+ All Categories
Home > Documents > Security for Wireless Networks

Security for Wireless Networks

Date post: 12-Sep-2021
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
14
701 N 34th Street, Suite 250 Seattle, WA 98103 206.691.5555 www.netmotionwireless.com Security for Wireless Networks
Transcript
Page 1: Security for Wireless Networks

701 N 34th Street, Suite 250Seattle, WA 98103206.691.5555www.netmotionwireless.com

Security for Wireless Networks

Page 2: Security for Wireless Networks

2TM

Security for Wireless Networks

Security for Wireless NetworksWhen enterprises incorporate mobile access via wireless networks (WLAN or WWAN) into their remote access methods, user authentication and data security become significantly more complex and challeng-ing than when dealing only with wired or tethered networks. This paper will explore secure remote access solutions and evaluate them in comparison with NetMotion Mobility. NetMotion Mobility is a mobile secure remote access solution that provides strong encryption and industry-leading security spe-cifically for mobile workers using wireless networks. Unlike other solutions, Mobility does not require administrators to forgo usability or productivity in favor of security. In fact, Mobility is a user-transpar-ent solution that does not require user training or intervention and typically results in lower IT support costs.Mobility is optimized for WWAN, WLAN or any other IP-based network mobile workers use for remote access, including home networks, dialup, and public and private hotspots.

IntroductionWireless access methods currently include both wide area wireless (provided by wireless carriers such as Cingular or Verizon Wireless) or wireless LANs (typically installed and operated by an enterprise). In general, remaining “legacy” private radio networks are gradually being replaced or augmented by 802.11 (Wi-Fi™) and/or carrier based networks (e.g., GPRS, 1xRTT, EDGE, and EV-DO).Both wide and local area wireless networks cited above support TCP/IP communications – the de-facto standard protocol used for virtually all “wired” application traffic and for sending and receiving data via the Internet. Use of TCP/IP over wireless infrastructure greatly extends the reach of an enterprise by providing access to data and applications that were previously available only via internal network access or occasional “dial-up” by mobile field workers, telecommuters, and partners. However, as with most technology advances, remote access via wireless networks also creates substantial security risks for those who are unprepared.

Access Methods

WWANWireless wide area networks such as EDGE, 1xRTT, or EV-DO provide an elegant solution for keeping mobile workers in contact with the enterprise. Data routing associated with such carrier-based networks typically is offered in two forms – dedicated or via the public Internet.

Dedicated Network

In a dedicated configuration, the mobile user connects to a carrier network and is then routed via a dedi-cated frame relay (or sometimes ATM) network back to the enterprise:

Page 3: Security for Wireless Networks

3TM

These networks provide an additional layer of security in that the data transmi�ed over the carrier net-work, from the mobile worker, is over a private link (frame relay) to the enterprise. The security used for the wireless link on WWANs depends on the access method and the telecommunications carrier. For example, in GSM and derivative networks, SIM (Subscriber Identity Mechanism) cards are used to supply key information during encryption. However, while wireless WAN security systems encrypt the data over a wireless network, security be-comes the responsibility of the individual user once the data leaves the carrier and travels the dedicated circuit. In addition, lost or stolen mobile devices (or mobile data PC cards and wireless phones serving as modems) also pose very real security threats. Without additional security measures in place such vulner-abilities can quickly put an enterprise at risk.

Internet

Internet-based routing typically is a more affordable solution than the dedicated network described above because it does not require a dedicated link from the carrier to the enterprise. In this model, the path from the mobile worker to the enterprise is via the carrier network and then to the enterprise using the public Internet:

�������������

�����������

������

�����������������������������������������

��������

��������

������

Again, data security over the wireless link depends on the access technology and the wireless carrier in-volved. In addition, unless an enterprise provides its own security solution, the risks associated with this model are severe because information traverses the public Internet on its way to and from an enterprise data center. The number of security threats that exist for communications across the public Internet are, of course, legion. Placing a firewall at the perimeter of the enterprise network offers some protection because it helps to secure the type of traffic allowed in or out of the enterprise. But this approach is insufficient with regard to validating the integrity of the data and the identity of the mobile user or device – both essential aspects of mobile computing security.

