Firewall policies Configuration->Security->Access Control->Policies: Add User role Configuration->Security->Access Control-> User Roles: Add Server group.

Slides:



Advertisements
Similar presentations
Introduction to the WatchGuard AP Device
Advertisements

Designing for Pervasive Network Security. Designing for Security Our aim in this section will be to concentrate on how campus Networks can be designed.
Securing The Network EDGE December 2010
WHG Product Training Oct 2011 For authorized partners only
CONFIDENTIAL © Copyright Aruba Networks, Inc. All rights reserved AOS & CPPM INTEGRATION CONFIGURATION & TESTING EAP TLS & EAP PEAP by Abilash Soundararajan.
Southampton Open Wireless Network The Topology Talk.
Hotspot Customization
All Rights Reserved © Alcatel-Lucent | Enterprise mobility | 2010 Laurent Bouchoucha October, 2010 Seamless mobility in a secure and controlled.
USRobotics Professional Access Point  Yosi Rafael.
How Purdue University Calumet maintains sanity in a campus BYOD environment Presented by: Tim Loudermilk - Supervisor of Network Administration.
802.1X Configuration Terena 802.1X workshop the Netherlands, Amsterdam, March 30 th Paul Dekkers.
Philippe Hanset ANYROAM LLC
Wireless. Module Objectives By the end of this module participants will be able to: Explain the differences between thick and thin access points List.
Network Access and 802.1X Klaas Wierenga SURFnet
High-quality Internet for higher education and research eduroam EuroCAMP, Porto, November 9, 2005
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 1 Roles Based Network Access Controls James R. Clifford Los Alamos.
Deliverable H: the interoperability testbed design Klaas Wierenga SURFnet.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco NAC Guest Server Guest Access - Simplified Tim Wellborn SE Sangeeta.
Panasonic Computer Products Europe CF-08 Live Set up.
D-Link Unified Access Point
Wireless Security with 802.1X Copyright 2005 Michael Griego This work is the intellectual property of the author. Permission is granted for this material.
Wireless Network Security Lab Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
WNAP-3000PE n Enterprise PoE Access Point Copyright © PLANET Technology Corporation. All rights reserved.
Atlanta-Fulton Public Library Wireless Network Ali Nabavi Project Manager Information Technology Fulton County Government.
Unified Student-Centric Authentication and Authorization Nathan Wilder Special Assistant - Technology Office of the CIO.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Chapter 10-Wireless Devices
Dartmouth’s Wireless Network May 16, 2005 David W. Bourque.
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter Network Security Architecture.
Altai Certification Training Backend Network Planning
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 NGWC – Central Webauth (CWA) using ISE 3850 and 5760 Viten Patel – RTP Wireless.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Basic Wireless Concepts & Configuration Chapter.
Dual WAN Router Brand & Marketing MGMT Dept DrayTek Corp Vigor2912 Series 14 th Jan Based on f/w RC4.
High-quality Internet for higher education and research Paul Dekkers April 4th, Turkey.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Scenario 1 Internet WAN LAN1 LAN2 LAN3 LAN4
Wireless Authentication & 802.1X By Gareth Ayres.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
Chapter 3: Authentication, Authorization, and Accounting
輔大資工所 在職研一 報告人:林煥銘 學號: Public Access Mobility LAN: Extending The Wireless Internet into The LAN Environment Jun Li, Stephen B. Weinstein, Junbiao.
1 © NOKIA FILENAMs.PPT/ DATE / NN AAA-SIP Requirements Current draft: draft-loughney-sip-aaa-req-00.txt draft-calhoun-sip-aaa-reqs-04.txt may not be updated.
Security for (Wireless) LANs 802.1X workshop 30 & 31 March 2004 Amsterdam.
7.4 Update - ISE Session.
Enterprise High Speed Access Point Brand & Marketing MGMT Dept DrayTek Corp VigorAP900.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Mar 27, 2000IETF 47 - Pyda Srisuresh1 Secure Remote Access with L2TP Pyda Srisuresh.
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
ArubaOS-Switch Tunneled Node
Securing Cisco Wireless Enterprise Networks (WISECURE)
Wireless LAB Test Preparation Guide
3GPP meeting Wireless LAN access
WPA Configuration Example WebUI
Maintaining a Secure and Usable Wireless Network
Holistic view of 802.1x integration & optimization
A Wireless LAN Security Protocol
Download Exact HP HPE6-A29 Exam Questions With Answers - HPE6-A29 Dumps PDF Realexamdumps.com
Free Dumps With Real Exam Question Answers | Free Update
Stellar Enterprise WLAN Global Overview
UNIFIED WIRELESS NETWORK
D-Link Business Wireless LAN Solution
SY604 NAT PPPoE Configuration
SurfCFCC Secure Wireless Access For Students, Faculty, and Staff.
UNIFIED WIRELESS NETWORK
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
Agenda Comware 5 and Comware 7 device based AAA:
UNIFIED WIRELESS NETWORK
What’s New In WatchGuard Wi-Fi Cloud v8.6
Presentation transcript:

Firewall policies Configuration->Security->Access Control->Policies: Add User role Configuration->Security->Access Control-> User Roles: Add Server group Configuration->Security->Authentication-> Severs->Server Group: Add 802.1x Authentication Configuration->All Profiles->Wireless LAN-> 802.1x Authentication Profile: Add AAA Configuration->All Profiles-> Wireless LAN->AAA Profile: Add SSID Configuration->All Profiles-> Wireless LAN->SSID Profile: Add Virtual AP Configuration->All Profiles-> Wireless LAN->Virtual AP profile: Add VLAN Configuration->Network->VLANs: Add AP Group Configuration-> AP Configuration: New AP system profile Configuration->All Profiles->AP-> AP System Profile: Add Non-Profile ConfigurationSecurity Profile Configuration WLAN Configuration AP Configuration Assign VAP to AP Group Configuration->AP Configuration: : Edit Define Authentication Server Configuration->Security->Authentication-> Severs: : Add WPA Configuration Example WebUI

Firewall policies ip access-list session "EmployeeAccess" any any any permit queue low User role user role Employee access-list session EmployeeAccess Server group aaa server-group EmployeeRADIUS auth-server RADIUS x Authentication aaa authentication dot1x EmployeeDot1x termination eap-type eap-peap AAA aaa profile Employee_AAA dot1x-default-role logon authentication-dot1x EmployeeDot1x SSID wlan ssid-profile Employee_SSID essid “corp” opmode wpa2-aes Virtual AP wlan virtual-ap Employee_VAP aaa-profile Employee_AAA ssid-profile Employee_SSID vlan 200 forward-mode tunnel VLAN vlan 200 AP Group ap-group Sunnyvale_APs AP system profile ap system-profile Sunnyvale_APs lms-ip bkup-lms-ip Non-Profile ConfigurationSecurity Profile Configuration WLAN Configuration AP Configuration Assign VAP to AP Group ap-group Sunnyvale_APs virtual-ap Employee_VAP ap-system-profile Define Authentication Server aaa authentication-server RADIUS01... WPA Configuration Example CLI

Firewall policies Configuration->Security->Access Control->Policies: Add User role Configuration->Security->Access Control-> User Roles: Add Server group Configuration->Security->Authentication-> Severs->Server Group: Add Captive Portal Authentication Configuration->All Profiles->Wireless LAN-> Captive Portal Authentication Profile: Add +Server Group == AAA Configuration->All Profiles-> Wireless LAN->AAA Profile: Add SSID Configuration->All Profiles-> Wireless LAN->SSID Profile: Add Virtual AP Configuration->All Profiles-> Wireless LAN->Virtual AP profile: Add VLAN Configuration->Network->VLANs: Add AP Group Configuration-> AP Configuration: New AP system profile Configuration->All Profiles->AP-> AP System Profile: Add Non-Profile ConfigurationSecurity Profile Configuration WLAN Configuration AP Configuration Assign VAP to AP Group Configuration->AP Configuration: : Edit Define Authentication Server Configuration->Security->Authentication-> Severs: : Add Captive Portal Configuration Example WebUI Assign Captive Portal Profile Configuration->Security->Access Control-> User Roles: : Edit

Firewall policies ip access-list session ”GuestAccess" any any any permit queue low User role User-role guest access-list session GuestAccess Server group aaa server-group GuestAuthServers auth-server GuestAuthServer Captive Portal Authentication aaa authentication captive-portal GuestCP server-group “internal” AAA aaa profile Guest_AAA initial-role logon SSID wlan ssid-profile Guest_SSID essid “guest” opmode opensystem Virtual AP wlan virtual-ap Guest_VAP aaa-profile Guest_AAA ssid-profile Guest_SSID vlan 900 forward-mode tunnel VLAN vlan 900 AP Group ap-group Sunnyvale_APs AP system profile ap system-profile Sunnyvale_APs lms-ip bkup-lms-ip Non-Profile ConfigurationSecurity Profile Configuration WLAN Configuration AP Configuration Assign VAP to AP Group ap-group Sunnyvale_APs virtual-ap Employee_VAP ap-system-profile Define Authentication Server aaa authentication-server GuestAuthServer... Captive Portal Configuration Example CLI Assign Captive Portal Profile User-role guest captive-portal GuestCP

Firewall policies Configuration->Security->Access Control->Policies: Add User role Configuration->Security->Access Control-> User Roles: Add SSID Configuration->All Profiles-> Wireless LAN->SSID Profile: Add Virtual AP Configuration->All Profiles-> Wireless LAN->Virtual AP profile: Add VLAN Configuration->Network->VLANs: Add AP Group Configuration-> AP Configuration: New AP system profile Configuration->All Profiles->AP-> AP System Profile: Add Non-Profile ConfigurationSecurity Profile Configuration WLAN Configuration AP Configuration Assign VAP to AP Group Configuration->AP Configuration: : Edit WEP Configuration Example WebUI

Firewall policies ip access-list session "EmployeeAccess" any any any permit queue low User role user role Employee access-list session EmployeeAccess SSID wlan ssid-profile WEP_SSID wepkey1 deadbeef99 opmode static-wep Virtual AP wlan virtual-ap WEP_VAP ssid-profile WEP_SSID vlan 210 forward-mode tunnel VLAN vlan 200 AP Group ap-group Sunnyvale_APs AP system profile ap system-profile Sunnyvale_APs lms-ip bkup-lms-ip Non-Profile ConfigurationSecurity Profile Configuration WLAN Configuration AP Configuration Assign VAP to AP Group ap-group Sunnyvale_APs virtual-ap Employee_VAP ap-system-profile WEP Configuration Example CLI