Professional Documents
Culture Documents
BRKEWN-2018
Cisco Public
Abstract
The proliferation of Wi-Fi enabled devices creates important challenges for IT, perhaps the chief challenge being security and scalable, efficient, secure roaming. This session will cover the state-of-the-art technologies for proper authentication and encryption and fast, secure roaming. Topics include 802.11i/ WPA/WPAv2, TKIP/AES & Fast roaming with CCKM, PKC, and the emerging 802.11r standard. Different EAP types like PEAP, PEAP-GTC, EAP-TLS, EAP-TTLS, EAP-FAST will be covered in this session. The session will include best practices for implementing latest WLAN security techniques and design and deployment recommendations for device roaming. Prerequisite: A minimum of CCNA level knowledge of campus routing and switching is highly recommended. Knowledge of 802.11 WLAN fundamentals and the basics of the Cisco Unified WLAN technology are also assumed.
BRKEWN-2018
Cisco Public
Session Agenda
Anatomy of a Device Connection Anatomy of a Device Roam Design and Deployment Considerations
BRKEWN-2018
Cisco Public
BRKEWN-2018
Cisco Public
Section Agenda
802.11 Architecture and Services Basics 802.11i Addendum EAP Types and Key Management Device Mobility Problem Statement
BRKEWN-2018
Cisco Public
STA
BRKEWN-2018 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public
STA
6
BSS ESS
BSS
BRKEWN-2018
Cisco Public
802.11 Services
Service Description Distribution Services Implementation
STA Services
BRKEWN-2018
Cisco Public
802.11 Services
Service
Association Reassociation Disassociation
Implementation
STA Services
BRKEWN-2018
Cisco Public
802.11 Services
Service
Association Reassociation Disassociation
Implementation
802.11
STA Services
BRKEWN-2018
Cisco Public
10
802.11 Services
Service
Association Reassociation Disassociation
Implementation
802.11 802.11
STA Services
BRKEWN-2018
Cisco Public
11
802.11 Services
Service
Association Reassociation Disassociation
Implementation
802.11 802.11 802.11
STA Services
BRKEWN-2018
Cisco Public
12
802.11 Association Response: 802.11 Association Response: Yes, You Can Associate No, You Cannot Associate to This BSSID to This BSSID
BRKEWN-2018
Cisco Public
13
BRKEWN-2018
Cisco Public
14
802.11 Disassociation Request: I Do Not Want to Be Associated to This BSSID Anymore 802.11 Reassociation Request: Can I Reassociate to This BSSID?
802.11 Association Response: 802.11 Association Response: No, You Cannot Associate Yes, You Can Associate to ThisThis BSSID to BSSID
BRKEWN-2018
Cisco Public
15
802.11 Services
Service
Association Reassociation Disassociation
Implementation
802.11 802.11 802.11
STA Services
16
802.11 Services
Service
Association Reassociation Disassociation
Implementation
802.11 802.11 802.11
STA Services
Authentication Deauthentication Privacy
Used to prove the identity of the STA and AP Used to eliminate a previously authenticated user from further use of the network Used to protect frames in transit over wireless medium
BRKEWN-2018
Cisco Public
17
802.11I addendum adds strong(er) mechanisms for implementing STA security-related services:
- Authentication/Deauthentication: PSK, 802.1X/EAP - Privacy: TKIP & CCMP
BRKEWN-2018
Cisco Public
18
WPA/WPA2
WPA
A snapshot of the 802.11I Standard Commonly used with TKIP encryption
BRKEWN-2018
Cisco Public
19
Strong Authentication Extensible Authentication Protocol (EAP) Outside Methods (Protective Tunnel): PEAP EAP-FAST TLS Inside Methods (Authentication Credentials): EAP-MSCHAPv2 EAP-GTC
BRKEWN-2018 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public
20
802.1X/EAP Choreography
802.1X/EAP Three Party Model
802.1X Port Blocking Instantiated: Only Authentication Transaction Related Traffic Allowed Through the AP
21
802.1X/EAP Choreography
BRKEWN-2018
Cisco Public
22
BRKEWN-2018
Cisco Public
23
BRKEWN-2018
Cisco Public
24
BRKEWN-2018
Cisco Public
25
802.1X/EAP Choreography
BRKEWN-2018
Cisco Public
26
BRKEWN-2018
Cisco Public
27
BRKEWN-2018
Cisco Public
28
BRKEWN-2018
Cisco Public
29
BRKEWN-2018
Cisco Public
30
802.1X/EAP Choreography
BRKEWN-2018
Cisco Public
31
802.11 Services
Service
Association Reassociation Disassociation Distribution Integration
Implementation
802.11 802.11 802.11
802.11, CAPWAP
STA Services
Authentication Deauthentication
Used to prove the identity of the STA & AP Used to eliminate a previously authenticated user from further use of the network Used to protect frames in transit over wireless medium
802.11, CAPWAP
32
????