WLANIn the WLAN industry, the IEEE 802.11a/b/g standards have made it possible for hardware vendors to create interoperable systems. The success of these initiatives has resulted in a high WLAN adoption rate in the corporate environment, both inside and outside the trusted network.But with this success has come an increased risk to corporate security. Security options included with wireless access points have been repeatedly shown to be insufficient. Wired Equivalent Privacy(WEP) is easily compromised and its exploits are well documented. Wi-Fi Protected Access(WPA) improved some of the deficiencies of WEP, but even WPA is susceptible to brute force dictionary a�acks (to retrieve pre-shared keys used in authenticating a device to the access point) and Message Integrity Check(MIC) De-nial of Service a�acks. A new standard called 802.1x may address many of these (device to access point) authentication woes, but adoption of this standard remains negligible. Unfortunately, most wireless

Page 4: Security for Wireless Networks

4TM

access points are capable of supporting only one security protocol at a time. As a result, organizations with wireless devices that support only weak WEP security, and do not support 802.1x or WPA, must con-figure their access points for the security protocol common to all of their devices. For such organizations, a change in WLAN security occurs only when all access points or devices are changed – or another, more comprehensive solution is identified

Multi-Network EnvironmentsThe number and types of networks an enterprise must coordinate, manage and secure is no longer lim-ited to networks (or devices) over which they have physical control (or even ownership). Remote access for partners or telecommuters may be initiated from untrusted devices; employees who take their com-puters home with them may be connecting over their personal broadband (DSL or cable modem) connec-tion, or perhaps even using their own Wi-Fi access point on their home network; and mobile workers may use public or private WLAN access, which includes public hotspots. In fact, such complexity is expected to be increasingly common among enterprises as they combine ser-vice (and networks) from multiple WWAN carriers to provide effective coverage for their field workers.

“By 2007, more than 50 percent of enterprises with more than 1,000 employees will make use of at least 5 wireless networking technologies.”

- Gartner, Inc – May 2004

All too o�en, the convenience and efficiency gained from the adoption of wireless wide or local area infrastructures are offset by increased costs for security, management, and deployment. While it is not possible for an organization to physically manage and secure all of the external networks used for re-mote access, it is possible to validate the authenticity of the user and device, to secure and encrypt data, and to protect the privacy of the user. Typically, such measures are accomplished through aggregation of multiple solutions from disparate vendors. Such solutions nearly always require significant tradeoffs between usability and security. In essence, the historical axiom has been, “The more secure the solution, the more unusable the connection.”

Traditional Options for Secure Remote Access An organization’s security requirements are substantially dictated by the wireless infrastructure it uses (or plans to use). When using wireless networks, security at the perimeter, in the DMZ, and on the trusted network is as important as the need to manage and control users and devices. A comprehensive security solution must protect mobile devices, authenticate users to the corporate network, and protect the integrity of the data, regardless of the wired or wireless networks used. This section reviews solu-tions commonly available today and their performance over wireless networks.

IPSec and Mobile IP VPNs

Internet Protocol Security (IPSec)

One of the weaknesses of the original Internet protocol (TCP/IP) is that it did not include a means for ensuring the authenticity and privacy of data as it is passed over a public network. Operating at layer 3 of the OSI model, IP datagrams are typically routed between two devices over unknown networks. Without a secure IP header, information in the datagram can be intercepted or altered. This became a growing concern when people started using the Internet to transfer sensitive data. Thus IP Security (IPSec) was developed.

