WLAN Roaming for the European Scientific Community: Lessons Learned , June 9 th, 2004 Carsten Bormann Niels Pollem reporting on the work of TERENA.

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Encrypting Wireless Data with VPN Techniques
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Terena Mobility Taskforce update Klaas Wierenga SURFnet.
Licia Florio EUNIS05, Manchester 1 Eduroam EUNIS Conference, June Licia Florio.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
TF Mobility Group 22nd September A comparison of each national solution was made against Del C – “requirements”, the following solutions were assessed.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
10 October 2003 Internet2 members meeting 1 An update on the work of JANET Wireless Advisory Group & The Terena Mobility Taskforce James Sankar UKERNA.
Module 5: Configuring Access for Remote Clients and Networks.
5/25/2015 AEB/Yleisesittely Roaming network access using Shibboleth in University of Helsinki Fall 2004 Internet2 Member Meeting 29th of September, 2004.
EduRoam ESA workshop 17 December 2004 Utrecht.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Network Access and 802.1X Klaas Wierenga SURFnet
High-quality Internet for higher education and research Federated network access with Klaas Wierenga SURFnet Ljubljana, April.
Wbone: WLAN Roaming Based on Deep Security Zagreb, May 22 nd, 2003 Carsten Bormann Niels Pollem with a lot of help from TERENA TF Mobility.
EduRoam: movilidad por Europa... y España Toledo, 29 de octubre de 2004
WLAN Roaming for the European Scientific Community: Lessons Learned , June 9 th, 2004 Carsten Bormann Niels Pollem reporting on the work of TERENA.
Deliverable H: the interoperability testbed design Klaas Wierenga SURFnet.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Wi-Fi Structures.
1 Installing a Wireless Network for University Members Oliver Gorwits, Roger Treweek Oxford University Computing Services
A Guide to major network components
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
What about 802.1X? An overview of possibilities for safe access to fixed and wireless networks Amsterdam, October Erik Dobbelsteijn.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Day15 IP Space/Setup. IP Suite of protocols –TCP –UDP –ICMP –GRE… Gives us many benefits –Routing of packets over internet –Fragmentation/Reassembly of.
EduRoam Australia Project Experience in location independent wireless networking with international collaboration with TERENA EduRoam Project 19 th APAN.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Altai Certification Training Backend Network Planning
Education roaming Secure Wireless Service for Research and Education.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
High-quality Internet for higher education and research Paul Dekkers April 4th, Turkey.
Internet Goes Mobile Alper Yegin KIOW 2003 at APNIC 16 August 19th, Seoul, Korea.
Michal Procházka, Jan Oppolzer CESNET.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
A Practical Guide for Joining EduRoam EuroCAMP Torino A Practical Guide for Joining EduRoam 4 March 2005 Version 1.6.
Eduroam JP and development of UPKI roaming Yoshikazu Watanabe*, Satoru Yamano* Hideaki Goto**, Hideaki Sone** * NEC Corporation, Japan ** Tohoku University,
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
802.1X in SURFnet 22 May 2003.
Routing integrity in a world of Bandwidth on Demand Dave Wilson DW238-RIPE
TERENA TF-Mobility: Roaming for WLANs Tim Chown University of Southampton TF-Mobility WG & UKERNA Wireless Advisory Group.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Connect. Communicate. Collaborate TERENA Networking Conference, 7 june 2005 Eduroam: past, present, and future.
Security for (Wireless) LANs 802.1X workshop 30 & 31 March 2004 Amsterdam.
7.4 Update - ISE Session.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
6 June 2004TF-Mobility meeting 6 June TF-Mobility meeting Agenda TF-Mobility Meeting, June Welcome and Update on TF-Mobility to date Discussion.
19 May 2003 © The JNT Association Terena Technical Advisory Council Terena Mobility Task Force
Michael G. Williams, Jeremey Barrett 1 Intro to Mobi-D Host based mobility.
Federated Wireless Network Authentication Kevin Miller Duke University Internet2 Joint Techs Salt Lake City February, 2005.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Networks and Security Great Demo
Introduction to Networking
Firewalls Routers, Switches, Hubs VPNs
AbbottLink™ - IP Address Overview
Chapter 10: Advanced Cisco Adaptive Security Appliance
Cengage Learning: Computer Networking from LANs to WANs
Presentation transcript:

