SEGURIDAD
SEGURIDAD
For:
HX2 with Windows CE 5.0
HX3 with Windows CE 5.0
MX3Plus with Windows CE 5.0
Marathon with Windows XP, Windows 7 or Windows Embedded Standard 2009
MX7 Tecton with Windows CE 6.0 or Windows Mobile 6.5
MX7 with Windows CE 5.0
MX8 with Windows CE 5.0 or Windows Mobile 6.1
MX9 with Windows CE 5.0 or Windows Mobile 6.5
Thor VM1 with Windows CE 6.0 or Windows Embedded Standard 2009
VX3 Plus with Windows CE 5.0
VX6 with Windows CE 5.0
VX7 with Windows CE 5.0
Thor VX8 with Windows XP, Windows 7 or Windows Embedded Standard 2009
Thor VX9 with Windows XP, Windows 7 or Windows Embedded Standard 2009
Disclaimer
Honeywell International Inc. (HII) reserves the right to make changes in specifications and other information contained in this
document without prior notice, and the reader should in all cases consult HII to determine whether any such changes have
been made. The information in this publication does not represent a commitment on the part of HII.
HII shall not be liable for technical or editorial errors or omissions contained herein; nor for incidental or consequential damages
resulting from the furnishing, performance, or use of this material.
This document contains proprietary information that is protected by copyright. All rights are reserved. No part of this document
may be photocopied, reproduced, or translated into another language without the prior written consent of HII.
2005-2012 Honeywell International Inc. All rights reserved.
Web Address: www.honeywellaidc.com
Acrobat Reader 2012with express permission from Adobe Systems Incorporated.
Other product names or marks mentioned in this document may be trademarks or registered trademarks of other companies
and are the property of their respective owners.
Patents
For patent information, please refer to www.honeywellaidc.com/patents.
Limited Warranty
Refer to www.honeywellaidc.com/warranty_information for your products warranty information.
Table of Contents
Chapter 1: Introduction
1-1
Overview
1-1
Objectives
1-1
1-2
Overview
1-2
Internet Security
1-4
1-5
1-6
When to Upgrade?
1-6
Network Segmentation
1-6
WEP
1-7
LEAP
WPA
1-8
1-9
EAP-TLS
1-10
PEAP/GTC
1-11
PEAP/MSCHAP
1-12
LEAP
1-12
EAP-FAST
1-13
PSK
1-13
1-14
1-15
Prerequisites
1-15
1-15
Supplicant
1-15
Equipment Requirements
1-15
Configuration Process
1-16
2-1
2-1
2-1
Express Setup
2-3
Server Manager
2-4
Encryption Manager
2-6
SSID Manager
2-7
LEAP
2-7
2-7
WPA Configuration
2-7
WPA-PSK Configuration
2-8
i
2-9
2-11
2-11
2-12
2-12
2-13
2-13
2-14
2-17
2-17
3-1
ACS Install
3-1
Network Configuration
3-2
User Setup
3-3
3-3
3-5
Windows Database
3-7
3-8
3-11
3-11
3-14
Authentication Help
3-17
4-1
Introduction
4-1
Mobile Devices
4-1
Server Certificate
4-2
4-2
4-5
5-1
Introduction
5-1
Server Installation
5-1
Server Configuration
5-1
Adding Users
5-4
Testing Authentication
5-8
5-10
Additional Information
5-11
2-9
6-1
6-1
Chapter 1: Introduction
Overview
Note:
Some of the equipment described in this manual is obsolete. Screen displays may differ based on the version of Cisco
IOS you are using. However, to secure your wireless infrastructure the configuration process described remains the
same.
Keeping a network secure is becoming quite a task. There are Internet based attacks making the news, thefts of PCs and
especially laptops are common enough not to be news worthy and finally there is that mysterious subject of wireless security.
Just how do you protect your computers and data from intrusion?
While this document contains a brief discussion of Internet and wired security procedures, the bulk of the information concerns
wireless security.
Objectives
When you finish reading this guide, you should have a grasp of the types of security available to protect your network,
especially the wireless portion. The purpose is not to explain the Honeywell components and systems themselves, but rather
to give you the knowledge you need to read other, more detailed, documents on those subjects.
If you are a Honeywell employee or customer and you sometimes feel unsure of or intimidated by the security terminology you
hear thrown about, then this document has been written for you. Rather than concentrating on developing detailed technical
skills, this document is designed to give you an intuitive sense or feel for the security concepts and terms used.
Please refer to the appropriate mobile computer online Reference Guide for complete information on configuring security
parameters for Honeywell mobile computers.
Also, please refer to documentation provided by other manufacturers (i.e.: Cisco documentation for the Access Point IOS) for
other components in your network.
1-1
An unstructured attack comes from a person (or persons) with limited technical ability, knowledge and resources.
Examples include an outsider looking for free access to the Internet or to create network or Internet traffic to slow the
system down. In many cases, these attacks are quite inconvenient but the attacker is not looking to steal information.
Generally, even a minimal level of security discourages an unstructured attack. For example, simply changing wireless
equipment settings from factory defaults and implementing security as basic as WEP may discourage an unstructured
attack.
