Morgan County Schools And Extreme Networks

Slides:



Advertisements
Similar presentations
SMC2804WBRP-G Barricade™ g 2.4GHz 54Mbps Wireless Cable/DSL Broadband Router with USB Print Server SMC2804WBRP-G
Advertisements

Filtering and Security By Mohammad Shanehsaz June 2004.
Page 1 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Part of the BRE Trust Protecting People, Property and the Planet Smart Buildings and Security: Developing a unified approach Will Lloyd BRE Global Limited,
Enterprise Single Sign On Identity management for web applications.
Wireless Network Security Lab Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Securing a Wireless Network
“A New Level” Redesigning the Network and Rebuilding Two New Computer Labs for Harambee Ministries By Josh Kammerer.
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter Network Security Architecture.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Story of Wi-Fi Note: Customer is facing any issue (No Browsing OR Authentication) and connected via Wi-Fi and unable to open modem page.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Isolating and Protecting Devices on the Network A database-driven methodology Tom Zeller June 2008.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
CS101 Home Network Basics.
Wireless Access Point Product Overview
Networking and Sharing
The new starbucks Jill E. Farris.
Instructor Materials Chapter 6 Building a Home Network
Maintaining a Secure and Usable Wireless Network
Wireless Technologies
Wireless Protocols WEP, WPA & WPA2.
GlocalMe U2 Operation.
Network Infrastructure
Methods of Securing LANs
Wireless Access Point Product Overview
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
WEP & WPA Mandy Kershishnik.
Securing A Wireless Network
Wireless Network Security
A Wireless LAN Security Protocol
Wireless Local Area Network (WLAN)
Network Neighborhood? Who’s on Your Wi-Fi?
Chapter 11: It’s a Network
Chapter 4: Wireless LANs
Enterprise Launch Cloud Networking Connected Experience
Complete Exam Dumps - Pass In 24 Hours - Dumps4Download
Wireless Fidelity (15881A0515).
CCNA 1 v3 JEOPARDY Module 3 CCNA1 v3 Module 3 S Dow.
Chapter 12 Communications Security & Countermeasures
On and Off Premise Secure Access
CS101 Home Network Basics.
Digital Pacman: Firewall Edition
Wireless LAN Security 4.3 Wireless LAN Security.
IEEE i Dohwan Kim.
ENH500 WDS Bridge PtoP Link for IP Camera
Operating Systems Security
CS101 Home Network Basics.
Configure a Wireless Router
Configure a Wireless Router
Network Security Mark Creighton GBA 576 6/4/2019.
CS101 Home Network Basics.
Global One Communications
Presentation transcript:

Morgan County Schools And Extreme Networks Wireless Security Changes October 11, 2016

Over the past few years we have added great technologies to our infrastructure: better routers better switches better network access control security cameras and door access better content filters better data cabling better wireless infrastructure and more wireless devices

All these things allowed us to add more devices to our network and provided for better user and classroom experiences. BUT… Tell the story of lawn chair guy

We had very little visibility and control in the area of wireless devices on our network.

We needed to find a way to monitor and control what was really happening in our network. We had to get a handle on who, what, when and where.

Personal devices were appearing all over the place and we had little visibility and control. Right now we are using several wireless security models: Pre-Shared Key - Wi-Fi Protected Access  (WPA-PSK). Requires a pass phrase (password) to be entered. Of course, everyone has this password. 802.1x authentication has provided a method to protect the network behind the access point from intruders as well as provide for dynamic keys and strengthen WLAN encryption. MAC-based authentication (Guest Registration): Forces all traffic through a authentication and multi-level authorization portal.

Pre-Shared Key: Wi-Fi Protected Access  (WPA-PSK) will be phased out over the next three months. The other two authentications will remain with Guest Registration being our focus. There will no longer be a need for passwords. Staff can register with their computer account credentials.

The Problem With Pre-Shared Key Identity and Access The Problem With Pre-Shared Key We could see the device and the location but we could not see who held the device.

The Benefit of Better Security Models Identity and Access The Benefit of Better Security Models Now we can see the device, the location, and the registered user/owner of the device.

Identity and Access

Port View