Introduction  Trinity guest network project objective  College wireless network overview  Public wireless/hospitality internet access  Guest network.

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Designing for Pervasive Network Security. Designing for Security Our aim in this section will be to concentrate on how campus Networks can be designed.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
SMC2804WBRP-G Barricade™ g 2.4GHz 54Mbps Wireless Cable/DSL Broadband Router with USB Print Server SMC2804WBRP-G
Terena Mobility Taskforce update Klaas Wierenga SURFnet.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
CONFIDENTIAL © Copyright Aruba Networks, Inc. All rights reserved Adaptive Trust Security Policies for Today’s Enterprise Mobility Pete Ryan – ClearPass.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
TF Mobility Group 22nd September A comparison of each national solution was made against Del C – “requirements”, the following solutions were assessed.
Hotspot Express Product Presentation
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
Secure Computing Network
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
Hotspot Express $ One of the Pioneers of complete WiFi solutions in India $ Hardware to create HOTSPOTs  Software to secure HOTSPOTs & Manage the users.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco NAC Guest Server Guest Access - Simplified Tim Wellborn SE Sangeeta.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
By: Alena Newcomb.  What is a WI-FI hotspot?  Wireless Local Area Network location that provides broadband Internet access.  Use of laptops, PDA, or.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Juniper Bridge Ltd | Suite 5, Crescent House | Yonge Close, Eastleigh | Hampshire SO50 9SX | |
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
© Siemens 2006 All Rights Reserved 1 Challenges and Limitations in a Back-End Controlled SmartHome Thesis Work Presentation Niklas Salmela Supervisor:
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
Ch. 5 – Access Points. Overview Access Point Connection.
Unified Student-Centric Authentication and Authorization Nathan Wilder Special Assistant - Technology Office of the CIO.
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Altai Certification Training Backend Network Planning
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
SG-VRT ppt Page 1 VPN Broadband Communication Risk-free networking connection via PLANET PLANET Technology Corp.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
70-411: Administering Windows Server 2012
Wireless Past, Present and Future. University of Auckland Robert Beattie.
Networks QUME 185 Introduction to Computer Applications.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
1 Session Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. Building Broadband Service Manager Technology Presentation BBSM Hotspot.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
Securing Wired Local Area Networks(LANs)
CAEN Wireless Network College of Engineering University of Michigan October 16, 2003 Dan Maletta.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
CUONG NGUYEN PRIYA PAKHANAVAR RUSSELL ROBINSON RPC Hotels.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
● Albert Einstein explained it best: ● "You see, wire telegraph is a kind of a very, very long cat. You pull his tail in New York and his head is meowing.
Microsoft Management Seminar Series SMS 2003 Change Management.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
7.4 Update - ISE Session.
NETWORKING & SYSTEM UPDATES
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
HotSpot Software HotSpot Billing Software helps you control and bill Internet access by redirecting your customers to sign-in or pay on your login page.
Windows Vista Configuration MCTS : Advanced Networking.
Open source IP Address Management Software Review
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
Getting Connected to NGS while on the Road…
How To Set Up A Wireless Network
Unit 27: Network Operating Systems
ISMS Information Security Management System
Getting Connected to NGS while on the Road…
AbbottLink™ - IP Address Overview
Chapter 10: Advanced Cisco Adaptive Security Appliance
What’s New In WatchGuard Wi-Fi Cloud v8.6
Presentation transcript:

Introduction  Trinity guest network project objective  College wireless network overview  Public wireless/hospitality internet access  Guest network access challenges  Guest access solution  IP3 NetAccess subscriber gateway  Outcomes and future developments

Trinity Guest Network Project  Objective: To facilitate the connection of short stay authorized Guests to the College data wireless (mandatory) and wired (desirable) network.  Examples of authorised Guests: - Conference delegates - Visiting academics and Library readers - VIPs, sales representatives, contractors - Summer accommodation visitors

College wireless network overview  Size and locations –750 users last academic year –Approx 145 APs in 50 locations, main Campus, St James, Dartry, D’Olier Street, Foster Place/College Green complex

College wireless network overview (cont)  Enterprise class based on Cisco Structured Wireless Aware Network (SWAN).  Secure –802.1X/EAP authentication via Radius/AD –Dynamic 128bit encryption –MAC address registration –VLAN’ed  Clients –802.1X compatible –College AD domain, OS patches, AV, high support  Internet connectivity limited, LAN based services available

