© Chris Carthern and William Wilson and Noel Rivera 2021
C. Carthern et al.Cisco Networkshttps://doi.org/10.1007/978-1-4842-6672-4_20

20. Wireless LAN (WLAN)

Chris Carthern1  , William Wilson2 and Noel Rivera3
(1)
Bangkok, Krung Thep, Thailand
(2)
FPO, AP, USA
(3)
APO, AE, USA
 

This chapter covers WLANs and WLAN standards, the basic components of the Cisco wireless network architecture, how to install and configure access points, wireless controller installation and configuration, wireless security, and WLAN threats and vulnerabilities. We will also cover configuration and monitoring with Cisco Prime Infrastructure and include integration with Cisco Identity Services Engine (ISE).

Wireless LANs (WLANs)

In today's networks, wireless communication is the norm, and we must account for this as network engineers. Most wireless networks consist of access points (APs) and wireless LAN controllers (WLCs). We will discuss the configuration of these devices but also will include using ISE and Prime Infrastructure to manage the network. An autonomous AP can be used without a wireless LAN controller, but a lightweight AP requires a WLC to be paired with to function. WLCs are the central piece of a wireless network configuration and deployment. The WLC defines the IP configuration and security settings of the network. APs are normally connected via wire to a switch and receive their configuration from the WLC. At bootup, an AP attempts to locate a controller and register with it. Once the AP is registered with the controller, it builds a Control and Provisioning of Wireless Access Points (CAPWARP) tunnel which is used to transport client traffic and traffic from the AP to the WLC.

Wireless Standards

As with many things in technology, wireless networks are defined by standards set by organizations and governments. This section covers some of the standards involving WLANs. WLAN is defined by the Institute of Electrical and Electronics Engineers (IEEE) 802 family of standards, which creates interoperability between many vendors. IEEE is well known for developing standards for computer networks. Standards can be reviewed at http://standards.ieee.org. 802.11 and 802.11x are a family of IEEE standards relating to WLAN technologies. Let’s review a few of those specifications in the 802.11 family of standards:
  • 802.11a: This standard in an extension to 802.11 that provides 54 Mbps transmission in the 5 GHz band using the orthogonal frequency division multiplexing encoding scheme.

  • 802.11b: This standard in an extension to 802.11 that provides 11 Mbps transmission in the 2.4 GHz band using DSSS.

  • 802.11g: This standard is an extension to 802.11 that provides 54 Mbps transmission as compared to 11 Mbps with the 802.11b standard.

  • 802.11i: This standard in an extension to 802.11 that provides security features, such as encryption and integrity.

Wireless Components

This section discusses the components of a WLAN. The devices include APs and controllers. Switches are also considered a component that is integrated into the WLAN via a physical connection between the AP and the switch.

Wireless Access Points

Access points are one of the main components of a WLAN. Your home router is considered an access point that allows access to the Internet. APs use an 802.11 standard modulation technique and operate within a frequency spectrum. Users connect to APs, and many authenticate users to the WLAN. There are different types of APs, including single and multiple radios.

Wireless Controllers/Switches

In situations where a larger wireless infrastructure is needed, a wireless LAN controller can be used. APs can be configured on an individual basis, which is practical for small networks but not for large WLANs at the enterprise level. For this reason, you must use a wireless LAN controller or switch. Wireless LAN switches are built with wireless LAN controllers in them. The controller has Ethernet ports that connect to an AP or connect to a switch that connects to APs. Cisco makes many wireless controllers that have many limitations and capabilities, which means that your wireless LAN administrator must review the features of each and choose the most appropriate solution for your network. Figure 20-1 provides an example of a wireless network with a wireless controller and access point connected via a LAN switch.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig1_HTML.jpg
Figure 20-1.

Wireless network diagram

Installing a WLAN

This section discusses the steps and considerations that need to take place when installing and setting up a wireless LAN.

Wireless Site Survey

Unless your installation takes place in an office with a few people in it, a site survey should be conducted to determine the best areas to place your access points for the best coverage possible. During the site survey, an AP and a client device are used as you move to different locations to find the most optimal location for the AP. Without a site survey or a well-planned survey, WLANs will have inadequate coverage, and the office will suffer from low performance in some locations. The time that it takes to complete the site survey will vary by the size of the office space. It is easier to complete the survey in buildings that have similar layouts on each floor. It is optimal to place the APs in the same location on each floor.

Before a site survey is completed, you should do the following:
  • Choose tools: Various tools are used to complete the site survey, including signal meters, test APs, and spectrum analyzers to perform signal interference testing and coverage testing.

  • Review floor plans: Floor plans of the building should be reviewed to identify optimal locations for access points and to review the results of signal testing.

  • Review the requirements: The installation requirements should be documented, and reviews should be held with the customer to go over items such as the size of the facility, the number of users that need to be supported by the network, and whether continuous coverage is needed throughout the facility. Also, the budget should be considered. These types of requirements drive what types of equipment you select for the installation.

