Tags

,

In this post we will see how we can add security into SSID configured in Autonomous AP. Here is the basic configuration for a Autonomous AP (AAP) without any security (ie open authentication). This is the basic configuration you need to practice many times. Prior to add any security your SSID should work with this basic config.

I have configured two SSID (data1 & data2 ) with vlan 12 & 13 assigned to each SSID on 5GHz  band (Radio 1) . Native vlan is 110 & your switch-port connected to this AAP need to configure as trunk port with native vlan 110.

hostname AAP1
dot11 ssid data1
   vlan 12
   authentication open
   mbssid guest-mode
dot11 ssid data2
   vlan 13
   authentication open
   mbssid guest-mode

interface Dot11Radio1
 ssid data1
 ssid data2
 mbssid
!
interface Dot11Radio1.12
 encapsulation dot1Q 12
 bridge-group 12
interface Dot11Radio1.13
 encapsulation dot1Q 13
 bridge-group 13
interface Dot11Radio1.110
 encapsulation dot1Q 110 native
 bridge-group 1
!
interface GigabitEthernet0.12
 encapsulation dot1Q 12
 bridge-group 12
interface GigabitEthernet0.13
 encapsulation dot1Q 13
 bridge-group 13
interface GigabitEthernet0.110
 encapsulation dot1Q 110 native
 bridge-group 1
!
interface BVI1
 ip address 10.10.110.100 255.255.255.0
ip default-gateway 10.10.110.3

First we will look at WEP (Wired Equivalent Privacy) security method one of this SSID. Keep note this is very weak (can be cracked within few minutes) security method and should not configure nowadays wireless network.

interface Dot11Radio1
 encryption vlan 12 key 1 size 40bit 1234567890
 encryption vlan 12 mode wep mandatory

Now you can check this with Anyconnect client by associating to “data1” SSID. Here is the screenshot of anyconnect client.

AAP-SEC-WEP1

In this method following is the sequence of packet flows.

1. Authentication Request (Client -> AAP)
2. Authentication Response (AAP -> Client)
3. Association Request (Client – > AAP)
4. Association Response (AAP -> Client)
5. WEP data frame to network ( Client -> AP )
6. If WEP key mismatch AAP discard packet.

You can verify above by taking a wireshark capture of the wireless frame.AAP-SEC-WEP2

In WEP, you can configure shared key authentication (it is least secure as challenge text send by AP to client). To configure this you have to type “authentication shared” command  under dot11 ssid. In this method traffic flow is like this.

1. Authentication Request (Client -> AAP)
2. Unencrypted Challenge Text (AAP -> Client)
3. Encrypted Challenge Text (Client – > AAP)
4. Authentication Success (AAP -> Client)

Related Posts

1. Autonomous AP with  WPA-PSK Security
2. Autonomous AP as Local Radius Server
3. Autonomous AP with  LEAP Security
4  Autonomous AP with  EAP-FAST Security
5  Autonomous AP with  EAP-TLS Security
6.
7.
8.
9.