WLAN Roaming for the European Scientific Community: Lessons Learned , June 9 th, 2004 Carsten Bormann Niels Pollem reporting on the work of TERENA TF Mobility

2 Outline  WLAN access control and security  How does inter-domain roaming work  Roaming on a European scale  How to integrate solutions at the site level  Conclusion

3 WLAN Security: Requirements  Confidentiality (Privacy): Nobody can understand foreign traffic Insider attacks as likely as outsiders'  Accountability: We can find out who did something Prerequisite: Authentication

4 (2003:) Security is rarely easy

5 (2004:) solved 

6 (2004:) or maybe not? 

7 WLAN Security: Approaches  AP-based Security: AP is network boundary WEP (broken), WEP fixes, WPA, … 802.1X (EAP variants + RADIUS) i  Network based Security: deep security VPNs needed by mobile people anyway  SSH, PPTP, IPsec Alternative: Web-diverter (temporary MAC/IP address filtering)  No confidentiality at all, though

8 Intranet X Access network Campus network world Routers RADIUS Server(s).1X

9 WLAN Access Control: Why 802.1X is better  802.1X is taking over the world anyway  The EAP/XYZ people are finally getting it right Only 5 more revisions before XYZ wins wide vendor support  Available for more and more systems (Windows 2000 up)  Distribute hard crypto work to zillions of access points  Block them as early as possible More control to visited site admin, too!  Most of all: It just works™

10 Intranet X Docking network Campus network world VPN-Gateways DHCP, DNS, free Web VPN

11 WLAN Access Control: Why VPN is better  Historically, more reason to trust L3 security than L2 IPSec has lots of security analysis behind it  Can use cheap/dumb APs  Available for just about everything (Windows 98, PDA etc.)  Easy to accommodate multiple security contexts Even with pre-2003 infrastructure Data is secure in the air and up to VPN gateway  Most of all: It just works™

12 Intranet X Docking network Campus network world Access Control Device DHCP, DNS, free Web Web redirect Web

13 WLAN Access Control: Why Web-based filtering is better  No client software needed (everybody has a browser)  Ties right into existing user/password schemes  Can be made to work easily for guest users It’s what the hotspots use, so guest users will know it already May be able to tie in with Greenspot etc.  Privacy isn’t that important anyway (use TLS and SSH)  Accountability isn’t that important anyway  Most of all: It just works™

From Access Control to Roaming

15 Roaming: High-level requirements Objective: Enable NREN users to use Internet (WLAN and wired) everywhere in Europe  with minimal administrative overhead (per roaming)  with good usability  maintaining required security for all partners

16 Inter-domain 802.1X RADIUS server Institution B RADIUS server Institution A Internet Central RADIUS Proxy server Authenticator (AP or switch) User DB Supplicant Guest Student VLAN Guest VLAN Employee VLAN HomeVisited

17 Web-based with RADIUS

18 Intranet X Docking network Campus Network G-WiN VPN-Gateways DHCP, DNS, free Web Intranet X Docking network Campus Network G-WiN VPN-Gateways DHCP, DNS, free Web VPN SWITCHmobile – VPN solution deployed at 14+ universities and other sites across Switzerland. Wbone – VPN roaming solution to 4 universities / colleges in state of Bremen. Clients enter the Internet through home network/gateway.

19 Wbone interconnecting docking networks R Briteline Uni Bremen /16 HS Bremen /16 HfK HS Brhv /18 IPSec Cisco IPSec/PPTP/SSH Linux IPSec Cisco PPTP Linux IPSec Cisco PPTP Linux PPTP Linux PPTP Linux AWI extend to other sites...