Structured attacks are more sophisticated. The person (or persons) implementing the attack may have a deep
understanding of network design and network and protocol weaknesses. These attackers will have some financial
resources to devote to the attack. Attackers may be after banking, credit card or personal identity information. Your
network could be the victim of industrial espionage from a competitor looking for confidential information. Other attacks
may seek to destroy information. Competitors may hope to interrupt your business by deleting critical information from
your network. You may find that WEP may not provide the security you desire when faced with a structured attack on
your wireless devices. A structured attacker will be more familiar with the weaknesses built into an operating system,
for example.
We can divide the attacks according to the source of the attack, internal or external.
l
External threats originate from outside the users of your network. In many cases, the external attacks originating from
the Internet are the ones you hear the most about. Other types of external threats include someone eavesdropping on
your wireless network traffic.
Internal threats originate from users on your network. The most common would be an employee, but could also be a
contractor or vendor. An insider is authorized to be on the network and may know their way around the network fairly
well. A common example is a disgruntled employee. Unintentional actions of employees may also pose an internal
threat by downloading software containing viruses or worms.
We can also divide the threats into three categories, technology, configuration and policy weaknesses.
1-2
Technology weaknesses include any weakness due to protocol, hardware or operating system. For example, TCP/IP
protocol contains weaknesses because it was designed to be an open standard for communication. Many people are
familiar with the workings of TCP/IP and how it can be exploited. Technology weaknesses also include operating
system weaknesses. The most common examples are the security flaws (and related updates) announced for
Microsoft Windows. Although problems with Windows operating systems get the most press due to the widespread
use of Windows, any operating system should be considered a candidate for this type of attack.
Configuration weaknesses arise when network equipment is left in its default configuration. A common mistake is
failing to secure administrator accounts with a unique password, leaving no password (or the factory default password)
to provide little security against attack. Another configuration weakness is using passwords that are easily guessed
(common names, short passwords, common words).
Policy weaknesses are the failure to implement and follow a policy on security. Policy should be written and include
actions to be taken in the event of an attack. Another vital policy point is a recovery plan. Policy plans should include
details on user privileges, passwords, Internet access, and hardware configuration. Common policy weaknesses are a
lack of a policy plan or the failure to enforce the policy that is in place. Good policy includes strong passwords and a
regular password change policy. Good policy also includes removing user accounts when employees leave the
company.
We can even divide the methodology into four categories as to how the attack is executed: reconnaissance attacks,
unauthorized access, denial of service attacks, and data manipulation.
l
Denial of service attacks attempt to disable network services for legitimate users. An example is sending a large
number of PING requests, overwhelming devices in the network and slowing (if not stopping) service for legitimate
users. Attacks may also be directed against CPU utilization, buffer memory or disk drive space as well as network
resources.
Reconnaissance attacks are unauthorized discovery, mapping or monitoring of the network. The attack may be to learn
more about the network for additional attacks or to eavesdrop on network traffic for passwords or information theft.
Unauthorized access occurs when an intruder gains access to information they should not access. It may be an
outsider or it may be an employee viewing information they should not be able to access. Unauthorized access can
occur when an intruder is able to find a user name and break a password. Once an intruder gains access, they can gain
control of targeted devices or attempt to penetrate deeper into the network. The goal may be to gain administrator
access to the network.
Data manipulation is often referred to as a man in the middle attack. An intruder captures, manipulates and replays data.
The attack may be made by IP spoofing (impersonating the identity of a trusted computer), session replay (interception
and capture of data packets or commands which are then manipulated and rebroadcast), session hijacking (intruder
takes over the session and inserts false data packets) and rerouting (intruder gains access to routers and spoofs
identities, which can allow a remote host to pose as a local host on the network).
As we start to look at solutions, consider how these categories mentioned above come into play. If you expect unstructured
attacks originating internally, you may find policy changes are all that is necessary. If you expect a structured attack from
external sources, be aware of technology, configuration and policy weaknesses.
How do you protect your network from these types of attacks?
Well look at solutions by the portion of the network susceptible to the attack. The reason for this is because the commercially
available security products seem to fit these three areas:
l
Keep the distinctions made above in mind when considering the solutions provided.
1-3
Internet Security
Perhaps more has been written about Internet security than any other type of network security. Honeywell realizes most of its
customers wont use their mobile computers to browse the Internet. However, it is likely PCs on the same network as the
mobile computer may be used to browse the Internet. Once a virus enters the network, it may spread to other devices on the
network.
There are many commercially available products to protect your computer or network from Internet based attacks. A firewall
and anti-virus program should be considered the bare minimum. Types of attacks include:
l
Trojan horse A destructive program appearing as a benign application. An example is a virus removal program that
introduces a new virus to the system rather than removing the virus as promised. Unlike a virus, a Trojan horse does not
replicate itself. Instead the program stays in place doing its damage or allowing an outside person to take control of the
computer.
Virus A piece of software code loaded onto your computer without your knowledge. The code is buried within an
existing program. Once the code is executed, the code may be copied to other programs or other computers. Viruses
may simply display a message or replicate to the point all available disk space or memory has been used. More
malicious viruses may seek to destroy programs or data. Viruses may perform their action immediately or lay dormant
until a certain date or time.
Worm A program or algorithm that replicates itself over a computer network. The worm replicates until the computers
resources are used up, eventually taking the system down.
