Executive Editor: Jim Minatel
Development Editor: Kim Wimpsett
Technical Editors: Chris Lyttle and Ben Wilson
Production Editor: Dassi Zeidel
Copy Editor: Liz Welch
Editorial Manager: Mary Beth Wakefield
Production Manager: Kathleen Wisor
Book Designers: Judy Fung and Bill Gibson
Proofreader: Rebecca Rider
Indexer: Ted Laux
Project Coordinator, Cover: Brent Savage
Cover Designer: Wiley
Cover Image: ©Getty Images, Inc./Jeremy Woodhouse
Copyright © 2017 by John Wiley & Sons, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-1-119-21108-2
ISBN: 978-1-119-24413-4 (ebk.)
ISBN: 978-1-119-21109-9 (ebk.)
Manufactured in the United States of America
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.
Library of Congress Control Number: 9781119211082
TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CWSP is a registered trademark of CWNP, LLC. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
We dedicate this book to the knowledgeable and competent wireless consultants, designers, and installers, and those who are working diligently to become one. You are the front lines of the industry, explaining the technology to customers, including trying to make them understand that more power and more APs often does not mean better WLAN performance. Wireless networking is a shared medium and a shared community, and we are honored to be part of it and to be able to contribute.
When we wrote the first edition of the CWSP Study Guide, David Coleman’s children, Carolina and Brantley, were just entering college. Carolina now holds a master’s degree in public policy from the University of Southern California (USC). Brantley graduated from Boston University and is currently working toward his Ph.D. in biochemistry at the University of Washington. David would like to thank his now adult children for years of support and for making their dad very proud. David would also like to thank his mother Marjorie Barnes, stepfather William Barnes, and brother Rob Coleman, for many years of support and encouragement.
David Coleman would also like to thank the entire Aerohive Networks Knowledge Services department. Additionally, David sends many thanks to Matthew Gast, Paul Levasseur, Abby Strong, Gregor Vucajnk, and all of his co-workers at Aerohive Networks (www.aerohive.com). It has been a honor working with you to help build something special.
David Westcott would like to thank Janie for her love and support. I know that my travel and book-writing schedule is difficult to deal with. I say it all of the time and I will continue to say it: “thank you” and “I love you” for your support and for everything that you do for me.
Bryan Harkins would like to thank his wife, Ronda, and his two daughters, Chrystan and Catelynn, and their families, including his three granddaughters, Kaylee, Mikynlee, and Lorali, for allowing him the ability to work with constant travel and the time away from them it has taken to create this book. He would also like to thank his parents for always being there and his brother Chris for getting him involved with IT in the first place. Additionally, he would like to thank Ed Walton, Jeff Manning, and Kent Woodruff for the chance to build something great at Cradlepoint and the team there for their assistance in doing so.
Writing CWSP: Certified Wireless Security Professional Study Guide has once again been an adventure. We would like to thank the following individuals for their support and contributions during the entire process.
We must first thank Sybex acquisitions editor Jim Minatel for reaching out to us and encouraging us to write this second edition of our wireless security book. We would also like to thank our development editor, Kim Wimpsett, who has been a pleasure to work with. We also need to send special thanks to our editorial manager, Mary Beth Wakefield; our production editors, Rebecca Anderson and Dassi Zeidel; and Liz Welch, our copyeditor.
We also need to give a big shout-out to our technical editor, Chris Lyttle, CWNE #156. We have personally known Chris for many years. His Wi-Fi background and knowledge were invaluable to providing the amazing technical editing that this book deserved. We encourage you to follow Chris on his blog www.wifikiwi.com or on Twitter: @wifikiwi. And of course, we offer many thanks to our technical proofreader, Ben Wilson. Ben has accumulated years of Wi-Fi experience working for three major WLAN vendors. We encourage you to follow Ben on Twitter: @AirNetworkBen. We would also like to thank Shawn Jackman for his contributions to the first edition of the CWSP Study Guide.
We also need to thank Keith Parsons, CWNE #3, and his team at wirelessLAN Professionals. Keith has built a worldwide community of WLAN experts that share knowledge. You can learn more about the wirelessLAN Professionals conferences at www.wlanpros.com. You can also follow Keith on Twitter: @KeithRParsons.
We would also like to thank the CWNP program (www.cwnp.com). All CWNP employees, past and present, should be proud of the internationally renowned wireless certification program that sets the education standard within the enterprise Wi-Fi industry. It has been a pleasure working with all of you the past 16 years.
Finally, we would like to thank Lee Badman for writing his very gracious forward for this book. Lee is also a Wi-Fi expert and he maintains a blog at wirednot.wordpress.com. We encourage you to follow Lee’s Wi-Fi question-of-the-day on Twitter via #WIFIQ. You can also follow Lee on Twitter: @wirednot.
