-
WiFi networks, when working in a secure and efficient manner, provide great business benefits. They ensure employee connectivity across multiple devices and even buildings, and can drive employee productivity throughout an organization’s entire footprint. However, wireless connectivity across business networks also comes with many seen and unseen risks to organizational privacy.
With the increasing adoption of bring your own device (BYOD) in modern workplace culture, the risks have grown. When dealing with WiFi networks for an enterprise, administrators need to worry not just about spotty coverage and dropped connections, but also security and privacy. Some of these risks might seem very obvious, but they often get overlooked. Leaving even a small loophole in WLAN security is an open invitation to hackers eager to eavesdrop into corporate networks.
With advancements in technology, organizations continually have new options for making their premises secure. The major concern often involves choosing between the flexibility to work quickly and the assurance of tight security.
Flexibility and security can be achieved with a robust WiFi platform by supporting the right devices with customized configurations based on your organizational requirements. However, organizations also need to keep in mind that hackers are getting smarter with every passing day, and relying on technology alone might not provide the ultimate security. Having the right combination of technology and supporting policies is the key to a secure and healthy WiFi environment for your organization.
With that in mind, here are common security mistakes to avoid when deploying and operating a WLAN for your organization.
-
Overreliance on firewalls and antivirus software
Many organizations rely entirely on network firewalls and antivirus software, avoiding discussions regarding additional investments for cybersecurity. A we dont-require-extra-security attitude often prevails until a cybercrime impacts the organization. However, firewalls and antivirus software do not address several common loopholes in corporate WiFi networks. Organizations need to realize that while their investments in security may not directly contribute to the bottom line, these investments are as important as insurance. Depending upon the criticality of an organizations digital information and IT infrastructure, proper strategy and budgets for additional security must be implemented.
-
Not considering WLAN security features
When buying WLAN gear, organizations often restrict their research to coverage area, upload/download speed, number or types of devices to connect, or even types of walls or floors. However, there are tons of additional security feature sets available with WiFi devices, including QoS control options, support for WPA/WPA2, WPS, port filtering, IP packet filtering, URL keyword filtering, MAC address filtering, and integrated firewall support. A keen eye on various features available with the new generation of devices can save you from having to make investments in multiple products, and ensure you receive the maximum benefit out of your Wi Fi equipment.
-
Substandard device configuration
When setting up your WLAN nodes (routers, access points, bridges or client adapters) you must evaluate device encryption. Having an encrypted communication mechanism ensures the validity of client systems, but may have a negative impact on network performance. The Wired Equivalent Privacy (WEP) mechanism was deprecated in 2003, and since then Wi-Fi Protected Access (WPA) and WPA2 have become the new standard. These are also available in different configurations like Pre-Shared Key (PSK), Temporal Key Integrity Protocol (TKIP) or Advanced Encryption Standard (AES), each having support for varying key lengths (64-bit, 128-bit or 256-bit). Large enterprises may also opt for the Enterprise mode of WPA or WPA2, which prevents WLAN users from eavesdropping on each others traffic.
However, having the most advanced configuration certainly provides better security, but often comes at the expense of performance. When encryption keys are lengthy, devices require more time and resources to perform encryption and decryption, which degrades network performance. The encryption configuration should be tight enough to ensure desired security, but loose enough to allow acceptable performance levels for the network.
Pro tip: when configuring/upgrading your devices, record and/or make a backup of the old routers settings, like port forwarding, QoS prioritization settings, or other settings and passcodes that might be associated with the old device. Overlooking this small point can lead to spending a lot of effort on device configuration.
-
Guest access without a password
Allowing random people to connect to a WiFi network without any password requirement is the worst-case scenario for the security of that system. All organizations, even those with frequent exposure to random guests like malls, airports or restaurant chains prefer to have some kind of PIN-based, time-bound or data-limit-bound access mechanism to keep track of guest users. For an enterprise-level WiFi network, a password or PIN-based authentication system for guest users is usually the first and foremost security requirement implemented.
-
No network encryption
There are a bunch of nasty hackers out there constantly trying to eavesdrop on enterprise networks and sniff out anything they can from a cozy corner of the Internet. Equipped with modern gadgets and apps, they can easily locate and break into most WiFi networks. Even WLANs with WPA or WPA2 encryption standards are susceptible to brute-force cracking, which an attacker can use to steal passwords or hijack your website or service accounts. Using encryption like Secure Sockets Layer (SSL) and Transport Layer Security (TSL) for critical applications could protect you from such eavesdropping attempts and restrict access to your shared folders and other critical network resources.
