User's Manual

APPENDIXD
SECURITY
Revised: 27 Jun 16 APX D-1 ESTeem Horizon Series
OVERVIEW
ThesecurityfortheESTeemHorizon,likeallnetworksecurity,mustbemultilayered.Onelevelofsecurityisneverenoughto
makesurethatdatadoesnotendupinthewronghands. Pleasereviewthefollowingsecuritylevelsanddecidewhatis themost
appropriateforyournetwork.
AESCCMP(802.11iandWPA2)
AESCCMP(AdvancedEncryptionStandardCounterMo deCBCMACProtocol)istheencryptionalgorithmusedintheIEEE802.11i
andWPA2securityprotocols.Thisnationalencryptionstandardusesa128bitAESblockcipherandCCMPtechniquetoensure
thehi g hes tlevelofsecurityandintegrityav ai labl e onawirelessnetwork.AESCCM
Pincorporatestw o sophisticatedcryptographic
techniques(countermodeandCBCMAC)andadaptsthemtoEthernetframestoprovidearobustsecurityprotocolbetweenthe
mobilecl ie ntandtheaccesspoint . AESitselfisaverystrongcipher,butco un t e r modemakesitdifficul t foraneavesdroppertosp
ot
patterns,andtheCBCMACmessageintegritymethodensuresthatmessageshavenotbee n tamperedwith. TheESTeem Horizon
iscompatibleasei the ranAccessPointorclientineit her WPA2orIEEE802.11isecuritysystems.
WiFi ProtectedAccess2withPresharedKey(WPA2PSK)
WPA2 PSK uses a co
mmon passphrase (preshar e d key) between the Access Point (AP) and the client to begin a secure
communicationsession.ThispassphrasemustbeenteredexactlythesameinboththeAccessPointandtheclient.Thispassphrase
isusedto authenticatecommunicationsessionbetweentheAPandclienttobeginthese
curewireless networki n gsession.
WiFiProtected Access2withEnterpriseServer(WPAEnterprise)
LikeWPA2PSK,WPA2EnterpriseverifiestheauthenticityoftheAccessPointandclient,butusesan802.1xbackendauthentication
serverhandlingtheauthenticationdecision.ThemostcommonlytypeofauthenticationserverisaRADIUSserver.Th
eESTeem
HorizoncanbeconfiguredtooperatewithanestablishedRADIUSserveronthenetwork.
WPA
WiFiProtected AccesswithPresharedKey(WPAPSK)
WPA, which uses 802.1x, was introduced in 2003 to improve on the authentication and encryption features of WEP. All
authenticationishandledwithinthisaccesspo intdevice.WPAhastwosignificantadvantagesove rWEP:
1. An encryption key differing in every packet. The TKI
P (Temporal Key Integrity Protocol) mechanism shares a starting key
betweendevices.Eachdevicethenchangesthei r encryptionkeyforev e r y packet.Itisextremelydifficultforhackerstoread
messageseveniftheyhaveinterceptedthedat a.
2. CertificateAuthentication(CA)canbeused,blockingahackerposingasav
aliduser.
WiFiProtected AccesswithEnterpriseServer(WPAEnterprise)
LikeWPAPSK,WPAEnterpriseverifiestheauthenticityoftheAccessPointandclient,butusesan802.1xbackendauthentication
serverhandlingtheauthenticationdecision.ThemostcommonlytypeofauthenticationserverisaRADIUSserver.TheEST
eem
HorizoncanbeconfiguredtooperatewithanestablishedRADIUSserveronthenetwork.
WPAisserver/clientrelationshipfromasoftwaredrive ronacomputer’swirelessLAN(WLAN)cardtoanAccessPoint.Thescope
ofWPAislimitedinusetothisconfigurationonly.TheESTeemHorizoncansupportWPAEnterpri
seandPSKasanAccessPoint,
butthelevelofsecurityontheBridginglayerisconfiguredseparately.