Page 5: Security for Wireless Networks

5TM

Its mission: o Encryption of user data for privacyo Authentication of the integrity of a message to ensure that it is not changed en routeo Protection against certain types of security a�acks, such as replay a�ackso Establishment of a mechanism to negotiate the security algorithms and keys required to establish point-to-point securityIn a fundamental sense, IPSec is not well-suited for wireless networks. IPSec “protects” the source IP address, which must remain static for the duration of the secure tunnel to validate the integrity of the sender. While this provides effective protection against spoofing, it also means that an IPSec VPN connection cannot survive wireless coverage gaps, loss of connectivity, or network transitions where the source address may change or be released. Resolving this weakness in IPSec is one of the missions of the Mobile IP working group.

Mobile IPMobile IP is a modification to IPSec that allows a node to continue to send and receive datagrams re-gardless of where the node happens to be a�ached to the network. Mobile IP masks IP address changes, allowing transport layer connections to survive network transitions. It does this by pre-pending the IPSec header with a Mobile IP header (called IP in IP) that manages the source address. This overhead can be costly in bandwidth-sensitive networks and is further exacerbated when NAT traversal (NAT-T) is a requirement.The security components of Mobile IP address only one security problem: redirection a�acks. This is gen-erally reasonable when one considers that redirection a�acks are the only new vulnerability introduced by Mobile IP.

Redirection AttackA redirection a�ack occurs when a “malicious node” gives false information to a home agent in a Mobile IP network. The home agent is informed that the mobile node has a new care-of address. In reality, the new care-of address is controlled by the malicious node. A�er this false registration occurs, all IP data-grams addressed to the mobile node are redirected to the malicious node. Mobile IP does not address other security risks associated with distributed networks. Any implementa-tion of Mobile IP that is targeted at unsecured networks, such as a wireless network, should incorporate other security mechanisms. See [5] for the original text of RFC 2002, and read NetMotion Mobility and Mobile IP for a side-by-side comparison of Mobility and Mobile IP.

SSL VPNsSSL VPN solutions are designed to secure application streams between remote users and an SSL VPN gateway. In contrast with IPSec VPNs, which connect remote devices to trusted networks, SSL VPNs con-nect remote users (independent of device) to specific applications and network resources inside trusted networks. SSL VPNs are an elegant security solution for web-based traffic. The SSL client is pre-built into many of the web browsers common to today’s operating systems, including Windows, Macintosh, Linux, Palm, Symbian, and Pocket PC. The SSL VPN solution also is well-suited for communicating to resources in a trusted network from non-corporate devices such as kiosks, Internet cafés, or an employee’s own computer. Though clearly convenient, these scenarios introduce a number of privacy- and security-related vulner-abilities. Connecting to the enterprise network from non-trusted devices leaves the user vulnerable to keyboard recording utilities. The user may also leave behind cookies and data that were cached during a browsing session. To address this vulnerability, most SSL VPN solutions use ActiveX or JAVA applet

Page 6: Security for Wireless Networks

6TM

utilities to “clean up” a�er a user by deleting the local cache and cookies when a session ends. Enterpris-es also are susceptible to worms or Trojans that may have infected non-trusted equipment used during an SSL session. SSL VPN vendors are addressing these threats using cooperative enforcement with third-party client so�ware such as antivirus or personal firewall so�ware. Additional SSL VPN utilities (Ac-tiveX or JAVA applets) are downloaded to ensure that the remote device is running the proper security so�ware (checking for the latest antivirus definition files, for example) prior to allowing access. SSL VPN solution providers have been very responsive to addressing these vulnerabilities as their reach has expanded. At the same time, the complexity of SSL VPN deployments has increased to satisfy the requirements of a secure computing environment. The method for addressing these vulnerabilities is elegant in that it is performed without much user intervention and within a browser environment. The trade-off is that the browser must be enabled to support the download of ActiveX controls and Java ap-plets, both of which have a number of documented vulnerabilities.The allure of SSL VPN solutions has been its inherent simplicity. SSL was already part of the browser, no client installation was required and it was simple for mobile workers to use. Increasingly, though, such simplicity no longer is available. In fact, in an effort to address gaps in functionality and security, most SSL VPN vendors now provide a client as part of their “clientless” SSL VPN solution. Remote user access requirements continue to expand, and the need for access to legacy and other non-web based data sources is growing among mobile workers. As a result, new ActiveX, Java, and Win32 controls are available to download to the remote device. This client so�ware typically requires some configuration to support the desired application and to port-forward the client-side traffic over the SSL tunnel. The solution is certain-ly no longer “clientless” – or simple.

