wireless

WN Blog 025 – Hidden SSIDs

Hey!

Welcome to our first blog post of 2020! Happy new year to all 🙂

We wanted to kick off this year’s first blog post covering how secure is a Hidden SSID. We have been into a few customer environments recently where they were hiding some of their SSIDs as they believed this was more secure.

Shout out to Mr. Andrew McHale for his explanation as to why we shouldn’t be hiding SSIDs:

“Some clients don’t probe for SSID’s, they rely on Beacons to decide what is available. If you hide the SSID in the Beacon then some clients won’t see SSID to connect to.

Others will try listening to beacons first and only probe if they don’t see the SSID they’re looking for. This wastes time.

On DFS channels the client has to listen for a Beacon or Probe Response before it probes itself. Normally Vocera clients always probe for the specific SSID we have programmed it for. But on DFS channels, to save that probing time, if we hear a Beacon supporting our SSID we will forego probing on that channel. If you hide the beacon we have to apply that extra 15ms for probing and dwelling on that DFS channel.”

To summarise what Andrew was saying there is that we should not be hiding the SSIDs as it can have a negative impact on client roaming & association.

Let’s now do some testing and see how secure it is to hide an SSID & what steps we have to do to be able to find what the hidden SSID name is – if that is even possible of course 😉

For our tests today I will be using my Mist AP41 – connected back to my Mist Cloud dashboard. The SSID we will be trying to find is called “Matts_Hidden_SSID”. I will also be using the WLAN-Pi & Wireshark to capture wireless packets.

Here is how my SSID is configured on My Mist dashboard – we can clearly see the SSID name and that I have selected to hide the SSID.

MiSt 
Monitor 
Ma 
O), Clients 
Access Points 
switches 
Location 
Analytics 
Netw•ork 
Organization 
WIA NINJAS 
< Matts 
Hidden 
SSID 
Matts Hidden 
Labels 
SSID 
Security 
@ WPA-2/PSK with passphrase 
O 
WPA-2/EAP (802.1 X) 
Apply to Access Points 
SSID 
Aps 
Isolation 
AP Labels 
Specific APS 
WLAN Status 
@ Enabled C) Disabled 
Hide 
D No Static IP Devices 
Radio Band 
@ 2.4G and 5G 
O 
2.4G 
Band Steering 
O Enable 
Client Inactivity 
Drop inactive clients after 
Geofence 
O 
Open Access 
More Options 
Fast Roaming 
@ Default 
VLAN 
@ Untagged O 
Guest Portal 
Tagged 
O 
O 
Dynamic 
O 
1800 
O 
O 
O 
seconds 
No portal (go directlyto internet) 
Custom guest portal 
Forward to external portal 
SSO with Identity Provider C) Requires custom firmware 
Bypass guest/external portal in case of exception 
Contact Mist for Firmware 
D Minimum client RSSI (2.4G) O 
D Minimum client RSSI (5G) O 
Block clients having RSSI below the minimum 
Data Rates 
O 
Compatible (allow all connections) 
@ No Legacy (2.4G, no 1 1b) 
O 
High Density (disable all lower rates) 
prohibit peer to peer communication 
Filtering (Wired to Wireless) 
Broadcast/Multicast 
Custom Forwarding 
Custom Forwarding to Etho POE 
SSID Scheduling 
O Enabled @ Disabled 
QoS Priority 
Override QoS 
AirWatch 
O Enabled @ Disabled 
O 
Custom Rates 
WiFi Protocols 
WiFi-6 @ Enabled O 
WLAN Rate Limit 
Cl Limit uplink to 10 
O Limit downlink to 20 
Disabled 
Mbps

Next, let’s take a look at what wireless channels my AP is using in the 5GHz band so I can configure my WLAN-Pi to capture on those channels.

MiSt 
Monitor 
Ma 
O), Clients 
Access Points 
switches 
Location 
Analytics 
Netw•ork 
Organization 
WIA NINJAS 
Radio Management 
-92 darn 
AVG. NOISE 
Distribution 
Current Radio Values 
Name 
FRI, 09:16 AM 
site 
Matt Starling Home 
AVG. # NEIGHBORS 
MAC Address 
2.4 GHz 
5 GHz 
Optimize now 
0.0 0 
AP DENSITY 
AVG. # CO CHANNEL NEIGHBORS 
No. Clients 
Status 
Connected 
Channel 
Channel 
108+1 12 
0.1 
AVG. # APS PER CHANNEL 
Channel Width 
40 MHz 
1.00 
CHANNEL DIST. SCORE 
5 GHz Enabled 
17 dBm 
Channel 
5 GHz Overridden 
Power

We can see in the above image that my AP is using a 40MHz wide channel & occupying channels 108 + 112. So we need to configure my WLAN-Pi to use those channels.

wlanpi@wlanpi: - 
as: w Ianpi 
Using keyboard—interactive authentication . 
Password : 
/ Ill I \ 
Welcome Co Debian Stretch with 
Armhian Linux 4 . I g. 66—sunxi64 
System load: 
Memory usage : 
CPU temp : 
Usage of / : 
0.00 0.00 0.04 
16 * of gg3MB 
330c 
of ISG 
syszem 
Up time: 
I g min 
.2s4.g.232 
sudo apt update 
s udo apt 
install 
Lasc login: Thu occ 3 2019 from 192.168.42.2 
wlanpi@wlanpi : —$ sudo iw wIanO sec channel 108 40MHz 
Usage : 
iw [options] dev sec channel 
[NOHT 1 HT40+lHT40-l 
SMHz 1 10MHz 1 80MHz 
Options : 
— — debug 
enable net link debugging 
wlanpi@wlanpi : —$ sudo iw WI ano sec channel 108 HT40+ 
wlanpi@wlanpi : —$

Now we have configured the WLAN-Pi to capture on those channels, I was ready to start capturing some packets.

Let’s take a look at some of the packets that were starting to come flooding in – I could see my other SSID “WiFi Ninjas” that I had not set to be hidden being broadcasted in the beacon frames but I could see that there was also another SSID coming from my Mist AP but we could not see the hidden SSID – still pretty secure at this point 😉 