Spyware Software that sends information about your habits, such as web browsing, to a certain web site. Often,
spyware is used to more directly target advertising on web sites to the users past browsing patterns. Spyware may also
be used to gather e-mail addresses, passwords or credit card information.
There are numerous commercial and freeware antivirus and spyware blocking/removal programs available. Most of these
providers maintain websites that provide details on the threats currently circulating. Please refer to these websites to
determine the software packages that best suit your needs.
While Honeywell does not make specific recommendations on Internet security as Honeywell computers are generally not
used to browse the Internet, you should consider implementing appropriate policies on Internet security on other portions of
your network, such as
1-4
Computers with sensitive information should also be equipped with spyware detection tools.
Implementation of software and/or physical firewalls to limit intrusion or damage should security be breached.
The strong password policy should include requiring the longest possible password (8 characters should be the
minimum, 10 are better), and should enforce periodic password changes. If possible, passwords should include a
mixture of letters, numbers and special characters.
Policy should include regular password changes; especially to update any passwords an employee had access to when
that employee leaves the company.
As operating system security flaws are discovered, software updates should be implemented. This is especially
important on computers with Microsoft Windows operating system simply because it is the most commonly deployed
OS and is subject to more types of attacks.
Implementation of software and/or physical firewalls to limit intrusion or damage should security be breached.
There are many commercially available publications dealing with networks and network security. Please refer to these guides
for information on general network configuration.
1-5
Your network architecture are there barriers between the wireless network and rest of the corporate network, is
sensitive data available on the wireless network?
The wireless client devices what operating systems are used, what security options are available, etc?
Your security infrastructure what user database are you using, what authentication technology is being used, is a PKI
in place, etc?
How much administrative resource are you willing to commit to wireless security?
What security policies can you reasonably expect your users to tolerate?
When to Upgrade?
If you are running a network of DOS computers and are concerned about security, when do you implement WPA (Wi-Fi
Protected Access) since it requires an investment in new equipment? If your data is sensitive and you consider the probability
of an attack likely, you may want to invest in WPA compliant equipment immediately. If you elect not to upgrade, use the
strongest possible security available to you on the old equipment, for example, 128-bit WEP (as opposed to 40-bit) or Ciscos
LEAP if your equipment supports it.
Network Segmentation
If your DOS devices are used for a less critical purpose like transmitting inventory picks and moves, you may want to create
network segments. Properly implemented, you can keep DOS devices running WEP or LEAP on their own network segment. If
security of these older wireless devices were breached, only the information in the particular network segment would be in
jeopardy.
If a building contains both office space and warehouse space, it certainly would make sense to create at least two network
segments. The wireless inventory control computers could operate on WEP or LEAP. This would discourage most casual
attackers. If a determined attacker did gain access to this network segment, they would be limited to the pick move data
carried on this segment.
The office segment of the wireless network would likely carry much more sensitive data such as payroll information, employee
data and business plans. Since the wireless computers in the office segment are likely going to be laptop computers running a
Windows operating system, it makes sense to implement a WPA solution on this segment.
1-6
WEP
WEP (Wired Equivalent Privacy) is an IEEE standard security protocol that was introduced in 1997. The intent was to provide
the same level of security to wireless networks that was possible in a wired environment. When WEP is used, data is
encrypted as it is transmitted over the wireless network. Unlike WPA security methods, WEP does not provide for direct user
authentication. However, since a client without the WEP key can only associate with an access point but cannot transmit
data, WEP does provide a de facto user authentication.
WEP originally specified a 40-bit key. 128-bit keys (actually 104 bits plus a 24-bit initialization vector) were later specified.
When possible, 128-bit keys should be specified as the longer key greatly increases security.
Advantages
l
Available across DOS, Windows (98, 2000, XP) and Windows CE platforms.
Can deter many less determined attackers such as war drivers looking for an open system to gain free access to the
Internet.
Dynamic WEP can be used to reduce the possibility of a security breech, where supported.
Disadvantages
l
Requires the key to be entered on all access points and wireless devices. This makes regular changes to the WEP
keys cumbersome.
1-7
LEAP
Ciscos LEAP may provide additional security as compared to WEP. However, LEAP is the oldest of the wireless oriented
802.1x protocols, and likely the most widely deployed. Recently published tools to exploit password vulnerabilities in the LEAP
protocol have made it less attractive. LEAP should be deployed only if no other 802.1x protocol is supported, and then only if a
strong password policy can be enforced.
LEAP authenticates users based on user names and passwords. LEAP does not require a Public Key Infrastructure (i.e. there
is no certificate authority). While WEP only provides data encryption, LEAP authenticates users.
When deployed outside of WPA, LEAP can be used with Cisco Key Integrity Protocol (CKIP) and Cisco Message Integrity
Check (CMIC) to provide enhanced data encryption.
Advantages
l
Available across DOS, Windows (98, 2000, XP) and Windows CE platforms when Cisco radios are used.
Can deter many less determined attackers such as war drivers looking for an open system to gain free access to the
Internet.
Disadvantages
1-8
Vulnerable to dictionary attack, meaning that enforcement of a strong password policy is required for security.