The NetMotion Mobility Solution

Mobility's Roamable VPN incorporates a standards-based, secure, virtual private network designed for wireless networking. Mobility is designed from the ground up with an understanding of the disparate network types mentioned earlier in this document. It provides a seamless solution for users transition-ing from home networks to hotspots and to mixed vendor environments, be they WWANs or WLANs It offers single-sign-on authentication through Microso� Active Directory, RADIUS, Kerberos, and other prevailing standards. It also uses standard Microso�® Windows® login credentials so there are no ad-ditional steps to learn or passwords to remember.The Mobility VPN encrypts all data transmi�ed between the Mobility client and server using 128-bit AES and offers the advantages of IPSec solutions without its configuration, client provisioning, and manage-ment burdens. Mobility is a layer 4 VPN optimized for both wide and local area wireless networks. The transport layer implementation allows Mobility to manage and protect the data flow from the application layer by acting as a proxy for the local application queries at the Mobility server. In addition, Mobility’s location in the TCP/IP stack allows it to seamlessly roam from one network to another. No ma�er what network a client device moves to, the mobile worker is automatically authenticated and the encrypted tunnel is established.

OSI Layer TCP/IP Internet Security Model

Application Layer 7

Application programs and protocols for file transfer, e-mail, etc.

SSL

Presentation Layer 6 Telnet, FTP, SMTP, etc.Session Layer 5

NetMotion MobilityTransport Layer 4

Transmission Control Protocol (TCP), Unacknowledged Datagram Protocol (UDP)

Network Layer 3

Internet Protocol (IP) IPSec

Page 7: Security for Wireless Networks

7TM

Data Link Layer 2

Network interface cards: Ethernet, Token-Ring, ARCNET, StarLAN, LocalTalk, FDDI, ATM, etc.

NIC drivers: Open Datalink Interface (ODI), Network Independent Interface Specification (NDIS)

Physical Layer 1

Transmission media: Twisted pair, coax, fiber optic, wireless media, etc.

Security model comparison

The Mobility client is a so�ware component with a small footprint that is transparent to the end user and does not require user configuration. Its location at the transport layer, below Winsock, allows Mobility to offer a secure end-to-end VPN for any application available to the mobile user or device. The Mobility client also helps secure the mobile device and provides local network firewall capabilities. When the Mobility client is active it listens only on the active interface, and the only data path to the device is through the Mobility tunnel, which is established between the Mobility client and server. With Mobility connected the device is hardened against local network a�acks (port scans, man-in-the-middle a�acks, etc.)—it adds another layer of security to the remote workstation.

NetMotion Mobility Security Architecture

AuthenticationBefore Mobility begins transporting data between the network and NetMotion Mobility client, it must ensure that the end user has the required permissions. A user establishes his identity by logging in to the Mobility client using his Windows domain user name and password. Using the Windows domain creden-tials allows for a single sign-on process and involves no extra work for the IT department. Single sign-on also gives users access to other domain resources, such as file system shares. Once a user has been au-thenticated, Mobility establishes the communications path for transporting application data. NetMotion Mobility supports two protocols for user authentication: CIFS (Common Internet File System) NetMotion Mobility supports the CIFS authentication protocol (also known as the NTLM version 2 challenge/response protocol) authentication of Mobility users on all client platforms. NTLM version 2 authentication means be�er security for Mobility clients on these platforms. RADIUS (Remote Authentication Dial-In User Service) When the Mobility server is configured to use RADIUS for user authentication, the Mobility server acts as a Network Access Server (NAS) in the RADIUS security system. When it receives a connection request from a Mobility client, it uses EAP-MD5 (Extensible Authentication Protocol using an MD5 hash) or LEAP (Lightweight EAP, an EAP implementation developed by Cisco) to secure an initial access negotiation that establishes the user's name and password. The Mobility server passes this information to the RADIUS server and requests authentication.With Mobility, unlike WEP, passwords are user-specific. Only one password is required of a user within the Windows domain, and any policies applied to that user (limited login times, for example) will also apply to his or her Mobility network access and all resources in the domain. Integration with Active Directory When the Mobility server is configured to use the NTLM protocol for user authentication (the default), its security is integrated with the security features in Windows 2000 and Windows 2003, including the Ac-tive Directory service. For a Mobility client to connect to a Mobility server and use Mobility XE services, the person using the client must have a user account on the Mobility server or in the domain in which the

