentication (TFA) for wireless connectivity, and they can be done even on a small network if you want and need to spend the resources to do it. 

Wireless security has come a long way from the early days of wireless networking. Initially, there was Wired Equivalent Privacy (WEP) that came in two levels: 64-bit and 128-bit. Unfortunately, the algorithm for WEP was seriously flawed, and by 2001 there were widely available decryption programs that let virtually anyone who wanted to compromise WEP security. We now believe that WEP is actually worse than no security at all. It is so easy to compromise that it should be considered no security at all, but it gives users a false sense of security.

WEP was replaced with Wi-Fi Protected Access (WPA), and finally by WPA2. WPA2—also known by its Institute of Electrical And Electronics Engineers (IEEE) standard designation of 802.11i—has two levels of security: WPA2-Enterprise and WPA2-Personal.

WPA2-Enterprise uses an 802.1X or RADIUS server to distribute different initial keys to every user. This 802.1X server can use Two Factor Authentication to further increase security.


WPA2-Personal uses a Pre-Shared Key (PSK) of 8 to 63 characters in length, and it can use either Advanced Encryption Standard (AES) or Temporal Key Integrity Protocol (TKIP) encryption. TKIP provides backward compatibility with devices designed for the original WPA standard, but it has been compromised and we don’t recommend it. When WPA2-Personal is used with AES and has a minimum 16-character PSK, it provides acceptable security for most small businesses and can be easily implemented. Another important requirement is to choose a wireless network name (SSID) that is not the default on your wireless access point (WAP).

The basic requirements for secure wireless access to your SBS network are

  • Use one or more wireless access points (not routers).

  • Use a static (or DHCP reservation) for the WAP IP address.

  • Disable the DHCP server on the WAP.

  • Change the SSID of the WAP to one that is appropriate for the network but isn’t either the default or something that too clearly identifies your company.

  • Change the password of the WAP to a password of at least 12 characters.

  • Enable AES as the only encryption method.

  • Choose a PSK of at least 16 characters. Longer is better. Alternately, use a USB key and Windows Connect Now (WCN) if your WAP supports it. WCN will generate a random 64-character key.

Wireless Security Strategies

A variety of security strategies for wireless networking have been suggested and used over the years—some useful and some not. The following list details our evaluation of several of these strategies:

  • MAC Address Filtering This strategy allows only a statically managed list of MAC addresses to access the wireless network. It’s a nice idea, but this strategy is easy to defeat with a sniffer because MAC addresses can be easily spoofed. Plus, a static list of “allowed” MAC addresses is a hopeless mess to manually maintain. All in all, it’s a complete waste of time.

  • SSID Hiding This strategy requires that the client know the name of the wireless network to be able to connect to it. And even if the network is known and configured into the Windows client, that client must continually probe to make sure that the network is present. This requirement causes all sorts of problems and limits the ability of Microsoft Windows to manage connections. The strategy is totally useless because anyone with access to the packets in the air can read the SSID from the commonly sent 802.11 management frames in a matter of seconds—whereas broadcasting the SSID, when combined with appropriate security, makes the network easier to manage and easier for users as well. Hiding the SSID is another complete waste of time.

  • WEP Encryption The original encryption standard for wireless, this standard uses either a 40-bit or 104-bit key (along with a fixed 24-bit initialization vector). It is easily hacked by anyone with bad intentions and will keep only the most casually curious out of your network. WEP keys are static keys and must be manually maintained. Every time a user who has wireless access leaves the organization, the WEP keys need to be changed. A network protected with WEP alone should be considered completely unsecured.

  • WPA The original WPA encryption standard is based on RC4, which can be compromised. However, because it changes keys with sufficient frequency and derives the new keys in an improved way as compared to WEP, it was a significant improvement over WEP, and it could generally be implemented without buying new hardware. With 802.1X authentication and the appropriate authentication method, the initial encryption keys are automatically generated.

  • WPA2 The WPA2 encryption is based on AES and is much more secure than RC4, while the WPA2 standard incorporates additional security measures beyond just encryption. Both Pre-Shared Key (WPA-Personal) and RADIUS/802.1X authentication (WPA2-Enterprise) scenarios are supported. This is the minimum wireless security standard you should allow on your SBS network.

  • IEEE 802.11i This is the underlying standard for WPA2, which is described in the preceding bullet point.

  • VPNs One solution to setting up secure wireless networks is to place the wireless network outside your main network and use a VPN connection to the main network. This approach has the advantage of getting around the insecurities of older equipment, but it has inherent problems. If the external access point is open and unsecured, it leaves the client exposed to any other computer in range. It also imposes a performance hit and requires a VPN connection for every client. Machine group policies are not applied, and the overall reliability of the connection and the administrative overhead are significant issues as well.

  • IEEE 802.1X Using 802.1X as the authentication mechanism for WPA2 encryption is an excellent solution, but implementing it on most SBS networks isn’t realistic.

We know some of these points are a bit controversial, but we also think that it’s possible to allow wireless clients on your internal SBS network. But only if you set realistic minimum standards and don’t use ineffective “security” measures that provide a false sense of security while actually doing little, if anything, to protect you from an attack.

 
Others
 
- Microsoft Dynamic AX 2009 : .Performance (part 8) - Transaction Performance - Limiting Field Lists
- Microsoft Dynamic AX 2009 : .Performance (part 7) - Transaction Performance - Caching - The EntireTable Cache , The RecordViewCache Class
- Microsoft Dynamic AX 2009 : .Performance (part 6) - Transaction Performance - Caching - Record Caches
- Microsoft Dynamic AX 2009 : .Performance (part 6) - Transaction Performance - Set-Based Data Manipulation Operators - The RecordInsertList and RecordSortedList Classes
- Microsoft Dynamic AX 2009 : .Performance (part 5) - Transaction Performance - Set-Based Data Manipulation Operators - The RecordInsertList and RecordSortedList Classes
- Microsoft Dynamic AX 2009 : .Performance (part 4) - Transaction Performance - Set-Based Data Manipulation Operators - The delete_from Operator
- Microsoft Dynamic AX 2009 : .Performance (part 3) - Transaction Performance - Set-Based Data Manipulation Operators - The update_recordset Operator
- Microsoft Dynamic AX 2009 : .Performance (part 2) - Transaction Performance - Set-Based Data Manipulation Operators - The insert_recordset Operator
- Microsoft Dynamic AX 2009 : .Performance (part 1) - Reducing Round-Trips Between the Client and the Server
- Exchange Server 2010 Quick Start Guide : Configuring Recipients (part 3) - Configuring a Postmaster Address, SSL Certificate , Entering the Product Key
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us