-
Lack of additional layers of authentication
Organizations can reduce WLAN security risks with additional authentication. When using the Enterprise mode of WPA or WPA2, installation of a separate Remote Authentication Dial-In User Service (RADIUS) server is required to do the 802.1x authentication. For this, there are multiple options available. Windows Server versions 2008 and later provide Network Policy Server (NPS), which can be leveraged for configuring a RADIUS server. For other operating systems, a third- party RADIUS server is required. Some WLAN access points also include a built-in RADIUS server.
There are also hosted services such as AuthenticateMyWiFi that can be used for additional authentication security. Organizations should consider all options before making any investments based on their requirements.
-
Relying entirely on MAC address filtering
MAC address filtering, an integrated security mechanism in many WLAN devices, lets administrators define a list of computers and client devices that are allowed or not allowed to connect, based on their unique MAC addresses. This mechanism provides basic security, but cannot be considered a fool-proof security mechanism as MAC addresses can easily be spoofed. Many devices offer the ability to change MAC addresses. By knowing the list of authorized MAC address for your organization or simply by procuring a device already authorized for your network, hackers can get into your network and steal bandwidth or perform malicious activities.
To avoid this, use encryption along with MAC filtering. Encryption prevents hackers from eavesdropping on the network, and provides more robust security than just using MAC filtering.
-
Incorrect SSID setup
Setting up the Service Set Identifier (SSID) correctly helps minimize several risk factors. For instance, many WLAN devices allow admins to turn off the broadcast of the SSID name, which removes the SSID from the list of visible networks available for connection. This helps protect the network from unauthorized users. However, hard-core hackers can find hidden networks; security requires a combination of methods previously discussed.
Another important SSID setting has to do with the number of SSIDs client devices can see and connect to. In Windows 7 and later versions of the Windows OS, you can limit the number of SSIDs client devices can connect to. This helps prevent client devices from connecting to an unsecured public WiFi network, thus avoiding exposure of devices and credentials to external networks.
-
Lack of password policies
Besides secure deployment and management of devices, organizations also need to ensure that proper policies are in place for operating the WiFi environment. For instance, when creating user accounts for the WiFi networks, many administrators prefer to use the same password for all Wi-Fi computers and devices. This approach often leads to access problems. In order to restrict a specific user or group from the network, the admin might need to change the passwords on all the access points and devices. Instead, organizations can leverage users individual accounts or digital certificates to allow them to connect to a WiFi network. Managing permissions for individual accounts often results in benefits for the organization in terms of user tracking as well.
Policies forcing users to keep a strong password, including a mix of alphabets, numbers and special characters, and having a password expire after a specified time duration, are also essential attributes organizations must attend to when defining a robust security policy.


Comments
marciasavage
User Rank: Guru
Wed, 08/12/2015 - 07:11
Community members: Any other WLAN security mistakes you'd add to this list?
dan_conde
User Rank: Apprentice
Thu, 08/13/2015 - 06:42
with regards to no. 5 - lack of passwords - I have visited places that provide day-passes (expiring user names and passwords). Although it's a bit cumbersome, it works better than a single password which eventually gets known widely.
On the other hand, I've seen places wit no password, and they require use of VPN to access anythig important. This still makes the place vulnerable to people who siphon-off usage, if that's a concern.
marciasavage
User Rank: Guru
Thu, 08/13/2015 - 07:35
The single-day pass for guests sounds much better than a single password. It seems NAC technology was supposed to help prevent access to sensitive resources, but that technology always seemed more about hype than reality.
Network Computing
User Rank: Apprentice
Thu, 08/13/2015 - 23:33
good note
Network Computing
User Rank: Apprentice
Sat, 08/22/2015 - 04:24
Hacking tools for this part of the network are widely developped and multipkying everyday. So, we need to pay attention of the WLAN Security design. We must follow a good process with all the team when implement a WLAN.
Network Computing
User Rank: Apprentice
Mon, 08/24/2015 - 12:03
Hi Jerome -
You make a great point about hacking tools and the fact that more and more are being created everyday, are we just fooling ourselves about Wifi Security ?
Network Computing
User Rank: Apprentice
Tue, 08/25/2015 - 16:20
Hi my friend ClassC,
Thank you very much.
