Guest Wireless Service Overview Andrew Rader November, 2013.

Slides:



Advertisements
Similar presentations
EBooks and Audiobooks. This class will give you an overview of eBooks and electronic Audiobooks available from the Library. We will also explain the basic.
Advertisements

Who was that masked man? Computer Registration. Node Registration Facts You must register your computer to use the network. There are two types of registration:
Members Only & Login Modules Members Only works with the Login module to provide password protection to Web pages and files. Login Groups may be created.
RedRover Wireless Program Update for TSP Forum. RedRover Topics for the Forum The Basics of RedRover RedRover and Security Recent RedRover Enhancements.
How to Register for ESRI’s GIS Online Course Yong Choi School of Business CSU, Bakersfield.
OK.gov’s Online Registration System. The Online Registration System Allows CMS Users to: - Gather custom data from registrants - Restrict the number of.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Introduction: This VCSS training session has been developed to provide : I.A quick overview of VCSS II.A walk through of the main VCSS features III.Solutions.
CPS Acceptable Use Policy Day 2 – Technology Session.
Portable Computer Registration Jean-Michel Jouanigot et al. Presentation to FOCUS on 2 October 2003.
Security at NCAR David Mitchell February 20th, 2007.
Protecting Students on the School Computer Network Enfield High School.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
Doc.: IEEE /0058r0 Submission January 2008 Harry Worstell, AT&TSlide 1 Opening Network Information, Attendance and Documentation for January 2008.
At the Log in page enter your college provided username and password then click submit to login to Owl Link.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Welcome and Logistics Joel Butler Fermilab. Outline Welcome from organizers Welcome from Fermilab Logistics.
Activating roaming access on Wiley InterScience™
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
Getting Connected to NGS while on the Road…
Methods of Securing Data in Windows Networks
Hotspot Shield Protect Your Online Identity
WikID installation/training
Common Methods Used to Commit Computer Crimes
How to Access and Redeem Cisco Certification Exam Discount Vouchers Step-by-Step Guide August 2013.
CERN Service Management
3.12 Kaspersky Antivirus Workstation 6.0 Installation
CERN Service Management
Security of a Local Area Network
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
MCAFEE.COM/ACTIVATE - TO GET MORE INFORMATION ABOUT DOWNLOAD, INSTALL AND ACTIVATE THE MCAFEE ANTIVIRUS SOFTWARE, VISIT ON USING.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
MCAFEE.COM/ACTIVATE - TO GET MORE INFORMATION ABOUT DOWNLOAD, INSTALL AND ACTIVATE THE MCAFEE ANTIVIRUS SOFTWARE, VISIT ON USING.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
MCAFEE.COM/ACTIVATE - TO GET MORE INFORMATION ABOUT DOWNLOAD, INSTALL AND ACTIVATE THE MCAFEE ANTIVIRUS SOFTWARE, VISIT ON USING.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
MCAFEE.COM/ACTIVATE - TO GET MORE INFORMATION ABOUT DOWNLOAD, INSTALL AND ACTIVATE THE MCAFEE ANTIVIRUS SOFTWARE, VISIT ON USING.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
MCAFEE.COM/ACTIVATE - TO GET MORE INFORMATION ABOUT DOWNLOAD, INSTALL AND ACTIVATE THE MCAFEE ANTIVIRUS SOFTWARE, VISIT ON USING.
Exercise ?: TOR.
Using Family Connection
Join In Be Secure Presentation
LGC Website, Software updates, Documentation, and Videos
FAFSA on the Web Preview Presentation
Configuring Internet-related services
Getting Connected to NGS while on the Road…
Part 3.
Connecting Remotely Winter 2014.
Unemployment Insurance Agency Michigan Web Account Manager
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
EBSCOhost Advanced Search Guided Style
Designing IIS Security (IIS – Internet Information Service)
MyLion Registration Website | Mobile device

Presentation transcript:

Guest Wireless Service Overview Andrew Rader November, 2013

Topics Service goals Registration process FAQ Security goals Traffic flow Network topology Q&A

Service Goals Provide laboratory guests and visitors a simple way to gain access to the wireless network while on campus for limited use for things such as web browsing, and basic communications needs.