WPA
WPA contains two components Encryption and Authentication. TKIP and MIC, both considered encryption components, are
required. Authentication is also required, but there are many options available. WPA compatible devices for enterprise
applications are required to support some form of 802.1x authentication but not all of them. Devices intended for small office
or home use can support WPA Pre-Shared Key PSK() instead of 802.1x. Many devices will support several forms of 802.1x
authentication, as well as WPA-PSK.
If you are interested in the additional security provided by WPA, the first question you need to ask is Does my equipment
support WPA?. Mobile computers that support WPA include all Honeywell computers with a Summit Client Utility (Windows
XP, Windows CE and Windows Mobile operating systems), a Broadcom Client Utility (Windows XPoperating system) or a
Atheros Client Utility (Windows XPoperating system). These utilities provide additional configuration options not available
with the Windows Wireless Zero Config utility. If your mobilecomputer is not covered in the list above, please contact
Technical Assistance for WPA support options. Complete instructions for using the wireless configuration utilities is covered in
the device-specific Reference Guide.
If your equipment does not support WPA, is the additional security worth the upgrade costs? Upgrades may consist of new
software or drivers for existing computers, a wireless radio upgrade or new mobile computers that support WPA. Youll also
want to check other wireless devices on your network. Many wireless printers, scanners and VoIP wireless telephones, for
example, do not support WPA security. Also, older models of wireless Access Points may not support WPA.
If your equipment supports WPA, the next question is What type of WPA should I implement on my network?. Do you want to
implement EAP-TLS, PEAP/MSCHAP or some other 802.11x protocol? Is WPA-PSK an option for you? The sections that
follow provide some detail on the different WPA protocols available to you.
1-9
Advantages
l
Data validation ensures messages have not been altered during transmission.
Disadvantages
l
EAP-TLS
This is probably the most secure of the 802.1x protocols in common use. But this security comes at a price. EAP-TLS requires
PKI certificates on both the authentication server and on the client computers. These certificates provide identification (instead
of a password). An asymmetric mathematical algorithm is used to verify certificates. Mutual authentication is supported
(RADIUS server authenticates the client, client authenticates the RADIUS server) to eliminate rogue Access Point
vulnerability. EAP-TLS requires more administrative attention than other 802.1x protocols.
Advantages
l
Is available from all security supplicant vendors, such as Summit. It is included with Windows XP Service Pack 2 using
Windows Wireless Zero Config.
Disadvantages
l
Costly, compared to password based systems, because of the required software and manpower for setup, training and
maintenance.
Is really practical only for device security. Especially in a warehouse environment, it is very difficult to use certificates
to authenticate users.
1-10
PEAP/GTC
PEAP (Protected Extensible Authentication Protocol) is similar to EAP-TLS in that it is based on Transport Layer Security.
PEAP, however, does not require user certificates on the client computers. PEAP establishes a protected tunnel to pass user
credentials back to the authentication server.
There are two versions of PEAP available. This version uses credentials obtained from a Token Card to validate the user.
PEAP/GTC could also be used to pass username and password credentials to any user database which expects clear text
passwords.
Note that the password is not passed in clear text over the wireless link. On the wireless link, the password is encrypted inside
the PEAP protected tunnel. Once it reaches the access point, and the PEAP tunnel is removed, it is placed in clear text on the
Ethernet network.
Advantages
l
Provides compatibility with a wide variety of user databases. Can be used with LDAP or other non-Microsoft user
databases, as well as with all popular token card authentication engines.
Does not require user or client device certificates, and is less difficult to administer than an EAP-TLS system.
Disadvantages
l
Not widely supported. It is not supported in Microsofts Windows XP WLAN security supplicant (the Zero Config utility).
Token cards require additional hardware and are not typically suitable for warehouse deployment due to user and
hardware considerations.
One time passwords (OTP) complicate 802.11 mobility and are not recommended. One time passwords are common
with token card systems.
1-11
PEAP/MSCHAP
PEAP (Protected Extensible Authentication Protocol) is similar to EAP-TLS in that it is based on Transport Layer Security.
PEAP, however, does not require certificates on the client computers. PEAP establishes a protected tunnel to pass user
credentials back to the authentication server.
There are two versions of PEAP available. This version uses MS-CHAP v2 to authenticate user names and passwords.
PEAP/MSCHAP v2 is useful if the user database stores passwords hashed using MS-CHAP v2. This typically constrains
PEAP/MSCHAPv2 to use by enterprises which deploy Active Directory to store user credentials. However, local RADIUS
databases can use this protocol as well.
Advantages
l
Commonly available. PEAP/MSCHAPv2 is supported by all supplicant vendors, and is one of three authentication
methods supported natively by Windows XP Service Pack 2.
Does not require user or client device certificates, and is less difficult to administer than an EAP-TLS system.
Disadvantages
l
Suitable only if user database stores passwords hashed with MSCHAP v2 (Active Directory or local RADIUS
databases).
LEAP
LEAP (Lightweight Extensible Authentication Protocol) was developed by Cisco for deployment on wireless LANs with Cisco
equipment.
Ciscos LEAP may provide additional security as compared to WEP. However, LEAP is the oldest of the wireless oriented
802.1x protocols, and the most widely deployed. Recently published tools to exploit password vulnerabilities in the LEAP
protocol have made it less attractive. LEAP should be deployed only if no other 802.1x protocol is supported, and if a strong
password policy can be enforced.
