Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.

Slides:



Advertisements
Similar presentations
UNIVERSITY OF EDUCATION BY H.M.ISHTIAQ RAFIQUE. Domain Name Structure.
Advertisements

TERMINAL SERVER DEPLOYMENT PLAN. STEP 1: PREPARATION  UTILIZE THE CURRENT SERVER FOR: ACTIVE DIRECTORY (AD) ACTIVE DIRECTORY (AD) NEEDED FOR STORAGE.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 10 Achieving D2.
Windows 2003 Server. Windows 2003 Server Contents Fitur Windows 2003 Server Installation And Configuration Windows Management Resource  User Management.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
Module 5: Configuring Access to Internal Resources.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Implementing Security for Wireless Networks Presenter Name Job Title Company.
15.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Lesson 17 – UNDERSTANDING OTHER NETWARE SERVICES.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Using RADIUS Within the Framework of the School Environment Charles Bolen Systems Engineer December 6, 2011.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
SSL From Your Smartphone Support for Android Smartphones /
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Clinic Security and Policy Enforcement in Windows Server 2008.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Review. 2 Main Areas Client and Server / Active Directory.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
70-411: Administering Windows Server 2012
Implementing Network Access Protection
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
GROUP POLICIES AND SECURITY USING WINDOWS SERVER 2008 Raymond Ross EKU, Dept. of Technology, CEN.
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Module 8: Configuring Network Access Protection
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
5.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 5: Planning.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Configuring Network Access Protection
CHAPTER 9 HARDENING SERVERS. C REATING A BASELINE POLICY Security parameters used to create a baseline installation can be configured using a Group Policy.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Module 6: Network Policies and Access Protection.
Network Access Control
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Authentication Protocols Natalie DeKoker, Lindsay Haley, Jordan Lunda, Matty Ott.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
LO2 Understand the key components used in networking.
Module 5: Network Policies and Access Protection
Understand User Authentication LESSON 2.1A Security Fundamentals.
Chapter 1 Introduction to Networking
Module 9: Configuring Network Access
Microsoft Windows NT 4.0 Authentication Protocols
Implementing Network Access Protection
Configuring and Troubleshooting Routing and Remote Access
EA C451 Vishal Gupta.
Wireless Modes.
Implementing TMG Server Publishing
ISMS Information Security Management System
Network Hardware and Protocols
Windows Active Directory Environment
Presentation transcript:

Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011

What is Our Goal? Protect our wireless networks  Security  Liability  Control Bandwidth usage

What is RADIUS? Remote Authentication Dial In User Service Developed in 1991 – Mature Protocol Client/Server protocol running at the Application Layer

The 3 Functions of RADIUS (AAA) Authentication Users or Devices BEFORE they connect to the network Authorization Users or Devices for Network Usage Accounting for usage of services

Who Are the Players? Laptops, iPhones, iPads, Androids, Workstations Access Point, Network Switch Wireless Controller (RADIUS Client) Network Policy Server (NPS) (RADIUS Server) Domain Controller (Active Directory) Active Directory Certificate Services Group Policy DHCP DNS

Required Components Domain Controller (2008 R2)  (Limited functionality with 2003) AD Certificate Services*  2003 Server this is simply called Certificate Services Network Policy Server*  2003 Server this is called IAS (Internet Authentication Server) DHCP* DNS* Access Points that support 802.1x LAN Controller *Built Into 2008 R2 Server

How Do Clients Get Certificates? If computers are in the domain  Group policy will push the certificates to the client  May take up to 20 minutes  Can speed process with ‘gpupdate /force’ If not in the domain (new laptop)  Connect to wired network and join domain  Reboot  Log on to the domain 1 time as any user while wired

Basic Configuration Configure RADIUS  Client component on Wireless Controller  Server component on Network Policy Server Install Certificate Services Install Network Policy Server(s) Certificate Group Policy is Configured  Push certificates to workstations  Push Wireless Policy to workstations Create WirelessAccess group, add computers Configure Network Policies on NPS