Right, that's great question. Because, regarding all about wifi security nowadays, this anxiety is common. I think, we must push this question to the researchers or persons involves in this domain, because we talk about security in each area, ok, but in the area of WIFI oufff, the lack is high, IMO.
Network Computing
User Rank: Apprentice
Tue, 08/25/2015 - 16:43
But i think that, we are moving to an era where, more attention will be paid to WIFI techno, maybe like wireless techno into pure telecoms technologies.It will be mandatory ! :), anyway, the security as we saw it here, is an end-to end actions, even if the techno is natively secure (with some security features built-in), it will be very interesting to have :
end devices (from vendor side) need to have some advanced maybe customized security features (what could be viable for marketing purpose),
and we must as always advice /instruct some good pratices of security to the End users!!!
I've noted your great question ClassC, i will ask one day somewhere for others point of view :)
Last thing, i want to add, in my opinion again, we have reach the era where reseachers/innovators in the domain (Wifi) will reveal what they have for a secure solutions. Indeed, sometimes it is more valuable when we need/require/want it! :)
Thanks and Regards,
Jerome
Network Computing
User Rank: Apprentice
Sat, 08/22/2015 - 04:31
We need to pay attention, and try to improve security in these wireless techno or implement some native security features in. Reseachers, vendors or others operators in these areas much rethink and redesign the wireless techno now for a better future with the Internet of Everything.
Network Computing
User Rank: Apprentice
Sat, 08/22/2015 - 04:33
Because i think that one of the power or the success of IoT will be the Wireless techno, IMO.
Thanks,
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 03:56
Ok, when you are setting up the installation, pay attention with the time on you ISE (NTP server) and the Time of your Active directory, it is the rigour! One ISE can support up to 5k
The second mode of deployment, if i remember, is to have up to 5 dedicated PSN. And have two boxes : one box -- make it, admin master and monitoring backup.
second box : vice versa!
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 03:59
Third model of deplym : support up to 40 PSN.
In this case, we must have, a dedicated physcal box for each role.
one box as admin master
one box as admin backup
one box as monitor master
one box as monitor backup
and add your physicall PSN. It is for very large network!
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 04:13
The ISE can do what we call Posture, it consist of, for example, analysing the user OS software, update of the anti-virus, OS firewall and its updates before give access to the network. Sometimes we can configure to force the update of all the user OS before let him access to the network or have some access to some ressources.
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 04:48
Hi everyone, Hi Marcia,
We can allow based on hour the voice trafic and deny the data trafic. We can allow only specific vendor phone to be connected, or more and more..... large range of feature.
I would like to share this challenge, we have one customer one day we ask us to shut all the user (switchs interface) at a specific day and hour and this periodically. Ok, we can push based on the period the DACL to deny any trafic, but he want also to wake up these ports (allow the traffic at a specific period), very difficult , because the second requirement can't be done by this platform :) Need to check and check maybe combine with the Cisco built-in features to clean the Virtual ACL or i don't known :)
That all i like in this platform, rigour, required of many skills, features built-in, flexibility ....
Hope that helps. Have a great sunday that God bless us!
Thanks and Regards,
Jerome AMON
marciasavage
User Rank: Guru
Mon, 08/24/2015 - 15:10
Wow, thanks for all that technical guidance Jerome! The granular access control ISE provides sounds great, but like you say, you really need the right skills to be able to set it up properly.
Network Computing
User Rank: Apprentice
Tue, 08/25/2015 - 17:00
Hi Marcia,
You're welcome and thank you also.
Sorry for my late reply, after working on the design of a big ISP (MPLS) project, i started the implementation (racking, mounting, testing, and configuration from the scratch). 2 new ASR 9k6 must work with a MGW. Techno a this event : IOS-XR, bgp, is-is, mpbgp, ospf, vrrp, bvi, rpl, snmp and more :)
Thanks for your reply, Yes, we need skills !!! And test the skills/knowledge of your infrastr, of the person before let him start put it on your infrastructure :)
Thanks and Regards,
Jerome
marciasavage
User Rank: Guru
Wed, 08/26/2015 - 08:11
Good luck with the project Jerome!
Network Computing
User Rank: Apprentice
Mon, 09/21/2015 - 09:26
Hi Marcia,
Thank you very much. the project was a success. The huawei MGW is connected and everything work as expected. This prototype of design will be reproduced next here in more than 7 locations/regions in all the country. Great achievement :)
Thanks again.
marciasavage
User Rank: Guru
Mon, 09/21/2015 - 10:16
Congratulations Jerome! Thanks for the update.