It authenticates users based on user names and passwords. LEAP does not require a Public Key Infrastructure (i.e. there is no
certificate authority).
Advantages
l
Can deter many less determined attackers such as war drivers looking for an open system to gain free access to the
Internet.
Does not require any use of Certificates. LEAP is one of the easiest authentication protocols to administer.
Disadvantages
l
Vulnerability to dictionary attacks means that enforcement of a strong password policy is a requirement.
Requires Cisco radios, or CCX certified radios, and Cisco Access Points.
1-12
EAP-FAST
EAP-FAST was developed by Cisco to improve upon the security offered by LEAP. EAP-FAST uses shared secrets instead of
certificates to establish an encrypted tunnel for exchanging user credebtials.
EAP-FAST occurs in three phases:
l
Phase 0 is a method to provide a PAC (Protected Access Credential) key to the client. Alternatively, Phase 0 can be
skipped and the PACs manually provided to the client.
In Phase 1, the Cisco ACS and the user client establish a encrypted tunnel based on the PAC presented by the end
user.
In Phase 2, the Cisco ACS authenticates the user credentials with EAP-GTC which is protected by the encrypted
tunnel created in the previous phase.
Advantages
l
Disadvantages
l
Requires Cisco radios, or CCX certified radios, and Cisco Access Points.
PSK
WPA-PSK relies on a pre-shared secret key to establish the encrypted authentication and key exchange tunnel. Typically the
Pre-Shared Key (PSK) is derived from a passphrase entered by the device administrator. The passphrase key is provisioned
off-line (entered manually). Since the passphrase is manually entered into each device, it will rarely be changed. This makes it
vulnerable to dictionary attacks. The IEEE 802 committee recommends that passphrases should be at least 20 characters long
and follow the same rules as a strong password. This level of passphrase will deliver security equivalent of a 40-bit WEP key.
Honeywell does not recommend using WPA-PSK in enterprise applications. Some enterprises are tempted to use WPA-PSK
to avoid the burden of establishing a RADIUS infrastructure. This should be chosen as a temporary solution only, with
migration to 802.11x planned within the year.
1-13
Lower cost.
Least secure.
Restrictive
l
Provides more security than an open policy at a greater cost and visibility.
Provides less security than a closed policy at a lesser cost and visibility.
Closed
l
Highest cost.
Most secure.
What is right for you? Hopefully, the information presented in this document can help you determine the policies appropriate for
your wireless network and provide some insight into security policies for the remainder of your network.
1-14
Configuration screens may appear slightly different depending on the version of IOS used.
Honeywell has also tested the Cisco 1242 and Cisco 1300 wireless bridges.
Cisco ACS Radius Server
Access Control Server (ACS) ACS 3.2.3 or greater is required for EAP-FAST.
Remote Authentication Dial-In User System (Radius)
A Radius server is not necessary for TKIP.
Note:
Configuration screens may appear different depending on the version of ACS used. ACS revision 3.3.2 was used for
the illustrations in this document.
Supplicant
The device must be equipped with the appropriate supplicant software. Please review the equipment requirements below to
verify your device has the proper supplicant software installed.
Equipment Requirements
The Summit radio supplicant is available to support WPA for devices with Windows operating systems.
The VX8 and VX9 with an Atheros or Broadcom supplicant also support WPA.
For equipment not listed above, please contact Technical Assistance.
1-15
Configuration Process
1. Configure the Cisco AP for the appropriate authentication protocol. See Cisco AP / Bridge Configuration.
2. Configure the Cisco ACS RADIUS Server (not necessary for WPA-PSK). See Cisco ACS RADIUS Server
Configuration to set up the RADIUS server for LEAP, PEAP/MSCHAP, PEAP/GTC and EAP-TLS.
3. Certificate administration (EAP/MS-CHAP, EAP/GTC, EAP/TLS) includes requesting certificate signing requests,
requesting server and user certificates, exporting user certificates and installing certificates. See Certificate
Administration.
4. RSA ACE Server Installation details the token server setup for PEAP/GTC. See RSA ACE Server Configuration.
5. Honeywell device configuration is covered in the online Reference Guide for the Honeywell device. Refer to the
Wireless Network Configuration section in the Reference Guide.
1-16
It is best to connect to the AP via the Ethernet port and not by radio. When configuration changes are made to the AP,
the radio connection fails until the new configuration is made to the client radio as well.
2-1
For more information on Cisco IOS, please refer to Ciscos on line help or product information available on Ciscos website.
Screens shown throughout the remainder of this section are accessed from the navigation buttons shown displayed on the
upper left hand corner of the screen.
2-2
Express Setup
Click Express Setup.
Set Aironet Extensions to disable.
Click Apply.
2-3
Server Manager
Click Security. Click Server Manager then scroll down.
This Server Manager configuration applies to all types of authentication except WPA-PSK. For WPA-PSK there is no server
required, therefore this step is not applicable.
Scroll to the Corporate Servers area and with <NEW> highlighted in the Server list box enter the IP or hostname in the text
box. Enter the shared secret used for that server and this AP.