Page 8: Security for Wireless Networks

8TM

server participates. He must also be a member of either the local NetMotion Users group or of a speci-fied domain user group. The Mobility XE setup program creates the local NetMotion Users group during installation, and allows the administrator to specify a global domain user group that contains users who are allowed to connect to a Mobility server.

NetMotion Mobility Client and Server On the mobile device running the Mobility client, data is processed at the session level. All application data destined for TCP and UDP sessions can be secured. (Most connection-oriented applications use TCP for communications; a few, like streaming media, use UDP.) Address management allows all IP data-grams destined for mobile devices to be secured by the NetMotion Mobility server. For more detail, read about Mobility's system architecture and components.

EncryptionMobility protects datagram contents via encryption before forwarding across the network. NetMotion Mobility offers the following levels of encryption, allowing administrators to weigh performance against security strength:• AES/Rijndael (128-bit encryption), the Advanced Encryption Standard for the United States • Twofish (128-bit encryption) • Triple-DES (112-bit encryption) • 56-bit Data Encryption Standard (DES) For a quick comparison of encryption algorithms used in NetMotion Mobility, see Technical Note 2105.

Security Protocols

For secure connections, authentication and encryption processes are shared between the Mobility server and client. NetMotion Mobility synchronizes the processes by exchanging security protocol messages between the server and client. The basic components of this exchange are as follows:• NetMotion Mobility uses the CIFS (Common Internet File System) authentication protocol (also known as the NTLM version 2 challenge/response protocol) to validate the user. The client sends the user name and domain information as part of an NTLM “hash”. The server challenges the client with a nonce. The client then uses the challenge, password, and other information to generate a hashed response. The connection is disallowed if this response does not match the value calculated by the server. If the values match, the user is successfully authenticated. See [4] for a complete description. • The Mobility server sends the Mobility client a data-security-level specification (turning encryp tion on or off). The server mandates the data security level—it is not negotiated—which prevents possible downgrade a�acks. • A Diffie-Hellman key exchange [4] occurs between the Mobility client and server that establishes the encryption keys for the session. When a Mobility client connects to a Mobility server, the fastest key computation method that they have in common is automatically negotiated. • For NTMLv2 and LEAP authentication, Mobility protects against man-in-the-middle a�acks by signing the Diffie-Hellman parameters in the key exchange. The receiver authenticates the parameters by checking the signature.• EAP-MD5 does not provide keys to sign this exchange but once the Diffie-Hellman exchange is done, all subsequent packets are cryptographically signed.• Automatic re-keying enhances Mobility VPN security by periodically changing the keys used to encrypt data passing between the Mobility client and server. When re-keying is enabled, the

Page 9: Security for Wireless Networks

9TM

server initiates a key exchange with each client connection at random times within a configurable re-key interval. The exchange produces a new, unique session key for each client connection; it is unrelated to the previous key, so compromising one key does not compromise future communication based on the new key.

Policy Management

IPSec VPN versus SSL VPN

IPSec policy management controls which networks the remote user has access to on the trusted network: a policy is created and enforced at the IPSec concentrator, which allows or denies the remote user access to a given network. SSL VPN policy management, on the other hand, is a layer 7 control that allows or denies a remote user access to a given application or resource on the network; again the enforcement point is at the SSL appliance. IPSec policies provide control at layer 3, user to network; SSL is more of an end-to-end, user-to-application solution.

