Campus Network Accession - Authentication and Controlling Student Laptops Brian O’Hora BSc (Hons) & MBA Technology Management Networks & Infrastructure.

Slides:



Advertisements
Similar presentations
Internet Information Services 7.0 and Internet Information Services 7.5 Infrastructure Planning and Design Published: June 2008 Updated: November 2011.
Advertisements

Selecting the Right Network Access Protection (NAP) Architecture Infrastructure Planning and Design Published: June 2008 Updated: November 2011.
The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]
Microsoft ® System Center Configuration Manager 2007 R3 and Forefront ® Endpoint Protection Infrastructure Planning and Design Published: October 2008.
Lotus Notes - the University of Nebraska Experience Greg Gray University of Nebraska Central Administration Computing Services Network.
Systems Analysis and Design in a Changing World
Moving Your Computer Lab(s) to the Cloud Rick O’Toole & Dave Hicking University of Connecticut Libraries.
U N C L A S S I F I E D LA-UR LANL Exchange / Blackberry Deployment June 2, 2009 Anil Karmel Solutions Architect Network and Infrastructure Engineering.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
Viewpoint Consulting – Committed to your success.
© 2010 VMware Inc. All rights reserved Confidential VMware Vision Jarod Martin Senior Solutions Engineer.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
8 Systems Analysis and Design in a Changing World, Fifth Edition.
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
Being Proactive with Computer Posture Assessment Department of Housing and Residence Education Charles Benjamin.
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
User Group 2015 Version 5 Features & Infrastructure Enhancements.
© Copyright High Performance Concepts, Inc. 12 Criteria for Software Vendor Selection July 14, 2014 prepared by: Brian Savoie Vice President HIGH.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Introduction  Trinity guest network project objective  College wireless network overview  Public wireless/hospitality internet access  Guest network.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Clinic Security and Policy Enforcement in Windows Server 2008.
© 2007 NeoAccel, Inc. NeoAccel SGX Installation Guide Dear Customer: We are pleased to provide you with our training presentation for our SSL VPN-Plus.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
10969A Active Directory® Services with Windows Server® Course 10699A
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
York Secure Scan vs Microsoft Windows Our story and how we dealt with it.
Microsoft ® System Center Operations Manager 2007 Infrastructure Planning and Design Published: June 2008 Updated: July 2010.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
System Center 2012 Certification and Training May 2012.
Implementing Network Access Protection
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
Module 14: Configuring Server Security Compliance
Configuration Management (CM)
Module 8: Configuring Network Access Protection
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Microsoft Management Seminar Series SMS 2003 Change Management.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
| IIT Annual Update Overview Divisional Update IIT Staff are focused on customers first IIT has improved the learner experience.
Cis339 Chapter 2 The Origins of Software 2.1 Modern Systems Analysis and Design Fifth Edition.
Integration integration of all the information flowing through a company – financial and accounting, human resource information, supply chain information,
Reducing server sprawl and IT power/cooling costs Moving from reactive to proactive state Quickly troubleshooting PC and laptop issues Deploying new.
1 Efficient- Flexible- Cost Effective. 2 The key is to ensure that your clients have a positive experience remotely irrespective of the process you wish.
Secure Access and Mobility Jason Kunst, Technical Marketing Engineer March 2016 Location Based Services with Mobility Services Engine ISE Location Services.
MCSA Windows Server 2012 Pass Upgrading Your Skills to MCSA Windows Server 2012 Exam By The Help Of Exams4Sure Get Complete File From
Al Lilianstrom and Dr. Olga Terlyga NLIT 2016 May 4 th, 2016 Under the Hood of Fermilab’s Identity Management Service.
Duke Heaton, Network Engineer, UVU
Systems Analysis and Design in a Changing World, Fifth Edition
Chapter 8 Environments, Alternatives, and Decisions.
Introduction Neharicca Child Security Services - ERP system helps an education institution to become compliant with nationally acknowledged best practices.
Systems Analysis – ITEC 3155 Evaluating Alternatives for Requirements, Environment, and Implementation.
THE STEPS TO MANAGE THE GRID
Welcome To : Group 1 VC Presentation
2018 Real Cisco Dumps IT-Dumps
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
IS4680 Security Auditing for Compliance
Increase and Improve your PC management with Windows Intune
In-house Developed Library Solutions
IT Management, Simplified
IT Management, Simplified
OU BATTLECARD: Oracle Data Integrator
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Campus Network Accession - Authentication and Controlling Student Laptops Brian O’Hora BSc (Hons) & MBA Technology Management Networks & Infrastructure Manager Information Systems Services University of Dublin Trinity College

Growth - Student networking TCD Residential network users YearUsersGrowth 2002/3276n/a 2003/ % 2004/ % 2005/ % 2006/7???? Wireless network users YearUsersGrowth 2002/3 n/a 2003/4200n/a 2004/ % 2005/6 > % 2006/7????

2005/6 Workflow required 1.Student submits web form 2.Case logged in workflow system (Remedy) 3.Public IP address assigned to NIC MAC address, hardware table updated 4.Machine added to MS AD domain 5.Case assigned form USG to Networks for port activation 6.Port activated, documentation updated, case reassigned USG 7.User scheduled to attend clinic

2005/6 Workflow required 8.User attends clinic, supplied with custom security CD 9.Pre AV checks - stinger 10.AV & E-Pol installation and configuration, OS updates 11.Network configuration 12.Add machine to domain 13.Application configuration – Browser and Mail 14.Case updated and closed, records updated 15.x2000 times – automation required !!!