David D. Coleman is the Senior Mobility Leader for Aerohive Networks, www.aerohive.com. David collaborates with the Aerohive Knowledge Services team and travels the world for WLAN training sessions and speaking events. He has instructed IT professionals from around the globe in WLAN design, security, administration, and troubleshooting. David has written multiple books, blogs, and white papers about wireless networking, and he is considered an authority on 802.11 technology. Prior to working at Aerohive, he specialized in corporate and government Wi-Fi training and consulting. In the past he has provided WLAN training for numerous private corporations, the US military, and other federal and state government agencies. When he is not traveling, David resides in both Atlanta, Georgia and Seattle, Washington. David is CWNE #4, and he can be reached via email at mistermultipath@gmail.com. Please follow David on Twitter: @mistermultipath.
David Westcott is an independent consultant and technical trainer with over 31 years of experience. David has been a certified trainer for over 23 years, and he specializes in wireless networking, wireless management and monitoring, and network access control. He has provided training to thousands of students at government agencies, corporations, and universities in over 30 countries around the world. David was an adjunct faculty member for Boston University’s Corporate Education Center for over 10 years. David has written seven books as well as numerous white papers, and he has developed many courses on wired and wireless networking technologies and networking security.
David was a member of the original CWNE Roundtable. David is CWNE #7 and has earned certifications from many companies, including Cisco, Aruba, Microsoft, Ekahau, EC-Council, CompTIA, and Novell. David lives in Concord, Massachusetts with his wife Janie, his stepdaughters Jennifer and Samantha, and his granddaughter Savannah. David can be reached via email at david@westcott-consulting.com. Please follow David on Twitter: @davidwestcott.
Bryan Harkins has over 30 years experience in the IT field. He has been involved in areas ranging from customer support and sales to network security and design. He has developed custom curriculum for government agencies and Fortune 500 companies alike and delivers both public and private wireless security classes around the world. Previously, Bryan worked as the senior global enablement leader for Aerohive Networks and as the training and courseware development manager for Motorola AirDefense (now Zebra). Currently, Bryan is the Director of Cradlepoint University, where he oversees the training department of Cradlepoint, www.Cradlepoint.com. Bryan also serves on the Board of Advisors for 802Secure, www.802secure.com.
Bryan has presented at multiple industry conferences, including IP Expo, Secure World Expo, Armed Forces Communications and Electronics Association (AFCEA) events, and Microsoft Broad Reach events. He holds a degree in aviation from Georgia State University. He is also a member of the CWNE Roundtable as well as a member of the CWNE Advisory Board. Bryan is CWNE #44, and he can be followed on Twitter: @80211University.
Though wireless security options haven’t changed significantly since the introduction of 802.11i, the world in which they function certainly has. We are living in strange times for wireless networking. Though our WLAN standards are bringing ever-faster connectivity and more networked devices are coming without Ethernet ports, today’s Wi-Fi practitioner operates in a hyper-nuanced security landscape. The media has no shortage of gloom and doom to report on network data breaches, yet many of today’s wireless clients are delivered with outdated or limited security capabilities. Where client devices are capable of supporting robust security, users may well opt for ease of use over security. In other situations, WLAN professionals might find themselves being asked to provide an expensive and complicated multitiered security strategy in an environment where there’s very little to really protect. Today’s CWSPs need be savvy in not only their range of security solutions and analysis tools, but also in how to choose the right option (or combination of options) for complicated situations with diverse user groups and WLAN client devices.
For those just embarking on a wireless career, or for seasoned profressionals trying to broaden their knowledge base, I applaud you for choosing this text. From captive portals to VPN, and MDM solutions to WIPS, the authors give you a knowledge base foundationon which you can build an operational career. David Coleman, Bryan Harkins, and David Westcott bring you decades of wireless security knowledge that spans the gamut from wardriving to Hotspot 2.0. CWSP helps you understand the strengths and disadvantages of any security option you’re likely to be faced with in today’s real world. It doesn’t matter whether you’re a one-person company servicing the SMB market or if you support a giant corporate WLAN, you’ll do well for yourself and your clients by learning what CWSP has to offer. BYOD, IoT, legacy WLAN concerns—it’s all here.
As a long-time wireless professional, I can promise you that there are no shortcuts to building high-quality networks. Good networks support operational goals, and good wireless experts help to make sure those goals are clearly defined and understood before they can be matched with the right solution. When it comes to WLAN security, there are no silver bullets or one-size-fits-all solutions. Thankfully, you’re in good hands with David, Bryan, and David as you learn how to think about the broad topic of WLAN security. Best of luck to you.
Lee Badman
CWNA, CWSP, CWDP
Network Architect