BSS
BSS ESS
BRKEWN-2018
Cisco Public
33
802.1X/EAP Choreography
BRKEWN-2018
Cisco Public
34
BRKEWN-2018
Cisco Public
35
Requirement: Facilitate Fast Secure Roaming for Enterprise Class Devices in an Efficient and Scalable Way
BRKEWN-2018
Cisco Public
36
BRKEWN-2018
Cisco Public
37
Section Agenda
CUWN Architecture Review Basic Roaming Walkthrough Fast Secure Roaming Technologies
BRKEWN-2018
Cisco Public
38
Real-Time 802.11/MAC Functionality: Beacon Generation Probe Response Power management/Packet buffering 802.11e/WMM scheduling, queueing MAC layer data encryption/decryption 802.11 control messages Data Encapsulation/De-Encapsulation Translational Bridging (H-REAP Local Switching) Fragmentation/De-Fragmentation
BRKEWN-2018 2011 Cisco and/or its affiliates. All rights reserved.
Non Real-Time 802.11/MAC Functionality: Assoc/Disassoc/Reassoc 802.11e/WMM resource reservation 802.1X/EAP Key management 802.11 Distribution Services 802.11 STA Services (Auth/Deauth/Privacy*) Wired/Wireless Integration Services
Cisco Public
39
BRKEWN-2018
Cisco Public
40
BRKEWN-2018
Cisco Public
41
BRKEWN-2018
Cisco Public
42
BRKEWN-2018
Cisco Public
43
All this can be on the order of seconds Can we make this faster?
BRKEWN-2018
Cisco Public
44
How Are We Going to Make Roaming Faster? Focus on Where We Can Have the Biggest Impact
Eliminating the (re)IP address acquisition challenge Eliminating full 802.1X/EAP reauthentication
BRKEWN-2018
Cisco Public
45
Roaming: Intra-Controller
Intra-controller roam happens when a STA moves association between APs joined to the same controller Client must be reauthenticated and new security session established Controller updates client database entry with new AP and appropriate security context No IP address refresh needed
BRKEWN-2018
Cisco Public
46
Roaming: Inter-Controller
Layer 2
BRKEWN-2018
Cisco Public
47
Roaming: Inter-Controller
Layer 2
L2 inter-controller roam: STA moves association between APs joined to the different controllers but client traffic bridged onto the same subnet Client must be re-authenticated and new security session established Client database entry moved to new controller WLCs must be in same mobility group or domain No IP address refresh needed Account for mobility message exchange in network design
BRKEWN-2018
Cisco Public
48
Roaming: Inter-Controller
Layer 3
BRKEWN-2018
Cisco Public
49
Roaming: Inter-Controller
Layer 3
L3 inter-controller roam: STA moves association between APs joined to the different controllers but client traffic bridged onto different subnets Client must be re-authenticated and new security session established Client database entry copied to new controller entry exists in both WLC client DBs Original controller tagged as the anchor, new controller tagged as the foreign WLCs must be in same mobility group or domain No IP address refresh needed Symmetric traffic path established -- asymmetric option has been eliminated as of 6.0 release Account for mobility message exchange in network design Account for asymmetric traffic path (EtherIP)
BRKEWN-2018 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public
50
How Are We Going to Make Roaming Faster? Focus on Where We Can Have the Biggest Impact
Eliminating the (re)IP address acquisition challenge Eliminating full 802.1X/EAP reauthentication
BRKEWN-2018
Cisco Public
51
52
PMKID Caching
Optional component of 802.11I specification Defines a PMK Security Association (PMKSA) that gets stored by authenticator PMKSA includes:
PMKID