Note:
The shared secret is just a password used between the AP and the ACS server for that AP. Document the shared
secret for each AP. The shared secret may be the same for each AP.
Scroll down and click the Apply button in the Corporate Servers area.
2-4
Navigate to the Default Server Priorities area and choose the server in the EAP Authentication scroll bar for Priority 1. If
there are backup RADIUS servers you can put them in as well.
Scroll down and click the Apply button at the bottom of the screen.
2-5
Encryption Manager
Click Security.
Using the navigation bar on the left, click on Encryption Manager.
This Encryption Manager configuration applies to all types of authentication with WPA and WPA-PSK. WPA requires the use
of TKIP for both WPA and WPA-PSK.
In the Encryption Modes area click the radio button for Cipher and use the scroll bar to choose TKIP.
Scroll down and click the Apply button.
2-6
SSID Manager
Using the navigation bar on the left, click SSID Manager.
Create a SSID for the WPA system to use. Scroll down to Authentication Settings -> Methods Accepted.
Note:
AP configuration for PEAP/MS-CHAP, PEAP/GTC, EAP-TLS and EAP-FAST is the same. It does not matter which
client supplicant is used. Configure the AP as shown in PEAP, EAP-TLS
LEAP
Check the box for Open Authentication and use the scroll bar to choose with EAP. Check the box for Network EAP and use
the scroll bar to choose No Addition.
WPA Configuration
Scroll down to Authenticated Key Management. Use the scroll bar to choose Mandatory. Check the box for WPA.
If configuring the system to authenticate to a RADIUS server do not put anything in the WPA Pre-Shared Key text box.
Scroll down and click the Apply button.
2-7
WPA-PSK Configuration
Click Security, click SSID Manager then scroll down.
If there is no RADIUS server and WPA-PSK is to be used, enter an ASCII key into the WPA Pre-Shared Key text box.
Document what the key is so it can be entered into the client configuration. There is no authentication for WPA-PSK, so set
method to Open Authentication <NO ADDITION>.
Scroll down and click the Apply button.
The AP is now configured. By clicking the Associations link you can see which devices are EAP Authenticated. If a client is
not authenticated the screen shows EAP pending.
2-8
Check the Cisco documentation for these and other configuration settings.
Configure the access point normally then use these commands to turn on EAP and WPA.
Telnet into the AP on the LAN connection.
Parameter
Sub-parameter
hostname
Description
Example
Name of AP
AP1200WPA
aaa
new-model
100.100.100.100
radius-server
host
100.100.100.100
host key 0
Secretkey
encryption mode
ciphers
tkip
authentication
authentication
Setting WPA
key-management
wpa
interface Dot11Radio0
Example
Telnet into the AP, login (default is Cisco for username and password).
Type en for enable and Cisco for password. Enter conf t.
Paste the following data at this point to enter this configuration.
hostname AP1200WPA
aaa group server radius rad_eap
server 10.2.3.1 auth-port 1645 acct-port 1646
aaa group server radius rad_mac
aaa group server radius rad_acct
aaa group server radius rad_admin
aaa group server tacacs+ tac_admin
aaa group server radius rad_pmip
aaa group server radius dummy
aaa authentication login eap_methods group rad_eap
aaa authentication login mac_methods local
aaa authorization exec default local
aaa authorization ipmobile default group rad_pmip
aaa accounting network acct_methods start-stop group rad_acct
aaa session-id common
bridge irb
interface Dot11Radio0
no ip address
2-9
no ip route-cache
ssid peapTest
authentication open eap eap_methods
authentication key-management wpa
speed basic-1.0 basic-2.0 basic-5.5 basic-11.0
rts threshold 2312
station-role root
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
bridge-group 1 spanning-disabled
interface FastEthernet0
no ip address
no ip route-cache
duplex auto
speed auto
bridge-group 1
no bridge-group 1 source-learning
bridge-group 1 spanning-disabled
interface BVI1
ip address 10.2.3.22 255.255.0.0
no ip route-cache
ip default-gateway 10.2.8.1
ip http server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag/ivory/1100
ip radius source-interface BVI1
radius-server host 10.2.3.1 auth-port 1645 acct-port 1646 key 7 13171117050B
radius-server attribute 32 include-in-access-req format %h
radius-server authorization permit missing Service-Type
radius-server vsa send accounting
bridge 1 route ip
end
2-10
The root wireless bridge must be added to the RADIUS server just as an AP1200 is added.
The root wireless bridge is configured to authenticate any non-root wireless bridge via the RADIUS server.
2-11
To authenticate to the root wireless bridge the EAP client username and password must be entered as the authentication
credentials. This is done on the SSID Manager configuration screen under General Settings.
The non-root wireless bridge appears on the root wireless bridge association table and the authentication state.
Now an access point can be connected to the non-root wireless bridge and all traffic will be secure.
2-12
RADIUS Server
Encryption Manager
Cipher = TKIP
SSID Manager
Next navigate to the Radio-802.11G settings screen and set the Role in Radio Network setting.
The root wireless bridge must be added to the RADIUS server just as an AP1200 is added.
The root wireless bridge is configured to authenticate any non-root wireless bridge via the RADIUS server.
2-13
Set the correct SSID to connect to the root bridge and set the a radio for this SSID.