*SSH remote capture 
File Edit View Go Capture 
651 
8a2.11 
Ila 
dam s.a 
802.11 
802. Ila 
dam 6.a 
802.11 
802. Ila 
dam s.a 
802.11 
802. Ila 
dam s.a 
802.11 
802. Ila 
dam s.a 
802.11 
802. Ila 
dam s.a 
802.11 
802. Ila 
dam s.a 
658 
802.11 
802. Ila 
dam s.a 
802.11 
802. Ila 
dam s.a 
802.11 
802. Ila 
dam s.a 
802.11 
802. Ila 
dam s.a 
802.11 
802. Ila 
dam s.a 
802.11 
802. Ila 
dam s.a 
802.11 
802. Ila 
dam s.a 
802.11 
802. Ila 
dam s.a 
802.11 
802. Ila 
dam s.a 
802.11 
802. Ila 
dam s.a 
802.11 
802. Ila 
dam s.a 
802.11 
802. Ila 
670 
802.11 
802. Ila 
Analyze Statistics Telephany 
Wireless Tools 
Help 
Apply a display filter 
Absolute Time 
Expr ession 
Spatial streams 
+ Management Fr ames 
Control Frames Data Frames 
Time as Formatted 
28.160416 
28.570037 
29.184500 
Delta Time 
a. 00BBB8 
a. 102371 
a. 000008 
a. 102480 
a. 102364 
a. 102382 
a. 000020 
a. 102493 
a. oooala 
a. 102333 
a. 102356 
a. 102367 
a. 000008 
a. 102484 
a. 102368 
Frequency 
R SSI 
-26 
- 26 
- 26 
- 28 
- 28 
- 26 
- 26 
- 28 
- 26 
- 26 
- 26 
- 28 
- 26 
- 26 
- 28 
- 28 
- 26 
- 26 
- 28 
-26 
TX Rate 
Data rate (M$s) 
Source 
Destination 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Broadcast 
Protocol 
Length 
359 
362 
359 
362 
359 
362 
359 
362 
359 
362 
359 
362 
359 
362 
359 
362 
359 
362 
359 
362 
Colouring Rule Name 
Beacon 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Beacon 
MCS index I 
ss1D 
wiFi 
wiFi 
wiFi 
wiFi 
wiFi 
wiFi 
wiFi 
wiFi 
wiFi 
Bandnidth 
PHY type 
Tag 
652 28.262787 
653 28.262795 
654 28.365275 
655 28.365283 
656 28.467647 
657 28.467655 
659 28.570057 
660 28.67255a 
661 28.67256a 
662 28.774893 
663 28.774901 
664 28.877257 
665 28.877265 
666 28.979632 
667 28.97964a 
668 29.082124 
669 29.082132 
554a 
5540 
5540 
5540 
5540 
5540 
5540 
5540 
5540 
5540 
5540 
5540 
5540 
5540 
5540 
5540 
5540 
5540 
5540 
5540 
MHZ 
MHZ 
dam 
dam 
(2872 
6 Mist 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
79:32 
Ninjas 
Ninjas 
Ninjas 
Ninjas 
Ninjas 
Ninjas 
Ninjas 
Ninjas 
Ninjas 
Info 
Beacon 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Bea con 
Beacon 
frame, 
f rame 
f rame 
f rame 
f rame 
f rame 
f rame 
f rame 
f rame 
f rame 
f rame 
f rame 
f rame 
f rame 
f rame 
f rame 
f rame 
f rame 
f rame 
frame, 
su=3B11, 
SN=3a12, 
SN=3a13, 
SN=3a14, 
SN=3a15, 
SN=3a16, 
SN=3a17, 
SN=3a18, 
SN=3a19, 
sN=3a2a, 
SN=3a21, 
SN=3a22, 
SN=3a23, 
SN=3a24, 
SN=3a25, 
SN=3a26, 
SN=3a27, 
SN=3a28, 
SN=3a29, 
sN=3a3a, 
Frame 653: 
359 bytes 
on 
wire (2872 bits), 
359 bytes 
c a ptu red 
bits ) 
on 
Radiotap Header va, Length 32 
802. II radio information 
IEEE 8B2.II Beacon frame Flags: . 
IEEE 8a2.11 wireless LAN 
Fixed parameters (12 bytes) 
v Tagged parameters (287 bytes) 
ag: SSID parameter set: Boa Boa Boa Boa Boa Boa Boa Boa Boa Boa Boa 
Number: SSID arameter set a 
interface 
Boa Boa Boa Boa Boa Boa 
Tag Iength: 17 
Tag: Supported Rates 6(8), 9, 12(8), 
Tag Number: Supported Rates (I) 
Tag Iength: 8 
18, 
42 
17 
15 
al 
a2 
5e 
24(8), 
36 
2/ 
48, 
54 , 
Su p ported 
Su p ported 
Su p ported 
Su p ported 
Rates . 
Rates : 
Rates : 
Rates : 
Rates : 
• 6(8) (ax8c) 
9 (0x12) 
12(8) (0x98) 
(ax24) 
Su 
rted 
aza 
gala 
aa2a 
aaaa 
aasa 
aasa 
ana 
ana 
gaga 
aaaa 
aaca 
aada 
aaea 
a afa 
3122 
alsa 
3142 
alfa 
[Mbit/ sec) 
• •LG8 $ 
64 
al 
17 
7a 
14 
47 
04 
a2 
al 
32 
17 
al 
al 
al 
2f 
2a 
34 
35 
11 
28 
al 
88 
04 
ff 
dd 
15 
11 
al 
17 
74 
46 
al 
ff 
fa 
79 
17 
34 
57 
al 
32 
11 
04 
al 
ab 
a2 
al 
al 
17 
78 
04 
gf 
18 
24 
al 
02 
17 
64 
le 
al 
al 
16 
04 
27 
2a 
51 
le 
95 
2a 
bf 
00 
17 
ff 
72 
al 
al 
a2 
dd 
12 
17 
68 
2d 
04 
32 
18 
98 
34 
99 
23 
la 
42 
2a 
35 
24 
47 
al 
le 
a2 
04 
42 
43 
79 
48 
2a 
38 
17 
7f 
a2 
al 
32 
sa 
24 
al 
le 
84 
al 
ff 
al 
al 
62

How about if we filter on probe responses only? By using this Wireshark filter: wlan.fc.type_subtype == 0x0005

