Securing Wireless LANs Securing Wireless LANs A Windows Server 2003 A Windows Server 2003 Certificate Services Solution Certificate Services Solution Ian Hellen – Principal Consultant Ian Hellen – Principal Consultant Stirling Goetz – Principal Consultant Stirling Goetz – Principal Consultant
22
Embed
Securing Wireless LANs A Windows Server 2003 Certificate Services Solution Ian Hellen – Principal Consultant Stirling Goetz – Principal Consultant.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Securing Wireless LANsSecuring Wireless LANsA Windows Server 2003 A Windows Server 2003
Ian Hellen – Principal ConsultantIan Hellen – Principal ConsultantStirling Goetz – Principal Consultant Stirling Goetz – Principal Consultant
AgendaAgenda
Introduction to Solutions for SecurityIntroduction to Solutions for Security Wireless LAN Security – selecting the right Wireless LAN Security – selecting the right
Trustworthy ComputingTrustworthy Computing Microsoft is committed to Trustworthy Microsoft is committed to Trustworthy
Computing: Computing: SecuritySecurity PrivacyPrivacy Reliability Reliability Business IntegrityBusiness Integrity
Trustworthy computing can only be Trustworthy computing can only be achieved through partnership & teamworkachieved through partnership & teamwork
Trustworthy Computing is a journey with a Trustworthy Computing is a journey with a long term vision and highlights and long term vision and highlights and obstacles along the roadobstacles along the road
Trustworthy ComputingTrustworthy Computing
SecuritySecurity
PrivacyPrivacy
ReliabilityReliability
Business IntegrityBusiness Integrity
Resilient to attack Protects confidentiality, integrity,
availability and data
Dependable Available when needed Performs at expected levels
Individuals control personal data Products and Online Services adhere to
fair information principles
Vendors provide quality products Product support is appropriate
Microsoft Solutions for Microsoft Solutions for Security (MSS)Security (MSS) Aimed at complex or difficult problem Aimed at complex or difficult problem
– “one good way”– “one good way” Based on experience in field and from Based on experience in field and from
MS internal deploymentsMS internal deployments Built and Tested in MS LabsBuilt and Tested in MS Labs Modular (PKI and RADIUS)Modular (PKI and RADIUS)
Wireless LANsWireless LANs
Benefits of WLANsBenefits of WLANs Increased staff productivityIncreased staff productivity Mobility and flexible workingMobility and flexible working Information access with lower costInformation access with lower cost
ProblemsProblems Early security standards had issuesEarly security standards had issues Some people don’t even take basic Some people don’t even take basic
precautionsprecautions Proliferation of solutions cause confusionProliferation of solutions cause confusion
Solution OptionsSolution Options
802.1X with WLAN protection802.1X with WLAN protection The native routeThe native route
VPN or IPsecVPN or IPsec Don’t deploy WLANsDon’t deploy WLANs
But prepare for rogue WLANsBut prepare for rogue WLANs Use basic 802.11 security Use basic 802.11 security
……and hope for the bestand hope for the best
802.1X with WLAN protection802.1X with WLAN protection
802.1X 802.1X Ratified by the IEEERatified by the IEEE Embraced by the WLAN vendor communityEmbraced by the WLAN vendor community
WLAN securityWLAN security WEP (128 bit) and WPA (TKIP)WEP (128 bit) and WPA (TKIP) Pending: TGi work on RSN (802.11i)Pending: TGi work on RSN (802.11i)
Planning guidePlanning guide Build guideBuild guide Operations guideOperations guide Test guideTest guide Delivery guideDelivery guide Tools and TemplatesTools and Templates
More Information… More Information… Download Download Securing Wireless LANs Securing Wireless LANs from:from:
http://go.microsoft.com/fwlink/?LinkId=14843http://go.microsoft.com/fwlink/?LinkId=14843 Microsoft Solutions:Microsoft Solutions:
http://www.microsoft.com/business/solutions/http://www.microsoft.com/business/solutions/ For a copy of this presentation visit: For a copy of this presentation visit:
http://www.microsoft.com/uk/securityhttp://www.microsoft.com/uk/security For regular information subscribe at:For regular information subscribe at:
For the MS security resource toolkit visit:For the MS security resource toolkit visit: http://www.microsoft.com/uk/securityhttp://www.microsoft.com/uk/security