Wireless Security: A Defense-in-Depth Approach for Wi-Fi Clients

Wireless Security: A Defense-in-Depth Approach for Wi-Fi Clients

By CWNP On 09/23/2009 - 30 Comments

Against those skilled in the attack, an enemy does not know where to defend. Against the experts in defence, the enemy does not know where to attack. – Art of War (Sun Tzu)

 

 

Two of my previous blog posts talked about defense-in-depth against Rogue APs and WLAN infrastructure-based attacks. We discussed that enterprises can achieve the best possible security by deploying a combination of wired solutions (e.g., 802.1X, NAC, Port security) and wireless solutions (e.g., WPA2, Wireless scanning, WIPS). The reason for this is that a combination of complementary security solutions provides better security than any of the individual solutions. This post talks about securing wireless clients.

Wi-Fi clients can be involved in communications that violate enterprise wireless security policies. With certain cases, it is an inadvertent client mis-configuration that can be exploited by an attacker. In other cases, it is an enterprise user trying to violate the policies voluntarily (e.g., ad hoc connections, access yahoo mail at work via a non-authorized AP). In my opinion, enterprises need to adopt a combination of solutions to secure against Wi-Fi client-based threats.  

-          Follow best practices: First of all, adopt acknowledged good practices in your enterprise wireless LAN (WLAN). Configure your enterprise WLAN with strong cryptographic security – WPA2/RSN. Protect your clients with good anti-virus software. Patch your operating systems regularly and install only those applications that are absolutely required in your enterprise. Educate your users on wireless security issues and the serious consequences of a security breach. 

-          Use Layer-3 Endpoint Agents: You should use Network Access Control (NAC) and Virtual Private Networks (VPN) to provide one layer of security to your WiFi clients. NACs are helpful in forcing policy-specific software configuration on clients. Further, they can quarantine clients that do not adhere to your policy. On the other hand, VPNs are of high value in securing remote enterprise users who need to access public Wi-Fi services. However, beware of the following issues/limitations of layer-3 agents. A NAC may not be able to protect against certain wireless security policy violations (e.g., an enterprise client connecting to a neighbor’s Wi-Fi network). Deploying VPNs for all WLAN users may neither be practical nor economical – challenges include guest access, hindrance to roaming, and high managerial overhead. 

-          Use Layer-2 Endpoint Agents: Layer-2 agents that are aware of the Wi-Fi layer must complement Layer-3 endpoint agents. Such Wi-Fi-aware agents can do a lot more than layer-3 agents. They enable you to implement fine-grain wireless security policies - you can create multiple security profiles on your enterprise clients. Thus, this is a lot more flexible than just having an “Allow/Deny Wi-Fi” policy on your clients. You can also have a layer-2 agent automatically select a profile based on certain parameters such as visible SSIDs. As an example of these policies, you may configure your layer-2 solution so that a user inside the enterprise is allowed to connect to enterprise APs only, while a user at a public Wi-Fi hotspot is allowed Wi-Fi access only via a VPN tunnel. Layer-2 agents can also be used to block the usage of non-Wi-Fi technologies such as Bluetooth and EV-DO.

 -          Wireless Intrusion Prevention System (WIPS): Given that you have already installed end-point agents on clients, you may be wondering whether WIPS has any value to add. The answer is “yes.” Following example scenarios show where end-point agents fail (and hence, WIPS can add value). An obvious scenario -  an enterprise where users are allowed administrative access on their notebooks. In this scenario, users can simply turn off or un-install the end-point agent to bypass it. Even if administrative access is not allowed, users can potentially sneak-in their own notebooks on which none of these agents are installed. The next scenario is related to the recent surge in the use of smart-phones (e.g., iPhone, Blackerry). Today, it may be almost impossible to locate endpoint agents for all such devices. Discussions with network administrators confirm that the use of personal smart-phones in an enterprise is one of the major security pain points today. Administrators face difficulties in getting even a basic visibility of Wi-Fi devices used in their enterprise and their software configuration. Having a complementary security layer in the form of a WIPS to gain this visibility can be very handy. Further, depending on its capabilities, a WIPS can be used to block Wi-Fi client related threats and/or ban the usage of specific types of Wi-Fi devices (e.g., iPhones). Of course, WIPS acts as a complementary layer as long as a Wi-Fi client is within the enterprise – remote or public Wi-Fi access has to rely on endpoint agents. Do you think the above security solution suite provides sufficient depth in protecting your enterprise wireless clients? Please chime in with your thoughts. 

Thanks,Gopi

Tagged with: gopi


Blog Disclaimer: The opinions expressed within these blog posts are solely the author’s and do not reflect the opinions and beliefs of the Certitrek, CWNP or its affiliates.


0 Responses to Wireless Security: A Defense-in-Depth Approach for Wi-Fi Clients

Subscribe by Email
There are no comments yet.
<< prev - comments page 1 of 1 - next >>

Leave a Reply

Please login or sign-up to add your comment.
Success Stories

I literally just came out of the testing centre having taken the CWDP exam. The certification process opened my mind to different techniques and solutions. This knowledge can only broaden your perspective. Great job, CWNP, you have a great thing going on here.

-Darren
Read More

Working through the CWNP coursework and certifications helped not only to deepen my technical knowledge and understanding, but also it boosted my confidence. The hard work it took to earn my CWNE has been rewarding in so many ways.

-Ben
Read More

I want to commend you and all at CWNP for having a great organization. You really 'raise the bar' on knowing Wi-Fi well. I have learned a ton of information that is helping my job experience and personal career goals, because of my CWAP/CWDP/CWSP studies. Kudos to all at CWNP.

-Glenn
Read More