8.6.3 Wireless Authentication and Access Methods
Access Methods and Security Protocols
Overview of Security Access Methods
Port Security
- Monitors physical switch ports to prevent unauthorized access.
- Requires that access to switch hardware be restricted to authorized personnel.
- Recommended actions include placing switches in secure locations and physically removing patch cables or disabling unused ports.
MAC Filtering and MAC Limiting
- Widely supported by manufacturers of wireless LAN hardware and software.
- Requires signed client-side and server-side certificates from a Certificate Authority (CA).
- Implementation can be labor-intensive and costly.
Wireless Authentication
- Pre-shared Key (PSK)
- A passphrase used to access a wireless network; common access method.
- Wi-Fi Protected Setup (WPS)
- Works only with networks that use PSK and WPA2.
- Allows secure connection without entering the PSK.
- Steps for WPS:
- Push the button on the access point—this enables searching for devices.
- Push the WPS button on the device to connect to the access point automatically.
- If no button is available, enter the unique eight-digit PIN of the access point.
Authentication Protocols
- Extensible Authentication Protocol (EAP)
- A framework that allows various authentication methods.
- It supports methods such as smart cards, biometrics, and digital certificates.
- Enables negotiation of authentication characteristics between client and server.
Specific EAP Variants
Protected Extensible Authentication Protocol (PEAP)
- Creates an SSL/TLS tunnel for secure communication of credentials.
- Requires server-side certificate for mutual authentication, proving server identity to clients.
- Developed through collaboration of Cisco, Microsoft, and RSA.
EAP Flexible Authentication via Secure Tunneling (EAP-FAST)
- Utilizes a Protected Access Credential (PAC).
- Establishes a TLS tunnel for transmitting user credentials.
- Vulnerable to PAC interception, mitigated by manual provisioning or using server certificates.
- A Cisco-developed protocol.
EAP Transport Layer Security (EAP-TLS)
- Leverages Transport Layer Security to provide robust authentication.
- Considered one of the most secure EAP standards.
EAP Tunneled Transport Layer Security (EAP-TTLS)
- An advancement of EAP-TLS requiring only one CA-signed certificate on the server.
- Simplifies the implementation process.
Network Access Control
- IEEE 802.1X Port-based Network Access Control
- Enhances security by requiring client authentication before network access.
- Implements an architecture of authentication, authorization, and accounting (AAA).
- Components involved:
- Supplicant: Device requesting access (e.g., a laptop).
- Authenticator: Network device acting as a conduit for authentication data.
- Authentication Server: Validates authentication requests and issues authorizations.
RADIUS Authentication Process
- Configuration: RADIUS server and client share a secret.
- Connection: The supplicant connects to the network.
- EAPoL Activation: Switch instructs the supplicant to authenticate via EAPoL.
- Data Transmission: Supplicant sends EAP data to the switch.
- Data Encryption: The switch encrypts EAP data and sends it to the RADIUS server.
- Credential Validation: RADIUS server decrypts and validates credentials.
- Access Granting: RADIUS issues an Access-Accept message to the switch.
- Connection Opening: Switch opens network access to the supplicant.
Air-gapped Networks
- Certain security-critical hosts (e.g., root certification authorities) should not connect to any network.
- An air-gapped network is isolated; communication is local to air-gapped devices only.
- Commonly used in military, government, and industrial settings.
- Management challenges include local administration and the need to scan USB or optical media before use.