*SSH remote capture 
File Edit View Go 
152 
8a2.11 
8B2.11a 
dam 6.ø 
8ø2.11 
7øø 
8ø2.11 
8ß2. 
dam 6.ø 
7ß3 
8ø2.11 
dam 6.ø 
7ß5 
8ø2.11 
dam 6.ø 
833 
8ø2.11 
dam 6.ø 
936 
8ø2.11 
dam 6.ø 
964 
8ø2.11 
dam 6.ø 
975 
8ø2.11 
dam 6.ø 
978 
8ø2.11 
dam 6.ø 
98ø 
8ø2.11 
dam 6.ø 
:49.4øgø56 44.78ø149 
8ø2.11 
dam 6.ø 
:49.418688 44.789781 
8ø2.11 
dam 6.ø 
44.8ø4283 
8ø2.11 
dam 6.ø 
:49.443324 44.814417 
8ø2.11 
dam 6.ø 
8ø2.11 
dam 6.ø 
2469 
8ø2.11 
dam 6.ø 
8ø2.11 
dam 6.ø 
2477 
8ø2.11 
6.ø 
8m.11 
8ß2. 
Capture 
= ox0005 
Analyze Statistics Telephony 
Wireless Tools 
Help 
"Ian fc. type_subtype 
Absolute Time 
+ Management Fr ames 
Control Frames 
Da ta Frames 
Time as Formatted 
7.564445 
Delta Time 
a. øøøøøø 
13.7ø56ß2 
8.837292 
ø.ø16123 
ø.ø1ø13ø 
2.9435ø4 
1.64ø69ø 
ø.4356ß3 
ø.øøgsøg 
ø.ø14625 
ø.ø1ß247 
g. 592379 
ø.øøg632 
ø.ø145ß2 
ø.ø1ø134 
4.1ø4218 
1.578936 
ø.ø13265 
ø.ø14984 
a. ø1ß264 
Frequency 
R SSI 
-26 
- 28 
- 26 
- 28 
- 26 
- 26 
- 26 
- 26 
- 26 
- 28 
- 26 
- 26 
- 26 
- 26 
- 26 
- 28 
- 26 
- 26 
- 26 
-28 
TX Rate 
Data rate (Mb's) 
Source 
Destnaton 
Protocol 
Length 
356 
356 
353 
353 
353 
353 
356 
356 
356 
356 
356 
356 
356 
356 
356 
356 
353 
353 
353 
353 
Colouring Rule Name 
MCS index I 
Expr ession 
Spatial streams 
Tag 
5øø 21.27øø47 
2396 48.918635 
1894 ø6 
1899 ø6 
19ß2 ø6 
2474 
2479 
Frame 
: 52 
: 52 
: 52 
: 52 
3ø .1ß7339 
3ø .123462 
3ø.133592 
33. ø77øg6 
34.717786 
35.153389 
35.162898 
35.177523 
35.18777ø 
% .497571 
5ø.51ß836 
5ø.52582ø 
% .536ß84 
554a 
554ø 
554ø 
554ø 
554ø 
554ø 
554ø 
554ø 
554ø 
554ø 
554ø 
554ø 
554ø 
554ø 
554ø 
554ø 
554ø 
554ø 
554ø 
554B 
MHz 
MHz 
MHz 
MHz 
MHz 
MHz 
MHz 
MHz 
MHz 
MHz 
MHz 
MHz 
MHz 
MHz 
MHz 
MHz 
d 8m 
dam 
d 8m 
(2824 
54 , 
6 Mist 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
Mist 
6 
6 Mist 
Matt 
Matt 
Matt 
Matt 
Matt 
Matt 
Matt 
Matt 
Matt 
Matt 
Matt 
Matt 
Matt 
Matt 
Matt 
Matt 
Matt 
Le novo 
Len ovo 
iPhoneX 
iPhoneX 
iPhoneX 
iPhoneX 
Len ovo 
iPhoneX 
iPhoneX 
iPhoneX 
iPhoneX 
iPhoneX 
iPhoneX 
iPhoneX 
iPhoneX 
Len ovo 
iPhoneX 
iPhoneX 
iPhoneX 
iPhoneX 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Response 
Response 
Response 
Response 
Response 
Response 
Response 
Response 
Response 
Response 
Response 
Response 
Response 
Response 
Response 
Response 
Response 
Response 
Response 
Response 
ss1D 
WiFi Ninjas 
Matts Hidden 
Matts Hidden 
Matts Hidden 
Matts Hidden 
wiFi 
wiFi 
wiFi 
wiFi 
wiFi 
wiFi 
wiFi 
wiFi 
wiFi 
wiFi 
Matts 
Matts 
Matts 
Matts 
Ninjas 
Ninjas 
Ninjas 
Ninjas 
Ninjas 
Ninjas 
Ninjas 
Ninjas 
Ninjas 
Ninjas 
Hidden 
Hidden 
Hidden 
Hidden 
Bandwidth 
SSID 
SSID 
SSID 
SSID 
SSID 
SSID 
SSID 
SSID 
PHY type 
8ß2 
8ß2 
8ß2 
8ß2 
8ß2 
8ß2 
8ß2 
8ß2 
8ß2 
8ß2 
8ß2 
8ß2 
8ß2 
8ß2 
8ß2 
8ß2 
8ß2 
Info 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Probe 
Response, 
Response, 
Response, 
Response, 
Response, 
Response, 
Response, 
Response, 
Response, 
Response, 
Response, 
Response, 
Response, 
Response, 
Response, 
Response, 
Response, 
Response, 
Response, 
Response, 
su=2596, 
SN=287ø, 
SN=3ø51, 
SN=3ß52, 
SN=3113, 
SN=3166, 
SN=3175, 
SN=3178, 
SN=3179, 
SN=318ø, 
SN=3426, 
SN=3427, 
SN=3428, 
SN=3429, 
SN=3549, 
SN=3582, 
SN=3583, 
SN=3584, 
SN=3585 , 
FN=ø 
FN=ø 
FN=ø 
FN=ø 
FN=ø 
FN=ø 
FN=ø 
FN=ø 
FN=ø 
FN=ø 
FN=ø 
FN=ø 
FN=ø 
FN=ø 
FN=ø 
FN=ø 
FN=ø 
353 bytes 
on 
wire (2824 bits), 
353 bytes 
ca red 
bits ) 
on 
interface 
Radiotap Header vø, Length 32 
8m.11 radio information 
IEEE 8e2.11 Probe Res rise Flags: . 
IEEE 8e2.11 wireless LAN 
Fixed parameters (12 bytes) 
SSID arameter set: Matts Hidden SSID 
Tag Number: SSID parameter set (e) 
Tag length: 17 
SSID: Matts Hidden SSID 
Tag: 
Tag: 
Tag: 
Tag: 
Tag: 
Tag: 
Tag: 
supported Rates 6(a), 9, 12(a), 18, 24(a), 36, 48, 
DS Parameter set: Current Channel: 
CMbit/ sec) 
Country Information: Country Code 63, Environment Any 
Power Constraint: 
T PC Report Transmit Power: 21, Link Margin. 
RSN Information 
Q8SS Load Element 
: measurement Pilot 
8ø2.11e ccA Version 
Transmission 
aaaa 
aala 
aaaa 
aasa 
eese 
aasa 
aa7a 
ane 
aaga 
aaaa 
aaba 
aaca 
aada 
aaea 
a afa 
aløa 
a12a 
a13a 
a14a 
else 
64 
65 
17 
78 
ø4 
6e 
17 
64 
16 
ø4 
27 
213 
11 
95 
213 
bf 
17 
15 
11 
53 
dd 
17 
68 
2d 
ø4 
32 
18 
be 
11 
49 
34 
23 
la 
42 
65 
44 
ø4 
42 
43 
13 
61 
17 
15 
f2 
213 
58 
74 
38 
17 
øø 
7f 
aa 
øø 
74 
84 
ff 
ff 
62 
73 
12 
17 
713 
14 
47 
ff 
ø4 
32 
5b 
98 
al 
ff 
2f 
213 
35 
48 
24 
88 
04 
ff 
aa 
dd 
69 
17 
74 
46 
ff 
79 
64 
48 
ce 
32 
64 
le 
ac 
•Ma tts Hidd 
en SSID 
• acn

Ooooh not quite so secure anymore is hiding the SSID? 🙂 We can quite clearly see in the SSID parameters the SSID name now! This didn’t take too much effort either did it? There are a few requirements that we need to meet though to be able to see the probe response.

I associated to the SSID whilst capturing the packets but if a client does not associate during your packet capture you won’t see the probe response so you might have to send a de-auth or something like that but that’s for another blog 😉

To summarise then, hiding the SSID is not only not secure, but it can also have a negative impact on roaming – next time I go to a customer site that has the SSID hidden, I will be sending them to this blog 😀

If you are new to Wireshark we did another blog last year on some useful filters which can be found here: https://wifininjas.net/index.php/2019/05/29/wn-blog-002-wireshark-filters/

I also have set up my own custom profiles, using a colour profile, my own custom columns & have added known devices MAC address to name profile so that’s how you can see “Matt_iPhoneX” instead of my MAC address. If you want any help with how to set up your Wireshark like this feel free to give us a shout and we will help you.

Hope you enjoyed the blog post 🙂

x

WN Blog 021 – Getting Started with Python Coding

Hey!

Welcome to our very first blog on our journey to learn some coding.

I decided it was finally time to stop burying my head in the sand & to make a start with taking a dive into the world of coding.

This is my very first time trying to properly understand what is required to even make a start with learning how to code – so disclaimer, this is going to be a very simple first step into Python coding.

