Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access 2 (WPA2)
WPA2 Personal Mode
1) uses WPA2-PSK (pre-shared key) authentication, a common key is statically configured on the client and the AP
2) Designed for environments where there is no RADIUS authentication server
3) Provides inadequate security for an enterprise wireless network; if attackers break the WPA2 PSK, then they can access all device data
4) Often authenticates devices, not users
WPA2 Enterprise Mode
1) Uses IEEE 802.1X and EAP authentication; each user or device is individually authenticated
2) Incorporates RADIUS authentication server for authentication and key management
3) Used by enterprise-class networks
WPA3
WebAuth
PSK Authentication
SKA Process
Public Key Infrastructure (PKI)
Asymmetric Encryption
1) User generates a public and private key, that work together - e.g. key1 will encrypt something that can be decrypted by key2 and vice versa
2) Server generates another pair of keys
3) Server sends its public key3 to user
4) User uses key3 to encrypt response to server and sends key1
5) Server will use key1 to encrypt when responding to user
Digital Signing
Certificate Authority (CA)
CA Certificate Retrieval
1) User1 and User2 request the CA certificate that contains the CA public key
2) Upon receipt of the CA cert, their systems verify the validity of the cert by using the public key cryptography
3) User1 & User2 contact the CA admin and verify the public key and serial number of the certificate
Certificate Enrollment
1) User1 & 2’s systems forward a certificate request, which includes their public key along with some identifying information. All this information is encrypted by using the public key of the CA
2) Upon receipt of the cert requests, the CA admin contacts User1 and User2 to confirm their submittal and the public key.
3) The CA admin issues the certificate by adding more data to the cert request, and digitally signing all of it
4) Either the end user manually retrieves the certificate, or Simple Certificate Enrollment Protocol (SCEP) automatically retrieves the cert, and the cert is installed onto the system
Authentication Using Certs
1) User1 and the server exchange certificates. The CA is no longer involved.
2) Each party verifies the digital signature on the cert by hashing the plaintext portion of the cert, decrypting the digital signature using the CA public key, and comparing the result. If matched, then the cert is verified confirming that User1 is User1 and the server is the server.
Extensible Authentication Procotol (EAP)
EAP Message Types
1) Request
2) Response
3) Success
4) Failure
EAP Types
WPA2 Enterprise EAP Types
1) EAP-TLS
2) PEAP
3) EAP-FAST
4) EAP-generic token card (GTC)
5) EAP-SIM
6) EAP-AKA
EAP Authentication Server
1) Locally by a Cisco WLC (local EAP) can use either the local creds, or LDAP to authenticate users. Can be used as a backup to RADIUS, so clients can auth even when the controller disconnects from RADIUS
2) Globally by a RADIUS server such as ISE, Microsoft server configured for RADIUS, or any RADIUS-compliant server
EAP Frame Format
1) RFC 3748
2) EAPOL is the method used to transport EAP packets btwn a supplicant and an authenticator directly by a LAN MAC service over 802.1X
EAP Request
EAP Response
EAP Success