The NetMotion Mobility Solution

Mobility Policy Management allows the administrator to centrally define rules and rule sets that can either enforce layer 3 policy (which network a remote user or device is allowed access to) or layer 7 policy (which applications or remote hosts a user or device is allowed access to). In addition, the policy is deployed to each mobile device or user and enforced at the end point. There is no bandwidth cost in denying access and securing internal networks or resources.User or device policy is defined on an interface or network basis. That is, an administrator can choose to enforce layer 3 or layer 7 security based on the networks available to the device or user. For example, an administrator may wish to prevent bandwidth-heavy applications from passing traffic while on a band-width-sensitive WWAN or if the connection speed of that network is below a certain (definable) threshold (i.e., less than 256kbps). This granular approach to policy management allows the administrator to cen-trally manage and control WWAN costs, bandwidth usage, and user experience while applying a solution that is consistent with the organization’s security policies.

VPN Comparison

Mobility VPN IPSec SSLStandards-based key exchange Yes Yes YesStandards-based encryption Yes Yes YesIntegrates with existing authentication schema Yes Yes YesDevice-to-DMZ security Yes Yes YesWireless-friendly Yes No TolerantSeamless roaming (fast handoffs) Yes No YesSeamless roaming (slow handoffs – out-of-range conditions or suspend and resume operations)

Yes No No

Application session persistence Yes No NoData compression Yes Some NoLink optimizations Yes No NoCompatible with Win32 applications without modification Yes Yes No*

Transparency (ease of use) Yes No Yes**NAT-friendly Yes No*** YesQuarantine by device or user Yes Yes Yes

Page 10: Security for Wireless Networks

10TM

Policy management – layer3 Yes Yes NoPolicy management – layer 7 Yes No YesClient required for Win32 applications Yes Yes YesSupport for secure, clientless connectivity No No YesMulti-platform support Windows only Yes Yes

*Requires the installation and configuration of client so�ware**For web based traffic***Many third-party IPSec solutions are now supporting the NAT-T RFC

Wireless-Aware

Application Session Persistence and Wireless Optimizations

In addition to being a wireless VPN, NetMotion Mobility offers wireless optimizations and network and application session persistence:• Wireless optimizations mean that data is transmi�ed as efficiently as possible: Mobility provides the ability to automatically switch to the fastest bandwidth network connection when multiple connections (Wi-Fi and GPRS, for example) are active. (For more on how Mobility pro vides optimum performance over intermi�ent and bandwidth-challenged network links, see our white paper, NetMotion Mobility Link Optimizations.) • Network session persistence means that users don't have to repeat the login process when they move from one IP subnet to another, or when they go out of range of the network and re turn. NetMotion Mobility automatically re-authenticates the connection every time users roam, without user intervention. • Application session persistence means that standard network applications remain connected to their peers, preventing the loss of valuable user time and data. For example, some major airline carriers offer high-speed, wireless access using the 802.11b protocol ("hotspots") in their erminals and waiting areas. Any customer with a mobile device equipped with a WLAN card can gain access to the Internet, corporate network, and e-mail. You open your laptop in the nearest cafe, log in to the corporate network, and start transferring data. But what happens when your flight is announced and you move to the gate at the other end of the terminal? The Mobility user suspends his laptop, moves to the new area, and then resumes the session. The user without NetMotion Mobility has to start from the beginning again: log in, get authenticated, re-open the application, and restart the transfer. Deploying NetMotion Mobility Securely

For Mobility security to be effective, it must be deployed in a secure fashion in concert with other security mechanisms and practices. Topology

The following examples illustrate possible network topologies that complement Mobility security. When using Mobility as a firewall it is important to take the necessary precautions with regard to the Windows configuration of the Mobility server. See the section at the end of this document for some guidelines to securing Windows 2000 and Windows 2003 servers.