Network Computing
User Rank: Apprentice
Mon, 09/28/2015 - 02:07
Hi Marcia, thank you very much. It remember me, all the emails i received when i succeffully finished this prject :) Sorry for my late reply, now working as a Principal Field Engineer for a new ASR-based project, P router (ASR9006) to be install and configured from the scratch regarding lot of constraints. And, new other one after this, IPTV project with full ASR products. Ahh, Cisco ASR line products Done right here!!! Thank you Marcia for you support :)
Network Computing
User Rank: Apprentice
Sat, 08/22/2015 - 04:42
Hi Marcia,
Thank you for mentioning the NAC techno. Yes, i worked and i'm working on this techno precisely those of Cisco called ISE (Identity Service Engine), we can do many great things with this, but what i notice is the restrictions with the Access Points (more those of Cisco with specific software and version). Yes, ISE does this job very well! i like it :)
Thanks and Regards,
marciasavage
User Rank: Guru
Sat, 08/22/2015 - 10:40
Hi Jerome! Can you elaborate on what you like about ISE?
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 01:55
Hi Marcia, Hummm Great question, i like everything about this product thanks to its features and how it brings a secure unified access and support this trend of BYOD. Marcia, here i will describe some good features/actions that we can do with this Cisco platform :) Developpers of this platform have done a great job trust me, but there are lot of to do also!
Boummm let's start now with some ideas :)
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 02:07
Hi Marcia, as i said i got the chance and i'm still working on this platform for some customers, and this platform is very rich but it requires to pratice and pratice in order to discover its power. And when a customer ask you something it will be a challenge to learn also new one.
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 02:16
Hi Marcia, We deployed it for lot of bank, enterprise corporate ... One thing i noticed from Cisco side, is there are no more documentation and book about this product, and trust me lot of systems integrator doesn't have skills on this :). Marcia, "on dirait que tu m'a pincé" lool. one thing i woulld like to notice is that we have the chance to have a CCIE higly trained on this Platform by a well-known partner! Ok, this platform have some bugs that we discover step by step when we are working, of course, we contact the Cisco TAC and we share with them, and they try to fix it with some released patch :) We help them!!!
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 02:25
Hi again Marcia,
"je t'avais dit que tu m'a pincé" :)
When you need to work on this platform, due to its rigour (and there i'm totally agree, because we are talking about security platform, so nothing than rigour), have a skills on systems could help, i will say mandatory, i mean in terms of server Certificates and more, know how and where you can find these informatins in the customer infrastructure, as you have not access to some specific ressources of the customer, you must know and instruct/guide them to find what you need to implement/tshoot! ouff lot of to say:)
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 04:10
Ok, let's move now to the operations.
We put all the rules on the Admin master, and it will push/clone the config on the admin backup. So all the confiuration must be done on the admin.
The monitoring is for log, helpful for tshoot, check who is connected, everyting on the network, backup config, restore as well, need to configure a ftp server for store all these huge amount of logs!
The PSN, receive all the rules form the Admin, receive the request of the users/devices, push the DACL (Downloable Access list) on the specific switch interface where the user is connected depending on the rules.
IPN mode, works with the ASA, becasue some versions of ASA don't support x and some others features that are required to communicate with the PSN. but, i thing the actual news versions have these features built-in so no IPN mode to be configured, we will have the PSN with the ASA only!
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 04:32
We have the basic AAA (Authentification, Authorization and Accounting) as in the past on ACS with some config on the switchs/routers. The old NAC + with ACS, can almost give some features of this all in one platform ISE, IMO. With the profiling we can say for exmaple, after authentificating the user based on mac or IP or username/password from AD, let him access to specific ressources. more and more we can do.
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 04:16
So, for this first features the ISE need to get access to internet in order to check these updates information, i think the is a great cloud behind from Cisco side :)
We have also the Profiling, very interesting, at this point we can set up some rules, based on the mac adress of the computer, vendor name of the computer, user departement, trafic type (voice, data), IP address and more .... It is the most used!
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 04:36
We can set up local usernames/passwords on the ISE, and authentificated the user, or use their mac adress, or use the protocol x but required to actived ot on the user computer, so it not interesting for guest and consultant...
So, we have the feature, hotspot, as in cyber cafe, we can for example, setup a username/passord and attribute to this a specific time and authorize only internet access (allow for exmaple the proxy address or DNS and internet gateway)....
