Www.swan.ac.uk/lis. Supporting a Wireless Network By Gareth Ayres.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Heroix Longitude - multiplatform, automated application performance monitoring and management software.
HetnetIP Ethernet BackHaul Configuration Automation Demo.
Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
Network Asset Management at Jefferson Lab Bryan Hess, Andy Kowalski, Brent Morris,
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
University of Michigan Residence Halls Networking In-Room Student Registration System
Toolbox Mirror -Overview Effective Distributed Learning.
Monitoring a Large-Scale Network: Selecting the Right Tool Sayadur Rahman United International University & Network Manager, Financial Service.
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
Wireless Network Security Lab Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
Being Proactive with Computer Posture Assessment Department of Housing and Residence Education Charles Benjamin.
Mr. Mark Welton.  Three-tiered Architecture  Collapsed core – no distribution  Collapsed core – no distribution or access.
Network Perimeter Security Yu Wang. Main Topics Border Router Firewall IPS/IDS VLAN SPAM AAA Q/A.
1 Enabling Secure Internet Access with ISA Server.
Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas.
Platform as a Service (PaaS)
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Alison Davis and Peter Kurtz Port Based Network Authentication in a Lab Environment QUESTNet 2000.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Virtual Company Group 8 Presentation Date: June /04/2017
1 Network Statistic and Monitoring System Wayne State University Division of Computing and Information Technology Information Technology.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
MikroTik Experience Overview - Wireless ISP Solutions
Guide to MCSE , Second Edition, Enhanced1 Windows XP Network Overview Most versatile Windows operating system Supports local area network (LAN) connections.
OASIS V2+ Next Generation Open Access Server CSD 2006 / Team 12.
CSD 2006 / TEAM 12 Final presentation 29 th May 2006.
Shark: A Wireless Internet Security Test Bed Senior Design Project May07-09 Stephen Eilers Jon Murphy Alex Pease Jessica Ross.
Week 1 – Seneca Networking Environment. Agenda Overview of Seneca Server names How to access servers Terminal Emulation (Putty) Browser – IE, Netscape,
“DMZ In a Box”. What is a DMZ? As a military term As a computing term.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
University of Montana - Missoula Adam Ormesher & Chase Maier.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 11: Remote Access Fundamentals
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
IP Network Clearinghouse Solutions ENUM IP-Enabling The Global Telephone Directory Frank Estes Vice President , ext 224
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Wireless Authentication & 802.1X By Gareth Ayres.
Resnet Enhancements and Directions Part 1, Bruce Campbell, Information Systems and Technology.
Based on work by DoIT Network Services, UW-Madison The Network and the Role of Tools January 6, 2006 Ron Kraemer, Deputy CIO.
NUOL Internet Application Services Midterm presentation 22 nd March, 2004.
Module 7: Advanced Application and Web Filtering.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Networks Computer Technology Day 17. Network  Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
NetTech Solutions Protecting the Computer Lesson 10.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
NETWORKING & SYSTEM UPDATES
How Web Database Architectures Work CPS181s April 8, 2003.
Split your database Store temporary tables in a backend Don't use memo fields Create temporary tables to speed up queries Don't put Mac and Windows users.
Windows Vista Configuration MCTS : Network Security.
Web and Proxy Server.
Platform as a Service (PaaS)
Business System Development
Platform as a Service (PaaS)
Module 3: Enabling Access to Internet Resources
Platform as a Service (PaaS)
Munix for Education Content Filter, Bandwidth Control, Location Mapping, Movement Analysis, User Self Management Portal, Time Analysis, and much more ….
Welcome To : Group 1 VC Presentation
What’s New in Fireware v12.1.1
Based on work by DoIT Network Services, UW-Madison
Chapter 27: System Security
Tiers vs. Layers.
Presentation transcript:

Supporting a Wireless Network By Gareth Ayres

Agenda 1.0Overview of Swansea Wireless Internet Service 2.0Usage Statistics 3.0Support Issues 4.0Dirty Network Access Controller 5.0Future Developments

01 Overview of SWIS Swansea Wireless Internet Service consists of: 255 Cisco 1210 Access Points 4 RoamNode Servers 1 Cisco Wireless LAN Solution Engine 1 Dirty Network Access Controller 1 RADIUS Server 1 Wireless Management Interface

01 Overview of SWIS Coverage Area: All Halls of Residence on and off campus ( Students ) All Open Access labs on campus 4 Separate Library Buildings 50% of all other Campus buildings Hot Spots around campus

01 Overview of SWIS Access controlled by RoamNode which was covered by Jezz Palmer last year. Brief overview of network architecture.

02 Usage Statistics Statistical overview of wireless usage: Approx 2000 registered users Statistics generated from syslogs and custom java app with a MySQL database and PHP driven web front. 3 graphs : Unique Users, Connection Attempts, Bandwidth.

02 Usage Statistics

02 Usage Statistics

02 Usage Statistics

03 Support Issues Main areas of Support: Configuration Problems( 50%) Security (Malware/Antivirus) (40%) Other (hardware, , other applications) (10%)

03 Support Issues Issues with Support: Time of year determines what problems will occur At start of academic year, configuration and security issues At start of other terms, mainly security issues During terms even mixture

03 Support Issues Malware most time consuming support problem: Malware on students computers is rampant Student lifestyle major cause of malware problem - Lazy, illegal software, file sharing, computers/users from all over the world. Scans and removal times can be large. Some malware very complex to remove without formatting

03 Support Issues Support provided in two Tiers : Front Line IT Support : Deal with most basic queries and problems. Limited by skill and time available. Second Line Support : I deal with problems IT Support can not resolve or are not trained to do. Have access to logs etc.

04 Dirty Network Access Controller Linux Box with : Two Interfaces (vlan 666, vlan 1) DHCP Server – Provides IP’s IPTables – Blocks all traffic except port 80 & 445 which is routed to squid port. (ssh is also open to specific ip’s) Squid – checks all web requests against ACL Access Control Lists – Windows Update, Symantec etc

04 Dirty Network Access Controller Allows Students to get updates without authenticating Provides access to instructions without authenticating Lets students read instructions from their computers Speeds up malware removal time Helps IT Support diagnose problems Helps IT Support deal with problems faster

05 Future Developments Replace Roamnode with 802.1x service Incorporate security solution such as Vernier