Navigate to the bottom of the screen and set the Infrastructure SSID to the configured SSID setting as shown below.
Enter valid client credentials from the RADIUS server to authenticate the non root bridge
After configuring the AP credentials navigate to the correct SSID in the SSID manager screen to use these credentials.
2-14
After configuring the AP credentials navigate to the correct SSID in the SSID Manager screen to use these credentials.
2-15
2-16
2-17
Add users for the RADIUS server by typing a username and password for each user.
If any group settings are required for session timeout or any of the other settings listed, add a group with your correct settings.
After adding the group, make sure to change all the users to the correct group using the Group Name pull down listing in the
Current Users box.
2-18
The AP local RADIUS server is now configured to authenticate LEAP clients. To continue configuration to authenticate EAPFAST clients, click the EAP-FAST Set-Up tab at the top of the page.
Honeywell testing was completed with a Primary Key generated by clicking the Generate Random box and clicking Apply.
This is optional per the AP setup screen shown.
2-19
2-20
Navigate to the Server Manager of each AP on the network and enter the AP information configured for the local RADIUS
server.
This is configured in the Backup RADIUS Server box of each AP on the network as shown.
Enter the IP address and the shared secret configured above.
Do not configure Corporate Servers if using a local RADIUS server in an AP. Configuring a Corporate Server causes a delay in
authentication as the Corporate Server must timeout before going to the Backup RADIUS Server.
2-21
2-22
ACS Install
Install the Cisco ACS following the installation instructions on the CD. Start the ACS and log in.
For more information on Cisco Secure ACS, please refer to Ciscos on line documentation and product information available on
Ciscos web site.
3-1
Screens shown throughout the remainder of this section are accessed from the navigation buttons shown above, displayed on
the left hand side of the screen.
Network Configuration
Click the Network Configuration button.
The Cisco ACS calls the AP to be used an AAA Client. Configure the AAA client with the same parameters as the AP1200.
AAA Client Hostname is required to be the same as in the AP. The key is the same as entered in the AP Server configuration,
called the shared secret.
Configure
l
hostname,
client IP,
Authenticate Using, by selecting RADIUS (Cisco Aironet) from the drop down box,
3-2
User Setup
To authenticate users credentials with the Cisco ACS RADIUS server, that user must be setup in a user database. The Cisco
ACS will check a user database in the ACS, or it will check any one of several possible external user databases.
3-3
Make sure in the User Setup area that the Password Authentication box is set to CiscoSecure Database.
In the password boxes enter the password to be used for this username.
Scroll down and set the Group box to the group for this user if applicable.
Click the Submit button.
Repeat this process for each user to be added to the CiscoSecure User Database.
See the Cisco ACS online help for other user parameters that are available.
3-4
3-5
3-6
Windows Database
Click Windows Database.
For testing purposes do not check the Verify that Grant dialin permission to user"... button.
3-7
The available Windows domains found by the Cisco ACS will be listed on the left pane. Use the arrow button to move the
correct domain to the box on the right (see Figure Below).
No other buttons need to be checked.
Click the Submit button at the bottom of the screen.
3-8
There are no parameters in the Cisco ACS for the RSA ACE server.
The location of the RSA dll that the Cisco ACS finds is displayed.
Next, the Unknown User Policy must be configured so the Cisco ACS will check these new databases. Navigate to the
External User Database screen and click the Unknown User Policy link.
The external databases configured will be displayed in the left pane. To have Cisco ACS check these databases highlight them
and click the right arrow button.
3-9
Now when a username that the Cisco ACS does not know about is received it will check the databases list in the right pane (as
shown above).
Click the Submit button and now a user can use the Active directory username and password or the RSA SecurID hardware
token to authenticate.
3-10
For an example of getting a certificate see Server Certificate, later in this document.
3-11
3-12
3-13
PEAP/MSCHAPv2
PEAP/EAP-GTC
EAP-TLS
EAP-FAST
LEAP
Check the Enable Fast Reconnect box. This will allow the wireless devices to authenticate faster when they roam from one
AP to another.
3-14
3-15
3-16
Authentication Help
If there is a problem getting authenticated one tool is the ACS logs.
Navigate to the Cisco ACS and click the Reports and Activity button.
3-17
3-18
Mobile Devices
Instructions for the Root Certificate and User Certificate generation and installation processes differ by equipment type and
operating system. Refer to the Wireless Network Configuration section in the equipment specific Reference Guide.
In Brief:
1. Root Certificates are necessary for EAP-TLS, PEAP-GTC, and PEAP/MSCHAP.
l
4-1
Server Certificate
The Cisco ACS requires a server certificate to be installed before it will allow any type of EAP authentication. The steps to get
a certificate installed are
l
Use the ACS Certificate setup page to generate a certificate signing request.
Send the data from the request to a certificate authority to request a certificate.
4-2
4-3
4-4
Signing on with non-administrator rights does not allow requesting the correct type of certificate.
4-5
4-6
Click the link for Submit a certificate request by using a base-64-encoded CMC or PKCSA #10 file.
Paste the generated request data from the Cisco ACS by pressing Ctrl V.
Set the certificate template to Web Server.
4-7
Note:
Signing on with non-administrator rights will not allow requesting the Web Server certificate.
