1 / 8

802.11 Security (Again, Sorry)

802.11 Security (Again, Sorry). Darrin Miller dmiller@cisco.com. Agenda. Today Tomorrow Public WLANs Private WLANs Future. Today. Proprietary Implementations  Variety of implementations that thwart the large threats to 802.11 Wireless LANs (WLANs) WiFi Protected Access (WPA)

orli-lowery
Download Presentation

802.11 Security (Again, Sorry)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 802.11 Security (Again, Sorry) Darrin Miller dmiller@cisco.com

  2. Agenda Today Tomorrow Public WLANs Private WLANs Future

  3. Today Proprietary Implementations  Variety of implementations that thwart the large threats to 802.11 Wireless LANs (WLANs) WiFi Protected Access (WPA) Imminent, and again mitigates the large threats to 802.11 WLANs Tunneling overlays (SSL, SSH, IPsec)

  4. Tomorrow - 802.11 – Task Group i (TGi) • Pros • Stronger Encryption (AES) • More complete features and mitigation of threats • authenticated management frames • Secure ad-hoc networking • Secure roaming • Challenges • Must evaluate the entire system for security • Relies on other entities for security (IETF) • How soon will TGi be finished and how soon will vendors produce interoperable products • EAP acronym soup (EAP-TLS, PEAP, EAP-TTLS)

  5. Public WLANs • Today • Authentication Mandatory • Typically No Confidentiality • Limited Roaming • Dedicated Access Points • Tomorrow • Legacy Device Support • Roaming Mandatory • Fraud Protection • Confidentiality Desired • Shared Use Access Points

  6. Private WLANs • Today • Authentication Mandatory • Confidentiality Mandatory • Legacy Device Support • Tomorrow • QOS Support Mandatory (VoIP) • Secure Roaming Mandatory • Legacy Device Support • Easier Deployment • Easier Management

  7. Future - Devices in Motion • Handoff of service between WLAN and Wireless WAN • Authentication assurance • Confidentiality assurance • Consistency across standards bodies (?) • Public Services Based Network • Corporate Application Access • User Based Public Service • Personal Use • User Based Private to Public Service • How do we consistently authenticate the user to the both services • Corporate Security Policy compliance. Is it OK to be connected to two networks at once. Will the end user or corporation even know?

  8. Feedback?

More Related