Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.

Slides:



Advertisements
Similar presentations
A Successful Help Desk Process for all IT Support
Advertisements

© Copyright Computer Lab Solutions All rights reserved. Do you need usage information about your computer labs? Copyright Computer Lab Solutions.
The Academic Computing Assessment Data Repository: A New (Free) Tool for Program Assessment Heather Stewart, Director, Institute for Technology Development,
Southwest Educause 2003 © Baylor University 2003 Adapting Enterprise Security to a University Environment Bob Hartland Director of IT Servers and Network.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Hotspot Express $ One of the Pioneers of complete WiFi solutions in India $ Hardware to create HOTSPOTs  Software to secure HOTSPOTs & Manage the users.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Webdisk Storage Anywhere, Anytime for Everyone Presented at Educause, 2003 Copyright 2003, Jeremy Mortis and Harold Esche. This work is the intellectual.
Wireless networking Roger Treweek Oxford University Computing Services.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Wi-Fi Structures.
1 Installing a Wireless Network for University Members Oliver Gorwits, Roger Treweek Oxford University Computing Services
The Homegrown Single Sign On (SSO) Project at UM – St. Louis.
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
Company LOGO WIRELESS DEPLOYMENT A successful solution to Campuswide role-based secure Wi-Fi deployment Andrea Di Fabio – Information Security Officer.
Wireless LANs A New Computing Experience Doug Jackson Director, Technology Customer Services University of Texas at Dallas EDUTEX 2002: Austin Copyright.
Mobile Computing and Security Authenticated Network Access (ANA) Jon Peters Associate Director Dave Packham Manager of Network Engineering NetCom University.
 All of you should be able to describe how a network works.  Most of you will be able to identify the main devices necessary for a network.  Some of.
Technical Training: DIR-615
1 BASIC TELECOMMUNICATIONS Wireless fidelity x.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
Rutgers IT Complex Michael R Mundrane 4 December 2001 Rutgers University Computing Services.
Please Note: Copyright –David L. Snellman This work is the intellectual property of the author. Permission is granted for this material to be shared.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Copyright Michael White and Sandra Thompson, This work is the intellectual property of the author. Permission is granted for this material to be.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
PowerPoint Presentation to Accompany Chapter 9 Networks & Communications Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
The "How" and "Why" of a Large-Scale Wireless Deployment  March 3, 2004  EDUCAUSE Western Regional Conference Sacramento, CA Copyright Philip Reese,
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 11: Remote Access Fundamentals
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
PRESENTATION ON WI-FI TECHNOLOGY
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Module 8: Managing Terminal Services. Overview Use and manage Terminal Services RemoteApp programs Use and manage Terminal Services Gateway Optimize and.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
● Albert Einstein explained it best: ● "You see, wire telegraph is a kind of a very, very long cat. You pull his tail in New York and his head is meowing.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to Networking.
LINCWorks Mesh Networking User Guide. This user guide will give a brief overview of mesh networking followed by step by step instructions for configuring.
Chapter Objectives In this chapter, you will learn:
Copyright Joel Rosenblatt 2010
Jill Forrester and David Kelly| October 20, 2011
Module Overview Installing and Configuring a Network Policy Server
Adapting Enterprise Security to a University Environment
How To Set Up A Wireless Network
Unit 27: Network Operating Systems
Project for OnLine Instructional Support (POLIS)
Planning a Network Upgrade
myIS.neu.edu – presentation screen shots accompany:
Unit 11- Computer Networks
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
Instructor Materials Chapter 8: Applied Networking
Presentation transcript:

Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Baylor University 14,221 Students 1,750 Full Time Employees 80 Buildings

Baylor Vision Connecting People with Ideas

How are we using Wireless? Roaming Network Access Point-to-Point Connectivity Point-to-Multipoint Connectivity

Wireless Applications Library Loaner Laptops EBIC MBA and EMBA ResNet access for dorms that are difficult to wire Mobil network access Connecting small remote facilities to LAN

Unique Users Over Past Year

Wireless Network Growth Currently 60 access points installed Projected to have 210 installed access points by Fall 2002

Current Wireless Coverage

Projected Wireless Coverage

Access Point Installation Site Survey 2 lines to every location Power supplied over ethernet cable Configure AP with proper channel separation Document – location, coverage area, channel

Wireless Troubleshooting Tools Access Point management tools Wireless sniffers Spectrum analyzers Documentation Wireless Test Stations

Security Who ? What ? Where ? When ?

Wireless Usage Policies Wireless falls under Computer Usage Policy Baylor Air-Space Policy for 2.4GHz spectrum

Wireless Network Practices Firewall blocks connection attempts from the Internet to Wireless hosts Firewall requires user authentication before allowing access to campus LAN and Internet Centralized logging server for authentication information

Wireless Authentication - Current Design Client application NetAuth DHCP server Firewall RADIUS server LDAP Centralized logging

Problems with Current Design Password is passed in clear text Maintaining client application for wide range of Operating Systems (Palm Os, Linux, Windows CE…) Limitations in customizing the firewall’s authentication mechanisms Modular Design creates configuration issues and multiple points of failure

Needs: Replace DHCP server, firewall, and client with one device – Wireless Firewall Gateway (WFG) Took a solution described by a NASA white paper then expanded and customized.

DHCP service Secure Web Site Firewall Router Wireless Authentication – Proposed Design

WFG Log On

The WFG solution addresses the following issues: Clear text password Holes in existing solution if a client uses a static IP and/or a falsified MAC address No client application to maintain – only requirement is a secure web browser Less expensive to maintain hardware/software Highly customizable

Contributors: Bob Hartland Director for IT Servers and Network Services Baylor University Scott Day Cori Rhodes Jon Allen Speaker: Technical:

Questions?

Support Issues Wide variety of platforms Non-standard personal machines and cards Maintaining 200+ access points Troubleshooting a mobile device Wireless become default for accessing resources

Air-Space Policy Key Points: Describe what the policy covers (include reference to FCC documentation) We are concerned with the 2.4GHz range used by b Explain why policy is needed Only way to help guarantee a reliable wireless network. State that Baylor will conduct regular scans for interference Prevents redistribution of Baylor’s network List sanctions or consequences Students dealt with through the student policies Work with faculty/staff to eliminate interference

Wireless Test Stations Guarantee one functional access point Troubleshooting steps for user to walk through Near a phone for phone support if necessary

Who Can Access Baylor LAN? Wireless network name User Authentication

What Info is Accessible over WLAN? Username and password Assume all other WLAN traffic is unsecure

WFG Design Map

Example Coverage Map

Organizational Chart

Design Map

Current NetAuth Application