Page 11: Security for Wireless Networks

11TM

NetMotion Mobility Client Connectivity

���������������

�������������

������������ ������������������������������������������������������������

������

���������������

������

���������

�����������

�������������������� ���������������������

In this example, the private wireless network is connected to the wireline network through the Mobility server. All application traffic generated on or destined for the wireless network is secured by Mobility, and no other network traffic is bridged or routed to the wireless network. Using standard firewall fea-tures found in the operating system, the system can be further configured to allow only Mobility traffic to be processed by the Mobility server on the wireless network.Public Transit Network

��������

���������������

����������������������������������������������

���������������

������

���������

�����������

������������������������

�������������� ���������������������

In this example, the mobile devices are connected to a diverse, public wide area network. The enterprise is also connected to the public network through a traditional firewall. The firewall is modified to allow Mobility connections, specifically to the address of the Mobility server. These connections are then pro-tected by Mobility security, as described above.

Page 12: Security for Wireless Networks

12TM

Corporate Campus

������������������������

�������������������������������������

������������������������

��������������������������������������������

�������������������������

������������

������������

������������������������������������������������������

�������������������������

��������������������� ��������������

�����������

�����������

�����������

In this example there is a private, wired network on a corporate (or hospital) campus, and a wireless LAN supporting mobile devices is connected to it (and the Internet) through a traditional firewall. Traffic from the public to the private network that is not destined for the correct port is denied using firewall rules. The firewall rules can specify either the domain ("allow access to 123.111.x:5008") or the addresses of particular Mobility servers ("allow access to 123.111.22.3:1002 and 123.111.23.4:5008")—the la�er approach is more secure. (On a smaller campus a single, multi-homed server running NetMotion Mobility could handle both the "hard-wired" and wireless LAN traffic.)Once a user is authenticated, he or she has access to the wired network. A NAT (network address transla-tor) reduces the number of public (routable) IP addresses required: in this example, it is set up as a many-to-one relationship so that the mobile devices use just one of two IP addresses (instead of requiring one each). Any traffic coming from the wireless LAN access points must satisfy both the firewall rules and be cleared by the Mobility server. With encryption enabled, this configuration protects the wired network while offering legitimate wireless users full, secure access to corporate data.

Extending the Corporate Firewall

The NetMotion Mobility Server, located behind the corporate firewall, acts as a transport-level, proxy firewall. As a proxy for all network traffic, user transactions are forced through controlled so�ware that protects the user's machine from a�acks using malformed packets, buffer overflows, fragmentation er-rors, and port scanning. Because NetMotion Mobility is a transport-level proxy, it provides this protection for a wide range of applications.

Quarantining Users and Devices

Though an administrator can terminate an existing connection immediately using the "abort connection" feature, it's o�en useful to quarantine Mobility users or devices for security reasons. Placing a device or user in quarantine does not terminate an existing connection, but the user or device will not be able to establish a new connection:

Page 13: Security for Wireless Networks

13TM

• A quarantined user will be unable to connect with any Mobility client. For example, when an employee is no longer with a company he can be put in quarantine so that he no longer has access to the corporate network.• A quarantined Mobility client (device) will be unable to connect even if the user has valid creden tials and has not been quarantined (a valid user will still be able to use another, non-quarantined device). This is useful if a device is lost or stolen; even if it is set up for automatic logon and authentication, a quarantined device will not be allowed to connect to the Mobility server. Another useful security measure is to put the entire New Devices class under quarantine. A device con-necting for the first time can register with the Mobility server but is then immediately disconnected. This allows the administrator to then go back and validate any newly connected devices (answering the ques-tion, “Is this a recognized new device or is it unauthorized?”), and move them to the appropriate non-quarantined device groups to allow connectivity.

