wireless as a business enabler
TRANSCRIPT
![Page 1: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/1.jpg)
WIRELESS AS A WIRELESS AS A BUSINESS ENABLERBUSINESS ENABLER
May 11, 2005May 11, 2005Presented by:Presented by:
Jim Soenksen and Ed Sale, Pivot GroupJim Soenksen and Ed Sale, Pivot Group
![Page 2: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/2.jpg)
Presentation GoalsPresentation Goals�� Describe the need for Describe the need for
and benefits of Wireless and benefits of Wireless NetworkingNetworking
�� Describe the risks Describe the risks involved in Wireless involved in Wireless NetworkingNetworking
�� Describe secure Describe secure Wireless Network Wireless Network deployment deployment considerations, considerations, technologies, and technologies, and vendorsvendors
![Page 3: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/3.jpg)
I Need Wireless!I Need Wireless!�� Meeting/Case NotesMeeting/Case Notes
�� Document ManagementDocument Management
�� Time and Billing Time and Billing
�� Litigation SupportLitigation Support
�� Contact ManagementContact Management
�� Email Email
�� PrintingPrinting
�� Internet, Intranet, Internet, Intranet, Extranet, Web PortalExtranet, Web Portal
![Page 4: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/4.jpg)
Why I Need Wireless! Why I Need Wireless!
�� PortabilityPortability
�� ProductivityProductivity
�� ResponsivenessResponsiveness
�� Me too!Me too!
![Page 5: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/5.jpg)
Benefit Reality CheckBenefit Reality Check
�� CostCost
�� MobilityMobility
�� Improve Client Improve Client ServiceService
�� It is the FUTURE!It is the FUTURE!
![Page 6: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/6.jpg)
Can You Afford The Risk?Can You Afford The Risk?
�� ConfidentialityConfidentiality
�� WEP, WPAWEP, WPA
�� ReliabilityReliability
![Page 7: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/7.jpg)
� Rogue Access Point
� Deploy Wireless
� Noise Interference
� Parking Lot Attacker(WEP Crack)
� Parking Lot Access Point
Can You Afford The Risk?Can You Afford The Risk?
![Page 8: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/8.jpg)
Can You Afford The Risk?Can You Afford The Risk?
Per Access Point Per Access Point Performance:Performance:
�� 802.11b 802.11b -- 10Mbps raw10Mbps raw~4Mbps usable~4Mbps usable
�� 802.11g 802.11g -- 54Mbps raw54Mbps raw~20Mbps usable~20Mbps usable
�� 802.11a 802.11a -- 54Mbps raw54Mbps raw~20Mbps usable~20Mbps usable
�� 802.11n 802.11n -- Future goalFuture goal~100Mbps usable~100Mbps usable
Fas
t Eth
erne
t
Eth
erne
t
802.
11b
802.
11g
802.
11a
802.
11n
20
10
5
1010203040506070
80
90
100
Mbps
Connection Type
Number of Connected
Hosts
Usable Bandwidth Per Host
![Page 9: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/9.jpg)
Can You Afford The Risk?Can You Afford The Risk?
Countermeasures Countermeasures •• 802.1x 802.1x –– AuthenticationAuthentication•• WEP/WPA WEP/WPA –– EncryptionEncryption•• Network SegmentationNetwork Segmentation•• VPNVPN•• PoliciesPolicies•• Network Admission ControlNetwork Admission Control•• Training Training
![Page 10: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/10.jpg)
Can You Afford The Risk?Can You Afford The Risk?
Support, Updates, MaintenanceSupport, Updates, Maintenance•• Knowledgeable IT StaffKnowledgeable IT Staff•• Hardware MaintenanceHardware Maintenance•• Software MaintenanceSoftware Maintenance•• Centralized ManagementCentralized Management
![Page 11: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/11.jpg)
Can You Afford The Risk?Can You Afford The Risk?
�� VulnerabilitiesVulnerabilities•• Unauthorized AccessUnauthorized Access•• Wide Open Interface to Wired NetworkWide Open Interface to Wired Network•• ManMan--inin --Middle Spoofing AttacksMiddle Spoofing Attacks
�� Roaming LaptopsRoaming Laptops
�� Multiple and Evolving StandardsMultiple and Evolving Standards
![Page 12: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/12.jpg)
Where Do I Start?Where Do I Start?
