Cardiff Location Aware Activities, Problems, Aims 3 rd September 08 Anthony Cope Mike Jorgenson.

Slides:



Advertisements
Similar presentations
AARP Tax-Aide Sonoma/Napa District Bill Dornbush, TC Guide to Printer Sharing.
Advertisements

Application Guide For Mesh AP – MAP-3120
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
© Tally Solutions Pvt. Ltd. All Rights Reserved 1 Shoper 9 POS Single Store Implementation October 2009.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
“All your layer are belong to us” Rogue APs, DHCP/DNS Servers, and Fake Service Traps.
Network Design and Implementation
VISEUM UK PRESENTATION MAJOR SECURITY PROJECT ON TIME COMPLETION MANAGEMENT.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
Wireless Security. Objective: Understand the benefits of a wireless network Understand security risks Examples of vulnerabilities Methods to protect your.
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Technical Training: DIR-615
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Wireless Networking 102.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
BASIC IPAD SETUP ONLINE APPLE IPAD MANUAL. BUTTONS.
Web Development Process Description
Network Design A Step by Step Process. Design with Change in Mind Building the network is just the beginning Growing the network for larger numbers of.
CWNA Guide to Wireless LANs, Second Edition 1 Planning for a Wireless Network “If you fail to plan, then you plan to fail” Some steps involved in planning.
January 2005Rudolf, Kwak, Worstell1 VoIP in WLANs and E911 support Marian Rudolf, Joe Kwak, InterDigital; Harry Worstell, AT&T doc: IEEE /0014r0.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Steps To Set Up Your Home Wireless Network You can use a wireless network to share Internet access, files, printers, and more. Or you can use it to surf.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Presented by: Dr. Munam Ali Shah
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
HOW I SURVIVED AIST2330 AND LEARNED TO LOVE SERVER ADMIN Fall 2015 Edition.
9: Troubleshooting Your Network
ONETOUCH™ AT NETWORK ASSISTANT NEWS BRIEFING PRESENTATION (EMBARGOED UNTIL 6/6/12)
August 27, 2003 Evaluation of WiNc Manager A Wireless Network Management Software from Cirond Technologies Inc. by Kassim Olawale Radio Science Laboratory.
Chapter 12 The Network Development Life Cycle
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Role Of Network IDS in Network Perimeter Defense.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
Location Awareness Lancaster Keith Mitchell Computing Department Paul Astle Information Systems Services (ISS)
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
Networks and Security Great Demo
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
L5 Computing Team Project Final Presentation Guidelines.
WISECURE Exam CCNP Wireless WISECURE Exam
Presentation by: Rebecca Chambers WebDuck Designs
Dumps PDF Designing Cisco Wireless Enterprise Networks Exam dumps.html Download Complete PDF File:
Sales Guide - D-Link AP Array WRPD , Aug.2011 D-Link Confidential.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Instructor Materials Chapter 9: Testing and Troubleshooting
Footprinting (definition 1)
Wireless Hacking.
Footprinting and Scanning
1. Press the Power button or switch to flip on the printer, if it is turn off. 2. From the Home display screen on the product control panel, click the.
Installing the HP LaserJet Pro 500 color MFP M570 printer software in Windows on a Wireless Network & Wired Network.
Get Dumps PDF Dumps Study Material Dumps4download
Wireless Security.
Intro to Ethical Hacking
Enhancements to Mesh Discovery
VISEUM UK PRESENTATION
POP: Building Automation Around Secure Server Deployment
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
Tax Card Online for students
ESA's TEC Directorate Asset Management - Present and Future
LM 5. Wireless Network Security
What’s New In WatchGuard Wi-Fi Cloud v8.6
How to install and manage exchange server 2010 OP Saklani.
Presentation transcript:

Cardiff Location Aware Activities, Problems, Aims 3 rd September 08 Anthony Cope Mike Jorgenson

Current – Progress so far Section A - Currently Drafting Documents A1 and A2 Section B - Pilot work in the Information Services Building Work concentrating on LA200 not Ringmaster which also has LA capabilities Received training on the LA200 Increased the density of Access points in building 39 PP Configured location appliance with maps and “Locales” Multiple attempts and failures to correctly profile and fingerprint. Trapeze Engineer Scheduled to visit next week Started to purchase equipment last couple of weeks.

Current – Tools Recent Purchases Phone Nokia N95’s, E71, HTC Touch Diamond All GPS. Eakahau Site Survey for fine tuning Ordered Trapeze RF Tags. Nobody wants to sell us any other type. Bluetooth GPS Dongles Software Development Work is progressing albeit slow due to other commitments – demo to follow.

Current - Problems Practical experiences A1,A2 Regarding deliverables A1 and A2. Problems with getting practical experience of LA have slowed us down a bit but the issues experienced are also useful Practical experiences B1,B2,B3 Progress hampered by inability to correctly calibrate the LA200 Fingerprints

Current - Problems Calibrating and Finger printing All access points need to be on the same channel for calibration. This can be service affecting with interference for users so needs to be done out of hours. Problems having to set all access points to single channel and turn off power management to start with. Very time consuming. Also need to turn off countermeasures as the AP may spend time attacking rogue AP’s and channel scanning for other AP Quick lesson learnt is that although we entered the Wired Mac address of each access point a problem was quickly highlighted that the SSIDs were moving around as each access point have up to 64 MAC addresses for multiple SSIDs. Calibration is set by IP address even though you also need Mac to pinpoint an stop the APs moving on maps as objects. They need to be set as AP’s So IP address of AP cannot ever change without having to recalibrate. Another odd thing in the set up process is having to setup the RF snooping on ringmaster then setup locales on the Dashboard application, finally setuping calibration, drawing locales on the web based users pages. Three Different interfaces! Cutting and pasting each SSID MAC address was also very time consuming.

Current - Problems The need to double and triple check! Check Locals are mapped to correct name of locale Make sure AP’s are mapped to correct local. Make sure all the AP’s are on the correct same channel when calibrating. Make sure the right AP – IP address is placed on the plan in correct place.

Get calibration issues corrected Survey with Eakahau IS building to fine tune accuracy Test WiFi - laptops, GPS Dongles and GPS phones, contrast and compare Speed Accuracy Spoofing Location Location Awareness Future Activities

Investigate the affects of the RF snoop on Location Awareness of : Countermeasures? Active Scanning Mode? Passive Scanning Mode? Channel Scope (Regulatory or Operational)? Location Awareness Future Activities

Stages B1 Look at LA200 API’s to provide information and hooking into a firewall Alternative look at hooking in to Trapeze ACLs to deny access Selective deny access Investigate any other “Off the shelf” equipment that may prove useful for Context security e.g. Newbury Networks RF Firewall, WiFi Watchdog, PanOS etc.

Stages B2 Investigate LA200 for hooking API’s into google earth Push or pull content? May look to purchase Google Earth pro licence

Stages B3 Get hold of WLAN tags for assets tagging. Waiting delivery! Investigate possibilities of location spoofing and how if can be achieved. Investigate other “Off the shelf” equipment and software. Chirping vs Exciters

Google Earth Network Management Demonstration LA200 Interface Availability of Access Points Wired location tracking Wired location awareness