Configuring the Wireless Client


Windows XP (with SP1, or later) is the preferred client in a WLAN environment. 802.1x and automatic wireless configuration, also known as Wireless Zero Configuration (WZC), are included in Windows XP. WZC is enabled when you choose Use Windows to Configure My Wireless Network Settings check box in your Wireless Network Connection Properties dialog box. WZC really comes into play when you have group policies configured on your Windows Server 2003 domain controllers.

Customers Who Participate in Microsoft's Premier Support

Microsoft provides the 802.1x Authentication Client for Windows 98 and Windows NT 4.0 Workstation to customers who participate in Microsoft's Premier Support.


You've seen WZC in action when you see the "One or more wireless networks are available" message in the notification area of the desktop. If you don't have group policies configured, the following defaults will apply:

  • The SSID is acquired from the wireless AP beacon

  • Network authentication is open

  • Data encryption is disabled

  • Shared key authentication is disabled

  • IEEE 802.1x authentication for this network is disabled

If the default settings don't conform to your wireless network the user must manually configure each option to match the wireless AP and your Windows Server 2003 security settings.

Configuring Wi-Fi Protected Access (WPA)

Windows XP (Post SP1) clients can take advantage of a stronger encryption standard known as WPA. WPA is an interoperable interim standard that has been developed by the Wi-Fi Alliance. WPA is a replacement for WEP, which has many known and published vulnerabilities. To take advantage of this new standard you will need to make sure that all your WLAN components are compatible.

Required Updates

To implement WPA to protect your data you'll need to verify or update the software/firmware at the following:

  • Wireless Access Point parameters includes WPA information element, WPA two-phase authentication, TKIP, Michael, and AES (optional).

  • Wireless Network Adapter options include WPA information element, WPA two-phase authentication, TKIP, Michael, and AES (optional).

  • Wireless Client Programs options include WPA client program (Windows XP SP1) and WPA-compliant configuration tool for wireless network adapter (Windows 2000).

BEST PRACTICE: Compatibility Issues

On certain wireless chip sets you might run into compatibility issues. Check with the manufacturer of your wireless network card before applying the new WPA client program.


Authentication

WPA requires that 802.1x authentication be in place. This can be accomplished through the RADIUS (EAP-TLS) method. This is configured through the Windows Server 2003 Internet Authentication Server. In smaller organizations a preshared key can be used.

Key Management

WPA requires the rekeying of both unicast and global encryption keys. Temporal Key Integrity Protocol (TKIP) is used to change the unicast encryption key for every frame and also synchronizes the changes between the AP and the wireless client.

Temporal Key Integrity Protocol (TKIP)

TKIP is a replacement for WEP. It provides a new encryption algorithm that is stronger than WEP. TKIP uses the calculation facilities that are already present of existing wireless devices to perform the encryption operations. To be in compliance with the WPA standard TKIP is required.

Michael

WPA uses a new data integrity method called Michael. WEP relies upon a 32-bit integrity check value (ICV) to proved data integrity assurance. This method can be captured and manipulated with cryptanalysis tools to update the ICV without the client knowing about it.

Michael specifies an algorithm that calculates an 8-byte message integrity code (MIC) using facilities available on existing wireless devices. This MIC is located between the data portion of the 802.11 frame and the ICV. Both the MIC and the ICV are encrypted along with the data frame. Michael also implements a new frame counter to prevent replay protection.

Advanced Encryption Standard (AES)

WPA calls for AES to encrypt the traffic between the AP and wireless clients. AES is optional as a replacement to your current WEP encryption. This is because manufacturers need to update their firmware and drivers. This might not be feasible in all cases.

Mixing WEP and WPA Wireless Clients

During the transition to a fully WPA-compliant environment it might be necessary to support pre-existing WEP clients. This is supported by the wireless AP after it has been upgraded. The AP determines which encryption method is being requested by the client. The WEP clients won't take advantage of the dynamic global encryption keys because they cannot support them.



Microsoft Windows Server 2003 Insider Solutions
Microsoft Windows Server 2003 Insider Solutions
ISBN: 0672326094
EAN: 2147483647
Year: 2003
Pages: 325

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net