  • Perform a facility walk-through: You should walk through the facility with the identified options for AP placement on your map. You should test by mounting your AP and antennas and walk around the entire facility with a laptop to record testing data. Cisco makes an Aironet Desktop Utility to view the quality of the AP signal, the strength of the signal, the percentage of packet retries, the link speed, the overall link quality, and the signal-to-noise ratio (SNR). The SNR can be high, even though you have a strong signal, but many packets may be resent due to the high noise. The packet retry percentage, or the number of times packets are resent, should be under 10% in all locations tested. This process should be completed each time you move the AP to another location. During the site survey, close all doors to get an accurate test of the signal quality. Sources of interference should be noted, including air conditioning units, power distribution closets, and elevators.

  • Complete a report: A site survey report should be completed with all the test results, including how the test was conducted and which equipment was used. Document how the WLAN can be integrated into the current network if there is a network already configured. Information on power should not be overlooked either. How will the APs be powered? Will they receive power via PoE to a switch or via a power supply? The amount of power needed to operate each AP should be accounted for.

Access Point Installation

One of the most important installations of a WLAN is the access point. As mentioned earlier in this chapter, if you use many APs, you must configure them one by one, whereas if you use a controller, the configuration can be completed by the controller for each AP. The AP should be installed clear of obstacles to increase the range of the signal. Do not place it near metal objects and furniture. Ceilings are an ideal place to mount access points so that employees cannot tamper with them. Also keep in mind weather conditions of the area. If an AP is to be installed outdoors or in the elements, make sure that it is designed to withstand such environmental factors.

Access Point Configuration

After you connect a Cisco lightweight access point (LAP), it will boot up and try to communicate through the switch to a Cisco wireless LAN controller. The switch needs to be configured with the correct access VLAN and inline power settings. The LAP will try to locate one or more controllers on the network to join. The LAP will try to build a CAPWAP tunnel with the controller and will send a CAPWAP join request. The controller will respond with a join response message. The LAP will then download its image and configuration from the WLC. After the discovery process is finished, the LAP can now be fully managed by the controller.

If your AP and controller are on different subnets, you can configure the switch or router to relay broadcast request on UDP port 5246 from the AP to an IP address of a specific controller:
Switch(config)# ip forward-protocol udp 5246
Switch(config)# interface vlan 10
Switch(config-if)# ip helper-address 192.168.1.254

WLAN Controller Installation

Configuration of a WLAN controller can vary based on the vendor, but the following are the steps to configuring a controller:
  1. 1.

    Power up the controller and complete initial configuration. This step involves defining the port to be used for WAN uplinks and which ports will be used for WLAN access.

     
  2. 2.

    Determine if you need to support one of multiple virtual WLANs. This step involves documenting the virtual WLANs.

     
  3. 3.

    Create the WLANs in the controller. This step involves configuring the controller’s access ports for the WLANs created in the previous step. Security settings can be configured during this step.

     
  4. 4.

    Connect the controller to access points. The controller should be connecting to APs via the controller’s access ports.

     
  5. 5.

    Configure access ports on the controller. The access ports should be configured at this step. VLANs are used if you need to logically separate WLANs.

     

WLAN Controller Configuration

This section focuses on the configuration of the WLAN controller using the Cisco GUI.

Initial Configuration of WLC via a Web Browser

If you don't want to use the CLI to configure the WLC, you can use a feature which enables a non-configured WLC to provide an IP address to PCs via DHCP. This allows the PC to connect to the WLC via the IP address. The IP range assigned by the WLC is from 192.168.1.3 to 192.168.1.14, and the WLC is configured with IP address 192.168.1.245. In the browser, we navigate to http://192.168.1.245. Figure 20-2 shows the initial page where you create your admin account. Click Start to continue.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig2_HTML.jpg
Figure 20-2.

Wireless controller GUI

The next page is where we set up the WLC system name, country, date/time, and NTP server. This is also where we configure the management IP address, subnet mask, default gateway, and management VLAN ID. Follow Figures 20-3 and 20-4 for the Cisco WLC configuration.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig3_HTML.jpg
Figure 20-3.

Wireless LAN Controller Configuration

../images/336497_2_En_20_Chapter/336497_2_En_20_Fig4_HTML.jpg
Figure 20-4.

Wireless LAN Controller Configuration Continued

Shown in Figure 20-5, the Create Your Wireless Networks page, we configure the network name/SSID (Service Set Identifier), choose the security type, and define the network and VLAN assignment. Optionally, you can also create a guest network and enable a way for guests to secure wireless network access. It is best practice to use WPA2 with AES encryption and 802.1x authentication. A pre-shared key should not be used in enterprise networks.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig5_HTML.jpg
Figure 20-5.

WLC network creation page

In Figure 20-6, you can configure the WLC for intended RF use in order to take advantage of Cisco WLC best practice default settings.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig6_HTML.jpg
Figure 20-6.

WLC RF optimization

Next, your WLC configuration will be summarized. Click Apply and reboot the WLC for changes to take effect. Figures 20-7 and 20-8 display the WLC configuration summaries.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig7_HTML.jpg
Figure 20-7.

WLC summary

../images/336497_2_En_20_Chapter/336497_2_En_20_Fig8_HTML.jpg
Figure 20-8.

