Cybersecurity Essentials 3.0-Module05
Cybersecurity Essentials 3.0-Module05
1 Wireless Communications
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Wireless Communications
Wireless versus Wired LANs
The table summarizes the differences between wireless and wired LANs.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Wireless Communications
802.11 Frame Structure
All Layer 2 frames consist of a header, payload, and Frame Check Sequence (FCS) section. The
802.11 frame format is like the Ethernet frame format, except that it contains more fields.
• Frame Control – It identifies the type of wireless frame and contains subfields for protocol version,
frame type, address type, power management, and security settings.
• Duration - It is typically used to indicate the remaining duration needed to receive the next frame
transmission.
• Address1 - It usually contains the MAC address of the receiving wireless device or AP.
• Address2 - It usually contains the MAC address of the transmitting wireless device or AP.
• Address3 – It sometimes contains the destination MAC address, such as the default gateway to
which the AP is attached.
• Sequence Control - It contains information to control sequencing and fragmented frames.
• Address4 - It is usually missing because it is used only in ad hoc mode.
• Payload – It contains the data for transmission.
• FCS - It is used for Layer 2 error control.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Wireless Communications
CSMA/CA
WLANs are half-duplex, shared media configurations. This creates a problem because a wireless
client cannot hear while it is sending, which makes it impossible to detect a collision.
To resolve this problem, WLANs use CSMA/CA as the method to determine how and when to send
data on the network. A wireless client does the following:
1. Listens to the channel (carrier) to see if it senses no other traffic on the channel (idle).
2. Sends a ready to send (RTS) message to the AP to request dedicated access to the network.
3. Receives a clear to send (CTS) message from the AP granting access to send.
4. If the wireless client does not receive a CTS message, it waits a random amount of time to
restart the process.
5. After it receives the CTS, it transmits the data.
6. All transmissions are acknowledged. If a wireless client does not receive an acknowledgment, it
assumes a collision occurred and restarts the process.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Wireless Communications
Wireless Client and AP Association
For wireless devices to communicate over a network, they must first associate with an AP or wireless
router. An important part of the 802.11 process is discovering a WLAN and subsequently connecting to
it.
• Discover a wireless AP
• Authenticate with AP
• Associate with AP
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Wireless Communications
Wireless Client and AP Association (Cont.)
A wireless client and an AP must agree on specific parameters that must be configured on the AP and
subsequently on the client to enable the negotiation of a successful association.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Wireless Communications
Passive and Active Discover Mode
Wireless devices must discover and connect to an AP or wireless router. Wireless clients connect to
the AP using a scanning (probing) process. This process can be passive or active.
Passive mode
• The AP openly advertises its service by periodically sending
broadcast beacon frames containing the SSID, supported
standards, and security settings.
Active mode
• Wireless clients must know the name of the SSID and initiate the
process by broadcasting a probe request frame on multiple
channels.
• APs configured with the SSID will send a probe response that
includes the SSID, supported standards, and security settings.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Wireless Communications
Wireless Devices - AP, LWAP, and WLC
• Home and small business wireless routers integrate the functions of a
router, switch, and access point into one device.
• All the control and management functions of the APs on a network can
be centralized into a Wireless LAN Controller (WLC).
• When using a WLC, the APs no longer act autonomously, but instead act
as lightweight APs (LWAPs).
• LWAPs only forward data between the wireless LAN and the WLC.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
5.2 WLAN Threats
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
WLAN Threats
Wireless Security Overview
With a wireless NIC and knowledge of cracking techniques, an attacker may not have to physically
enter the workplace to gain access to a WLAN.
• Interception of data - Wireless data should be encrypted to prevent it from being read by
eavesdroppers.
• Wireless intruders - Unauthorized users attempting to access network resources can be deterred
through effective authentication techniques.
• Denial of Service (DoS) Attacks - Access to WLAN services can be compromised either
accidentally or maliciously.
• Rogue APs - Unauthorized APs installed by a well-intentioned user or for malicious purposes can
be detected using management software.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
WLAN Threats
DoS Attacks
Wireless DoS attacks can be the result of:
• A malicious user intentionally interfering with the wireless communication - Their goal is to disable
the wireless network completely or to the point where no legitimate device can access the medium.
