MAC Registration or Fun with Wireless at the Member’s meeting.

Slides:



Advertisements
Similar presentations
SMC2804WBRP-G Barricade™ g 2.4GHz 54Mbps Wireless Cable/DSL Broadband Router with USB Print Server SMC2804WBRP-G
Advertisements

Application Guide For Mesh AP – MAP-3120
300Mbps n Wireless Gigabit Router
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Computer Engineer -- Network and Operating System Specialization Prepared By: Eng.Alaaeddin B. Al-Qazzaz.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
Chapter 9: Troubleshooting and Repairing Networking.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
Network Components T. Meredith 5460 – Summer 2014.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Design Wireless Network 2
When Networking meets Wireless When Networking meets Wireless.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
Networking Components Chad Benedict – LTEC
1 BASIC TELECOMMUNICATIONS Wireless fidelity x.
Securing a Wireless Network
Installing a DHCP Server role on Windows Server 2008 R2 in a home network. This is intended as a guide to install the DHCP role on a Domain Controller.
Telecommunication Networks Group Technical University Berlin Secure WLAN Operation and Deployment in Home and Small to Medium Size Office Environments.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
1. 2 Move to PKG (SCME) Prepare the new SCME IP phone package and Upload package to SCME System by SCME Admin. CONFIGURATION  Phone Setting  File Upload.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Internal NetworkExternal Network. Hub Internal NetworkExternal Network WS.
Pc Naming Configuration 1.WEB REGISTER 2.FIXNAME 3.MCAFEE AGENT SETUP ITC Training: Session 2.
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
Common Devices Used In Computer Networks
70-411: Administering Windows Server 2012
IT Infrastructure Chap 1: Definition
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
Wireless Networks and the NetSentron By: Darren Critchley.
Chapter 8: Configuring Networking. Exploring the Network and Sharing Center 2.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
CAEN Wireless Network College of Engineering University of Michigan October 16, 2003 Dan Maletta.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Remote Desktop Services in Windows Server 2008 R2.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Networking in Windows NT Layered Network Architecture Network Interface Card Network Adapter Card Drivers NDIS InterfaceStreams Transport Protocols.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Resnet Enhancements and Directions Part 1, Bruce Campbell, Information Systems and Technology.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
CS591-Fall 10 Clonts 1 Wireless Network Security Michael Clonts.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
CTC228 Nov Rest of the Semester...  Next time (Mon 23 Nov) – Go over test, prep lightning talks  Then (Wed Nov 25) – Class canceled (so you.
CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler.
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
NetReg with Devices Micronet 10/21/2015 Saskia Etling, Information Security and Policy.
ITIS 3110 LAB 10 Wireless. configure Pi to use a Wi-Fi dongle New lab Extremely simple.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
NetModule Cloud Solution Professional M2M Networking out of the Cloud © 2014 NetModule AG Slide 1.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Quick Start Up Tool. Why the StartUp Tool? Plug-and-play installation of Ingate and SIP trunking, as simple as possible. Necessary steps:  Unpack your.
Module 5: Network Policies and Access Protection
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
TSS 3293 W IRELESS N ETWORK SECURITY AIMAN ALIF BIN SUPIAN TSK WIRELESS GATEWAY.
Networking Week #10 OBJECTIVES Chapter #6 Questions Review Chapter #8.
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
WIRELESS NETWORK SECURITY MUHAMMAD AFI AMIRUL BIN RAMLE.
Cafanh Seminar Saturday 15, 2015 Speaker: Jean Bernard Choudja.
Goals Introduce the Windows Server 2003 family of operating systems
What’s New In WatchGuard Wi-Fi Cloud v8.6
Presentation transcript:

MAC Registration or Fun with Wireless at the Member’s meeting

MM wireless infrastructure Two Vivato Wi-Fi “Switches” A couple of conventional access points Special DHCP server Special DNS server DNS redirector Snort box (IDS) MAC address database

MM wireless manpower Four to six folks walking around with wireless analyzers A fulltime engineer from Vivato Parts of network engineers to assist with configuration and running of the various servers

Objectives Provide a quality wireless service for the MM Identify and fix problems caused “ad-hoc” access points Detect and remedy infected hosts

How are we doing? The registration process seems to be working well (lucky to have caught static DNS address issue) The wireless service has been somewhat problematic, seems to be client specific We do have the ability to identify ad-hoc hosts and their owners relatively easily Snort was started today, so we’ll see if that’s of value

What we do on campus Simple Access Points, no security features used SSID broadcast in the clear DHCP serves addresses VPN server (currently PPTP) used to as a gateway

Our experience VPN works pretty well, current OSs provide user-friendly PPTP clients Still high barrier for network connected appliances (e.g., B VoIP phone) No good way to deal with guest users (both generating credentials as well as dealing with VPN software

Biggest Problem Windows XP’s easy to use “feature” that allows you to share you wired connection at layer 2 Currently growing tools to management the campus-wide service Scaling issues with PPTP server (hint: when vender gives performance data for IPsec don’t assume PPTP will be similar)