Guidelines for Securing Windows

When using Mobility as a firewall, follow standard precautions for securing a PC running Windows 2000 or Windows 2003. If Mobility is being used as a firewall it is best, from a security standpoint, if no other applications are running on the same PC as the Mobility service. In addition, you should disable the fol-lowing Windows services: • IP forwarding, also known as "routing" • DNS server • TCP/IP printing • Inbound NetBIOS and SMB connections • Remote access service server • Simple TCP services—echo, chargen, discard, daytime, quotd • SNMP service

NetBIOS and SMB Services

NetBIOS and SMB services allow unauthenticated users to create NULL sessions, thus permi�ing a�ack-ers to gain access to information about the machines they exploit. These services are enabled by default on Windows systems.Windows 2000 and Windows XP use ports 135 through 139, and port 445. In addition to filtering these ports at your network perimeter, you should disable NetBIOS over TCP/IP on the Mobility server.

Password protection

User passwords are literally the keys to security. NetMotion Mobility never copies passwords, nor does it send them over the network. As a convenience for the user, however, authentication is done only once per user session: an encrypted form of the password is dynamically stored by the Mobility client and kept for the duration of the session. The cached credentials are flushed when the user logs out or the system is shut down.There are also cryptanalysis methods that can recover passwords by guesses combined with analysis of the security protocols. A strong password policy is the best defense against these a�acks:• Change passwords frequently

• Avoid short, common words

• Use a combinations of letters, numbers, and other characters

Page 14: Security for Wireless Networks

© 2005 NetMotion Wireless, Inc. All rights reserved. NetMotion and the NetMotion logo are registered trademarks, and NetMotion Mobility, Mobility XE, Roamable VPN, InterNetwork Roaming and Best-Bandwidth Routing are trademarks of NetMotion Wireless, Inc. NetMotion technology is protected by US Patent 6,546,425, other US and foreign patents pending.

WP2012 04/05 14TM

Device Security and Interoperability

Security-conscious enterprises use additional solutions to further secure and protect their mobile devices. NetMotion Mobility has been tested with and complements these solutions:Anti-virus: Maintaining and requiring the latest anti-virus definition files is crucial. Mobility interoper-ates with common cooperative enforcement solutions, which restrict network access to security-compliant devices.

Distributed firewall: Personal or distributed firewalls (like anti-virus solutions) have become common-place. Mobility is compatible with mobile device firewall solutions commonly used on both the Windows and Windows Mobile platforms.

Device authentication: Requiring a user to authenticate to a device before authenticating to the network is becoming more and more common, especially with handheld devices that are o�en set down when the user performs other tasks (like handing over a package or working on a piece of equipment). Because these devices have a higher risk of being lost or stolen, many organizations are requiring that the data stored on them be encrypted and locked. These device authentication and encryption solutions can be paired with Mobility to provide a unique authentication solution.

Mobility management: Patch management, so�ware updates, and “poison pills” are features common to mobility management solutions. These mobility management tasks will occur within the secure tunnel provided by Mobility, and are even optimized by Mobility’s link optimizations. If the device is compro-mised, mobility management solutions o�en include a poison pill that destroys the data on the device a�er a failed login threshold has been met or upon a command from the network administrator.

Ongoing Development

New security standards and technologies continue to be developed and adopted. NetMotion Wireless is actively engaged in the international community of industry trade groups and standards-making bod-ies that follow and shape security, mobility, and wireless technologies. We continue to incorporate and complement these standards and technologies as they are adopted in the marketplace.

References

1. Wi-Fi Security, February 19, 2001. (From the Wi-Fi Alliance.)

2. Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition, John Wiley & Sons, 1996

3. IEEE, "802.11 Standard," November 1997

4. Paul Leach and Dan Perry, CIFS: A Common Internet File System, Microso�, November 1996

5. IETF, RFC 2002, IP Mobility Support, October 1996

6. Elizabeth D. Zwicky, Simon Cooper, and D. Brent Chapman, Building Internet Firewalls, O'Reilly & Associates, 2000

7. Wireless Application Protocol, John Wiley & Sons, 1999

8. Step by Step Guide to Internet Protocol Security (IPSec), Microso�, February 2000


Recommended