Service Goals Provide laboratory guests and visitors a simple way to gain access to the wireless network while on campus for limited use for things such as web browsing, and basic communications needs.

Service Goals Provide laboratory guests and visitors a simple way to gain access to the wireless network while on campus for limited use for things such as web browsing, and basic communications needs.

Service Goals Provide laboratory guests and visitors a simple way to gain access to the wireless network while on campus for limited use for things such as web browsing, and basic communications needs.

Registration Process Connect to the wireless network “ guest ”. Open a web browser to be redirected to the guest registration page. Provide your contact information. Restart your browser.

Guest Wireless FAQ Goto and search the knowledge base for “guest network” Knowledge base article KB CDDocDB CS-doc-5206 Link to FAQ is on the guest registration web pages

What is the guest wireless network? The guest wireless network provides laboratory guests and visitors access to the wireless network while on campus for limited use for things such as web browsing, and basic communications needs.

How do I access the guest wireless network? To use the guest wireless network, select the “guest” SSID from a wireless device. Once connected to the guest network open up a web browser. You will then be redirected to the guest registration form. Fill out your contact information and agree to the terms of service.

How long does guest access last? You will be redirected to the guest registration page after registration expires at midnight each day. On subsequent days, complete the registration form again and confirm your agreement to the terms of service. You will then be granted network access again until midnight. There is no limit to the number of days that you can use the guest wireless network.

Is there a limit to the number of devices I can use on the guest wireless network? No. There is no limit to the number of devices you can use on the guest wireless network.

Does the guest wireless network require pre- authorization, a user account or an encryption key? No preauthorization, user account or encryption keys are required to use the guest wireless network. Upon connecting to the guest wireless network, SSID “guest”, you will be prompted to enter your contact information and agree to the terms of service.

Why are some web sites blocked on the guest wireless network? Access to web sites that meet certain criteria are blocked to help prevent virus infections and to assist users in following the Fermilab Policy on Computing.

Why are some applications (such as peer-to-peer file sharing) blocked on the guest wireless network? The network is intended for limited use to provide web browsing, and basic communications needs for guests and visitors while they are on campus. It is not intended to provide other Internet-based services such as transfers of audio files, video files and large datasets.

I work at Fermilab. Should I use the guest wireless network for any of my devices? No. Please register all devices, including personal property, and use the main “fgz” wireless network. To permanently register your device, visit

There is a web site or an application that is blocked on the guest wireless network that I believe should be allowed. Who should I contact? First, please remember that the network is intended for limited use by campus guests and visitors only. If you are unable to perform your work using the network, you should consider using the main “fgz” wireless network from a registered machine. Otherwise, you can direct concerns regarding the security policy of the guest wireless network to the service desk at

Can I use the Fermilab Virtual Private Network Service from the guest wireless network to access internal Fermilab resources? Yes, but you do not need to. Since you have a Fermilab VPN account, you do not need to use the guest network. Instead please register your device and use the main “fgz” wireless network. To permanently register your device, visit

What is the IP address range of the guest wireless network? The IP address range is outside of the normal Fermilab IP block. This address range is subject to change, so please do not attempt to hard code it into any device or application.

What are the risks with using the guest wireless network? Clients who use the guest wireless network run similar risks as when using other wireless networks such as those at restaurants, hotels, and airports. This network is segmented from the other Fermilab networks. As such, lab-wide security protections, such as managed anti-virus services, are not provided. We encourage guests using this network to ensure that their anti-virus protection, operating systems and other software are up to date. Guests who utilize this network do so at their own risk.

Security Goals Segregate guest traffic from production traffic Protect production network from machines that are not well administered Enforce a different security policy for guest traffic Limit the number of security incidents incurred by guests

Q & A