If like me you didn’t even know where to start, what version of Python to go with, what you need to write your first piece of code, any apps required, what training material should I look at first – then this blog is probably for you as I will take you through everything I have done to write my first piece of very simple Python code.

If you already have even an intermediate level of coding or Python knowledge – then this blog probably is not for you but you are welcome to read on anyway and if you have any useful feedback for anyone else about to embark on their first journey into coding, please feel free to leave some comments below.

Let’s start with what training material I have decided to go with. I reached out to a few people that I knew who was pretty good with coding for what they would recommend as a starting point. I will list out a few of the recommendations:

  1. Cisco DevNet learning labs: https://developer.cisco.com/learning/tracks/app-dev
  2. Learn Python the hard way: https://learnpythonthehardway.org/python3/?__s=2fqytpgbriphaxjuruo3
  3. Kirk Byers “Learn Python Course” – https://pynet.twb-tech.com/
  4. Udemy Python Videos – https://www.udemy.com/course/python-complete/

I took a look at all these options and they all seemed like a great place to start but I have decided to go with the Kirk Byers “learn Python Course” – you sign up to the course on his website and then when the course starts each week he will email you about an hours’ worth of videos to watch along with some exercises. Kirk comes from a networking background so even from the very beginning when he is teaching you the Python basics – it is still cantered around networking which I like.    

Moving on to which version of Python do I start to learn – version 2 or version 3? Great question I didn’t know either, so I reached out to some guys & they all said well it depends on your environment but if you are making a start now its probably best just to jump straight in with version 3. The way it was explained is that Python v2 is kind of like IPV4 & Python v3 is IPV6 – there will still be support for v2 till the end of 2020, but everything is moving towards v3.

Ok so now I made my decision to go with Python v3 you need to install Python on your device. You can download here:

Python Download: https://www.python.org/downloads/

If you are downloading Python for the first time, make sure when you are going through the installer you check the box “Add Python to PATH”.

Python Add to PATH

If you already have Python installed here are the steps to add Python to PATH:

Steps:

  1. Right Click on ‘This PC’
  2. Click ‘Advanced system settings’
  3. Go to the ‘Advanced’ tab
  4. Click ‘Environment Variables’
  5. Select ‘Path’
  6. Click ‘Edit’
  7. Click ‘New’
  8. Add paths to Python home (example: C:\Users\macd\AppData\Local\Programs\Python\Python38-32) dir and your .py scripts dir (example: C:\Users\macd\OneDrive\WiFi Ninjas\Mist API)
  9. Click ‘OK’
Python PATH 2
Adding Python to PATH after install

After you have downloaded the version of Python relevant to your operating system we now need to install some sort of tool/ application to use to write our Python code. There are quite a few out there such but the one that I have gone with and seems to be quite popular is an application called ATOM. You can download ATOM from here:

ATOM download: https://atom.io/

Once you have installed ATOM on your device, you can install additional packages & themes to make ATOM more relevant for what you are coding. I found some recommendations online for some packages to use on ATOM specifically for Python coding which I will share with you guys what I have installed – I will be totally honest I am not 100% sure what all of them do but some are pretty self-explanatory. 

  1. “Autocomplete-python” – Python completion for packages, variables, methods, functions, with their arguments.
  2. “file-icons” – Assign file extension icons & colors for improved visual grepping.
  3. “kite” – Python coding assistant featuring AI-powered auto-completion, advanced function signatures, and instant documentation.
  4. “python-autopep8” – Formats Python code using autopep8
  5. “script” – Runs code in ATOM.
  6. “linter-flake8” – ATOM linter plugin for Python using flake8.

There was also a recommendation to use the “Predawn” theme which styles the text in ATOM in a certain way that might make it easier for you to understand different aspects of the code.

Now that we have Python v3 installed and ATOM + the additional packages for an application to use to write Python code it was time to get started!

In ATOM your first line of code needs to be a “shebang” line (not sure if I have got that correct but it certainly sounded like shebang so I am going with it!). This tells your computer that you want Python to execute this program. The shebang line begins with #! but the rest depends on your operating system. I am using a Windows laptop, so my shebang line is:

Windows shebang line: #!/usr/bin/env python3

My very first piece of code was going to a super simple one where I wrote some “strings” where a user would then input some text & then that text would be “printed” out.

Staying on the networking theme I went with some basic IP information. Here is the code that I had written in ATOM:

ATOM Code

The “ip_addr” “sub_mask” & “def_gw” are my strings and the “= input” means that is what will be seen & what a user types into here are what will the be printed which is called out from the “print” lines. I saved this piece of code as “test1.py” in my one drive.

Now I wanted to run this piece of Python code that I had written on my laptop, you can do this directly from your Windows command prompt. When you launch the command prompt you will need to change the directory first, so it knows where to execute the Python code from. As my file was in my one drive this was the command line that I needed to enter.

Change directory: “cd C:\Users\mstarling\OneDrive\Python\Python Files”

Once the directory has been changed you can then execute your Python file by using this command.

Execute Python command: “python ./test1.py”

Which should look something like this:

:estl .py — Files — Atom 
Edit View Selection Find Packages eelp 
test2.py 
Python Files 
testl. py 
test2.py 
2 
4 
6 
7 
8 
S! python3 
ipßidr = input("Enter a IP addres: ") 
sub_mask = a Subnet Mask: ") 
def_gw = Input("Enter a Default Gateway: ") 
print(ip_addr) 
print(sub_mask) 
print(def_gw) 
icrosoft Windows [Version 18.8.17134.1138] 
(c) 2818 microsoft Corporation. All rights reserved . 
: \Users\mstar1ing d C: Files 
Users mstarlin OneDrive P hon P hon Files python . /testl . py 
Enter a IP addres: 18.18.18.18 
Enter a subnet mask: 255.255.255.8 
Enter a Default Gatewa 
. 18.18.18.1 
18.18.18.18 
255.255 . 255.8 
18.18.18.1 
: \Users\mstar1ing\OneDrive\Python\Python Files>_
ATOM Code & CMD

We can see here the code in ATOM, then changing the directory in my windows command prompt, then executing the Python file & I then entered some IP-SM-DG info which then got printed out! I know this is a super simple piece of code but within 1 hour of watching my first Python training videos, I was able to install everything I needed, write my first piece of code & then execute it – which I found very exciting!

I then wrote another piece of simple code which was a little bit more relating to us 😀

thon\Pythcn Files — Atom 
2 
4 
testl.py 
Welcome 
podcast = input("Enter your favourite wireless networking podcasters: ") 
prmt(podcast) 
icrosoft windows [Version 18.8.17134.1138] 
(c) 2818 microsoft Corporation. All rights reserved . 
: \Users\mstar1ing>cd C: \Users\mstar1ing\OneDrive\Python\Python Files 
Enter our favourite wireless networkin 
IFI Ninjas 
dcasters: WiFi Nin •as 
: \Users\mstar1ing\OneDrive\Python\Python Files>_
ATOM Code & CMD WiFi Ninjas

What you can see here is you could get creative with any kind of info you wanted to input here.

There you go guys, all the first steps that it took to get me off the ground and running with Python coding. Our aim is to really push on & learn as much as possible over the next year with coding & automation so we will do our best to keep you updated along our journey with anything we think might be useful to help you guys.

