Real world application Corporate Wireless Networking Andrew Yeomans DrKW & Jericho Forum Board.

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Brute Force Attack Against Wi-Fi Protected Setup
Anatomy of an Wi-Fi Enterprise Wireless LAN Chris De Herrera Pacific Crest Bank Chief Information Officer Webmaster, Tablet PC Talk, CEWindows.NET.
Wi-Fi Technology.
Customer Insight: CSO's Perspective – What Edge? Microsoft Research EdgeNet, June 2006 Mark Ashida General Manager Windows Enterprise Networking.
Page 1 April Visions and business opportunities for wireless and mobile communications.
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Copyright 2001 – Wireless-Nets, Ltd.Page 1 Public Wireless LAN Hotspots Applications and Technologies September 27, 2001 Presented by: Jim Geier Principal.
All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
1MEDIACON 2004 © 2001, Cisco Systems, Inc. A View on Mobility for Multimedia Arthur Feather Mobile Wireless Group Cisco Systems Arthur Feather Mobile Wireless.
Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
Faculty of Computer Science & Engineering
A Wireless Local Area Network (WLAN) is a network that interconnects devices using radio waves. Wireless networking technologies allow devices to communicate.
Gold Country Computer Learning Center March 2006 Is Wireless for You? Roger Thornburn.
Unisys Mobile CommHub – Inventing the Future Presented by: Edward Minyard, ITIL Partner Global Infrastructure Services.
Service Provider WiFi Addressing the Mobile Data Challenge
WI-FI BY AMIEE STICKELLS. WHO INVENTED WI-FI ? There is many contributors that helped make Wi-Fi Vic Hayes has been called the "father of WiFi", Vic Hayes.
Bluetooth and Wi-Fi Kane Hartley.
Omniran Wi-Fi Hotspot Roaming Use Case Date: Authors: NameAffiliationPhone Max RiegelNSN
Licia Florio EUNIS05, Manchester 1 Eduroam EUNIS Conference, June Licia Florio.
Omniran ecsg 1 Introduction to OmniRAN EC SG Max Riegel (OmniRAN SG Chair)
Omniran ecsg 1 OmniRAN Introduction and Way Forward Max Riegel (OmniRAN SG Chair)
16-Wirless Networking Technologies Dr. John P. Abraham Professor UTPA.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
What is Wireless LAN? Mika Setälä Chairman, HiperLAN/2 Global Forum Marketing Working Group And what it is not!
Real world application  Protocols  Paul Simmonds ICI Plc. & Jericho Forum Board.
Prepare for the future  The de-perimeterised “road-warrior”  Paul Simmonds ICI Plc. & Jericho Forum Board.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Wireless Devices Trusted Platform Module (TPM). Action Buttons I’ve included an action button of one of the websites I looked at for wireless devices.
300Mbps Dual Band Wireless VDSL2 Router VDR-300NU.
Real world application  Voice over IP  John Meakin Standard Chartered Bank & Jericho Forum Board.
SSL From Your Smartphone Support for Android Smartphones /
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
© Siemens 2006 All Rights Reserved 1 Challenges and Limitations in a Back-End Controlled SmartHome Thesis Work Presentation Niklas Salmela Supervisor:
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
WELCOME!. Page: 2 Agenda One is impressive – two make a powerful team! Networking solutions, the Extreme way Coffee Break Security solutions, the NetScreen.
Jericho Forum Achievements  Steve Whitlock Board of Management, Jericho Forum ®
Surviving in a hostile world  The myth of fortress applications  Tomas Olovsson CTO, Appgate Professor at Goteborg University, Sweden.
Education roaming Secure Wireless Service for Research and Education.
Computer Networks Unit 1 – BTA 3O Ms. Chytra. Introduction to Networks Most people working in an office with more than a few computers will be using some.
VoIP in Disaster & Emergency Response Voice over IP in Disaster and Emergency Response Team Members: Muhammad Ali Mansoor A. Siddiqui Carlos Loarca de.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Deepnet Unified Authentication for Outlook Anywhere.
A tree line has a central line connecting together a series of star networks. The server is connected to a central line. Tree Network As the star, and.
For Wi-Fi The is internationally describing characteristics of a wireless local network. It was named after a group of people who invented.
Networking Components BY: JOSON ABRAHAM LTEC 4550.
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Wireless security Wi–Fi (802.11) Security
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
COA Masterclass The introduction! Paul Simmonds Board of Management, Jericho Forum ® ex.CISO, ICI Plc.
Federated Wireless Network Authentication Kevin Miller Duke University Internet2 Joint Techs Salt Lake City February, 2005.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
SEMINAR ON “ REMOTE CONTROLLING OF TECHNICAL SYSTEMS USING MOBILE DEVICES”
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
4G Wireless Technology Prepared by K.Sai Kumar Yadav 07K81A0584.
Virtual Private Networks
Fourth ICT Security Conference 2017
Secure Connected Infrastructure
Providing Teleworker Services
OmniRAN Introduction and Way Forward
Anatomy of a Wireless LAN – Part I
Virtual Private Network
Networking Essentials
SCCAN Forum Month 2002 doc.: IEEE Feb-19 SCCAN Forum
OmniRAN Introduction and Way Forward
By Seferash B Asfa Wossen Strayer University 3rd December 2003
By Markus Kriechhammer
Presentation transcript:

Real world application Corporate Wireless Networking Andrew Yeomans DrKW & Jericho Forum Board

Secure wireless connection to LAN Corporate laptops Use i (WPA2) Secure authenticated connection to LAN Device + user credentials Simple? LAN AD Radius Servers Corporate

Not just laptops But also… Audio-visual controllers Wi-Fi phones LAN AD Radius Servers CorporateAV

Blinkenlights? Play with mobile phone! Photo: Dorit Günter, Nadja Hannaske

Guest internet access too Mixed traffic Trusted or untrusted? How segregated? Internet LAN AD Radius Servers GuestCorporateAV Secure Insecure

Laptops also used at home or in café 7491 Costbucks coffee 7491 Internet LAN AD Radius Servers GuestCorporateAV Secure Insecure VPN

Security complexity Need location awareness i if corporate wireless link VPN if not corporate Still not perfect security, insecure connections needed to set up café/home connections Security on direct connections too

Jericho visions Internet LAN AD Servers Secure application protocols Common authentication Inter-network roaming USB Costbucks coffee USB GuestCorporateAV USB QoS gate

Todays complexity 7491 Costbucks coffee 7491 Internet LAN AD Radius Servers GuestCorporateAV Secure Insecure VPN

Challenges to the industry 1. Companies should regard wireless security on the air- interface as a stop-gap measure until inherently secure protocols are widely available 2. The use of 802.1x integration to corporate authentication mechanisms should be the out-of the box default for all Wi- Fi infrastructure 3. Companies should adopt an any-IP address, anytime, anywhere (what Europeans refer to as a Martini-model) approach to remote and wireless connectivity. 4. Provision of full roaming mobility solutions that allow seamless transition between connection providers

Paper available from the Jericho Forum The Jericho Forum Position Paper Wireless in a de- perimeterised world is freely available from the Jericho Forum website