WLC summary continued

After rebooting the WLC, use the management IP address we configured to log in. To connect to the WLC, browse to its management IP address to use the web-based GUI to configure, monitor, and troubleshoot the WLC as shown in Figure 20-9.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig9_HTML.jpg
Figure 20-9.

WLC login

WLC Monitoring

Upon logging into the WLC, we see the network summary of the WLC as displayed in Figure 20-10. You cannot make any configuration changes here.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig10_HTML.jpg
Figure 20-10.

WLC network summary

Click Advanced in the upper-right corner to make changes. Now we see MONITOR, WLANs, CONTROLLER, WIRELESS, SECURITY, MANAGEMENT, COMMANDS, HELP, and FEEDBACK in the top menu.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig11_HTML.jpg
Figure 20-11.

WLC MONITOR summary

You can see the summary screen of the wireless controller GUI in Figure 20-11. It features information such as the controller IP address, software version, name, number of access points, current clients, and rogue access points.

VLAN Configuration

The Interfaces option under CONTROLLER in the left menu is where we configure VLANs on the WLC. Interfaces are logical connections internal to the controller, whereas controller ports are physical connections on the WLAN.

Click CONTROLLER and click Interfaces. Click New in the top-right corner. We will step through the screens to create a new VLAN/interface. Follow along with Figures 20-12 through 20-15.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig12_HTML.jpg
Figure 20-12.

WLC new VLAN

Click Apply in the top-right corner. Next, we configure the VLAN ID, subnet, gateway, network mask, and DHCP information.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig13_HTML.jpg
Figure 20-13.

WLC VLAN

Enter the IP address, network, and gateway of the VLAN.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig14_HTML.jpg
Figure 20-14.

WLC VLAN configuration

Click Interfaces in the left menu to see the VLAN we just created.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig15_HTML.jpg
Figure 20-15.

WLC VLAN summary

DHCP Configuration

Under CONTROLLER, there is Internal DHCP Server in the left menu. Expand it and click DHCP Scopes where we can see the initial DHCP scope (day0-dhcp-mgmt) that allowed us to access the WLC for initial configuration. Follow along with Figures 20-16 through 20-18.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig16_HTML.jpg
Figure 20-16.

WLC DHCP summary

To create our new DHCP scope, click New and assign it VLAN 100, our VLAN that we created earlier. We see that our address pool is 0.0.0.0 - 0.0.0.0. Click the VLAN to change the settings.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig17_HTML.jpg
Figure 20-17.

WLC DHCP creation

We can now configure the subnet, net mask, lease time, default routers, and DNS servers.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig18_HTML.jpg
Figure 20-18.

WLC DHCP configuration

Don't forget to click Apply in the upper-right menu and click Save configuration in the upper-right menu afterward.

WLAN Configuration

To create a new WLAN, click WLANs in the top menu. You now see already configured WLANs. Click the Go button which allows us to create a new WLAN. Follow along with Figures 20-19 through 20-22.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig19_HTML.jpg
Figure 20-19.

WLC WLAN creation

Choose the WLAN type in the dropdown menu and enter the profile name and choose your SSID. It is recommended to use the same profile name and SSID. We will create ID 10.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig20_HTML.jpg
Figure 20-20.

WLC WLAN configuration

You must click Enabled next to Status to activate the WLAN.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig21_HTML.jpg
Figure 20-21.

WLC WLAN enabled

Let’s look at the QoS tab and look at the preset settings. If we select Quality of Service, we see preset settings for video and voice among others. If a client asked to you prioritize voice, you would select that option.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig22_HTML.jpg
Figure 20-22.

WLC QoS configuration

MANAGEMENT

If you click the MANAGEMENT tab as shown in Figure 20-23, we see different options for managing the WLAN. Let's look at SNMP (port 162) and SYSLOG and HTTP-HTTPS.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig23_HTML.jpg
Figure 20-23.

WLC SNMP configuration

Security

WLAN security is a huge concern for any network administrator. There are many threats introduced into your network when you move to wireless, which wired networks do not have to be concerned about. Also note that you still must secure the networks from the same vulnerabilities that exist in wired networks. Anyone can sniff your traffic because it is in the air. This section explores security concepts, such as the vulnerabilities that are introduced and how to mitigate the threat of an attack on your WLAN. Many WLANs today do not implement good security, which almost allows access to anyone. If you want proof, just look at some of your neighbors’ networks—they are wide open (but do not use their networks).

Encryption and Authentication

Let’s very briefly cover wired equivalent privacy (WEP), because it should not be used for encryption and any network using WEP should be considered insecure. It is important to protect your data by keeping unauthorized users out of the networks and preventing eavesdropping. Next, you learn about Wi-Fi Protected Access (WPA) and 802.1x authentication.

WPA

WPA has two versions, WPA and WPA2, which were introduced by the Wi-Fi Alliance. WPA was developed to replace WEP due to its vulnerabilities. WPA makes key cracking very unlikely because it causes automatic key changes. WPA can be used with 802.1x or pre-shared keys. WPA2 is a stronger form of encryption and is an update to WPA. WPA uses Rivest Cipher 4 (RC4), whereas WPA2 uses Advanced Encryption Standard (AES), which is one of the strongest encryption algorithms. It has not been broken to date and is used to protect government information.