I hope you enjoyed the blog & I would recommend anyone thinking about taking the plunge into making a stat with learning to code to do it – as I strongly believe that going forward as a network engineer we will really be required to have at least some knowledge and coding skills as well.

Thanks!

X

WN Blog 018 – WiFi Design Day 2019 Experience

Hey!

I have just recently attended the Ekahau & Open Reality WiFi Design Day 2019 at the ICC in Birmingham and thought I would do a blog post to summarise my experience and thoughts.

This was my 3rd year in a row attending from the 1st one back in 2017 at the Churchill War Rooms, to the Barbican centre and then the ICC in Birmingham  – this year I was attending as a speaker for the first time.

I really feel that there is no other event like this in the UK where you get the exposure to such a wealth of fantastic speakers, the opportunity to network with like-minded individuals & they throw in food + beers! For what is very little expense in comparison.

Big thanks to all the people over at Ekahau & Open Reality for the event but I want to say to Sam Cobley and Matt Cavill imparticular a huge thanks to these guys as I know how much personal time & effort they put into this event to make sure it’s always a massive success.  

I will cover & highlight some of the presentations from the day below but disclaimer – I have not included every presentation from the day here as I did not attend them all!

When I first arrived at the ICC in Birmingham it wasn’t too difficult to work out where I needed to go from this nice display.

Arrival Display
Arrival Display

The line up for the day’s action, we took the liberty of highlighting what the people were saying was the most exciting & anticipated presentation of the day:

Presentation Timetable
Presentation Timetable

My 3rd year attending, first time speaking lanyard – a special day for me personally 🙂

Matt Lanyard
Matt Lanyard

I took this photo at what is arguably the most important part of the day – coffee time! We WiFi pros need that coffee first thing in the morning but it was equally as great to see that so many people were in attendance given the typically bad English weather that had caused extensive flooding & travel nightmares.

Coffee Time
Coffee Time

With nearly 300 tickets sold, we can see a packed crowd here and just how popular these WiFi Design days are becoming!

WDD Crowed Shot
WDD Crowed Shot
Mikko Lauronen
Mikko Lauronen

Anssi & Mikko kicked off the day by showing us some extremely cool & exciting new features that will be coming out very soon with Ekahau. You will now be able to moonwalk, drink a beer and survey – all at the same!

Ekahau never fails to amaze me with the innovations of the products they offer to us as WiFi Engineers and there is absolutely no way I would be able to do my job as effectively without having Ekahahu in my tool kit. 

Anssi Presenting
Anssi Presenting
David Corbett
David Corbett

David Corbett gave us an interesting insight into the NHS Free WiFi rollout and how important WiFi really is seen now and no more as a “nice to have”.  How much of a benefit & positive experience it brings to not only patients that use the WiFi extensively whilst at the hospital to stay in contact with loved ones but also for staff how much it is helping them also.

David Corbett Presenting
David Corbett Presenting
Keith Parsons
Keith Parsons

Next up to present was the original WiFi Legend himself, Mr. Keith Parsons! Keith took us through some tips, techniques, tools for troubleshooting WLANs. I have been lucky enough to be on one of Keith’s’ training courses, as well as seeing him present in person. There are few better in the WiFi industry than Keith and for him to share his knowledge and tips with us is one of the best parts of the day for me.

A couple of tips if you are at one of Keith’s presentations – make sure to put your phone on silent and ask permission if you want to record him, personally I would just suggest you sit back, enjoy and try to take in as much information as possible!

Keith Parsons Presenting
Keith Parsons Presenting

Keith also revealed some new training courses that are going to be available from the ECSE / WLAN Pros next year. ECSE Troubleshooting & ECSE Advanced – as well as offering the original ECSE Design still.

If like me you wanted to know when the next opportunity would be to go on one of these amazing training courses – here are some of the dates for 2020:

ECSE Training Dates
ECSE Training Dates
Mark O'Leary
Mark O’Leary

Mark gave us an insight into Eduroaming, from how it is deployed to how many unique devices they are seeing on the Eduroam network – Pretty impressive. This is a great concept and something I personally really want to see more of in the WiFi industry. Cisco is doing something very similar called “Open Roaming” where the handoff from 4/5G to WiFi is completely seamless and requires no interaction from the end-user – just how WiFi should be in my opinion.

Mark O'Leary Presenting
Mark O’Leary Presenting

Keeping up with the theme from last year where I featured on the WiFi design day YouTube video for feedback on the day – I was more than happy to get back in front of the camera again to tell everyone what a great day I had and why.

Matt Youtube
Matt YouTube Video

This was now after the lunch and the two breakout sessions or “tracks” started.

I attended track 2 as this was also where we would be presenting 🙂

First up was Nick Turner / Dick Burner – giving us a live demo of some of the new Ekahau features.

Nick Turner Presenting
Nick Turner Presenting
Andrew McHale
Andrew McHale

Next up in track 2 was the voice master, Andrew McHale. It is always a pleasure and insightful to listen to Andrew’s tips on voice for wireless – there is no doubt that he is one of the leading experts in the industry when it comes to the subject – so even though this was the 327273th time we had heard Andrew talk about voice over wireless – it was still amazing & extremely mind-blowing hearing Andrews knowledge of this subject.

I have highlighted my favourite tip from Andrews slide here 😀

Andrew McHale Presenting
Andrew McHale Presenting
WiFi Ninjas
WiFi Ninjas

This was mine & Mac’s first time presenting at the WiFi design day and we decided to talk about what we think is the most exciting thing about WiFi – RTLS! (Real-time location services) We first went through some theory on what is RTLS, different methods & techniques, etc and then had some real-world demos + testing that we had been doing throughout the year.

WiFi Ninjas Presenting
WiFi Ninjas Presenting
WiFi Ninjas Presenting 2
WiFi Ninjas Presenting 2
Jim Vajda
Jim Vajda

We then headed back into the main hall where Jim took us through an alternative view of what the 7Signal portfolio could bring to us by not using the WiFi monitoring tool for monitoring the WiFi – but using it to help us with designing WiFi. 

Jim Vajda Presenting
Jim Vajda Presenting
Peter MacKenzie
Peter MacKenzie

The last presenter of the day was the Magician himself, Mr. Perter Mackenzie. The topic for Peter’s presentation was roaming analysis – where Peter covered the different methods & amendments available to help clients roam whilst giving us a deep dive view into the packets of how all of this happens.

This would have seemed like quite a dark art to me if I hadn’t have had the pleasure of sitting one of Peter’s CWAP courses this year so thankfully I could understand at least some of what Peter was saying :D.

Anyone thinking about going for their CWAP or just want to get a better understanding of how this fantastic protocol works, then I highly recommend you take one of Peters’s courses if you get the chance to.

Peter MacKenzie Presenting
Peter MacKenzie Presenting

Peter finished his presentation off by mentioning the WLA, all the great things they have coming up but also about the UK WiFi Guys Slack Chat.

This a great form of community and communicating with fellow WiFi pros in the UK – if you are not in the UK WiFi Guys Slack chat and would like to be, you can reach out to @WiFiNigel on twitter to get added.

This was a fantastic selfie that WiFi Nigel took, really catching his best angle here I think :D.  

WiFi Nigel Selfie 2
WiFi Nigel Selfie

We finished the day off with a round table where some of the presenters were invited back on stage to take questions from the crowd & any questions that came in online. We were extremely honored to be invited back up to be on the round table to sit up there with some true WiFi legends and, Andrew McHale ;).