• Accidental interference - WLANs are prone to interference from other wireless devices (microwave
ovens, cordless phones, baby monitors). The 2.4 GHz band is more prone to interference than the
5 GHz band.
To minimize the risk of a DoS attack due to improperly configured devices and malicious attacks,
harden all devices, keep passwords secure, create backups, and ensure that all configuration changes
are incorporated off-hours.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
WLAN Threats
Rogue Access Points
A rogue AP is an AP or wireless router that has been connected to a corporate network without explicit
authorization and against corporate policy.
Anyone with access to the premises can install an inexpensive wireless router that can potentially
allow access to a secure network resource.
The connected rogue AP can be used by an attacker to capture MAC addresses, capture data
packets, gain access to network resources, or launch a man-in-the-middle attack.
To prevent the installation of rogue APs, organizations must configure WLCs with rogue AP policies
and use monitoring software to actively monitor the radio spectrum for unauthorized APs.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
WLAN Threats
Man-in-the-Middle Attack
• The hacker is positioned in between two legitimate entities to read or
modify the data that passes between the two parties.
• User traffic is now sent to the rogue AP that captures the data and
forwards it to the legitimate AP.
• Return traffic from the legitimate AP is sent to the rogue AP, captured,
and forwarded to the unsuspecting user.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
5.3 Secure WLANs
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Secure WLANs
SSID Cloaking and MAC Address Filtering
To address the threats of keeping wireless intruders out and protecting data, two early security
features were used and are still available on most routers and APs: SSID cloaking and MAC address
filtering.
SSID Cloaking
• APs and some wireless routers allow the SSID beacon frame to be disabled.
• Wireless clients must manually configure the SSID to connect to the network.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Secure WLANs
SSID Cloaking and MAC Address Filtering (Cont.)
• An administrator can manually permit or deny clients wireless access based on their physical MAC
hardware address.
• In the figure, the router is configured to permit two MAC addresses. Devices with different MAC
addresses will not be able to join the 2.4GHz WLAN.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Secure WLANs
802.11 Original Authentication Methods
SSIDs are easily discovered even if APs do not broadcast them,
and MAC addresses can be spoofed.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Secure WLANs
Shared Key Authentication Methods
There are four shared key authentication techniques available. Until the availability of WPA3 devices
becomes ubiquitous, wireless networks should use the WPA2 standard.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Secure WLANs
Authenticating a Home User
Home routers typically have two choices for authentication: WPA
and WPA2 (stronger). Two WPA2 authentication methods are:
Personal
• Intended for home or small office networks, users
authenticate using a pre-shared key (PSK).
Enterprise
• Intended for enterprise networks but requires a Remote
Authentication Dial-In User Service (RADIUS) authentication
server.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Secure WLANs
Authentication in the Enterprise
In networks that have stricter security requirements, an additional
authentication or login is required to grant wireless clients such
access.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Secure WLANs
WPA3
At the time of this writing, devices that support WPA3 authentication were not readily available.
However, WPA2 is no longer considered secure.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
5.4 Wireless Network
Communication Summary
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Wireless Network Communication Summary
What Did I Learn in this Module?
• Wireless networking devices connect to an AP or wireless router using the 802.11 frame format
that is like the Ethernet frame format but with additional fields.
• WLAN devices use the CSMA/CA method to determine how and when to send data on the
network.
• APs can be configured autonomously (individually) or by using a WLC to simplify the configuration
and monitoring of numerous access points.
• Wireless networks are susceptible to threats, including data interception, wireless intruders, DoS
attacks, and rogue APs.
• A rogue AP is an AP or wireless router that has been connected to a corporate network without
explicit authorization.
• In an MiTM attack, the threat actor is positioned between two legitimate entities to read or modify
the data that passes between the two parties.
• There are four shared key authentication techniques available: WEP, WPA, WPA2, and WPA3.
• Home routers typically have two choices for authentication: WPA and WPA2 (stronger).
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25