Switch to WPA / WPA2-Enterprise encryption
Network administration - Every Wi-Fi network in an enterprise needs to use the Enterprise mode of WPA or WPA2 encryption. In this article, we will show you how to switch from Personal (PSK) mode to Enterprise (RADIUS) mode.
Certainly many of you know, encryption of Wired Equivalent Privacy (WEP) is a code that is no longer safe today. The security standard for the first wireless LAN, developed by IEEE, has emerged as a vulnerability that allows attackers to crack.
In 2003, the Wi-Fi Association released another security standard called Wi-Fi Protected Access. Although the first version (WPA), which uses TKIP / RC4 encryption, gave the attackers some disappointment, it was still not considered safe.
In the second version (WPA2), released in mid-2004, security has improved quite well with the implementation of IEEE 802.11i security standards and CCMP / AES encryption.
In this article, I will show you two very different modes of accessing a protected Wi-Fi network (Wi-Fi Protected Access) and show you how to switch from Personal mode to Enterprise mode.
Let's start!
Two modes of WPA / WPA2: Personal (PSK) and Enterprise
Both versions of Wi-Fi Protected Access (WPA / WPA2) can be executed in two modes:
- Personal mode or Pre-Shared Key (PSK) : This mode is suitable for most home networks - not suitable for corporate networks. You can define encryption passwords on wireless routers and other access points (APs). The password must then be entered by the user when connecting to a Wi-Fi network.
Although this mode seems very easy to enforce, it cannot guarantee enterprise network security. Unlike the Enterprise mode, wireless access is not separate or centrally managed. A password is applied to all users. If the global password needs to be changed, it must be changed on all APs and computers. This will cause a lot of difficulties when you need to change; for example, when an employee leaves the company or, when a computer is stolen or compromised.
Unlike the Enterprise mode, encrypted passwords are stored on computers. However, anyone on the computer - whether it's an employee or a criminal - can connect to the network and can recover the encrypted password.
- Enterprise mode (EAP / RADIUS): This mode provides the necessary security for wireless networks in enterprise environments. Although complicated in settings, this security mode provides centralized and discriminatory control of Wi-Fi network access. Users are assigned login information that they need to enter when connecting to the network, which can be changed or revoked by administrators at any time.
Users do not need to care about actual encryption keys. They are created safely and assigned on each user session in the background after a user enters their login credentials. This will prevent someone from recovering the network key from computers.
Introducing 802.1X authentication and RADIUS servers
The authentication method is used to verify user (and server) information on WPA / WPA2-Enterprise networks defined by the IEEE 802.1X standard. This method of authentication requires an external server, still called Remote Authentication Server In User Service (RADIUS) or Authentication, Authorization, and Accounting (AAA), used for a variety of network protocols and environment containing ISP.
A RADIUS server needs to understand the Extensible Authentication Protocol (EAP) language and can communicate with wireless APs, referring to RADIUS clients or authentication suites. The RADIUS server will essentially serve as an intermediary between APs and user data. Since then APs can communicate directly with the 802.1X client, also referred to as an 802.1X Supplicant, on a user's computer or device.
Verify 802.1X not based on port. This means that when someone tries to connect to a protected enterprise network, communication will be allowed through a virtual port to transmit the login information. If the authentication process is successful, the encryption keys will be sent securely and users will now be given full access.
See page 2
Authentication server (Authentication)
There are several ways you can get an 802.1X authentication server:
- FreeRADIUS: This is one of the most popular AAA servers in the world. Although it is a free, open source project, this server has a lot of advanced points. It is available for different platforms, including Linux, Mac OS X, and Windows. By default, you change these settings in the configuration file.
- Windows Server: If you have a Windows Server set up, you can use an Internet Authentication Service (IAS) available in Windows Server 2003 or Network Policy Server (NPS) in Windows Server 2008.
- Outsourced Services: Hosting services, such as AuthenticateMyWiFi, are one of the good ways for those who do not want to invest much money or time in setting up a RADIUS server, with multiple offices, or without Deep technical expertise. These services can provide additional functionality for traditional RADIUS servers.