WiFi Round Table
WiFi Round Table

The only slightly negative feedback / constructive criticism was, and this is my completely unbiased opinion but I think that next year Open Reality / Ekahau should give the WiFi Ninjas a longer time slot and be on the main stage 😉

One final warning/ tip:  if you go out with Alan Blake the night before a conference, you will have one of the best nights out you have ever had, but prepare appropriately for the hangover the next day. I would still highly recommend this experience to anyone as Alan is one of the most fun & nicest people I have met – who I always look forward to seeing at these events.

Alan Blake & Co.
Alan Blake & Co.

I hope you enjoyed my summary of the 2019 WiFi Design day, if you were there and would like to leave your feedback also – please feel free to post a comment below as I am sure the guys at Open Reality & Ekahau would love to know.

Lots of love,

Matt

x

WN Blog 017 – Cisco Catalyst 9800 – Local Web Auth Configuration Guide

Hey!

Welcome to another one of our Cisco C9800 configuration blogs!

This time we will be covering Local Web Authentication (LWA), where guest sessions are managed by the WLC itself.

We can authenticate against RADIUS, TACACS, LDAP or local WLC Guest Users database. In this guide we will use local WLC Guest Users.

As I was preparing for deployment for a customer that would be using 2 x foreign C9800CLs in HA SSO & 2 x anchor C9800CLs in HA SSO I had my lab set up in this configuration also. In this scenario, the WLAN that I will be using is being guest anchored via a tunnel from the foreign WLC to the Anchor.

This meant that all the configuration you see below had to be replicated across both the foreign and the anchor WLCs.

We will include the steps we used from the official Cisco config guide but will add screenshots from our lab WLCs to hopefully make it a bit easier to follow.

Official Cisco guide:

https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/config-guide/b_wl_16_10_cg/wireless-web-authentication.html

Below are the steps to configure LWA.

1. Configuring AAA Authentication (GUI)

Procedure

Step 1 Choose Configuration Security AAA.
Step 2 In the Authentication section, click Add.
Step 3 In the Quick Setup: AAA Authentication window that is displayed, enter a name for your method list.
Step 4 Choose the type of authentication you want to perform before allowing access to the network, in the Type drop-down list.
Step 5 Choose if you want to assign a group of servers as your access server, or if you want to use a local server to authenticate access, from the Group Type drop-down list.
Step 6 To configure a local server to act as a fallback method when servers in the group are unavailable, check the Fallback to local checkbox.
Step 7 Choose the server groups you want to use to authenticate access to your network, from the Available Server Groups list and click > icon to move them to the Assigned Server Groups list.
Step 8 Click Save & Apply to Device.

As we are using local WLC Guest Users database to authenticate against, we will specify ‘local‘ Group type for ‘login‘.

AAA Config

2. Creating Parameter Maps

Procedure

1 Choose Configuration Security Web Auth.
2 On the Web Auth page, click Add.
3 In the Create Web Auth Parameter window that is displayed, enter a name for the parameter map.
4 In the Maximum HTTP Connections field, enter the maximum number of HTTP connections that you want to allow.
5 In the Init-State Timeout field, enter the time after which the init state timer should expire due to the user’s failure to enter valid credentials on the login page.
6 Choose the type of Web Auth parameter.
7 Click Apply to Device.
8 On the Web Auth page, click the name of the parameter map.
9 In the Edit WebAuth Parameter window that is displayed, choose the required Banner Type. If you choose Banner Text, enter the required banner text to be displayed. If you choose File Name, specify the path of the file from which the banner text has to be picked up.
10 Enter the virtual IP addresses as required.    
11 Set appropriate status of WebAuth Intercept HTTPSCaptive Bypass Portal, and Watch List Enable.
12 In the Watch List Expiry Timeout field, enter the time in seconds after which the watch list should time out.
13 Set appropriate status for Disable Success WindowDisable Logout Window, and Login Auth Bypass for FQDN.
14 Check the Sleeping Client Status checkbox to enable authentication of sleeping clients and then specify the Sleeping Client Timeout in minutes. The valid range is between 10 minutes and 43200 minutes.
15 Click the Advanced tab.
16 In the Redirect for log-in field, enter the name of the external server to send a login request.
17 In the Redirect On-Success field, enter the name of the external server to redirect after a successful login.
18 In the Redirect On-Failure field, enter the name of the external server to redirect after a login failure.
19 To configure external local web authentication, perform these tasks: Under Redirect to External Server in the Redirect Append for AP MAC Address field, enter the AP MAC address. In the Redirect Append for Client MAC Address field, enter the client MAC address. In the Redirect Append for WLAN SSID field, enter the WLAN SSID. In the Portal IPV4 Address field, enter the IPv4 address of the portal to send redirects. In the Portal IPV6 Address field, enter the IPv6 address of the portal to send redirects, if IPv6 address is used.
20 To configure customized local web authentication, perform these tasks: Under Customized Page, specify the following pages: Login Failed Page Login Page Logout Page Login Successful Page
21 Click Update & Apply.

Here you can choose a certificate that you want to present guests with when they hit the Captive Portal:

Normally, we would want to have a cert signed by a trusted public CA, but since we don’t have one we won’t select anything in the ‘Trustpoint’ field.

Another thing to point out here is that the Virtual IPv4 Address and Trustpoint certificate must be specified in the global Web Auth Parameter Map. Adding new map won’t even have that options.

Web Auth Config 2

For simplicity, we have just used ‘global‘ Web Auth Parameter Map.

3. Configuring the Web Authentication WLANs

Follow the procedure given below to configure WLAN using web auth security and map the authentication list and parameter map:

Procedure

  Command or Action Purpose
1 enable Example:
Device> enable
Enables privileged EXEC mode. Enter your password if prompted.
2 configure terminal Example:
Device# configure terminal
Enters global configuration mode.
3 wlan profile-name wlan-id ssid-name Example:
Device(config)# wlan mywlan 34 mywlan-ssid
Specifies the WLAN name and ID. profile-name is the WLAN name which can contain 32 alphanumeric characters. wlan-id is the wireless LAN identifier. The valid range is from 1 to 512. ssid-name is the SSID which can contain 32 alphanumeric characters.
4 no security wpa Example:
Device(config-wlan)# no security wpa
Disables the WPA security.
5 security web-auth {authentication-list authentication-list-name | parameter-map parameter-map-name} Example:
Device(config-wlan)# security web-auth authentication-list webauthlistlocal Device(config-wlan)# security web-auth parameter-map sample
Enables web authentication for WLAN.Here, authentication-list authentication-list-name : Sets the authentication list for IEEE 802.1x. parameter-map parameter-map-name : Configures the parameter map. Note  When security web-auth is enabled, you get to map the default authentication-list and global parameter-map . This is applicable for authentication-list and parameter-map that are not explicitly mentioned.
6 end Example:
Device(config)# end
Returns to privileged EXEC mode.
WLAN 1
WLAN Config 1

Layer 2 security we will select none here:

WLAN 2
WLAN Config 2

Foreign WLC policy to Anchor the SSID:

Foreign WLC SSID Policy

Anchor WLC policy for the SSID:

Anchor WLC SSID Policy

4. Configuring Pre-Auth Web Authentication ACL (GUI)

Before you begin

Ensure that you have configured an access control list (ACL) and a WLAN.

