WPA
Although 802.1X addresses the weak authentication and key management issues of the original 802.11 standard, it provides no solution to the weaknesses of the WEP encryption algorithm. While the IEEE 802.11i wireless LAN security standard, which will be discussed in the "WPA2" section later in this tutorial, was being finalized, the Wi-Fi Alliance, an organization of wireless equipment vendors, created an interim standard known as Wi-Fi Protected Access (WPA). WPA replaces WEP with a much stronger encryption method known as the Temporal Key Integrity Protocol (TKIP). WPA also allows the optional use of the Advanced Encryption Standard (AES) for encryption.
WPA is available in two different modes:
- WPA-Enterprise: Uses 802.1X authentication and is designed for medium and large infrastructure mode networks
- WPA-Personal: Uses a preshared key (PSK) for authentication and is designed for small office/home office (SOHO) infrastructure mode networks
WPA2
The IEEE 802.11i standard formally replaces WEP and the other security features of the original IEEE 802.11 standard. Wi-Fi Protected Access 2 (WPA2) is a product certification available through the Wi-Fi Alliance that certifies wireless equipment as being compatible with the IEEE 802.11i standard. The goal of WPA2 certification is to support the additional mandatory security features of the IEEE 802.11i standard that are not already included for products that support WPA. For example, WPA2 requires support for both TKIP and AES encryption. WPA2 includes fast roaming techniques such as Pairwise Master Key (PMK) caching and pre-authentication.
How It WorksWhen a wireless client authenticates using 802.1X, there are a series of messages sent between the wireless client and the wireless AP to exchange credentials (802.1X authentication) and to determine the pairwise transient keys (the 4-way handshake). The pairwise transient keys are used for encryption and data integrity of WPA2- protected wireless data frames. This message exchange introduces a delay in the connection process. When a wireless client roams from one wireless AP to another, the delay to perform 802.1X authentication can cause noticeable interruptions in network connectivity, especially for time-dependent traffic such as voice or video-based data streams. To minimize the delay associated with roaming to another wireless AP, WPA2 wireless equipment can optionally support PMK caching and preauthentication.
PMK CachingAs a wireless client roams from one wireless AP to another, it must perform a full 802.1X authentication with each wireless AP. WPA2 allows the wireless client and the wireless AP to cache the results of a full 802.1X authentication so that if a client roams back to a wireless AP with which it has previously authenticated, the wireless client needs to perform only the 4-way handshake and determine new pairwise transient keys. In the Association Request frame, the wireless client includes a PMK identifier that was determined during the initial authentication and stored with both the wireless client and wireless AP's PMK cache entries. PMK cache entries are stored for a finite amount of time as configured on the wireless client and the wireless AP.
To make the transition faster for wireless networking infrastructures that use a switch that acts as the 802.1X authenticator, Windows Vista and Windows Server 2008 calculate the PMK identifier value so that the PMK as determined by the 802.1X authentication with the switch can be reused when roaming between wireless APs that are attached to the same switch. This practice is known as opportunistic PMK caching.
PreauthenticationWith preauthentication, a WPA2 wireless client can optionally perform 802.1X authentications with other wireless APs within its range while connected to its current wireless AP. The wireless client sends preauthentication traffic to the additional wireless AP over its existing wireless connection. After preauthenticating with a wireless AP and storing the PMK and its associated information in the PMK cache, a wireless client that connects to a wireless AP with which it has preauthenticated needs to perform only the 4-way handshake.
WPA2 clients that support preauthentication can preauthenticate only with wireless APs that advertise their preauthentication capability in Beacon and Probe Response frames.
WPA2 is available in two different modes:
- WPA2-Enterprise: Uses 802.1X authentication and is designed for medium and large infrastructure mode networks
- WPA2-Personal: Uses a PSK for authentication and is designed for SOHO infrastructure mode networks
Table-2 summarizes the 802.11 wireless LAN security standards.
Table-2 802.11 Wireless LAN Security StandardsSecurity Standard | Authentication Methods | Encryption Methods | Encryption Key Size (bits) | Comments |
---|---|---|---|---|
IEEE 802.11 | Open system and shared key | WEP | 40 and 104 | Weak authentication and encryption. Use is highly discouraged. |
IEEE 802.1X | EAP authentication methods | N/A | N/A | Strong EAP methods provide strong authentication. |
WPA-Enterprise | 802.1X | TKIP and AES (optional) | 128 | Strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES) encryption. |
WPA-Personal | PSK | TKIP and AES (optional) | 128 | Strong authentication (with strong PSK) and strong (TKIP) or very strong (AES) encryption. |
WPA2-Enterprise | 802.1X | TKIP and AES | 128 | Strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES) encryption. |
WPA2-Personal | PSK | TKIP and AES | 128 | Strong authentication (with strong PSK) and strong (TKIP) or very strong (AES) encryption. |
Windows Vista and Windows Server 2008 support the following security standards for 802.11 wireless LAN networking (the wireless network adapter and driver must also support the standard):
- 802.11 with WEP
- 802.1X
- WPA-Enterprise
- WPA-Personal
- WPA2-Enterprise
- WPA2-Personal
Components of 802.11 Wireless Networks
The components of Windows-based 802.11 protected wireless networks.
The components are:
- Wireless clients: Initiate wireless connections to wireless APs and communicate with intranet resources or other wireless clients once connected
- Wireless APs: Listen for wireless connection attempts, enforce authentication and connection requirements, and forward frames between wireless clients and intranet resources
- RADIUS servers: Provide centralized authentication and authorization processing and accounting for network access attempts from wireless APs and other types of access servers
- Active Directory domain controllers: Validate user credentials for authentication and provide account information to the RADIUS servers to evaluate authorization
- Certification authorities: Part of the PKI that issues computer or user certificates to wireless clients and computer certificates to RADIUS servers
In this tutorial:
- IEEE 802.11 Wireless Networks
- Support for IEEE 802.11 Standards
- Wireless Security
- WPA
- Planning and Design Considerations
- Wireless Authentication Modes
- Intranet Infrastructure
- Wireless AP Placement
- Authentication Infrastructure
- Wireless Clients
- Windows Vista Wireless Policy
- Windows XP Wireless Policy
- Command-Line Configuration
- PKI
- 802.1X Enforcement with NAP
- Deploying Protected Wireless Access
- Configuring Active Directory for Accounts and Groups
- Deploying Wireless APs
- Configuring Wireless Clients
- Configuring and Deploying Wireless Profiles
- Maintenance for a Protected Wireless
- Troubleshooting Wireless Connections
- Network Diagnostics Framework Support for Wireless Connections
- Wireless Diagnostics Tracing
- NPS Event Logging
- Troubleshooting the Windows Wireless Client
- Troubleshooting the Wireless AP
- Common Wireless AP Problems
- Troubleshooting the Authentication Infrastructure
- Troubleshooting Certificate-Based Validation
- Troubleshooting Password-Based Validation