802.1x

802.1x uses several authentication protocols to provide access control, including the Extensible Authentication Protocol (EAP), Extensible Authentication Protocol Transport Layer Security (EAP-TLS), Protected EAP (PEAP), Lightweight Extensible Authentication Protocol (LEAP), and EAP Flexible Authentication via Secure Tunneling (EAP-FAST). 802.1x prevents users from being allowed to pass data through a WLAN AP until they have been authenticated. Authentication is based on a supplicant or user that would like access, an authenticator or an AP that grants network access, and an authentication server that grants permission based on credentials provided by the supplicant.

EAP supports many different methods of authentication, including the use of the following:
  • Smart cards

  • One-time passwords

  • Certificates

  • Public key authentication

  • Tokens

  • Kerberos

The EAP process of authentication starts with a user trying to associate with an AP. The AP restricts the user from network access, and the user must provide authentication information. Next, the authentication server and user authenticate each other and agree on a key. Finally, the user is granted access to the network.

EAP-TLS uses public key cryptography, allowing the server and user to mutually authenticate each other. Digital certificates and smart cards are forms of public key cryptography. The communication between the user and server is encrypted with a TLS tunnel. WEP, WPA, or WPA2 encrypts the data after the user is authenticated. The EAP-TLS process of authentication starts with a user trying to associate with an AP. The AP restricts the user from network access, and the user must provide authentication information via a certificate. Next, the authentication server provides a certificate to the user. The user and the server authenticate each other and agree on a key and establish a secure tunnel. Finally, the user is granted access to the network.

PEAP uses a server-side authentication system similar to that used in SSL using TLS. The PEAP process of authentication starts with a user trying to associate with an AP. The AP restricts the user from network access. The user verifies the server certificate. Next, the authentication server authenticates the user by using a one-time password or some other means and agrees on a key. Finally, the user is granted access to the network. Windows passwords and usernames can be used to authenticate users also, including the authentication server communicating with Active Directory to allow user access.

LEAP provides a username and password authentication that allows users access to the network. Each time a user authenticates, a new key is generated. Every time a user moves to a new AP, a new key is created. The LEAP process of authentication starts with a user trying to associate with an AP. The AP restricts the user from network access. The user must provide login credentials to the server. Next, the authentication server and user authenticate each other and create a session key. Finally, the user is granted access to the network.

EAP-FAST uses a certificate-based authentication with a username and password via an encrypted TLS tunnel between the user and authentication server. EAP-FAST uses shared secret keys to make reassociation between the user and the AP fast. Public keys can also be used, but the AP must know the secret key for the user in advance. The EAP-FAST process of authentication starts with a user trying to associate with an AP. The AP restricts the user from network access. The user verifies the server’s credential with the shared key. Next, the authentication server and user agree on a key. Finally, the user is granted access to the network after the secure tunnel is connected.

Authentication Server

Let’s configure a RADIUS server for authentication. Navigate to SECURITY and then under AAA click RADIUS and Authentication. Follow along with Figures 20-24 through 20-27.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig24_HTML.jpg
Figure 20-24.

WLC RADIUS authentication server

If you click New, we can create a new server.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig25_HTML.jpg
Figure 20-25.

WLC RADIUS server configuration

In order to authenticate clients to your WLAN, you should use an authentication server. Click the Security tab. We see that we can choose WPA2 and use AES for encryption. We see Authentication Key Management where 802.1x can be enabled.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig26_HTML.jpg
Figure 20-26.

WLC WLAN security

If you expand the AAA Servers option, we see RADIUS and TACACS+ options. Let’s configure RADIUS using the server we created.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig27_HTML.jpg
Figure 20-27.

WLC WLAN security AAA configuration

Cisco ISE

Cisco ISE and WLAN

We can configure and manage WLCs with Cisco ISE. Browse to the ISE GUI at https://ISEIP/admin. If this is your first login, you will be asked to run the Wireless Setup wizard. If it is not your first time, then the wizard is in the upper-right corner of the ISE GUI. Figure 20-28 displays the Cisco ISE GUI.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig28_HTML.jpg
Figure 20-28.

Cisco ISE GUI

This section will cover deploying ISE and a WLC. Navigate to the Wireless Setup wizard by hovering over the circle icon with an arrow in the top-right corner and selecting Wireless Setup as shown in Figure 20-29.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig29_HTML.jpg
Figure 20-29.

Cisco ISE wireless setup menu

We will use the Wireless Setup wizard to configure ISE with the following options following Figure 20-30 through Figures 20-37:
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig30_HTML.jpg
Figure 20-30.

Cisco ISE wireless setup

Bring Your Own Device (BYOD) : Give your employees the option to use their own devices you specify as admin or allow them to enroll in a device portal.

Guest Access: This will allow a custom portal page where a guest can register their device to create a wireless access account.

Secure Wireless with WPA2, PEAP authentication, and 802.1x: This will secure corporate users using Active Directory for authentication.

Wireless Setup Wizard

We have three options for configuration, and you can run any one or all three in any order.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig31_HTML.jpg
Figure 20-31.