Procedure

Step 1 Choose Configuration Tags & Profiles WLANs.
Step 2 Click the name of the WLAN.
Step 3 In the Edit WLAN window, click the Security tab and then click the Layer3 tab.
Step 4 Click Show Advanced Settings.
Step 5 In the Preauthenticaion ACL section, choose the appropriate ACL to be mapped to the WLAN.
Step 6 Click Update & Apply to Device.
WLAN 3
L3 WLAN

We use the pre-auth ACL here that only allows guests access to DNS and DHCP while blocking access to the network until they have authenticated.

Pre-Auth ACL
Pre-Auth ACL

5. Configuring a Local Banner in Web Authentication Page (GUI)

Procedure

1 Choose Configuration > Security > Web Auth.
2In the Webauth Parameter Map tab, click the parameter map name. The Edit WebAuth Parameter window is displayed.
3In the General tab and choose the required Banner Type: If you choose Banner Text, enter the required banner text to be displayed. If you choose File Name, specify the path of the file from which the banner text has to be picked up.
4 Click Update & Apply.

6. Create Local WLC Guest Users Credentials

What was not covered in the Cisco guide was how to add a guest user. To create a new guest user:

Navigate to Configuration > Security > Guest User:

Guest User

Now we have everything configured and a guest user account set up we are ready to connect to the guest LWA WLAN – Woohoo!

iPhone Captive portal
iPhone Connected

Successfully connected client via LWA and anchored to the anchor WLC from the foreign WLC:

Foreign WLC Client

Successfully connected client via LWA and anchored on anchor WLC:

Anchor WLC Client

I was just using the default captive portal in my lab – if you or your customer would like to customise the captive portal here is the Cisco guide and a screenshot of where you can download the webauth bundle from Cisco for your C9800! The bundle is very dated and has a proper vintage feel to it but it’s certainly possible to adjust it so it looks OK 🙂

https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/115951-web-auth-wlc-guide-00.html#anc8
Web Auth Bundle

Hopefully, this post helps and saves you guys a bit of time if you need to configure a Local Web Authentication (LWA) WLAN in the future.

As always any feedback or comments are always welcome.

X

WN Podcast 021 – Cisco Catalyst 9800 – Built & Basics

Welcome to our new WiFi Ninjas Podcast episode!

Today, we kick of the Cisco Catalyst 9800 Podcast series, where we will cover some nitty & gritty stuff and share our real world deployment tips and experiences about those new, hot WLCs!

Let’s start with basics 🙂

  • What is C9800?
  • 9800-80 – 2RU Appliance
    • 80Gbps
    • 6000 APs
    • 64,000 Clients
    • 100Gbps Uplink Module Option!
  • 9800-40 – 1RU Appliance
    • 40Gbps
    • 2000 APs
    • 32,000 Clients
  • 9800-CL – Public/Private Cloud Virtual Controller
    • VMWare/KVM/AWS/GCP
    • 2Gbps of centrally-switched traffic
    • 6,000 APs
    • 64,000 Clients
    • Supported features that were not supported on the AireOS vWLC
      • SSO High Availability
      • Local or Flex Mode APs
      • Guest Anchoring
  • 9800-SW – Embedded 9300/9500 Switch Controller
    • 200 APs
    • 4,000 Clients
    • Indirect AP Support (APs can be connected to downstream switches)
  • 9800-L
    • 250 Aps
    • 5000 clients
    • Max throughput 5Gbps
    • Fixed uplinks 2 x 10gbps
  • Features
  • Built
    • VMware
      • Networking
        • 3 interfaces
        • HA considerations
        • Trunk
          • Accept Promiscuous Mode!
        • Central vs Flex
        • OOB
          • Not used
      • Kill the autoinstall, CLI (at least for us) is quicker
      • VLAN and SVI for mgmt
      • Set country code
      • Specify interface (mgmt SVI) to be used for wireless mgmt / AP join
      • Create a cert, validate its creation with sh wireless management trustpoint
      • Configure SSH
    • Physical
  • Challenges
    • Internal DHCP
      • ‘Reserved Only’ turned on by default
      • Configure DHCP Pool, starting IP, ending IP, lease time, gate, DNS, domain
      • Set DHCP Server IP address to be C9800 mgmt.
    • Prime bug
    • Compatibility with other Cisco infra
    • AAA attribute
  • Guest Flow
    • MAB CWA
    • Redirection ACL is not applied anywhere, it’s just referred to by ISE AuthZ Profile
    • Use WLAN guest ACL or have it referenced back by RADIUS

With tons of love x,

WiFi Ninjas

WN Podcast 020 – Airport WiFi Design with Jim Palmer – Part 2

Welcome to our new WiFi Ninjas Podcast episode! This is a continuation to an extremely interesting discussion about WiFi Airport Design with the best WiFi Airport Ninja in the world – Jim Palmer!

We’re discussing rate limiting effects on the network, security, authentication and more!

As mentioned on the show, here is the link for Jim’s cool video about rate limiting, that really is eyes opening! 🙂

Thanks for listening and enjoy! And comment. And shout if you like it or don’t like it or if you’d like us to talk about anything specific in future episodes!

With tons of love x,

WiFi Ninjas

WN Podcast 019 – Airport WiFi Design with Jim Palmer – Part 1

Welcome to our new WiFi Ninjas Podcast episode! Today we kick off a very interesting discussion around WiFi Airport Design with probably the best WiFi Airport specialist in the world – Jim Palmer!

  • A bit about Jim
    • CWNE #304
    • Ekahau Master 31
    • Runs a very busy American Airport
  • Wireless Physical Design
    • APs / Antennas Placement and types
    • RF considerations
  • Wireless Configuration
    • High Density approach
    • Roaming approach
  • Apps
    • Apps used by clients
    • Apps used by stuff
  • Project Lifecycle
    • Project Management of this thing
    • Predictive, pre-deployment and post deployment surveys etc.
    • Liasing with contractors and 3rd parties
    • Additional Testing?
  • LAN & WAN
    • Internet pipe
    • LAN structure
    • Throughput concerns
    • Cabling
    • Bottlenecks
  • Security
    • Onboarding
    • Auth
    • What infra used?
    • Encryption
    • Content filtering
    • Additional security features
  • Challenges
    • DFS?
    • Distance to the switch
    • PoE
    • Mounting restrictions
    • Obstructions, metal
    • Other networks, concessions
    • Interferers
  • Ninja Tips
  • Lessons learned

Thanks for listening and enjoy! Shout if you like it or don’t like it or if you’d like us to talk about anything specific in future episodes – we would be delighted to know your thoughts!

With tons of love x,

WiFi Ninjas

WN Podcast 018 – Protocol Analysis Talk with Peter MacKenzie – Part 2

Welcome to our new WiFi Ninjas Podcast episode! This a second part of our protocol analysis discussion with Jedi Grandmaster Peter MacKenzie!

A bit about Peter:

  • CWNE #33
  • Head of Technical Operations at MarQuest Limited
  • Graduated from the University of Hull with a 1st class honours degree
  • Co-author of the CWAP study guide published by Wiley
  • Member of the CWNE Board of Advisers

Do we still call you Peter? We see Jim Palmer is trying to find a new nickname for you 😀

  • Peter Packets?
  • Sir sniff a lot
  • The Duke of Frames
  • Peter McPacketface

A bit about MarQuest limited: – http://www.marquest.com/

  • MarQuest’s customer base includes large organisations across several sectors such as finance, education, government, retail and legal services. Operating from UK offices in Beverley (Yorkshire) and Oxford, we provide services and solutions to all national regions. Our international reputation for technical excellence has led to global provision of services and product supply to countries in mainland Europe, North America and APAC countries (including India and Australia).