For example, APs are not directly connected to the Internet; they can be placed behind NAT routers or gateways, allowing you to assign a unique secret to each AP. These services also have control panels on the web, so users can easily configure authentication settings.
Other advantages of EAP
The mind behind 802.1X authentication is the Extensible Authentication Protocol (EAP). There are many other advantages of EAP. Which features in each organization should be used is entirely dependent on the level of security desired, as well as some degree of complexity and server / client specifications.
These are the most common types:
- PEAP (Protected EAP): This is one of the most popular and easy to implement EAP methods. It can authenticate users through the username and password they enter when connecting to the network.
The authentication server can also be validated during PEAP authentication when an SSl certificate is installed on the server. This type is supported by default in Windows. - TLS (Transport Layer Security) : Is one of the most secure types of security, but quite complex in implementation and maintenance. The server and client validation process needs to be done via SSL certificates. Instead of having to provide a username and password when connecting, user devices or computers must be loaded SSL certificate files into its 802.1X client.
Administrators can control the Certificate Authority (CA) and manage client certificates, which allows them to have more control, but also require more administrative time.
- TTLS (Tunneled TLS): An improved version of TLS, which does not require client-side security certificates, has reduced the complexity of network management. However, this EAP type does not have native support in Windows; it needs a third client like SecureW2.
Your next steps
From what I have shown you above, you probably know the 802.1X authentication mechanism that makes WPA / WPA2-Enterprise encryption a way to secure corporate Wi-Fi networks. . Also, you know that to implement them, we need to have an authentication server and PEAP, TLS, and TTLS are common EAP types.
Here are some tips that can help you with the next steps:
- Find and select a RADIUS server or outsource service.
- Set up a RADIUS server with EAP, AP and user settings.
- Configure APs with encryption information and RADIUS server.
- Windows configuration (or other operating system) with encryption settings and 802.1X.
- Finally, connect to your protected Enterprise network!
You should read it
- Deploy WPA2-Enterprise wireless security in small businesses
- How to set up an internal RADIUS Server - Part 2
- Securely protect information on Wi-Fi network
- Wifi security: should use WPA2-AES, WPA2-TKIP or both?
- What is WPA2 (WiFi Protected Access 2)?
- What is the RADIUS protocol?
- KRACK attack breaks down the WPA2 WiFi protocol
- Upgrade wireless network security
May be interested
- KRACK attack breaks down the WPA2 WiFi protocolresearcher mathy vanhoef from leuven university discovered a serious security flaw on wi-fi protected access ii (wpa2) network security protocol.
- 5 issues for enterprise securitysometimes computer users forget the basics of security and create a hole in the process.
- How to Hack Wi Fi WPA/WPA2 with Kali Linuxtoday's tipsmake will show you how to crack (hack) a wpa or wpa2 network password using kali linux.
- Security when working with Wi-Fi Hotspotin this article we will share some tips to help protect your email, documents and computers safely using wi-fi hotspots.
- Switch in Cinstead of writing multiple if..else statements, you can use the switch statement in c. the switch statement in c selects one of many blocks of code to be executed.
- Discover the difference between symmetric and asymmetric encryptionthere are two commonly implemented types of encryption: symmetric and asymmetric. the fundamental difference between the two types of encryption is that symmetric encryption uses a unique key for both encryption and decryption.
- Compare 4 types of security WiFi WEP, WPA, WPA2 and WPA3wireless security is extremely important. the vast majority of us connect a mobile device, such as a smartphone, tablet, laptop, or other device, with a router at many times of the day.
- How to hack WiFi passwords with holes on WPA / WPA2new security researchers reveal a new wifi hacking technique that makes it easy to find the wifi passwords of today's most modern routers. this method targets the wpa / wpa2 wireless network protocol with roam based on the pmkid (pairwise master key identifier).
- Top 20 best encryption software for Windowsin a pc, many of your personal information may be accessed illegally. that's because windows data is stored on the drive that is not encrypted or protected by encryption software so anyone can access your private and confidential information.
- Adiantum, Google's new encryption method helps ensure safety for all Android deviceswith the goal of bringing memory encryption to low-cost android devices while ensuring their performance, google recently officially lost a new encryption method called adiantum.