Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.

Slides:



Advertisements
Similar presentations
SEMINAR ON Wi-Fi.
Advertisements

Wi-Fi Technology.
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Licia Florio EUNIS05, Manchester 1 Eduroam EUNIS Conference, June Licia Florio.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
U.S. Department of Energy Pacific Northwest National Laboratory July 2004 Presented by Jeffery Mauth Pacific Northwest National Laboratory
TF Mobility Group 22nd September A comparison of each national solution was made against Del C – “requirements”, the following solutions were assessed.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
Secure Computing Network
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Northern Arizona University Wi-Fi 2005 Flagstaff Campus Wireless Plan 4/11/2005.
Wireless networking Roger Treweek Oxford University Computing Services.
University of California, Davis1 Draft Wireless Network Policy Administrative Computing Coordinating Council September 10, 2001.
Wireless Network Selo TE UGM. Wireless Networking Wireless Networking (Wi-Fi) Wireless Networking (Wi-Fi) Introduction and Benefits Introduction and Benefits.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
UCLA Campus Wireless Pilot Initiative Update for ITPB 10/25/01.
Chudi IgboemekaITSS, Stanford University 04/2002 Campus Wireless Update Chudi Igboemeka Academic Technology, Pilots & Projects ITSS.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
Streamlining Support and Management through the Implementation of Active Directory Educause 2003 Mid-Atlantic Regional Gale D. Fritsche –
Virtual Private Network
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Wireless Network Security Overview 無線網絡系統保安概覽. ASL experience in school projects Whole School Wireless Rollout Wireless Networking Project SAMS Project.
EduRoam Australia Project Experience in location independent wireless networking with international collaboration with TERENA EduRoam Project 19 th APAN.
Chapter 7: Using Windows Servers to Share Information.
Wireless Infrastructures Wireless. Wireless Infrastructures Wireless LAN Predominantly IEEE A, B, G, N Wireless MAN WiMax and its.
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
Introducing the Symbol AP-5131
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
Altai Certification Training Backend Network Planning
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
PRESENTATION ON WI-FI TECHNOLOGY
Technical Policy and Standards Andy Gorton – Senior Architect: Institutional Networks.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Campus Network Development Network Architecture, Universal Access & Security.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
● Albert Einstein explained it best: ● "You see, wire telegraph is a kind of a very, very long cat. You pull his tail in New York and his head is meowing.
Lecture 24 Wireless Network Security
Remote Access for Mobile Computing Andrew Jessett NT Support and Development Group (a.k.a. PC Support) Business and Information.
Security in Wireless Networks 458 Security Offense Debate: Wireless Security by Cisco Group DoubleDeuce Jibran Ilyas Frank LaSota Paul Lowder Juan Mendez.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
KFUPM Wireless LAN Sadiq M. Sait. Contents  Introduction  Technology - Brief overview  Project Plan RFP and Start dates Progress Curve  Coverage and.
Submitted By:- Raushan Kr. Chaurasiya(68) Santu Thapa(75) Satyanarayan Prajapat(76)
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
Exploring the World of Wireless James Taylor - COSC 352 Fall 2007.
COMPUTER FUNDAMENTALS David Samuel Bhatti
BYOD Technical workshop Simon Bright - E2BN Philip Pearce – E2BN.
PRESENTED BY: 21022O MUHAMMAD FAIZI BIN MUSA 3TSI WIRELESS GATEWAY.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Virtual Private Network Access for Remote Networks
Wireless Technologies
Securing the Network Perimeter with ISA 2004
Wireless Fidelity 1 1.
Chapter 4: Wireless LANs
Welcome To : Group 1 VC Presentation
Virtual Private Network
By Markus Kriechhammer
Global One Communications
Presentation transcript:

Flexible Network Access Overview

Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible Access Remote Access for Staff and students Dial-InISP Modem VPN Broad Band VPN On Campus For Staff, Students and Visitors UoG-ISP Communal Locations and other areas Managed LAN ports VPN Managed WiFi Access VPN

On Campus Flexible Access Aims Allow staff, students and visitors to access UoG campus network resources via their own systems To provide UoG campus network security measures via authentication, encryption and personal firewall To provide UoG ISP security measures via mistrust I.e., assume other systems on UoG ISP are suspect To support as wide a range of systems a possible To provide a scaleable and manageable solution that could be adapted for specific (faculty/departmental) requirements To support the most appropriate LAN technologies To provide as near a self service as possible backed by Web based documentation and FAQs

On Campus Flexible Access Progress and Futures Pilot study initiated in January 2004 – Report available on CS Web site Pilot located in University Library providing a choice of 10/100Mbs Ethernet ports and b Wireless access points UoG ISP implemented via private IP address space UoG Campus access and security implemented via a modified VPN service providing authenticated access, strong encryption and an integrated personal firewall Choice of existing VPN solution easy to make Pilot has been extended to other areas in library and other buildings Plan to continue rollout to other communal areas and work with departments on local requirements Plan to address Visitor requirements out with UoG VPN solution Plan to provide ‘lightweight’ alternatives to VPN e.g SSL-vpn, WPA2 and 802.1x

Flexible access Pilot General Issues Scalability complex requiring VLAN structures to maintain the UoG ISP and Private address leakage with ACLs to accommodate departmental requirements VPN requirement can be daunting for some users Same old P2P misuse plus un-patched systems – right to mistrust! Identifying suitable locations and getting agreement to deploy User support – Self service OK! For most but a significant number of users have problems with VPN configuration and or foreign language support

Flexible access Pilot Technology Issues Both wired and WiFi access ports have proved popular Wired ports easier to manage and secure WiFi access certainly provides the required flexibility but requires significantly more work to deploy

Flexible access Pilot Wireless LAN Issues Pilot deployments conform to draft Wireless LAN Policy: Main concerns are to do with Doing proper site surveys to ensure maximum coverage and a safe and secure operating environment for support staff Managing non overlapping frequency ranges to avoid interference Ensuring acceptable levels of security on a shared communications medium Restricting access to authorised users Ensuring acceptable contention ratios per Access Point Real cost of WiFi deployments is the back end infrastructure required to provide security, scalability, AP management, roaming and rogue AP detection

Flexible Access Visitor Issues Because of site licence restrictions and US export restrictions it is not possible to supply visitors with a copy of the VPN client Other ad hoc solutions have been implemented based on off campus access Work in progress to provide acceptable visitor solutions based on some or all of the following Temporary account creation and 802.1x and WPA as appropriate LIN pilot for proxying authentication to users home site OS provided or Public domain VPN support