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 04:39
We have also the web portal for authentification, say if we don't have the mac address of the user in the database, or something else, redirect him to the web portal for a username /passord based authentification and then push the specific authorization to its interface port on the swicth where he is connected. hum, we have a DACL there. to check on the swiths these acl after pushed by the PSN, enter on cisco switch, i think, show authen session interface .....
Hope that helps!
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 02:33
Hi Marcia, i'm still there ;)
About the rigour, this platform is okay, that is one thing i like also and on this point i say bravo to the developpers team:) You will need some mandatory information to install it before start to configure the rules and more .... And one thing you need to have skills into networking (routing and switching), it is a must, if not you couldn't do anything trust me with. Becasue for some operations, you will need to add configuration to the switchs (more), routers (less), master the customer environnement or master the infrastructure where you want to deploy this solution --- It can put down all your infrastructure due to a bad action! at this moment, you will need to call all your RS, Sec, Wireless, Systems Tshoot skills :)
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 03:07
I like it because, it demand lot of skills in differents areas of IT in order to profit from all its power. NTP, Active Directory, Routing, Swiching, VoIP, Wireless, Mangement of Servers Certificates, .... And of course, when you have to implement it in a big infrastructure, trust me you need more skills than that !
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 03:37
Hi Marcia,
"C'était le début, ça va commencer!!!" :)
Ok, what i like about ISE, Perfect!
It is just a box, precisely a Cisco server, UCS (so the CIMC included) with a hypervisor (Vsphere, what i known) on the top and a sofware installed on the top of all, called Identity Service Engine ! This platform/software can operate into different mode (3 precisely) : Admin, Monitoring, PSN (Policy Service Node). And there is one other mode when you want to secure and make flexible you remote VPN connexion, in this case, we talk about IPN (Inline Posture Node).
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 03:45
Before, Cisco recommand 3 deifferent mode of deployment due to the size of you network (here number of devices/users to deal with). first mode you have two physicall boxes, you configure one to be the master in admin mode and backup in the monitoring mode and make it also a PSN.
The second box, backup in admin mode, master in monitoring mode and make it also a PSN.
We have high availalbilty because as i said, if you implement this solution you network for security (authentification, authorizatin), and you have these boxes down, all your network is down, IMO
Network Computing
User Rank: Apprentice
Sun, 08/23/2015 - 03:49
in the first model of deployment, you notice that the two boxes work as PSN, so depending on the configuration you will put on your devices (switchs), in order to specify which is the master and the backup in terms of PSN function. because, all the request and actions will be done by the PSN. we will come back!
Network Computing
User Rank: Apprentice
Fri, 08/21/2015 - 22:07
nice post good
Network Computing
User Rank: Apprentice
Sat, 08/22/2015 - 04:20
Hi everyone,
@ NWC Editors, great post. Thanks to bring this subject.
I think on of the big mistake is the bad design of the WLAN, indeed they don't take time to work well on this part of the infrastructure so it becomes the weak portion and the perfect space of hackers or the point of attack!
Thanks
Network Computing
User Rank: Apprentice
Sat, 08/22/2015 - 04:28
These kind of mistakes are reproduced in other area such IoT where we could see someone play with a car remotely or something like that :) -- maybe the technology has a lack of security built-in or i don't, maybe the designers/users don't have a good understanding or best practices of this Techno.
christineblue8846
User Rank: Apprentice
Fri, 04/29/2016 - 07:52
Good note. I use PureVPN mainly to protect my identity and personal information by encrypting my WiFi connection. Everything I do online is protected with PureVPN.
Network Computing
User Rank: Apprentice
Sun, 08/16/2015 - 07:34
This was a fantastic piece on WiFi Security Mistakes. With everyone delploying WiFi , disclaimers to endusers for security breeches is not enough.
There is so much information here that I urge everyone to take the time to review it carefully - let it sink in. Because companies in general have no idea what is actually involved with WiFi security, they entrust sysadminsand networking professional to do so - but do we really understand the best practices ?
I admit I don't. How about you ? Networking Computing does an excellent job in bring IT professionals up to speed.
Thanks.
Network Computing
User Rank: Apprentice
Sun, 08/16/2015 - 07:37
Making backups of Router setting is another great tip. When you start trying to employ new techniques in security, it is reasonable to expect things might not to go as expected, so a backup will be your best friend when things go awry.
It should be the first step you make before employing any changes.