Mobile Computing and Security Authenticated Network Access (ANA) Jon Peters Associate Director Dave Packham Manager of Network Engineering NetCom University.

Slides:



Advertisements
Similar presentations
Virtual Trunk Protocol
Advertisements

A Successful Help Desk Process for all IT Support
© Copyright Computer Lab Solutions All rights reserved. Do you need usage information about your computer labs? Copyright Computer Lab Solutions.
Virtual LANs.
Implementing Inter-VLAN Routing
Wireless & Mobile in the Library Indiana State University Library Ralph Gabbard, Judy Tribble, Paul Asay, Chris Hayes Copyright Ralph Gabbard, Judy Tribble,
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Module 5: Configuring Access for Remote Clients and Networks.
Office of the Vice President Copyright Notice Copyright Greg Hedrick, Matthew Wirges This work is the intellectual property of the author. Permission.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Terri Lahey LCLS Facility Advisory Committee 20 April 2006 LCLS Network Security Terri Lahey.
Company LOGO WIRELESS DEPLOYMENT A successful solution to Campuswide role-based secure Wi-Fi deployment Andrea Di Fabio – Information Security Officer.
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
Moving Your Paperwork Online Western Washington University E-Sign Web Forms Copyright Western Washington University, This work is the intellectual.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Rutgers IT Complex Michael R Mundrane 4 December 2001 Rutgers University Computing Services.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
VLANs.ppt CCNA Exploration Semester 3 Chapter 3
Test Review. What is the main advantage to using shadow copies?
Virtual Company Group 8 Presentation Date: June /04/2017
Configuring Routing and Remote Access(RRAS) and Wireless Networking
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
PowerPoint Presentation to Accompany Chapter 9 Networks & Communications Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice.
Voice VLANs Lecture 7 VLANs.ppt 21/04/ Apr-17
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
Semester 3, v Chapter 3: Virtual LANs
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
VLAN V irtual L ocal A rea N etwork VLAN Network performance is a key factor in the productivity of an organization. One of the technologies used to.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
1 Professor Emeritus Ray Schroeder Director of Technology-Enhanced Learning University of Illinois at Springfield Copyright Ray Schroeder, This work.
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Part V: Monitoring Campus Networks.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
© 2006 Property of Lancope. Proprietary and Confidential. Lancope and Emory University: Illuminating (and Securing) the Network Andy Wilson Senior Systems.
Based on work by DoIT Network Services, UW-Madison The Network and the Role of Tools January 6, 2006 Ron Kraemer, Deputy CIO.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs Cisco Networking Academy.
Portals and Web Standards Lessons Learned and Applied David Cook Copyright The University of Texas at Austin This work is the.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Switching in an Enterprise Network Introducing Routing and Switching in the.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
1 Large-scale (Campus) Lan design (Part II)  VLANs  Hierarchical LAN design.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 VLANs.
Copyright Joel Rosenblatt 2010
Chapter 1 Introduction to Networking
CCNA 3 Chapter 10 Virtual Trunking Protocol
Large-scale (Campus) Lan design (Part II)
Switch Setup Connectivity to Other locations Via MPLS/LL etc
Based on work by DoIT Network Services, UW-Madison
Best Practices for Configuring Stratix Managed Switches
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
Computer Networks Protocols
VLANS The Who, What Why, And Where's to using them
Presentation transcript:

Mobile Computing and Security Authenticated Network Access (ANA) Jon Peters Associate Director Dave Packham Manager of Network Engineering NetCom University of Utah Copyright David Packham and Jon Peters, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

University of Utah, located in Salt Lake City Department of Network & Communication Services (NetCom) responsible for campus network backbone, phone service, security, , help desk, phone operators Hosting the 2002 Winter Olympic opening and closing ceremonies, and the athletes’ residence village Background

Purpose of Presentation Authentication through a firewall. Authenticated network access (ANA).

Driving Need

Design Requirements Security Performance Scaling Cost Global authentication database model Minimum client side configuration Multi-platform support

Authentication through a firewall

Security Performance Scaling Cost

Authenticated Network Access (ANA) Components (2) redundant HSRP router capable of supporting multiple interfaces or virtual sub-interfaces and the ability to associate a user supplied MAC address per each interface. (2) redundant DHCP servers with (2) network interface cards each. (2) redundant LDAP server with (2) network interface cards. (2) redundant WWW/DNS server with (2) network interface cards. (2) redundant VLAN policy server with (2) network interface cards. Fully switched network capable of spanning certain vlans throughout the mobile computing area.

ANA

ANA Process Initial connection Authentication to network Continuance of lease Link down or release of IP address

ANA Client ANA Client connects to ANA controlled Cisco switch ANA Controlled Switch

? To which VLAN should this port belong? ANA Controlled Switch Cisco VPS1100

Place port in default VLAN for VTP domain. ANA Controlled Switch Cisco VPS1100

ANA Client ANA v3 Client requests and receives a DHCP address

ANA Client Client requests authentication page by launching a browser

ANA v3 Cisco VPS1100 ANA v3 commands the VPS server to place the switch port into a new VLAN

VPS server places the switch port into the VLAN assigned to the port via ANA v3 ANA Controlled Switch Cisco VPS1100

ANA Client Client has full access to open network

ANA Security – switched, logged, VPN usable Performance - < 30k Scaling – 50,000 S/F/S /day Cost – Log linear Global authentication, NID, LDAP, modular Minimum client side configuration – NONE! Multi-platform support – Linux/PDA/Mac

Daily Graphs

Long Term Graphs

Summary of Activity Average Number of Visits per Day on Weekdays468 Average Number of Hits per Day on Weekdays32,956 Average Number of Visits per Weekend1,009 Average Number of Hits per Weekend49,250 Most Active Day of the WeekWed Least Active Day of the WeekMon Most Active DateOctober 01, 2000 Number of Hits on Most Active Date58,379 Least Active DateSeptember 20, 2000 Number of Hits on Least Active Date5,624 Most Active Hour of the Day18:00-18:59 Least Active Hour of the Day06:00-06:59

Current Development Plan Addition of wireless networks and other devices. Addition of remote access users through VPN’s. Bandwidth and usage notifications. Post login licensed software download.

Address Web Server – Current Development Team Dave Packham Steve Scott Justin Kim Andrew Reich Mindy Sartor Past Team Members John Storm Kyle Mallory Alexander Quilter