Cisco ISE wireless guest setup

We can see three options under Guest Access: Self Registration, Hotspot, and Sponsored. To allow for guests to self-register via a portal, choose Self Registration. Enter your wireless controller information. Using at least 16 characters for your shared secret is advised.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig32_HTML.jpg
Figure 20-32.

Cisco ISE WLC setup

Click Register and advance to the next screen where we select our WLC and click Commit.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig33_HTML.jpg
Figure 20-33.

Cisco ISE wireless guest self-registration setup

Configure the wireless SSID and the VLAN for your guest users and select account duration (it is 24 hours by default) and the URL redirect after guests have logged in. Apress_Guest was already configured on the WLC, so it was already listed. Let’s create Apress_Guest1.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig34_HTML.jpg
Figure 20-34.

Cisco ISE wireless SSID setup

We can customize the guest portal by clicking the pencil icon. We can customize three pages: Login Page, Registration Page, and Registration Success.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig35_HTML.jpg
Figure 20-35.

Cisco ISE wireless self-registration portal

Click Login Page and let's customize the background and icon images. You can change the terms and conditions for your company needs. Click Commit to save your changes.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig36_HTML.jpg
Figure 20-36.

Cisco ISE wireless self-registration portal edit

Click the TEST PORTAL button to test your configuration. If changes are necessary, then click the pencil; and if you are done, then click Go Live, and guests can now log into your network. You can see how simple it was to create a wireless network using the wizard with Cisco ISE.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig37_HTML.jpg
Figure 20-37.

Cisco ISE wireless setup completion

Hotspot Wizard

Now we will configure a hotspot using Cisco ISE. Navigate to the Wireless Setup wizard and click Hotspot under Guest Access. Then we can select our WLC or click the + icon to connect to a new WLC. Follow the hotspot configuration using Figure 20-38 through Figures 20-46.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig38_HTML.jpg
Figure 20-38.

Wireless Cisco ISE wireless hotspot setup

Enter the hotspot name and VLAN we will use and click Add. Also, we can choose the POST LOGIN REDIRECT. As we can see, the account access duration is 30 days.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig39_HTML.jpg
Figure 20-39.

Wireless ISE wireless hotspot configuration

Select the hotspot you created and click Commit.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig40_HTML.jpg
Figure 20-40.

Wireless ISE wireless hotspot

We can customize the hotspot portal by clicking the pencil icon. We can customize two pages. When you are finished, click Next.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig41_HTML.jpg
Figure 20-41.

Wireless ISE wireless hotspot portal

Click the pencil icon to get a closer look at our options.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig42_HTML.jpg
Figure 20-42.

Wireless ISE wireless hotspot portal configuration

Our hotspot is ready now. Click Commit.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig43_HTML.jpg
Figure 20-43.

Wireless ISE wireless hotspot portal test

Click TEST PORTAL to test our hotspot.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig44_HTML.jpg
Figure 20-44.

Wireless ISE wireless hotspot portal acceptance

Click Accept to finish testing our hotspot.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig45_HTML.jpg
Figure 20-45.

Wireless ISE wireless hotspot portal connection

We have successfully tested the hotspot.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig46_HTML.jpg
Figure 20-46.

Wireless ISE wireless hotspot portal completion

We are now ready to go live. Click Go Live so users can use the hotspot. Figure 20-47 displays the BYOD wireless wizard.

BYOD Wizard

Navigate to Bring Your Own Device from the Wireless Setup wizard. Select from Single SSID or Dual SSID and then click SETUP. We will go with Single SSID. Follow along using Figures 20-48 through Figures 20-53.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig47_HTML.jpg
Figure 20-47.

Wireless ISE wireless BYOD wizard

Select Single SSID.

Select your WLC or add a new one and click Commit.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig48_HTML.jpg
Figure 20-48.

Wireless ISE wireless BYOD WLC selection

Add your wireless SSID and click Add.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig49_HTML.jpg
Figure 20-49.

Wireless ISE wireless BYOD SSID setup

Select your SSID and click Commit.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig50_HTML.jpg
Figure 20-50.

Wireless ISE wireless BYOD SSID configuration

Select your Active Directory you previously configured and add employees to the group.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig51_HTML.jpg
Figure 20-51.

Wireless ISE wireless BYOD AD configuration

You can choose to customize the BYOD portal and the My Devices Portal just as we did with the guest portal. Enter your custom URL for employees to remember it. The URL could be mydevices.local. It should be in your corporate DNS server and pointed to ISE. Once complete, click Next and Go Live after verifying your configuration.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig52_HTML.jpg
Figure 20-52.

Wireless ISE wireless BYOD portal

We can customize the device portal by clicking the pencil and adjusting settings like the color. Then click Commit.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig53_HTML.jpg
Figure 20-53.

Wireless ISE wireless BYOD portal configuration

Lastly, we are ready to click Go Live and use the BYOD portal.

Cisco Prime

Cisco Prime Infrastructure has been discussed in other chapters, and we will discuss it here too as it can be used to manage wireless networks.

Prime can be used for the following:
  • It allows you to track devices and display their locations using spatial maps.

