WLAN Design Approach
The general concerns of WLAN security and the specific size of a design dictate the mitigation techniques that can be applied to a WLAN design. However, the mitigation technologies available are consistent across all the SAFE designs.The following two main choices of mitigation available to a designer are based on the technology to be incorporated:
- Implementing a dynamic WEP keying model using 802.1X/EAP and TKIP
- Implementing a network layer encryption approach based on IPSec
Mutual Authentication or EAP WLAN Design
The mutual authentication WLAN design model is based on EAP and TKIP, which is the Cisco WEP improvement that provides the mechanism for users to access a corporate network.The devices, mitigated threats, and design guidelines of the EAP WLAN design model are discussed in the following sections.
Devices for EAP WLAN Design
The key devices found in the mutual authentication or EAP WLAN model are shown in Table 20-2.
Device | Description |
---|---|
DHCP server | Delivers IP configuration details. |
Layer 2 or 3 switch | Provides Ethernet connectivity and Layer 3 or 4 filtering between the wireless access point and the corporate network. |
One-time password (OTP) server (optional) | Authorizes OTP details from the RADIUS server (PEAP use only). |
Public key infrastructure (PKI) server (optional) | Provides X.509 digital certificate for user and server identification. |
RADIUS server | Provides user-based authentication for wireless clients and access point authentication to the wireless clients. |
Wireless access point | Mutually authenticates wireless clients through EAP. |
Wireless client adapter and software | Provides the hardware and software necessary for wireless communication. |
Figure 20-1. Typical EAP WLAN Design
[View full size image]

Threats Mitigated in the EAP WLAN Design
Within the WLAN EAP design model, the anticipated threats and mitigation actions are those shown in Table 20-3.
Threat | Threat Mitigation |
---|---|
Address Resolution Protocol (ARP) spoofing | Authentication. |
IP spoofing | Authentication and RFC 2827 filtering on the Layer 3 switch. |
Man-in-the middle attacks | Several EAP authentication types combined with the MIC feature. |
Network topology discovery | Authentication. |
Password attack | EAP protocols such as PEAP that use secure connectivity between client and server before authentication. |
Unauthenticated access | Authentication. Optional access control on the Layer 3 switch limits wired network access. |
Wireless packet sniffers | WEP enhancements (specifically, per-packet keying as part of TKIP). |
Figure 20-2. Wireless LAN EAP Design Threats and Threat Mitigations
[View full size image]

Design Guidelines
Within the EAP design model, security is maintained by preventing network access to unauthenticated clients through the use of a RADIUS server. This RADIUS server provides the majority of the mitigation against security risks. Network designers should give special consideration to the location of the RADIUS server with respect to its availability. Particular attention also should be given to the location of the DHCP server because this provides the IP addressing configuration after a device has been authenticated and allowed access to the WLAN.Depending on the type of EAP used, the following guidelines should be observed:
- EAP-TLS
Use of a private PKI server to issue digital certificates is recommended. - EAP-TLS and EAP-PEAP
Normal users should be prevented from having access to the wireless client's EAP supplicant settings. Configure wireless clients with the trusted certificate server's digital certificate. - EAP-LEAP and EAP-PEAP
To prevent brute-force password attacks, configure user accounts to be locked after only a few number of incorrect login attempts. - EAP-TLS
Configure the RADIUS server to check the Certificate Authority's certificate revocation list (CRL).
To mitigate initialization-collision attacks, rotate unicast and broadcast WEP keys at a frequent interval through the use of dynamic keys.Finally, consider using wireless virtual LANs (VLANs) with EAP because you can implement dynamic VLAN assignments through the RADIUS server and user group settings. This segregates users into specific groups, which allows group-specific security policies to be defined. Additionally, using a management VLAN, access-point management traffic can be segregated from user traffic.
IPSec WLAN Design
The IPSec WLAN design model is based on users utilizing an IPSec VPN overlaid on the wireless network to access the corporate network.The devices, mitigated threats, and design guidelines of the IPSec WLAN design model are discussed in the following sections.
Devices for IPSec WLAN Design
The key devices found in the IPSec WLAN model are shown in Table 20-4.
Device | Description |
---|---|
DHCP server | Delivers IP addressing information to wireless clients before and after VPN establishment. |
Layer 2 switch | Provides Ethernet connectivity between the WLAN access points and the corporate network. |
Layer 3 switch | Provides Ethernet connectivity and Layer 3 or 4 filtering on the corporate network. |
OTP server | Authorizes OTP details from the RADIUS server. |
RADIUS server | Provides user-based authentication for wireless clients terminating on the VPN gateway. Optionally also can talk to an OTP server. |
VPN gateway | Authenticates remote users and terminates their IPSec tunnels. Also can act as a DHCP relay. |
VPN software client | Provides a remote user with a software VPN client and personal firewall software on a PC. |
Wireless access point | Mutually authenticates wireless clients through EAP. |
Wireless client adapter and software | Provides the hardware and software necessary for wireless communication. |
Figure 20-3. Typical IPSec WLAN Design
[View full size image]

Threats Mitigated in the WLAN IPSec Design
Within the WLAN IPSec design model, the anticipated threats and mitigation actions are those shown in Table 20-5.
Threat | Threat Mitigation |
---|---|
ARP spoofing | Encryption. |
IP spoofing | Encryption. Only valid, authenticated IPSec packets ever reach the corporate network. |
Man-in-the middle attacks | Authentication and IPSec encryption. |
Network topology discovery | Protocol filtering. |
Password attack | Strong passwords or the use of OTP. |
Wireless packet sniffers | Encryption. |
Figure 20-4. WLAN IPSec Design Threats and Threat Mitigations
[View full size image]

Design Guidelines
Within the IPSec WLAN design model, the wireless access points are connected to an untrusted Layer 2 switch infrastructure that is used only to forward IPSec traffic between the WLAN clients. This traffic is kept separate from the wired network until it is decrypted by the VPN gateway.WEP normally is not used in the design, so treat the network as untrusted and do not mix it with any other VLAN in the wired network.When it is associated with an access point, the wireless client obtains Layer 3 addressing information through DHCP. After this point, an IPSec tunnel is authenticated with the VPN gateway, and a secure IPSec tunnel is created across the WLAN.Remember to consider the client connection insecure until the IPSec VPN is established. Consequently, the following points should be considered:
- Apply restrictive filters to the WLAN to allow only the necessary protocols required for establishing a secure tunnel to the VPN gateway.
- Configure the VPN client software to automatically establish the IPSec VPN when the correct WLAN IP addressing is received from DHCP.
- Activate a personal firewall in the client to protect the device while it is connected to the untrusted WLAN network without the protection of IPSec.
- Disable split tunneling by the client.
Design Alternatives
The following are possible design alternatives to the IPSec WLAN model:
- Use static WEP on the wireless network as a further deterrent against hackers.
- Layer 802.1X/EAP into the IPSec VPN deployment.
- To further secure DNS and DHCP services, deploy dedicated hosts within the VPN infrastructure to provide these services. This mitigates attacks on the wired DNS and DHCP servers.
- Hard code VPN gateway addressing in clients to eliminate the need for DNS services for VPN termination.