Protocol Analysis

  • What is protocol analysis
  • Capturing tools
  • Capture location and duration
  • Capture on a single channel, multiple channel, 1SS, 2SS, etc.
  • Roaming in captures
  • Capture and display filters, colouring, columns, etc.
  • Decryption procedures
  • Other tools: WLAN scanners and discovery tools, captures visualisation and stats
  • Centralised captures and monitoring, alerting and forensic tools
  • Tshoot framework: Define, scale, causes, capture, analyse, observe, remedy, document

Spectrum Analysis

  • What is spectrum analysis
  • Spectrum analysis tools and views
  • Noise and SNR
  • Locate and identify WiFi and non-WiFi interferers based on their RF signature
  • Duty cycle vs spectrum utilisation
  • CCI vs ACI – understand impact of channel interference on WiFi performance
  • Identify 802.11 PHYs looking at FFT

PHY Layers and Technologies

  • PLCP and PMD sublayers
  • PHY technologies in captures: PHY headers, preambles, training fields, frame aggregation and data rates
  • Pseudo-headers: RSSI, rate, MCS, duration, channel, properties, noise, etc.
  • Protocol analysers limits: supported PHYs, SS, SGI, etc.

MAC Sublayer and Functions

  • Frame encapsulation and frame aggregation
  • MAC Frame Format
  • 802.11 Management Frame Formats
  • Data and QoS Data Frame Formats
  • 802.11 Control Frame Formats
  • BSS config: country code, rates, beacons, WMM, RSN, HT/VHT/HE, channels, SSID name, CRC

WLAN Medium Access

  • Distributed Coordination Function (DCF): carrier sense, energy detect, NAV, contention window, random backoff and spacing
  • Enhanced Distributed Channel Access (EDCA)
  • Wi-Fi Multimedia (WMM)
  • Analyse QoS configuration and operations: captures and end-to-end implementation

802.11 Frame Exchanges

  • Discovery, authentication, association
  • EAP and PSK auth
  • 4-way handshake
  • Roaming optimisations (802.11r, v and k) and considerations (sticky clients, excessive roaming)
  • ACK, RTS/CTS, QoS Data, Block ACK
  • Analyse HT/VHT/HE specific transmission methods
  • MIMO, TxBF, MU-MIMO, MRC
  • Frame aggregation (A-MSDU and A-MPDU)
  • Power Saving operations
  • Protection mechanisms
  • Band Steering 

Thanks for listening and enjoy! And comment. And shout if you like it or don’t like it or if you’d like us to talk about anything specific in future episodes!

With tons of love x,

WiFi Ninjas

WN Podcast 017 – Protocol Analysis Talk with Peter MacKenzie – Part 1

Welcome to our new WiFi Ninjas Podcast episode!

We are indeed very privileged to have a true WiFi Master on as our guest, Peter MacKenzie from MarQuest Limited, to discuss Wireless Protocol Analysis.

Today’s show is special to our hearts as we both think of Peter as our WiFi Sensei! ;]

A bit about Peter:

  • CWNE #33
  • Head of Technical Operations at MarQuest Limited
  • Graduated from the University of Hull with a 1st class honours degree
  • Co-author of the CWAP study guide published by Wiley
  • Member of the CWNE Board of Advisers

Do we still call you Peter? We see Jim Palmer is trying to find a new nickname for you!  

  • Peter Packets?
  • Sir sniff a lot
  • The Duke of Frames
  • Peter McPacketface

A bit about MarQuest limited: – http://www.marquest.com/

  • MarQuest’s customer base includes large organisations across several sectors such as finance, education, government, retail and legal services. Operating from UK offices in Beverley (Yorkshire) and Oxford, we provide services and solutions to all national regions. Our international reputation for technical excellence has led to global provision of services and product supply to countries in mainland Europe, North America and APAC countries (including India and Australia).

Protocol Analysis

  • What is protocol analysis
  • Capturing tools
  • Capture location and duration
  • Capture on a single channel, multiple channel, 1SS, 2SS, etc.
  • Roaming in captures
  • Capture and display filters, colouring, columns, etc.
  • Decryption procedures
  • Other tools: WLAN scanners and discovery tools, captures visualisation and stats
  • Centralised captures and monitoring, alerting and forensic tools
  • Tshoot framework: Define, scale, causes, capture, analyse, observe, remedy, document

Spectrum Analysis

  • What is spectrum analysis
  • Spectrum analysis tools and views
  • Noise and SNR
  • Locate and identify WiFi and non-WiFi interferers based on their RF signature
  • Duty cycle vs spectrum utilisation
  • CCI vs ACI – understand impact of channel interference on WiFi performance
  • Identify 802.11 PHYs looking at FFT

PHY Layers and Technologies

  • PLCP and PMD sublayers
  • PHY technologies in captures: PHY headers, preambles, training fields, frame aggregation and data rates
  • Pseudo-headers: RSSI, rate, MCS, duration, channel, properties, noise, etc.
  • Protocol analysers limits: supported PHYs, SS, SGI, etc.

MAC Sublayer and Functions

  • Frame encapsulation and frame aggregation
  • MAC Frame Format
  • 802.11 Management Frame Formats
  • Data and QoS Data Frame Formats
  • 802.11 Control Frame Formats
  • BSS config: country code, rates, beacons, WMM, RSN, HT/VHT/HE, channels, SSID name, CRC

WLAN Medium Access

  • Distributed Coordination Function (DCF): carrier sense, energy detect, NAV, contention window, random backoff and spacing
  • Enhanced Distributed Channel Access (EDCA)
  • Wi-Fi Multimedia (WMM)
  • Analyse QoS configuration and operations: captures and end-to-end implementation

802.11 Frame Exchanges

  • Discovery, authentication, association
  • EAP and PSK auth
  • 4-way handshake
  • Roaming optimisations (802.11r, v and k) and considerations (sticky clients, excessive roaming)
  • ACK, RTS/CTS, QoS Data, Block ACK
  • Analyse HT/VHT/HE specific transmission methods
  • MIMO, TxBF, MU-MIMO, MRC
  • Frame aggregation (A-MSDU and A-MPDU)
  • Power Saving operations
  • Protection mechanisms
  • Band Steering 

Thanks for listening and enjoy! And comment. And shout if you like it or don’t like it or if you’d like us to talk about anything specific in future episodes!

With tons of love x,

WiFi Ninjas

WN Podcast 016 – WiFi 6 In The Wild – Part 2 – Real World

Hello! Welcome to our new & juicy podcast episode 16! Today we are following up with a second part of the “WiFi 6 In the Wild” deep dive, where we’ll discuss real world of WiFi 6 operations and enhancements, trying to focus on what’s practical and important without sounding like marketing broken record ^_^

Today’s show notes will be quite short, as we’ve blogged about this topic here: https://wifininjas.net/index.php/2019/07/03/wn-blog-003-wifi-6-deep-dive-real-world-testing/

Enjoy! And comment. And shout if you like it or don’t like it or if you’d like us to talk about anything specific in future episodes!

With tons of love x,

WiFi Ninjas