Tuesday, November 27, 2018

Just a little home advice for a WiFi novice


I recently had a coworker ask me how to improve the wireless in his home. He says he has two standalone APs on opposite ends of the house and coverage is horrible. He explained that both APs were older and didn’t have the latest advancements available in 802.11ac. Trying to get information about how he set them up was difficult.  I hadn't realized before now how complicated Wi-Fi could be to someone that hasn’t studied it. After asking a few questions… "what channel are the APs on? Do the APs support 2.4 and 5 Ghz? Are you using WEP,WPA or WPA2? " I came away with the following.

  • Two APS
  • One AP was set to "b" radio and the other to "g"
  • Two SSIDs differently named with different passwords , one on each AP
  • Both APs were set to the same channel (not sure which one)

Having studied Wi-Fi but not knowing his system, I was able to point out a few issues and make some suggestions.

  • Don’t set the radios to "b" or "g". If they have "n" capability that’s the best if they need to be set to anything
  • Each AP should be on a different channels in 2.4 choose either 1, 6 or 11
  • If it has a 5Ghz radio make sure to set those channels differently also
  • You only need 20mhz wide channels in both 2.4 and 5Ghz
  • If possible set the SSIDs to WPA2-AES

Along with the suggestions came some explaining. I'll keep it short and simple.

  • 2.4 and 5GHz are frequency bands that device radios can communicate on.
  • Channels are within each frequency band and are used to separate transmission domains. Much like radio stations, two can't broadcast on the same channel at the same time otherwise you'll get collisions on media and have a hard time hearing anything.
  • Channels can be set to different widths to allow more data to be passed (20, 40, 80 160MHz)
  • WPA2-AES is the best security at the moment (WPA3 is around the corner). For 802.11n or ac data rates you need to have WP2-AES or higher(future) set. Otherwise your just going to get 802.11a or g data rates.

The one thing I think any new person to wireless needs to understand is the lettering designation and what frequency band they work on. 802.11 a,b,g,n,ac don’t all work on both 2.4 and 5GHz, only one of the 802.11 amendments specified support for both bands. Here is how it breaks down.

2.4GHz - b, g, n
5GHz - a, n, ac

As you see 802.11n is the only amendment that had support for both bands. This caused confusion back in the day when purchasing equipment. What we noticed was anything that had a wireless card capable of 802.11n support wasn’t always a 5Ghz capable. We needed to look for cards that said WiFi a/b/g/n. Seeing that the WiFi card had the "a" designation told us that it supported 5Ghz and seeing the "b" designation meant it supported 2.4Ghz.

Friday, November 16, 2018

Aruba 802.11ax 510 series



Aruba has just released its first ax AP. The 510 series is the first ax Enterprise AP that I've seen to also supports the new WPA3 certification. Aruba has two AP models in this lineup 514 which has external antennas and 515 which has internal antennas. Both models are 4x4x4 on 5GHz and support 160MHz channels, on the 2.4GHz side the APs are 2x2x2. Aruba HPE has included two RJ-45's one of which supports HPE SmartRate up to 2.5Gbps for hooking this bad boy into the wired side. As for powering to full capacity you're going to need 802.3at compliant switches as without the an external USB device the AP draws 19W max according to documentation.

Check out the New Aps and specs over at Aruba

Wednesday, October 17, 2018

Simple WiFi Config changes

When looking over the configs in wireless systems I find a lot are deployed like one's home network. Meaning that someone came in and stood the network up to work with every device under the sun.

Just like at home with the cable company installing your WiFi I find older legacy security protocols enabled on SSIDs where the latest enterprise clients are connecting.  Most schools I work in have a refresh of devices every 3 -5 years which means as of today all enterprise devices should be 802.11n at the minimum (and where I am most are).
I haven't seen WEP enabled in a while but I still find a lot of WPA TKIP enabled. These settings are killing the data rates on your devices and the throughput of your wireless network.  Deploying WPA TKIP when it's not needed impacts performance do to its backward compatibility with older PHYs.

If you want the latest AC or even N data rates you need to move to WPA2 AES to secure the network.  802.11n doesn’t support WPA TKIP so having it enabled neuters your expensive network back down to 802.11g or 802.11a rates.  Another thing I often find is all data rates enabled. This isn't always bad (usually is) depending on your deployment but where I am with 1 AP per classroom and no need to support 802.11b clients this is simply a no no.  Having lower "b"  and 802.11 prime rates enabled can slow down the network and cause "hidden node" issues. All beacons, broadcasts and multicasts traverse the wireless medium at the lowest mandatory rate so all clients can hear and understand them. This ends up consuming unnecessary airtime in a high density deployment with 802.11n as the lowest common denominator.
More recently in deployments of 802.11ac I find that vendors have enabled 80 MHz channels in high density networks.  This is probably do to the fact that the school district demanded the highest possible data rates for their standardized testing or for the fact that they need 30 kids in each classroom to stream HD video all at the same time.  I can't fault the vendor for this because they were just doing what they are told and it also helped them sell their product (along with extra unnecessary switching equipment for the 2 drops they ran to every classroom).  After the vendor is gone and the network is under load the problems with 80 MHz surface. There simply isn't enough channel space available to deploy 80 MHz channels in high density environments nor have I seen a need for it yet. I back every deployment down to 20 MHz channels and the complaints from districts stop. The tough part is explaining to the school district that the great speed increase they were expecting out of there 802.11ac network was all marketing and wasn't realistic for their needs.

In Summary here are some guidelines for your 802.11 wireless config.

  • WPA2-AES (needed for a minimum of 802.11n data rates)
  • disable lower mandatory or basic data rates.
  • 20 MHz channels in 2.4 GHz always
  • 20 MHz channels in 5 GHz unless using DFS channels then you can use 40 MHz if needed
  • Enable WMM


Friday, August 24, 2018

WPA3 Overview


WPA3 Overview

So what's different and what matters with WPA3. Two modes are available in WPA3 just like in previous versions, Personal and Enterprise.

Let's start off with WPA3-Personal. Personal mode  networks are just that… "Personal". They have no real place in enterprise networks and should be kept that way.  I know this is wishful thinking as I myself have had to compromise and deploy many WPA2-Personal networks at customer sites. At some point I hope device manufactures start offering the option for WPA3-Enterpise in everything!  Until then we are stuck using Personal mode networks with their draw backs but thankfully with WPA3-Personal they get a little more secure… for now.

  • WPA3-Personal mode uses Simultaneous Authentication of Equals (SAE) instead of Pre-Shared Key (PSK)

As opposed to PSK, SAE is a password for the network and that password is not used to derive the Pairwise Master Key (PMK) like PSK was.  What this means is that if an attacker gets the SAE password somehow, they only have a way onto the network and not a way of decrypting the traffic of other devices using the network. Which brings me to the next point..

  • SAE like PSK generates a new PMK per session. The difference being SAE provides forward secrecy by insuring the PMK cannot be obtained if the password is compromised.

A compromised password is only going to allow an attacker access to the network which could be damaging enough but because SAE provides forward secrecy, PMKs cannot be obtained to decrypt other device sessions over the air.

Now on to WPA3-Enterprise. Not a lot has changed here except for the requirement of Protected Management Frames (PMF).  Disabling PMF for WPA3-Enterprise networks is not an option. PMF can only be set to capable or required.

WPA3-Enterprise also has a new optional security mode, 192-bit security mode. The security mode is meant for highly secure environments and doesn't allow for any backward compatibility with lesser security protocols.