Making roaming work on a European scale

21 FCCN RADIUS Proxy servers connecting to a European level RADIUS proxy server UKERNA SURFnet FUNET DFN CARnet European RADIUS hierarchy CESnet RedIRIS UNI-C GRnet

22 The CASG  Separate docking networks from controlled address space for gateways (CASG)  Hosts on docking networks can freely interchange packets with hosts in the CASG Easy to accomplish with a couple of ACLs  All VPN gateways get an additional CASG address Hmm, problem with some Cisco concentrators inetnum: netname: CASG-DFN descr: DFN-Verein descr: Stresemannstrasse 78 descr: Berlin country: DE admin-c: MW238 tech-c: JR433 tech-c: KL565 status: ASSIGNED PA mnt-by: DFN-LIR-MNT changed: source: RIPE

23 Intranet X Docking network Campus Network G-WiN VPN-Gateways DHCP, DNS, free Web Access controller Intranet X Docking network Campus Network G-WiN VPN-Gateways DHCP, DNS, free Web Access controller Intranet X Docking network Campus Network G-WiN VPN-Gateways DHCP, DNS, free Web Access controller The big bad Internet CASG

24 CASG allocation  Back-of-the-Envelope: 1 address per population E.g.,.CH gets ~600, Bremen gets ~60  Allocate to minimize routing fragmentation May have to use some tunneling/forwarding  VPN gateway can have both local and CASG address

25 The CASG Pledge  I will gladly accept any packet There is no such thing as a security incident on the CASG  I will not put useful things in the CASG People should not be motivated to go there except to authenticate or use authenticated services  I will help manage the prefix space to remain stable

How to integrate all these at the site level?

27 Commonalities  802.1X Secure SSID RADIUS  Web-based captive portal Open SSID RADIUS  VPN-based Open SSID No RADIUS } Docking net (open SSID) RADIUS backend }

28 How can I help... as a home institution Implement the other backend:  As a RADIUS-based site Implement a CASG VPN gateway (or subscribe to an NREN one) Provide the right RADIUS for all frontends  As a VPN site Run a RADIUS server  Help the users try and debug their roaming setup while at home (play visited site)

29 How can I help... as a visited institution Implement the other frontend:  As a docking network site Implement the other docking appraoch:  CASG access or Web-diverter Implement a 802.1X SSID (“eduroam”) in addition to open SSID  As an 802.1X site Implement an open SSID with CASG access and Web-diverter  Your local users will like it, too Maybe too much…

30 Network layout with multiple SSID’s and VLAN assignment

31 Network layout without multiple SSID’s and VLAN assignment

Doing the plumbing

33 Default router in docking net  Default route points to access control device: ip route  CASG routes point to CASG router ip route

34 CASG router ip access-list extended casg-out permit ip any deny ip any any ip access-list extended casg-in permit ip any deny ip any any interface Vlan86 ip address ip access-group casg-in in ip access-group casg-out out ip nat inside

35 What if docking net is RFC1918?  Maximum compatibility with an address-based NAT: ip access-list standard docking-addr permit ! ip nat translation timeout 1800 ip nat pool dn netmask ip nat inside source list docking-addr pool dn

So where are we?

37 Fun little issues  1/3 of Bremen‘s 432 Cisco 340 APs can't do VLANs Ethernet interface hardware MTU issue  Some client WLAN drivers are erratic in the presence of multi-SSID APs  Can't give university IP addresses to roamers Too many university-only services are “authenticated” on IP address Address pool must be big enough for flash crowds  CASG space is currently allocated on a national level So there will be a dozen updates before CASG is stable

38 Conclusions  It is possible to create a fully interoperable solution  It’s not that hard: especially when you use TF mobility’s deliverable H to guide you  Re-evaluate solutions in a couple of years TF mobility is going for a second term to help  Integration approach also provides an easy upgrade path E.g., add 802.1X to docking-only site

39 Conclusions  It is possible to create a fully interoperable solution  It’s not that hard especially when you use TF mobility’s deliverable H to guide you  Re-evaluate solutions in a couple of years TF mobility is going for a second term to help  Integration approach also provides an easy upgrade path E.g., add 802.1X to docking-only site Go for it