2005/6 outcome – efficiency connections vs time

Methodologies in use to address this challenge 1.Resist need to network private machines 2.Manage machines as standard corporate machines 3.Outsource residential network 4.Manage the unmanaged by using an emerging technology framework, Network Admission Control (NAC) to address challenges

Network Admission Control (NAC) - the wider environment Analysis: Network Access Control Network Computing, October 06, 2006 “NAC (network access control) enforcement products will grow to $3.9 billion by 2008 from $323 million last year--that's more than 1,100 percent growth” Lippis Report Issue 69: 2007 Is The Year of Network Access Control Oct 16, 2006 by Nick Lippis So is 2007 the year of NAC? 1)NAC solves real problems 2)NAC technology works 3)Enterprises are deploying NAC. The data points are building and the trend line is becoming clear is the year of NAC.

TCD Self Service NAC project objectives From start October 2006: Improve quality of service for students connecting computers to the College network Reduce IS Services staff involvement Maintain or enhance Network Security Provision of dynamic network administration and network security information

TCD Self Service NAC scope target customers and areas Initial scope Extended scope Desirable – Wireless/VPN Not under considerations – Guest/EduRoam

TCD Self Service NAC project approach Surveyed current market place and Institutions using NAC Solutions identified – approx 20 Short listed - 6 Arranged presentations, trials and site visits Submitted project proposal including business case to Senior Management Initiated restricted Request For Proposals, closing 8 th June

TCD Self Service NAC project business case Model 1 Transaction costs Model 2 Staff equivalents Model 3 Qualitative benefits

TCD Self Service NAC project RFP criteria Description of solution, features, integration with existing, user Scenarios(50) Solution roadmap, past and future OEM/reseller information (20) Cost (30)

TCD Network Admission Control project – evaluation responses Responses received 30% weighting significant Unexpected response Cost determined outcome

KHIPU and Bradford Campus Manager selected TCD selects KHIPU Networks to supply NAC solution Khipu exclusive partners Bradford Campus Manager in the UK/Ireland Over 300 Campus Manager installations in the USA, Over 28 Campus Manager installations in the UK Over 1,250,000 Ports controlled by Campus Manager UK and International Education User Groups

Bradford Networks Company History ►Began as custom engineering development services team ►Network management software design expertise ►Began as custom engineering development services team ►Network management software design expertise ►Demonstrated solution at an industry trade show ►Concept and sample architecture developed ►Functional prototype development – BRADFORD CAMPUS MANAGER ►Demonstrated solution at an industry trade show ►Concept and sample architecture developed ►Functional prototype development – BRADFORD CAMPUS MANAGER ►Transition: engineering services to a product company ►Installed CAMPUS MANAGER in several educational institutions ►Transition: engineering services to a product company ►Installed CAMPUS MANAGER in several educational institutions Increased install base to over 200 clients

Educational Customers UK and Ireland

Sample Educational Customers USA, UK and Ireland

Bradford Campus Manager

“Out of band” solution – leverages existing network

TCD Self service NAC configuration Dual NS 1200/8200 appliance pairs for resilience, 3000 client user license purchased 116 CISCO switches across all residences and 200 Library communal area wired network points Private IP addressing MS AD Authentication database Role based access management - MS AD attribute White list file for BCM and Bluecoat Web proxies Client browser auto detect proxy settings used Ongoing authentication enforced

TCD Self service NAC User Experience Connect to the network Open a web browser, presented with SNAC welcome page Next page - terms and conditions Next page – OS specific page outlining the web browser proxy settings Next page - Registration page, name, contact number and location Download a scanning program to ensure computer is compliant If not compliant, advised how to self-remediate Once your computer is compliant, asked to authenticate with MS AD credentials to gain admission to appropriate network

TCD Self service NAC Endpoint Compliance On Registration/Rescan download and run CSA executable MS Windows OS/AV checks Apple MAC OS/AV checks Linux check

TCD Self service NAC registration welcome page

TCD Self service NAC terms & conditions of use

TCD Self service NAC MS IE proxy settings page

TCD Self service NAC registration page

TCD Self service NAC scan fail page

TCD Self service NAC registration complete

TCD Self service NAC Primary outcome – ability to meet customer needs efficiency

TCD Self service NAC Economic perspective outcome Assume total Capex and Opex cost over three years excluding labour Assume cost per user in bands €0-10, €10-25, €25-50, €50-75 and € Cost per user currently €50-75 but €0-10 achievable within 3 years

TCD Self service NAC outcomes Repositioned to better meet network connectivity needs of students both effectively and efficiently as these needs evolve over time Control and support high numbers of “unmanaged” network devices

TCD Self service NAC secondary outcomes Improves job design Requires and supports organisational cultural and structural change Wider technical improvements Difficulties Opportunities

Campus Network Accession Authentication and Controlling Student Laptops “Each new wave of technology disrupts existing security measures and introduces new vulnerabilities. In the case of information security, failing to deploy defensive solutions at the right time can leave the enterprise vulnerable. Delays in implementing identity, authentication, and access control products or services can leave the enterprise in catch-up mode in terms of business opportunity.” Gartner, Inc. research (ID Number G ; The Future of Enterprise Security)

Campus Network Accession - Authentication and Controlling Student Laptops “Got connected to the wireless and wired networks yesterday. Such an improvement over the previous system!” “OK, so have connected to the wired network in my room in college now, all nice and easy to set up compared to before!” “It takes 40 seconds for the restart, and this (I think) has to be done everytime you boot up. Bring back the network clinics I say!!!” Boards.ie October 2006