  • It contains wireless planning tools for AP placement.

  • It allows you to use configuration templates to deploy WLCs and APs.

  • It allows you to receive alerts and has a built-in troubleshooting tool.

  • It allows for monitoring of the wireless network.

  • Detailed reports can be run.

To log in to Prime, browse to the IP address of the server and log in using username and password as shown in Figure 20-54.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig54_HTML.jpg
Figure 20-54.

Cisco Prime login

After logging in, you see a home page as in Figure 20-55.

We can see the menu:
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig55_HTML.jpg
Figure 20-55.

Cisco Prime home page

  • Dashboard: Displays dashboards of network activity or information.

  • Monitor: Monitoring display for troubleshooting and maintenance.

  • Configuration: Configuration templates are monitored and deployed.

  • Inventory: Manage device and software inventory.

  • Maps: View network architecture maps.

  • Services: Access mobility services.

  • Reports: View reports.

  • Administration: Prime Infrastructure server management.
    ../images/336497_2_En_20_Chapter/336497_2_En_20_Fig56_HTML.jpg
    Figure 20-56.

    Cisco Prime Dashboard Overview

The Cisco Prime Dashboard can be seen in Figure 20-56. If you hover over the menu, we see a list of our different options. Let's hover over Configuration as shown in Figure 20-57. To configure WLCs and APs through Prime, you can use configuration templates. We can see several different templates including Controller Configuration Groups, Lightweight Access Points, and Autonomous Access Points.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig57_HTML.jpg
Figure 20-57.

Cisco Prime Configuration menu

Here is the severity of the alarms which can be seen in Figure 20-58:
  • Critical: Shown with a red circle

  • Major: Shown with an orange triangular arrow

  • Minor: Shown with a yellow triangular arrow
    ../images/336497_2_En_20_Chapter/336497_2_En_20_Fig58_HTML.jpg
    Figure 20-58.

    Cisco Prime alarms

Wireless Network Monitoring

You can monitor a wide variety of aspects within your wireless network with Prime. You can do this by clicking Dashboard and then Overview to see your WLC and AP count. The Cisco Prime network summary can be seen in Figure 20-59.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig59_HTML.jpg
Figure 20-59.

Cisco Prime network summary

If we hover over Inventory and navigate to Device Management and Network Devices, we can see our WLC. Click Wireless Controller, and we can see our managed WLC in Prime. We can see the network devices in Figure 20-60.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig60_HTML.jpg
Figure 20-60.

Cisco Prime network devices

We can click our WLC to view the details of the device as shown in Figure 20-61.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig61_HTML.jpg
Figure 20-61.

Cisco Prime WLC details

Rogue access points can be identified in Alarms and Events as shown in Figure 20-62.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig62_HTML.jpg
Figure 20-62.

Cisco Prime rogue access point alarms

We can select an alarm message to view the details as shown in Figure 20-63.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig63_HTML.jpg
Figure 20-63.

Cisco Prime rogue access point alarm details

To view security attacks that have been detected by Prime, go to Dashboard ➤ Wireless ➤ Security as shown in Figure 20-64.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig64_HTML.jpg
Figure 20-64.

Cisco Prime Security dashboard

Prime Infrastructure Maps

Prime allows you to have a visual representation of your wireless controllers and APs to include their location and coverage area. PI provides this visual representation with maps; data displays physical locations and predictive RF coverage. You can upload a floor plan as an image file as well. Maps can be accessed by navigating to Maps ➤ Wireless Maps ➤ Site Maps. Follow the map configuration using Figures 20-65 through Figures 20-71.

Insert a campus map and under it we create Floor 1.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig65_HTML.jpg
Figure 20-65.

Cisco Prime site map

We will add a floor to our Apress campus map. We drag our floor plan over to the page and click Save at the bottom.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig66_HTML.jpg
Figure 20-66.

Cisco Prime campus map

We can set the location of our campus using latitude and longitude.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig67_HTML.jpg
Figure 20-67.

Cisco Prime floor plan upload

Now we see our map that has been loaded into Prime.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig68_HTML.jpg
Figure 20-68.

Cisco Prime floor plan

Maps can show access points, clients, interferers, rogue APs, rogue clients, and coverage areas. Rogue clients are clients not known to Prime, and rogue APs are APs that are not part of the enterprise network. This is very useful and could be a security incident. Let’s add an AP to the floor. Click Floor 1, click Edit, and under Access Points select Add.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig69_HTML.jpg
Figure 20-69.

Cisco Prime site map floor plan edit

Now select the appropriate AP and click Add selected.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig70_HTML.jpg
Figure 20-70.

Cisco Prime site map AP addition

On the map if you click an access point, a window will pop up and display information related to the AP including name, MAC address, AP type, AP model, WLC IP address, location, and uptime. You can also monitor the access point and configure the access point from this menu.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig71_HTML.jpg
Figure 20-71.

Cisco Prime site map AP details

On the map if you have a client and click it, we see information related to the client to include the username and MAC address of the client.

We can enable AP coverage which shows the coverage area in Figure 20-72.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig72_HTML.jpg
Figure 20-72.