looklook
planplan
actact
repeatrepeat
![Page 13: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/13.jpg)
looklook
�� Perform Site Survey Perform Site Survey •• Existing Wireless networksExisting Wireless networks•• Required Access PointsRequired Access Points•• Potential Sources of InterferencePotential Sources of Interference•• Signal Strength Signal Strength
�� Assessment Existing Wireless Assessment Existing Wireless DeploymentsDeployments
![Page 14: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/14.jpg)
planplan
�� Develop RequirementsDevelop Requirements
�� Create Wireless PoliciesCreate Wireless Policies
�� Select VendorsSelect Vendors
![Page 15: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/15.jpg)
planplan
Develop RequirementsDevelop Requirements•• Laptop Host FirewallsLaptop Host Firewalls•• DHCP AvailabilityDHCP Availability•• BandwidthBandwidth•• Signal Strength / Antenna Size & ShapeSignal Strength / Antenna Size & Shape•• Bridging RequirementsBridging Requirements•• Seamless RoamingSeamless Roaming•• Management & Ongoing MaintenanceManagement & Ongoing Maintenance•• CostCost
![Page 16: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/16.jpg)
planplan
Develop Requirements (Cont.)Develop Requirements (Cont.)•• Guest AccessGuest Access•• Business AccessBusiness Access•• Applications; Included vs. ExcludedApplications; Included vs. Excluded•• Access RestrictionsAccess Restrictions•• Authentication Protocol Authentication Protocol •• Encryption ProtocolEncryption Protocol•• SegmentationSegmentation
![Page 17: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/17.jpg)
planplanArchitectureArchitecture�� Home WirelessHome Wireless
�� Guest NetworkGuest Network
�� SingleSingle --AP Business AP Business NetworkNetwork --VPNVPN
�� SingleSingle --AP Business AP Business Network 802.1x, Network 802.1x, WPAWPA
�� MultiMulti --AP Business AP Business NetworkNetwork -- Fat APFat AP ’’ss
�� MultiMulti --AP Business AP Business NetworkNetwork -- Thin APThin AP ’’s, s, Wireless SwitchWireless Switch
![Page 18: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/18.jpg)
planplan
Design Wireless NetworkDesign Wireless Network•• ArchitectureArchitecture•• Firewall / VPNFirewall / VPN•• Integrate with Wired NetworkIntegrate with Wired Network•• Wireless TechnologyWireless Technology
![Page 19: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/19.jpg)
planplan�� TrainingTraining�� MetricsMetrics�� Estimate CostEstimate Cost
•• PlanningPlanning•• Equipment/HardwareEquipment/Hardware•• Implementation & IntegrationImplementation & Integration•• TrainingTraining•• MaintenanceMaintenance•• SecuritySecurity
![Page 20: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/20.jpg)
actact�� Prototype ImplementationPrototype Implementation
•• Deploy Technology on Trial BasisDeploy Technology on Trial Basis•• Management Program Management Program •• Ongoing MaintenanceOngoing Maintenance
�� Production DeploymentProduction Deployment•• Roll Out to EnterpriseRoll Out to Enterprise•• Train IT & End UsersTrain IT & End Users•• Test Production EnvironmentTest Production Environment
![Page 21: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/21.jpg)
repeatrepeat
�� MonitorMonitor
�� AuditAudit
�� UpgradeUpgrade
�� AdjustAdjust
![Page 22: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/22.jpg)
TechnologiesTechnologies�� 802.1X 802.1X -- Modern APModern AP ’’s now supports now support
�� RADIUS RADIUS -- Authentication protocol & server Authentication protocol & server usually required for 802.1Xusually required for 802.1X
�� 802.11a 802.11a -- 54 Mbps in 5 GHz band54 Mbps in 5 GHz band
�� 802.11b 802.11b -- 10 Mbps in 2.4 GHz band10 Mbps in 2.4 GHz band
�� 802.11g 802.11g -- 54 Mbps in 2.4 GHz band54 Mbps in 2.4 GHz band
�� 802.11i 802.11i -- AES encryption for WPAAES encryption for WPA
�� 802.11n 802.11n -- 100 Mbps usable bandwidth100 Mbps usable bandwidth
�� 802.11r 802.11r -- fast secure roaming handoffs fast secure roaming handoffs
![Page 23: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/23.jpg)
VendorsVendors�� Fat Access Points Fat Access Points –– Cisco, 3Com, Linksys, Belkin, Cisco, 3Com, Linksys, Belkin,
DD--Link, Netgear, Proxim, SMC, AppleLink, Netgear, Proxim, SMC, Apple
�� Thin Access Points/Wireless Switches Thin Access Points/Wireless Switches –– Cisco Cisco (Airespace), Aruba, Trapeze(Airespace), Aruba, Trapeze
�� Network Admission Control Network Admission Control –– Cisco, Script Logic, Cisco, Script Logic, iPassiPass
�� Wireless Firewalls Wireless Firewalls –– Juniper/NetScreen, Netgear, Juniper/NetScreen, Netgear, WatchGuardWatchGuard
�� Wireless Survey/Assessment Tools Wireless Survey/Assessment Tools -- Air Magnet, Air Magnet, AiroPeek, KismetAiroPeek, Kismet
�� Wireless Hacking Tools Wireless Hacking Tools –– WEPcrack, AirSnort, KisMACWEPcrack, AirSnort, KisMAC
�� Wireless IDS Wireless IDS –– AirDefense, Aruba, Cisco (Airespace), AirDefense, Aruba, Cisco (Airespace), WIDZWIDZ
![Page 24: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/24.jpg)
Wireless Helpful SitesWireless Helpful Sites�� WiWi--FiFi Technology ForumTechnology Forum�� CiscoCisco�� Aruba NetworksAruba Networks�� Air DefenseAir Defense�� IDCIDC�� GartnerGartner�� ForresterForrester�� Knowledge StormKnowledge Storm�� Computer WorldComputer World�� SC MagazineSC Magazine�� NW FusionNW Fusion�� Information SecurityInformation Security
MagazineMagazine�� Pivot GroupPivot Group
![Page 25: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/25.jpg)
Q & AQ & A
![Page 26: Wireless as a Business Enabler](https://reader031.vdocuments.mx/reader031/viewer/2022020705/61fb99532e268c58cd6015dd/html5/thumbnails/26.jpg)
THANK YOUTHANK YOUfrom from
Jim Soenksen and Ed Sale, Jim Soenksen and Ed Sale, Pivot GroupPivot Group
looklook, , planplan, , actact, , repeatrepeat