Secure Wireless Integration How CFCC is integrating secure wireless access into its production environment Scott McNeil ∙ Assistant Network Administrator.

Slides:



Advertisements
Similar presentations
Mobile Device Management Timothy Yager SUNY Oswego Labman 2013 – Evergreen State College.
Advertisements

Mobile Device Tsunami Tom Long College of Engineering The Pennsylvania State University
The Next Step NSW DET Standards.  Standard (“fat”) Access Point(s) (AP’s) installed  Multiple laptops connected  Security provided by WEP or WPA (or.
Mission Critical Messaging Platform Roni Havas Unified Communications Solution Specialist Specialists Technology Unit – EPG - Microsoft Israel
Designing Enterprise Mobility Cortado Corporate Server.
IPv6 Planning and Implementation at PSU.  1986 – PSU gets Class B network ( ) & 5 Class C networks  1988 – Department of Computer.
Division of Information Resources BYOD & Classroom Technology How are we designing classrooms for the future?
Week 9, Network Communication Software, Dept of Informatics, Faculty of Business.
Meraki Mobile Device Management
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
Make Life in Technology Easier! Presenter: Jacob Quade Ties Conference December 16, 2013.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
University of California, Davis1 Draft Wireless Network Policy Administrative Computing Coordinating Council September 10, 2001.
802.1x EAP Authentication Protocols
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Using RADIUS Within the Framework of the School Environment Charles Bolen Systems Engineer December 6, 2011.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Caring. Learning. Integrity. Respect. Technology Support for Algonquin’s Mobile Learning Environment Version 2 September Edu-t ne.
Your storage on the ground; Your files in the cloud.
Eric Hamilton, Assistant Principal of Curriculum & Instruction Paul Wakefield, Network Engineer Alice Schmitz, Instructional Technologist S.T.A.R. = Name.
802.11ac What it is ∙ What it can do for you Real World deployment scenarios and examples Scott McNeil ∙ Assistant Network Administrator ∙ Cape Fear Community.
TAKING COMPREHENSIVE DISTANCE-FLEXIBLE LEARNING TO THE NEXT LEVEL Prof. Dr. Karim Zerhouni Chief Information Officer Head of Sciences Division Prof. Dr.
Unified Student-Centric Authentication and Authorization Nathan Wilder Special Assistant - Technology Office of the CIO.
Randy Diddel A+ Certified Technician Apple Certified Associate-Mac Integration OS X ITIL Foundations v3 Mac Team Technical Support Analyst II UNM IT Workstation.
Technology Services. Agenda Options available to guests KSB (departmental) responsibilities Guest responsibilities Technology Services responsibilities.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
+ Navigating Campus Technology Presented by Stephanie Jasmin.
Education roaming Secure Wireless Service for Research and Education.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Confidential Data Security Strategies Based upon the ESG “Outside-In” Confidential Data Security Model © 2009 Enterprise Strategy Group Vendor Channel.
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Scott Butson District Technology Manager. Provide professional to all district staff Professional development has been provided on a regular basis to.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
Enterprise Solutions Chapter 12 – Mobility and Its Need in an Enterprise.
Good MDM IOS Overview Presented by: Jerry Wen 02/09/2012.
ENABLING companies to DEPLOY wireless data solutions Application Development Tools Remote Deployment and Management LAN/WAN environments.
Microsoft Management Seminar Series SMS 2003 Change Management.
Microsoft Azure Active Directory. AD Microsoft Azure Active Directory.
Wireless and Mobile Security
Access Network Devices Remotely— Even if the Network is Down— with Out-of-Band Management.
The Claromentis Digital Workplace An Introduction
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
BYOD Technical workshop Simon Bright - E2BN Philip Pearce – E2BN.
ORNL is managed by UT-Battelle for the US Department of Energy Cyber Security Assessment of the SNS ICS Karen S. White 10/18/15.
Mobile Technology M OBILE T ECHNOLOGY T ASK F ORCE.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
Isolating and Protecting Devices on the Network A database-driven methodology Tom Zeller June 2008.
Basharat Institute of Higher Education
Phase 4: Manage Deployment
Shibboleth Integration Fairfield University
Cisco Real Exam Dumps IT-Dumps
Computer Information Services (CIS) New Hire Orientation
Extended Authentication Protocol (EAP) Vulnerabilities exploited through Rogue Access Points Stephen Cumella.
On and Off Premise Secure Access
Getting Started.
Wavestore Integrates…
Getting Started.
SurfCFCC Secure Wireless Access For Students, Faculty, and Staff.
Requirements and Approach
CLASSROOM PROJECTION SYSTEM
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Requirements and Approach
IT Management, Simplified
Presentation transcript:

Secure Wireless Integration How CFCC is integrating secure wireless access into its production environment Scott McNeil ∙ Assistant Network Administrator ∙ Cape Fear Community College

Why? Faculty requesting greater mobility options Staff also requesting greater mobility options Department heads wanting greater classroom flexibility Can help control costs in new construction and/or renovations

How? Active Directory integration 802.1X enterprise authentication Role based access Machine authentication

802.1X Authentication PEAP with MSCHAPv2 – When configured properly is every bit as secure as EAP/TTLS but can be deployed without special provisioning – However some kind of provisioning is still recommended for laptops/notebooks – For laptops, configuration can be added to imaging or be pushed out via AD group policy – Android and Apple iOS devices super easy to provision

CFCC’s Solution Lightweight, controller based access points Aruba Networks ClearPass™ Active Directory integration Aruba Networks AirWave™ server for monitoring, system analytics over time, analytic report generation and wireless intrusion detection/prevention

Questions ∙ Discussion