DLP & Security March 2003 Month 2002 doc.: IEEE /xxxr0

Slides:



Advertisements
Similar presentations
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Advertisements

Wireless LAN Security Framework Backend AAA Infrastructure RADIUS, TACACS+, LDAP, Kerberos TLSLEAPTTLSPEAPMD5 VPN EAP PPP x EAP API.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Basic Wireless Concepts & Configuration Chapter.
doc.: IEEE /xxxr0 Mike Moreton
Mesh Networking Task Group Process
Proposed Document Structure
TGi Security Report May 18, 2001 May 2001
Issues of MAC Management Security
ESS Mesh Deployment Usage Model
Stephen McCann, Siemens Roke Manor
Stephen McCann, Siemens Roke Manor
WLAN Mesh in CAPWAP Architecture
Proposal for Task Group Deliverables May 9, 2004
Proposal for Task Group Deliverables May 9, 2004
Month 2002 doc.: IEEE /xxxr0 March 2008 Motion
European 6th Framework Update
Technical Requirements for IEEE ESS Mesh Networks
Outputs of the Usage Model Special Committee
Co-existence Beacon Element
Review of WAVE Scope and Objectives
Beacon Response Proposal
Overview of Cisco Per-client Extensions to MIB
Limiting Degrees of Freedom for Measurement Requests
Proposed Normative Text Changes Concerning QoS IBSS
Month 2002 doc.: IEEE /xxxr0 September 2004 Motion
TGi Preliminary Agenda
TGi Final Report for the November 2003 Session
Stephen McCann, Siemens Roke Manor
TGi Final Report for the September 2002 Session
TGi Final Report for the January 2003 Session
WLAN Mesh in CAPWAP Architecture
Stephen McCann, Siemens Roke Manor
WAPI Status Dave Halasz, Cisco Systems Dennis Eaton, GlobeSpanVirata
IEEE Liaison to CableLabs
Stephen McCann, Siemens Roke Manor
ESS Mesh Deployment Usage Model
Free the APs Button Images
Tentative Association May 12, 2004
NTT Access Network Service Systems Laboratories
TGi Preliminary Agenda
TGi Final Report for the January 2004 Session
TGi Final Report for the March 2004 Session
TGi Preliminary Agenda
TGi Security Agenda and Status
Useful Radio Statistics
Motion to a Start High Throughput Study Group
TGi Final Report for the March 2003 Session
Resolution to Comment 497, TGe D5.0
Motivation for Vendor Specific Request Element
Interworking Update II
IETF-IEEE Meeting Summary
Tge Request to ANA Srinivas Kandala Sharp Labs of America, Inc.
Tge draft ballot information
Stephen McCann, Siemens Roke Manor
Stephen McCann, Siemens Roke Manor
TGi Preliminary Agenda
TGi Final Report for the May 2004 Session
Proposed Normative Text Changes Concerning Distributed Admissions
TGp Motions for Tuesday
Pre-Authentication with 802.1X
NTT Access Network Service Systems Laboratories
Srinivas Kandala Sharp Labs
TGi Final Report for the September 2003 Session
Mesh Networking Task Group Process
On ESS Mesh Device Discovery
Secretaries Guidelines Team Report for the March 2004 Plenary Session
SG Operating Rules Anybody can vote, present, and make motions
Resolution to Comment 497, TGe D5.0
Presentation transcript:

DLP & Security March 2003 Month 2002 doc.: IEEE 802.11-02/xxxr0 Dave Halasz, Cisco Systems, Inc. John Doe, His Company

DLP is IBSS while in Infrastructure Month 2002 doc.: IEEE 802.11-02/xxxr0 March 2003 DLP is IBSS while in Infrastructure DLP allows IBSS while in infrastructure. Security can be solved by performing two distinct authentications. The first is in infrastructure and the second is in IBSS. This results in no further work required. Dave Halasz, Cisco Systems, Inc. John Doe, His Company

Clients initially authenticate in infrastructure March 2003 Clients initially authenticate in infrastructure Client A Client B Dave Halasz, Cisco Systems, Inc.

DLP Handshake March 2003 Client A Client B Dave Halasz, Cisco Systems, Inc.

Clients authenticate in IBSS March 2003 Clients authenticate in IBSS Client A Client B Dave Halasz, Cisco Systems, Inc.

Direct traffic allowed to flow March 2003 Direct traffic allowed to flow Data traffic Client A Client B Dave Halasz, Cisco Systems, Inc.

What is the intent of DLP? March 2003 What is the intent of DLP? A) An IBSS network can be extended to infrastructure B) An infrastructure network can be extended to include IBSS C) Both of the above This solution does not make any assumption of the intent of DLP. This solution available without TGe & TGi coordination. Dave Halasz, Cisco Systems, Inc.