Cisco Prime site map coverage area

Select Rogue APs to see where rogue APs are located.

Prime Infrastructure Configuration

Prime has a configuration wizard for creating a rogue AP policy. Let’s go through it using Figure 20-73. Navigate to Services ➤ Mobility Services ➤ Wireless Security.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig73_HTML.jpg
Figure 20-73.

Cisco Prime Wireless Security

If we click Next, we can start to configure our rogue policy as shown in Figure 20-74.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig74_HTML.jpg
Figure 20-74.

Cisco Prime rogue policy

If we click Next, we can use current rules or create new rogue rules as shown in Figure 20-75.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig75_HTML.jpg
Figure 20-75.

Cisco Prime rogue rule

Figure 20-76 displays the configuration of a rogue rule titled TEST.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig76_HTML.jpg
Figure 20-76.

Cisco Prime rogue policy example

After we have created our rogue rule, we can click Apply. Figure 20-77 shows the rogue policy.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig77_HTML.jpg
Figure 20-77.

Cisco Prime rogue policy configuration

Threats and Vulnerabilities

There are many threats to a WLAN, as signals propagate through the air for any eavesdropper to view and analyze. This section focuses on those vulnerabilities, as well as ways to prevent security breaches. The only advantage that WLANs have over wired networks is that hackers must be within reasonable physical proximity of the WLAN. Even from several miles away, an attacker can use a cheap antenna to send or sniff Wi-Fi signals. It is good to understand the threats that are in a WLAN, because you can better defend your network. Let’s not forget how the placement of your APs is integral to security of your Wi-Fi network. You want to restrict physical access to your network devices to unauthorized personnel as they can easily be replaced, moved, or reset.

Service Set Identifiers (SSIDs) are treated as a security mechanism, when in reality they are only used to separate WLANs from one another. Sniffing is undetectable, but there are many free and commercial sniffing tools available. SSIDs are broadcasted multiple times per second in each beacon frame from an AP. It is best practice to turn off the SSID broadcast, but even then, your SSID is broadcast whenever a client associates or reassociates with the AP. This SSID can be sniffed and is in the clear. This is one type of gaining access to the network. Sometimes WLANs even use their SSID as their password.

If you use WEP for security, you might as well not use a password. There are many tools that can be used to crack WEP keys in seconds. Sniffing tools can be used to capture usernames or other important information. There are many websites that tell you how to make antennas that can be used to gain access to networks. Wardriving is completed by scanning wireless signals for networks, and there are sites that contain online databases of unprotected wireless networks. The best practice is to use WPA2 to protect your data in the network.

WLANs can easily be disrupted by denial of service (DoS) attacks that can be completed with radio-jamming equipment. Disassociation attacks also occur by posing as an AP and disassociating a device from an AP. Then the attacker can constantly send disassociating attacks to cause DoS. An attacker could also pose as a “man in the middle” to make a client associate with it and then sniff all its data. Air Jack is a tool that can locate a hidden network that does not broadcast its SSID. The tools dissociate a device from an AP, forcing it to reassociate with the AP; it sniffs the SSID in the reassociation packet. It can also transmit invalid authentication requests by spoofing legitimate clients, which causes APs to dissociate legitimate clients. The best way to prevent this type of attack is to make sure that your WLAN coverage ends inside your building and that it does not stretch outside. This can be done by focusing on the placement of the APs and walking around with a scanner to verify that the network does not extend further than you want it to.

Some APs restrict users’ access by MAC addresses, but in this case, it is trivial to sniff packets that contain legitimate users’ MAC addresses, and thus someone can spoof this to be accepted on the network. Rogue APs are unauthorized and not allowed on a network; some users set them up because they think it is easy, and attackers may set them up to steal account information from users. Any device can try to associate with a rogue AP, and the account information used to authenticate can steal a user’s credentials. Do not think that you will be able to identify a rogue AP, because it can mimic your normal AP. Credit card data can be stolen, as well as other confidential information. One-time passwords can be used to minimize the threat, but even a one-time password can be stolen, although it is only valid for that one session. Wireless surveys should be performed on your network to detect rogue APs.

In most instances, malicious wireless snooping and cracking is done to gain access to the Internet without paying a service provider or to conceal malicious activity within an unknowing victim’s wireless network, deflecting any searches for the source of that activity from the individual. Usually, networks that take even moderate care in securing the access points by using encryption and authentication, and by following good physical security practices, won’t be targeted in favor of the low-hanging fruit of an unsecured or poorly secured network. Attackers want the easy target most of the time—so secure your network!

Summary

This chapter covered WLANs and WLAN standards, as well as the basic components of the Cisco wireless network architecture, including access points and controllers. We discussed how to install and configure access points and wireless controller installation and configuration. We covered configuration with ISE and managing your wireless network with Cisco Prime Infrastructure. Finally, we covered wireless security, including encryption, authentication, and WLAN threats and vulnerabilities that exist in wireless networks.

Wireless Exercise

This section provides a wireless exercise to reinforce what was covered in this chapter.

