Transparent Wireless Authentication For New Wireless Network

Slides:



Advertisements
Similar presentations
AD User Import From SIMS.NET
Advertisements

SYNAPSE I.S. Ticket Sales & Management. SYNAPSE I.S. What is Olympia ? Olympia is NOT just another internet sales service. Olympia is a tool for the ticketing.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
1 Week #1 Objectives Review clients, servers, and Windows network models Differentiate among the editions of Server 2008 Discuss the new Windows Server.
Novell from Home Net Storage. Novell access via NetStorage 1-Web Interface Connect to your shared drive through your web browser Windows, Mac or Linux.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
© 2009 VMware Inc. All rights reserved VMware Updates Orlando VMware User Group – April 2011 Ryan Johnson VMware, Inc. Technical Account Manager Professional.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Advanced Web 2012 Lecture 2 Sean Costain How the Web Works - Refresh Sean Costain 2012 The web is a matrix of servers that handle client requests.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Feeds Computer Applications to Medicine NSF REU at University of Virginia July 27, 2006 Paul Lee.
Printer Installation Ben Wu A&S IT 09/18/2007. Outline  Preparation  Local Printer Installation  Network Printer Installation  Printer Sharing  Other.
1 SAMBA. 2 Module - SAMBA ♦ Overview The presence of diverse machines in the network environment is natural. So their interoperability is critical. This.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
© Paradigm Publishing Inc. 4-1 Chapter 4 System Software.
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
Guide to MCSE , Second Edition, Enhanced1 Windows XP Network Overview Most versatile Windows operating system Supports local area network (LAN) connections.
© 2005,2006 NeoAccel Inc. Partners Presentation SSL VPN-Plus 2.0 Quick Start Guide.
Module 4: Add Client Computers and Devices to the Network.
Chapter 4 System Software.
Design for Senior Project December 05, 2007 Raytheon_Design_Review.ppt 1 of 19 Raytheon – Google Earth Roy Daniels, Marc Maciel, Rifina Pierre Department.
Hands-On Virtual Computing
Chapter 9: Novell NetWare
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
SUSE Linux Enterprise Desktop Administration Chapter 12 Administer Printing.
NETWORK FILE ACCESS SECURITY Daniel Mattingly EKU, Dept. of Technology, CEN/CET.
THE CVR NETWORK. The CVR Local Area Network (LAN)  The purpose of the network is to enhance productivity, provide users with access to resources, and.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Module 8: Configuring Network Access Protection
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
A Brief Documentation.  Provides basic information about connection, server, and client.
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
Chapter 10: Rights, User, and Group Administration.
1350 TAC Training © 2000, Cisco Systems, Inc. Wireless Lab.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
Experiment Management System CSE 423 Aaron Kloc Jordan Harstad Robert Sorensen Robert Trevino Nicolas Tjioe Status Report Presentation Industry Mentor:
MOE – Experience 1.What do you get 2.It just works 3.Same look and feel across the university 4.Your documents and desktop available.
Introduction TO Network Administration
MT. CARMEL BAPTIST CHURCH NETWORK OVERHAUL L. Kennerly Newlin Networking and Database.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
1 Overview of Microsoft Windows 2000 Multipurpose OS Reduces total cost of ownership (TCO)
Web-Based Inventory Database Application By: Gar Seigla.
HNC COMPUTING - Network Concepts 1 Network Concepts Network Concepts Network Operating Systems Network Operating Systems.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Last updated: 28 April, 2006 Tomas B. Krag ItrainOnline MMTK: 1 Linux based Infrastructure Developed by: Tomas B. Krag, wire.less.dk.
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Palo Alto Networks Certified Network Security Engineer
NAT、DHCP、Firewall、FTP、Proxy
Top 5 Open Source Firewall Software for Linux User
Introduction to Computers
Printer Admin Print Job Manager
Unit 27: Network Operating Systems
Outline Overview Development Tools
Network Models, Hardware, Protocols and number systems
Distributed Systems Bina Ramamurthy 12/2/2018 B.Ramamurthy.
Networking and Security
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Windows Server Administration Fundamentals
Chapter 10: Advanced Cisco Adaptive Security Appliance
In-house Developed Library Solutions
Ubuntu MYSQL Database Server
Presentation transcript:

Transparent Wireless Authentication For New Wireless Network By: Timothy Krebs Friday, September 14, 2018

Overview Quick Project Review Description and Intended Use Deliverables Proof of Design Conclusion Questions

Quick Project Review Wireless Solution for Cheviot United Methodist Church Wireless Gateway Linux Solution Authentication Gateway Two user levels No Client Setup Wireless AP will be located at church in optimized location

Description & Intended Use New Wireless Network Access to network by user authentication. Is a secured wireless network. Simple to Use Intended Uses The Pastor now has Internet & Network wide Access from home Secretary’s Laptop now has access to print and transfer file Easy Internet access for people giving presentations or requiring the Internet for pitches. Network access and expandability for future needs

Deliverables Overall: Pastor: Secretary: A working wireless gateway An easy connection for XP/SP2 users The gateway is able to handle two types of users. The church wireless clients are secure Pastor: The pastor has full church network access from home The pastor is able to remote desktop to his work machine from home Is secure from rogue wireless connections. Secretary: Has full access to the network & Internet Is able to print to both printers.

New User Associating with Access Point

NoCat Login

Successful Login

Owner Connecting to System

Guest User Connecting to System

SSL Packet Capture

Packet Capture of a Login In Process

IP Tables

MySQL Member Table

Administrative Interface Add User

Administrative Interface Edit or Delete User

Clip of Adding User

User Documentation Logging in to Network Add Remove Users Utilizing Remote Desktop

Conclusion Security Easy of Use Documentation

Questions?

Infrastructure Changes

IP Tables Before Logon

Proof of Design Quick Movie of Login Taking Place Screen Shots of NoCat Interface Screen Shots of Packet Captures Screen Shot of NoCat config file Screen Shots of MySQL Database Screen Shots of Administration Interface Quick Movie of User Administration Samples of User Documentation Pictures of Hardware

NoCat Config Files

System Testing Test Security of Church Wireless Machines Through Packet Sniffing on Linux Gateway Verify Required Ports Are Able To Be Accessed or Blocked Verification Remote PCs Can Reach Required Resources Verification of System Harding on Wireless Side

Packet Capture of Redirect Process

Unsuccessful Login

Additional Design Protocols Pastor Abilities Secretary Abilities Administrator Abilities