Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 8/19/04 NetReg Update Wireless Update & Demo SP2.

Slides:



Advertisements
Similar presentations
Infrastructure Services. Introducing Al-Futtaim Technologies One of the regions leading System Integrators Strong partnerships with leading global ICT.
Advertisements

CTS Wireless Pilot Status Quarterly Customer Meeting January 22, 2013.
Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 4/21/05 SPAM Update Manage IT Update Manage IT Demo.
Lotus Notes - the University of Nebraska Experience Greg Gray University of Nebraska Central Administration Computing Services Network.
Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 2/19/04 alias update Alias subscription demo.
SALSA-NetAuth SALSA-FWNA BoF Kevin Miller Duke University Internet2 Member Meeting May 2005.
Overview of Wireless Network Steven Fetcie Infrastructure Manager Information Services.
Module 5: Configuring Access for Remote Clients and Networks.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
NPTF Wireless Discussion. 3/3/20032 Agenda Goals Strategy Current status Future plans Challenges Options.
Network Planning Task Force Special Spring Session.
Windows Server 2008 Network Access Protection (NAP) Technical Overview.
Remote Networking Architectures
IT Briefing August IT Briefing Agenda 8/17/06 Organization tweaks EOL Demo Symantec Reporting demo VPN Update & IdM NetCom Q&A Karen Jenkins.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Windows 2003 and 802.1x Secure Wireless Deployments.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 7/15/04 PS Support Overview June Action Items TS.
MikroTik Experience Overview - Wireless ISP Solutions
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Microsoft Windows 8.1 Enterprise: A brief overview of Microsoft Windows 8 Enhancements. Welcome!
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
MIMCom 2006: Deploying a campus area network for the University Teaching Hospital Lusaka – Zambia Midterm Presentation March 24th 2006 Project Team: Michael.
Altai Certification Training Backend Network Planning
The "How" and "Why" of a Large-Scale Wireless Deployment  March 3, 2004  EDUCAUSE Western Regional Conference Sacramento, CA Copyright Philip Reese,
70-411: Administering Windows Server 2012
Implementing Network Access Protection
Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 1/20/05 iCommand & Remedy Update SESA Overview &
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Wireless LAN Expansion Proposal Presentation to the UTFAB Monday, March 5, 2007 Scott Baily, Associate Director for Networking,
IT Briefing March IT Briefing Agenda 3/16/06 Security Announcements eResearch Overview Housing Overview & Demo Update on current performance problems.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 11: Remote Access Fundamentals
Module 7 Planning Server and Network Security. Module Overview Overview of Defense-in-Depth Planning for Windows Firewall with Advanced Security Planning.
IPv6, the Protocol of the Future, Today Mathew Harris.
Simplifying the Configuration of Student Laptops — StirlingVPNSetup Simon Booth University of Stirling Laptop Forum 27th June 2006.
CAEN Wireless Network College of Engineering University of Michigan October 16, 2003 Dan Maletta.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 7/17/05 New scanning tools EOL/eVax & BTS Oracle.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 8/19/04 SW Distribution Update CSD Updates –iCommand.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
IT Briefing April IT Briefing Agenda 4/20/06 Web Update eSubmissions Overview AAIT Finance Team Overview IT Website Enhancements Security Updates.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
CRM in Education: Raising Standards. Saving Time. Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
SharePoint in the Education Space Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
TOPIC: AUTHENTICITY CREATED BY SWAPNIL SAHOO AuthenticityAuthorisation Access Control Basic Authentication Apache BASIC AUTHENTICATIONDIGEST ACCESS AUTHENTICATIONDHCP.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Information Technology at Emory IT Briefing January 2004.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
RADIUS By: Nicole Cappella. Overview  Central Authentication Services  Definition of RADIUS  “AAA Transaction”  Roaming  Security Issues and How.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Project ICTanzania 2006 Team 5 Saad Riaz | Zach Isamuyo | Nsubis Genesis | Mikael Corp.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Networks
Module 9: Configuring Network Access
Virtual Private Network
Virtual Private Networks (VPN)
MICROSOFT Networking with Windows Server VCE
Welcome To : Group 1 VC Presentation
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Server-to-Client Remote Access and DirectAccess
Presentation transcript:

Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 8/19/04 NetReg Update Wireless Update & Demo SP2 Knowledge Sharing Jay Flanagan Paul Petersen All

Information Technology at Emory Wireless Update & Demo

Information Technology at Emory Information Technology Division Technical Services Agenda Short History of the Wireless Project Current Project Status How Emory’s Wireless Works Demonstration

Information Technology at Emory Information Technology Division Technical Services Wireless History 1/27/04: Ways & Means Meeting –Presented NetCom’s initial research –Asked to proceed with infrastructure development using NetCom funds –Asked to estimate cost of campus wide wireless –Asked to analyze different billing models

Information Technology at Emory Information Technology Division Technical Services Wireless History cont. 4/13/04: Ways & Means Meeting –Presented campus wide estimate and billing models –Asked to build list of University only common areas that would benefit the most from wireless access –Asked to estimate cost of common area installation

Information Technology at Emory Information Technology Division Technical Services Wireless History cont. 6/8/04: Ways & Means Meeting –Presented wireless common areas, installation cost and operational cost –Startup operational funding model approved –Wireless announcement and approval process identified –Netcom approved to move forward with common area installation

Information Technology at Emory Information Technology Division Technical Services Wireless Project Status All three wireless pilots complete Management system and support infrastructure in place Netcom wireless workgroup and ITD/NetCom wireless planning group established Wireless support positions identified and recruiting has begun

Information Technology at Emory Information Technology Division Technical Services Wireless Project Next Steps Complete installation of wireless networking for University users in common areas Install wireless in requested areas based on appropriate request procedures (Healthcare or University)

Information Technology at Emory Information Technology Division Technical Services Wireless Common Areas Ways & Means approved the following areas to be funded centrally and installation efforts have begun –Woodruff Library –Cox Hall –SAAC –Dobbs University Center –Quadrangle –Health Sciences Center Quad

Information Technology at Emory Information Technology Division Technical Services Wireless Equipment Access Points manufactured by Colubris Networks –Named “hottest startup” at Supercomm –Deployed by over 500 companies and Universities McDonalds, University British Columbia, McGill University, Nagoya University, AT&T, Marriott, Hilton, Barnes and Noble,…

Information Technology at Emory Information Technology Division Technical Services Security Security and Authenticated Access is achieved using VPN (PPTP) –VPN is supported on the widest variety of clients –As new wireless authentication and encryption standards are ratified we will be able to transition

Information Technology at Emory Information Technology Division Technical Services The Parts

Information Technology at Emory Information Technology Division Technical Services How it works Wireless Client associates to the Access Point (AP) and is given a private IP address by DHCP server on the AP Wireless Client establishes VPN (PPTP) tunnel to AP. AP uses campus Radius servers to check authentication credentials Campus DHCP server provides global IP address to wireless client Wireless Client is on the network

Information Technology at Emory Information Technology Division Technical Services Demonstration

Information Technology at Emory Information Technology Division Technical Services NetCom