EXERCISE 1: WIRELESS NETWORK CONFIGURATION
This exercise can be completed by downloading Cisco Packet Tracer. You can create WLANs using a WLC, a switch, and an AP and authenticate mobile devices using this software. A Cisco account is required in order to download Packet Tracer. You will create one WLAN and one VLAN and authenticate with WPA2. Complete exercise 1 using Figure 20-78.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig78_HTML.jpg
Figure 20-78.

Wireless exercise

Download Cisco Packet Tracer. We are using version 7.3.

Add a switch, a wireless LAN controller, two access points, a tablet, and a mobile phone.

First, let’s configure the WLC with the following settings as shown in Figure 20-79:
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig79_HTML.jpg
Figure 20-79.

WLC exercise configuration

Management IP address: 192.168.1.254

Subnet mask: 255.255.255.0

Default gateway: 192.168.1.1

Next, configure the admin PC to DHCP.

Next, configure the switch with the following settings:

MGMT VLAN 200: 192.168.1.1/24

IP DHCP: Exclude 192.168.1.1 and 192.168.1.254

DHCP pool: 192.168.1.0/24

Connect and configure lightweight access points to the switch:

AP Floor1

AP Floor2

Add a tablet and mobile host.

Exercise Answers

This section provides a walk-through to this chapter’s exercise.

Exercise 1

Configure the switch with a VLAN and DHCP server:
Switch# sh run
Building configuration...
Current configuration : 2206 bytes
!
version 16.3.2
hostname Switch
!
ip dhcp excluded-address 192.168.1.1
ip dhcp excluded-address 192.168.1.254
!
ip dhcp pool MGMT
network 192.168.1.0 255.255.255.0
default-router 192.168.1.1
!
interface GigabitEthernet1/0/1
switchport access vlan 200
switchport mode access
switchport nonegotiate
!
interface GigabitEthernet1/0/2
switchport access vlan 200
switchport mode access
switchport nonegotiate
!
interface GigabitEthernet1/0/3
switchport access vlan 200
switchport mode access
switchport nonegotiate
!
interface GigabitEthernet1/0/24
switchport trunk native vlan 200
switchport trunk encapsulation dot1q
switchport mode trunk
switchport nonegotiate
!
interface Vlan200
ip address 192.168.1.1 255.255.255.0

On the admin workstation, go to the browser and navigate to http://192.168.1.254 as shown in Figure 20-80.

Create whatever password you want to. Next we move on with the WLC configuration as shown in Figure 20-81.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig80_HTML.jpg
Figure 20-80.

WLC configuration

../images/336497_2_En_20_Chapter/336497_2_En_20_Fig81_HTML.jpg
Figure 20-81.

WLC configuration continued

Navigate to the WIRELESS tab to view the APs that have registered with the WLC as shown in Figure 20-82.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig82_HTML.jpg
Figure 20-82.

WLC AP summary

Click WLANs to create two WLANs. Name them Floor1 and Floor2 as shown in Figure 20-83.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig83_HTML.jpg
Figure 20-83.

WLC WLAN configuration

Make sure they are enabled as shown in Figure 20-84.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig84_HTML.jpg
Figure 20-84.

WLC AP Floor1 configuration

Click the Security tab.

Under Layer 2, select WPA+WPA2.

Select WPA2 Policy and select AES for encryption.

Select PSK for pre-shared key.

Type Apress123 for our pre-shared key and click Apply as shown in Figure 20-85.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig85_HTML.jpg
Figure 20-85.

WLC AP Floor1 security configuration

Repeat for Floor2.

In the WLANs menu, select Advanced and create a group for each floor by selecting Add Group as shown in Figure 20-86.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig86_HTML.jpg
Figure 20-86.

WLC WLAN AP group configuration

Click the Floor1 group and select the WLANs tab and add a new SSID and name it Floor1 as shown in Figure 20-87.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig87_HTML.jpg
Figure 20-87.

WLC AP group menu

Next, go to the WLANs tab and select the Floor1 AP and click Add New as shown in Figure 20-88.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig88_HTML.jpg
Figure 20-88.

WLC WLAN AP group edit

Select Floor1 and click Add as shown in Figure 20-89.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig89_HTML.jpg
Figure 20-89.

WLC AP group WLAN configuration

Next, go to the APs tab and select the Floor1 AP and click Add APs as shown in Figure 20-90.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig90_HTML.jpg
Figure 20-90.

WLC AP group AP configuration

Repeat this for Floor2.

Click the smart phone and connect it to the Floor2 AP. Enter the SSID, select WPA2-PSK, and enter your key and select AES for encryption as shown in Figure 20-91. You may need to select Static and switch back to DHCP to pull an IP address. We see the phone connected to the Floor2 AP.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig91_HTML.jpg
Figure 20-91.

Smartphone AP connection

Click the tablet and connect it to the Floor1 AP. Enter the SSID, select WPA2-PSK, and enter your key and select AES for encryption as shown in Figure 20-92. We see the tablet connected to the Floor1 AP.
../images/336497_2_En_20_Chapter/336497_2_En_20_Fig92_HTML.jpg
Figure 20-92.

Tablet AP connection

We can see the wireless devices authenticated and connected to the Floor1 and Floor2 access points.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.223.196.211