4-8
When the CA issues the certificate click the link Download certificate.
Save the certificate by clicking the Save button and save the certificate to a location on the hard disk.
Keep track of the certificate, as it is needed when installing it into the ACS.
Now the ACS certificate is saved on the ACS computer hard drive and is ready for installation.
To install the certificate go to Installing an ACS Certificate.
4-9
4-10
Server Installation
Install the RSA ACE server according to the directions in the documentation that comes with the server.
Import the token data once the server is installed.
Server Configuration
To configure the user database click Start | Programs | RSA ACE Server | Database Administration Host Mode.
Click the System menu and make any changes required.
In the test case the Allow agent host auto-registration box was checked and the Alphanumeric PINS allowed box under
PIN options.
5-1
Click OK.
5-2
5-3
Adding Users
Now add users under the User menu.
Enter a users last name and username and click the Assign Token button.
Click yes to add the user to the database.
The select token screen appears.
5-4
Click the Select Token from List button and choose the token for this user.
The numbers correspond with the number on the back of the tokens.
5-5
Note:
Write the username on the back of the token to keep track of which token goes with each username.
Now the user must be activated on the agent host by clicking the Agent Host Activations button on the user screen.
Double click the agent host name setup above to activate the user as shown below.
5-6
5-7
Testing Authentication
The user is now configured in the server and can be tested on the server. Navigate to Start | All Programs | RSA ACE
Agent | Test Authentication.
Enter the new username and the current passcode from the hardware token.
5-8
If this is the first time the username is used a new PIN will be created as shown.
After configuring the PIN it will ask to authenticate again.
Note:
Using a PIN and passcode or only the passcode is configurable in the token screen for each token. The choices are
Users authenticate with: passcode or tokencode only.
The username is already in the field. Now enter the PIN followed by the passcode.
Once the test authentication works configure the mobile computer for EAP/GTC and use the same user credentials. Please
refer to the appropriate Reference Guide for the mobile computer for details on configuring the computer for WPA.
5-9
5-10
This screen displays each authentication attempt as tested with the Test authentication screen and the active monitor.
Additional Information
The documentation provided with the RSA ACE server is extensive. For additional parameters and configurations consult the
documentation.
Links to additional help and implementation guides are available by typing "RSA ACE Server" into a browser search engine.
5-11
5-12
Glossary
There are many terms and acronyms used when discussing security, especially when wireless security is the topic. The
following terms and acronyms are used throughout this document.
ACS
Access Control Server.
AP
Access Point. Hardware and software product (essentially a computer) that performs an Ethernet to Radio Frequency bridging
function over radios in the same frequency band.
CA
Certificate or Certification Authority. An organization that issues and manages security credentials and public keys for
message encryption.
CKIP
Cisco Key Integrity Protocol.
CMIC
6-1
6-2
Protected Extensible Authentication Protocol. One of the possible 802.1x authentication protocols that can be used in WPA Wi-Fi Protected Access.
PEAP/GTC
PEAP - Protected Extensible Authentication Protocol. GTC - Generic Token Card. One of the possible 802.1x authentication
protocols that can be used in WPA. PEAP/GTC requires a certificate for authenticating the authentication server, but uses
token card credentials for authenticating the user.
PEAP/MSCHAP
PEAP - Protected Extensible Authentication Protocol. MSCHAP - Microsoft Challenge Handshake Protocol. One of the
possible 802.1x authentication protocols that can be used in WPA - Wi-Fi Protected Access. PEAP/MSCHAP requires a
certificate for authenticating the authentication server, but relies on user name and password (encrypted with MSCHAPv2) to
authenticate the user.
PING
Packet Internet Grouper. A program used to test reachability of destinations by sending them an Internet Control Message
Protocol (ICMP) echo request and waiting for a reply.
PKI
Public Key Infrastructure. A PKI is required to issue and maintain digital certificates. The PKI is used to provide a highly
reliable system for identifying users and/or devices on the network. A PKI consists of a Certificate Authority, along with
certificate stores on network components.
PSK
Pre-Shared Key. The pre-shared key is a value or string known by all participants in a security conversation. The PSK is not
distributed over the network. Normally, the PSK is manually entered into all devices where it is required.
RADIUS
Remote Authentication Dial-In User System. A common method for providing authentication, authorization and accounting
services to the network. RADIUS was developed to support users dialing into the network, but is now commonly used for all
types of network connections: Ethernet, dial-up, wireless, etc.
TCP/IP
TCP - Transmission Control Protocol. IP - Internet Protocol. The purpose of these two protocols is to allow computers to
communicate over long distance networks. The TCP part has to do with verifying delivery of packets. The IP part refers to
moving data packets between nodes. TCP/IP software is built into all major operating systems, such as Unix, Windows and
the Mac OS.
TKIP
Temporal Key Integrity Protocol. TKIP is a data encryption protocol specified by the 802.11i standard as an improvement to the
original 802.11 WEP encryption protocol.
WEP
Wired Equivalent Privacy. WEP is the encryption protocol specified by the original 802.11 specification. WEP was intended to
provide privacy for wireless communication equivalent to that enjoyed by unencrypted wired line users.
6-3
E-TO-SECURITY
Rev H
10/12