Campus Manager Presenters: Andy Babb & Ryan Lininger Denison University.

Slides:



Advertisements
Similar presentations
WHG Product Training Oct 2011 For authorized partners only
Advertisements

MikroTik Vendor Session © MikroTik MikroTik Vendor Session WISPNOG February th, 2005 Chicago, IL.
Network Access Control Systems at Educational Institutions Richard Becker Brian Leslie Kansas State University.
Overview of the technology that comprises Attendance Enterprise.
Challenges and Incidents in Higher Ed. About->Presenter Zach Jansen Information Security Officer, Calvin College.
© 2012 ForeScout Technologies, Page 1 Bob Reny, Sr. Systems Engineer Do you know NAC? Data Connectors - Vancouver 4/25/2013.
Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
Network Asset Management at Jefferson Lab Bryan Hess, Andy Kowalski, Brent Morris,
How’s My Network (HMN)? A Java approach to Home Network Measurement Alan Ritacco, Craig Wills, and Mark Claypool Computer Science Department Worcester.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicPresentation_ID 1 Justin Rowling – Systems Engineer Protecting your network with Network Admission.
NetPass and Northwestern By Julian Y. Koh As told by Robert Vance NUIT-Telecom & Network Services.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBCMSN Configuring Wireless LANs BCMSN Module 6 Lesson 6.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco NAC Guest Server Guest Access - Simplified Tim Wellborn SE Sangeeta.
CNIL Report April 4 th, CNIL Report (Apr 4 th, 2005) Two Major Goals: –Improvement of Instructional Services –Strengthening research IT infrastructure.
Brandeis University Network Registration Joshua West 03/15/2011 LTS Staff Meeting.
Advanced Internet Bandwidth and Security Strategies Fred Miller Illinois Wesleyan University.
RBAC Defense in Depth Authors: Brad Ruppert & Russell Meyer.
Office of Information Technologies CAMP: Bridging Security and Identity Management Christopher Misra 14 February 2008 Tempe, AZ Protecting Network Assets.
Being Proactive with Computer Posture Assessment Department of Housing and Residence Education Charles Benjamin.
VMware is a registered trademark of VMware, Inc. (an EMC company).
Network Registration and User Tracking An Open Source Approach Mark Berman Ashley Frost Williams College.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Effective Customer Service: Exploring the process from beginning to end.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Caring. Learning. Integrity. Respect. Technology Support for Algonquin’s Mobile Learning Environment Version 2 September Edu-t ne.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
Implementing Dual-Boot Clusters in a Distributed Environment Surajit Bose, Technology Services Manager Dustin King, Systems Imaging Architect.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Overview AdministrationEmployeeCustomerWaiting Screen.
© 2008 Cisco Systems, Inc. All rights reserved.ACE XML API 1 November, 2008 David Muñoz XML API.
Hsu Chun-Hung Network Benchmarking Lab
HTML+JavaScript M2M Applications Viewbiquity Public hybrid cloud platform for automating and visualizing everything.
Ali Bahar Eric Hetrick. Introduction CAS Uptown uses ZENworks 10.0 for their current imaging needs. CAS Uptown manages about 300 machines in Sander and.
University of Montana - Missoula Adam Ormesher & Chase Maier.
1 Phil Rodrigues, Sr Network Security Analyst, NYU ITS Automated Policy Enforcement November 12, 2004.
Module 11: Remote Access Fundamentals
Module 8: Configuring Network Access Protection
RINGS (ResNet Integrated Next Generation Solution) Educause Security Professionals Conference 2006.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Network Registration & Bandwidth Management Gary Holeman Ken Johnson Tim Medin.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
Update on Campus Networks December 2009 Bruce Campbell Director, Network Services Information Systems and Technology.
Cisco Router Hacking Group 8 Vernon Guishard Kelvin Aguebor ECE 4112.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Resnet Enhancements and Directions Part 1, Bruce Campbell, Information Systems and Technology.
Intellias. Streamlining Lawson Applications from an Intellias Web Interface.
Supporting a Wireless Network By Gareth Ayres.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Managing Networks and Network Devices
Open source Windows Management Infrastructure server implemented by Microsoft. Portable Includes Windows Server Management protocol stack.
How to use mrtg to monitor traffic on your wireless and wired network a bella mia company.
 The Hows and Whys of a wireless WPA2/802.1X network Presenters: Kevin Koster, Founder and Technical Lead at Cloudpath Networks Mike Courtney, Network.
Vmware 2V0-621D Vmware Exam Questions & Answers VMware Certified Professional 6 Presents
1 Policy Based Systems Management with Puppet Sean Dague
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Network Admission Control: A Survey of Approaches Educause 2008
Happy Endings: Reengineering Wesleyan’s Software Deployment to Labs and Classrooms Kyle Tousignant 03/22/2016.
Implementing the syslog Protocol on a Radlan router
Configuring and Troubleshooting Routing and Remote Access
AAA Introduction Chalk Talk
Chapter 2: Basic Switching Concepts and Configuration
2018 Real Cisco Dumps IT-Dumps
– Chapter 3 – Device Security (B)
Chapter 10: Advanced Cisco Adaptive Security Appliance
6. Application Software Security
Zhihui Sun , Fazhi Qi, Tao Cui
Presentation transcript:

Campus Manager Presenters: Andy Babb & Ryan Lininger Denison University

What’s To Come Denison’s Background Environment Previous Setup Current Setup Future Setup The Good and Bad Questions

Background Environment Population: 2,100 Students, 600 Employees, 300 Labs Cisco Switches –IOS and CATOS Mixed Vendor Wireless (Cisco, 5G) Have Many VLANs Distributed routing design –No single aggregated point for traffic Desire to improve students ability to register on their own

Previous NAC Setup Previous system was home grown system Previous registration system required up to 10 minutes for the services to update DHCP information. No client validation Much of the information was self reported –I.E. input errors. Lots of staff hours in fall during student move in –Lots of development hours as well Sasser and Blaster motivated us to move to a new solution

Non-persistent client Out-of-Band solution fits with our network structure Wired Registration: Use VLAN switching Wireless Registration (Testing): DHCP/DNS manipulation LDAP authentication Student self remediation and validation Forced Registration and Role Based access in student spaces Staff hours invested in fall registration process is less than before and more services are provided Current NAC Setup

Client Listing

Denison NAC: Future Recently upgraded Campus Manager 4.0 moves away from Nessus Scans Persistent Client for Denison Owned Machines (possibly students also) Role Based Management Campus Wide –Testing role based access in academic areas now Helpdesk usage of Campus Manager Reporting & data mining from Campus Manager Disabling clients (policy violations)

The Good Support –Vendor and community Initial Setup Admin console runs on Apple and Windows Console interface is robust VLAN Switching works well Administrative view Protocol support (ssh, telnet, snmp) Game console registration

Admin Console

Game System Registration

The Bad Operator permissions are too limited Operator account interface Java setup of console is… umm… picky Reporting is limited Database API has room for growth Custom automation and scripting

Questions ? Andy Babb Ryan Lininger Campus Manager Listserv –