Lifetime PMK (32 bytes) BSSID (6 bytes) Client's MAC (6 bytes) AKM (Authentication and Key Management)
PMKID =
BRKEWN-2018
Cisco Public
53
t: ques n Re ted to io cia ociat sass Be Asso Di 1 o e 802.1 ot Want t Anymor N ID I Do This BSS
1. WLC extracts PMKID from 802.11 (Re) CAPWAP association request 2. WLC computes the new PMKID based on the PMKSA and other information it knows (BSSID, Client Mac) 3. WLC compares the values if they match, full 802.1X/EAP authentication is skipped and the WLC & client go directly to the four-way handshake, then updates the PMKSA in the client DB 4. If they dont match, the WLC sends the STA an EAP-Identity Request to initiate the full 802.1X/EAP Authentication
BRKEWN-2018
Cisco Public
54
BRKEWN-2018
Cisco Public
55
OKC/PKC
Key Data Points
Requires client/supplicant support Supported in Windows since XP SP2 Many ASDs support OKC and/or PKC Check on client support for TKIP vs. CCMP mostly CCMP only Enabled by default on WLCs with WPAv2 Requires WLCs to be in the same mobility group Important design note: pre-positioning of roaming clients consumes spots in client DB In highly controlled test environments, OKC/PKC roam times consistently measure in the 10-20 msec range!
BRKEWN-2018
Cisco Public
56
Standardization! 802.11R
802.11R is a ratified IEEE standard, based in large part on CCKM 802.11R: Fast (Basic Service Set) BSS Transition Also includes dynamic QoS capabilities No commercially available clients at this point WiFi Alliance is planning/implementing 802.11R plugfests Cisco WLCs have implemented 802.11R (unsupported) since 5.2 In highly controlled OTA test environments, 802.11R roam times are comparable to CCKM OTA times
BRKEWN-2018
Cisco Public
57
How Are We Going to Make Roaming Faster? Focus on Where We Can Have the Biggest Impact
Eliminating the (re)IP address acquisition challenge Eliminating full 802.1X/EAP reauthentication
BRKEWN-2018
Cisco Public
58
BRKEWN-2018
Cisco Public
59
Section Agenda
Roaming Domains Design Considerations for Roaming Client Roaming Behavior Special Case: H-REAP Groups
BRKEWN-2018
Cisco Public
60
Roaming Domains
Mobility Group
Mobility Group cluster of up to 24 controllers (regardless of type) that create a seamless roaming domain Fast secure roaming technologies work across controllers within a roaming domain Mobility messages exchanged either unicast or multicast depending on configuration http://www.cisco.com/en/US/docs/wireless/controller/7.0/configuration/ guide/c70mobil.html#wpmkr1100509
BRKEWN-2018 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public
61
Roaming Domains
Mobility Domain
Mobility Domain is a seamless roaming domain of up to 3 Mobility Groups Max of 72 WLCs Seamless roaming == IP addressing is maintained Fast secure roaming does work not across Mobility Group clients crossing these boundaries will have to go through a full reauth, but will retain their IP address
http://www.cisco.com/en/US/docs/wireless/controller/7.0/configuration/ guide/c70mobil.html#wpmkr1100509
BRKEWN-2018 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public
62
Network latency will have an impact on these times consideration for controller placement With a fast secure roaming technology, roam times under 150 msecs are consistently achievable, though mileage may vary
BRKEWN-2018
Cisco Public
63
BRKEWN-2018
Cisco Public
64
BRKEWN-2018
Cisco Public
65
66
Questions?
BRKEWN-2018
Cisco Public
67
BRKEWN-2018
Cisco Public
68
BRKEWN-2018
Cisco Public
69
BRKEWN-2018
Cisco Public
70
Thank you.
BRKEWN-2018
Cisco Public
71