TF Mobility Group 22nd September 20031 A comparison of each national solution was made against Del C – “requirements”, the following solutions were assessed.

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Secure Internet Solutions Geoff Huston Chief Scientist, Internet Telstra.
Joining eduroam Wireless Roaming for Education and Research.
Encrypting Wireless Data with VPN Techniques
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Terena Mobility Taskforce update Klaas Wierenga SURFnet.
Licia Florio EUNIS05, Manchester 1 Eduroam EUNIS Conference, June Licia Florio.
URP Usage Scenarios for NAS Yoshihiro Ohba August 2001 Toshiba America Research, Inc.
Omniran GPP Trusted WLAN Access to EPC Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
10 October 2003 Internet2 members meeting 1 An update on the work of JANET Wireless Advisory Group & The Terena Mobility Taskforce James Sankar UKERNA.
Module 5: Configuring Access for Remote Clients and Networks.
The Nomadic Network Providing Secure, Scalable and Manageable Roaming, Remote and Wireless Data Services Josh Howlett & Nick Skelton Information Services,
5/25/2015 AEB/Yleisesittely Roaming network access using Shibboleth in University of Helsinki Fall 2004 Internet2 Member Meeting 29th of September, 2004.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Network Access and 802.1X Klaas Wierenga SURFnet
High-quality Internet for higher education and research Federated network access with Klaas Wierenga SURFnet Ljubljana, April.
EduRoam: movilidad por Europa... y España Toledo, 29 de octubre de 2004
WLAN Roaming for the European Scientific Community: Lessons Learned , June 9 th, 2004 Carsten Bormann Niels Pollem reporting on the work of TERENA.
Deliverable H: the interoperability testbed design Klaas Wierenga SURFnet.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Wireless networking Roger Treweek Oxford University Computing Services.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
802.1x EAP Authentication Protocols
Master Thesis Proposal By Nirmala Bulusu Advisor – Dr. Edward Chow Implementation of Protected Extensible Protocol (PEAP) – An IEEE 802.1x wireless LAN.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
What about 802.1X? An overview of possibilities for safe access to fixed and wireless networks Amsterdam, October Erik Dobbelsteijn.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Windows 2003 and 802.1x Secure Wireless Deployments.
 2013, Infotecs ViPNet Technology Advantages.  2013, Infotecs GmbH In today’s market, along with the ViPNet technology, there are many other technologies.
EduRoam Australia Project Experience in location independent wireless networking with international collaboration with TERENA EduRoam Project 19 th APAN.
AARNet Copyright 2010 Network Operations The eduroam project group
Chapter 7: Using Windows Servers to Share Information.
WIRELESS LAN SECURITY Using
Altai Certification Training Backend Network Planning
Eduroam Louis Twomey HEAnet Library Services Day 20 th November 2014.
Education roaming Secure Wireless Service for Research and Education.
70-411: Administering Windows Server 2012
High-quality Internet for higher education and research Paul Dekkers April 4th, Turkey.
Michal Procházka, Jan Oppolzer CESNET.
A Practical Guide for Joining EduRoam EuroCAMP Torino A Practical Guide for Joining EduRoam 4 March 2005 Version 1.6.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Wireless Authentication & 802.1X By Gareth Ayres.
802.1X in SURFnet 22 May 2003.
TERENA TF-Mobility: Roaming for WLANs Tim Chown University of Southampton TF-Mobility WG & UKERNA Wireless Advisory Group.
Integrating and Troubleshooting Citrix Access Gateway.
EDUROAM Michael Helm ESnet/LBL 26 Mar EduroamTAGPMA 27 Mar What Is Eduroam? The Roaming Scholar vs the Restricted Wireless Network –I am in.
輔大資工所 在職研一 報告人:林煥銘 學號: Public Access Mobility LAN: Extending The Wireless Internet into The LAN Environment Jun Li, Stephen B. Weinstein, Junbiao.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Security for (Wireless) LANs 802.1X workshop 30 & 31 March 2004 Amsterdam.
Santhosh Rajathayalan ( ) Senthil Kumar Sevugan ( )
Workshop roaming services: eduroam / govroam
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Authentication and Authorisation in eduroam Klaas Wierenga, AA Workshop TNC Lyngby, 20th May 2007.
6 June 2004TF-Mobility meeting 6 June TF-Mobility meeting Agenda TF-Mobility Meeting, June Welcome and Update on TF-Mobility to date Discussion.
Integrating multiple wireless access control schemes at NTUA Spiros Papageorgiou, Christos Siaterlis NOC/NTUA.
19 May 2003 © The JNT Association Terena Technical Advisory Council Terena Mobility Task Force
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
Copyright ©2016 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training What’s New in Fireware v
Chapter 7: Using Windows Servers
Microsoft Windows NT 4.0 Authentication Protocols
Goals Introduce the Windows Server 2003 family of operating systems
Presentation transcript:

TF Mobility Group 22nd September A comparison of each national solution was made against Del C – “requirements”, the following solutions were assessed 802.1x based authentication solution. VPN based authentication solution. Variation to VPN based authentication solution with client certificates. Web-based redirect authentication solution. Roamnode (PPPoE) authentication solution. Deliverable G

TF Mobility Group 22nd September x based authentication solution –Layer 2 solution, standard is still maturing, some cheaper AP that support 802.1x are appearing on the market. –Uses EAP or EAPOL. –Uses RADIUS for authentication, authorisation and accounting. –Can be scaled using a RADIUS Proxy Hierarchy to enable the visitor to authenticate at their home institution. –Admin overhead involves loading 802.1x client on mobile devices, RADIUS configurations and VLAN assignment. –Non 802.1x client support offered via website support and may look into general web-redirect authentication system. –EAP-TLS and TTLS security support with WPA, TKIP, i extensions). –Accountability via RADIUS logging and user reports to helpdesk (e.g. stolen mobile device). Deliverable G

TF Mobility Group 22nd September VPN based authentication solution –Layer 3 solution, mature standard. –Can be scaled using an overlay network of assigned address space for VPN Gateways or control lists of VPN Gateways. –Admin overhead in loading VPN client on mobile devices, configuration of VPN gateways, access lists & VLANs. –Strong security via encrypted tunnels for each connection. –Accountability via the user’s home institution as the user authenticates and gets their IP address from there, also reports to the helpdesk e.g. stolen mobile device. VPN based authentication solution with client certificates –Admin overhead required to install client certificates on mobile devices and maintain / manage a PKI. Deliverable G

TF Mobility Group 22nd September Web based redirect authentication solution –Requires a http or https supported web browser, no additional client software is likely to be required –Uses RADIUS for authentication, authorisation and accounting. –Can be scaled using a RADIUS Proxy Hierarchy with authentication at visitor user home institution. –Minimum admin overhead as unknown authentication requests are forwarded back across a RADIUS proxy hierarchy. –Less secure than other authentication solutions due to web based login page for authentication and no provision to protect authentication of authorised users in a VLAN from seeing each others traffic –Accountability via RADIUS logging and user reports to helpdesk (e.g. stolen mobile device). Deliverable G

TF Mobility Group 22nd September Roamnode (PPPoE) authentication solution –Uses PPPoE. –Decouples process of establishing a physical network from establishing a logical network connection. –Uses RADIUS back end for AAA service. –Uses an overlay network for visitor users. –Uses a VPN gateway via an IP-in-IP tunnel. –Requires proprietary equipment at the home and visited institution and client operating systems with PPPoE support. –Accountability via RADIUS logging and user reports to helpdesk (e.g. stolen mobile device). Deliverable G

TF Mobility Group 22nd September Conclusion –A European AAA based on one solution is not practical. –A solution that supports the various national solutions is needed. Recommendations: A phased development / testing approach Resolve scaling and interoperability issues for all AAA (802.1x, VPN, VPN +PKI, web- based redirect, PPPoE) Consolidate findings into a trial report Build and scale a RADIUS proxy hierarchy for non-VPN AAA Conduct feasibility tests on creating an scalable VPN solution Subject to feasibility, build the proposed VPN solution Extend solution to agree mechanisms for exchange of credentials (e.g. PKI) Could extend to VPN if possible?

TF Mobility Group 22nd September Revised Recommendations (as a result of discussions in Berlin) - A phased development / testing approach Resolve scaling and interoperability issues for 802.1x, VPN, web- based redirect, PPPoE) Consolidate findings into a trial report Build and scale a RADIUS proxy hierarchy for non-VPN AAA Conduct feasibility tests on creating an scalable VPN solution Subject to feasibility, build the proposed CASG solution Extend to VPN in parallel Work on software changes to PPPoE to facilitate roaming

TF Mobility Group 22nd September Update on inter NREN tests Organizational RADIUS Server C Organizational RADIUS Server C Top-level RADIUS Proxy Server Top-level RADIUS Proxy Server Organizational RADIUS Server E Organizational RADIUS Server E Organizational RADIUS Server D Organizational RADIUS Server D Organizational RADIUS Server G Organizational RADIUS Server G Organizational RADIUS Server F Organizational RADIUS Server F National RADIUS Proxy Server National RADIUS Proxy Server National RADIUS Proxy Server National RADIUS Proxy Server Currently directly linked to the University of Southampton Currently hosted at SURFnet Currently linked to FCCN, Portugal Currently linked to CARNET, Croatia Backup Top-level RADIUS Proxy Server Backup Top-level RADIUS Proxy Server etlr1.radius.terena.nl ( ) etlr2.radius.terena.nl ( ) Organizational RADIUS Server A Organizational RADIUS Server A National RADIUS Proxy Server National RADIUS Proxy Server Organizational RADIUS Server B Organizational RADIUS Server B Currently linked to SURFnet, Netherlands