Public wireless hotspots/Hospitality Guest Internet access  Low security  Any wireless client adapter will connect  Little wireless client configuration to connect  Full or almost full internet access  Connection established using a prepaid access code or credit card via a web based login portal  Connectivity and session management is usually controlled by a wireless gateway device providing a reliable controlled connection

Guest network access challenge  To provide an reliable network service to guests with the following characteristics –Low client configuration –Access code/portal authentication –Compatibility for most hardware and software types –Low user support requirements –Feature rich in terms of internet availability  Benefit from existing extensive infrastructure  Protect College’s other data networks and reputation from intentional/unintentional misuse of guest network

Guest access solution  Provide public wireless hotspot/hospitality type connectivity features using the existing campus network infrastructure  This is achieved by “overlaying” a Guest enabled network on the existing campus network using VLAN technology and an internet gateway device  A number of internet gateway devices were evaluated

Devices evaluated:  Bluesocket WG5000 wireless gateway (August 2004).  Cisco Building Broadband Services Manager (BBSM) ver 5.3. (May 2005).  IP3 NetAccess NA1500 internet gateway (July 2005).

Primary evaluation criteria:  VLAN based guest client discovery*.  Ability to generate its own access codes to facilitate Guest authentication*.  Session and bandwidth control, logging and accounting.  Ease of integration with existing campus network infrastructure, must support min users.  Customisable login portals, DHCP (NAT/PAT),SMTP, support for RADIUS authentication.

Evaluation Outcome: Bluesocket WG 5000 Cisco BBSM 5.3 IP3 NA1500 NetAccess VLAN based client discovery* YESNOYES Ability to generate own access codes* NOYESYES All other features YESYESYES

IP3 Enterprise Network Firewall Guest overlay architecture Wired Guest (VLAN 14) Wired Staff/Student etc Wireless Guest (VLAN 14), Authentication: OPEN Wireless Staff/Student Authentication 802.1X/EAP Internet IDS appliance

IP3 NetAccess subscriber gateway Access Control, Billing, and Subscriber Management Solution  Flash-based Network Appliance  802.1Q VLAN support.  Internal Access Code Generation & Authentication  Custom Login Portals.  Integrated DHCP, Firewall, & Web Servers  RADIUS AAA support  Supports VPN Pass-Through.

1. Guest connects to wired/wireless network, (SSID: TCDguest) 2. Guest client obtains DHCP assigned private IP address, opens Web browser, IP3 redirects to custom login screen. 3. Guest enters guest access code 4. IP3 provides authentication & accounting 5. IP3 manages bandwidth, access code duration. IP3 NetAccess manages Guest Internet Connections Internet, , VPN, etc. IP3 NetAccess

Portal groups:  Combination of the following: –Assigned (Guest) VLAN –Assigned (customised) login portal –Payment method (access code) –Product (eg 512K bandwidth)

Portal Groups

Portal groups cont’d

Portal Groups – VLAN’s

Portal Groups – Login portal

Portal Groups – login portal

Portal Groups – Payment methods

Portal groups - Products

Portal Groups – Products contd

Access codes - overview:  Created using access code generator.  Codes may be valid between a fixed start/end date or allow a one-off session from time of activation.  The generated access codes can be exported from the IP3 appliance in.CSV format.  The exported codes are then merged with a customised TCD access code token template before printing.  Codes are printed from a standard LaserJet colour printer using Avery business card labels.

Access codes - generation

Access codes generation - contd

Access codes - tokens

Outcomes  Over 500 guest users have been facilitated since the system was rolled out in August 2005 –First trial end July, Maths Lattice conference (55) –Production end Aug, Eurographics 2005 (>200) –Sept., BA conference (BA press users fallback) –Sept., EDNO, Maths, Nursing Studies –many individual requests

Outcomes (cont) I wanted to say that the wireless access in the printing house worked flawlessly yesterday. Our international evaluation panel and the SFI and IDA minders plugged in, retrieved their and I think this helped enormously in getting across an image of a professional organization with it's act together. One of the panellists from a University in the South of England commented that he'd never be able to get this kind of service in his home University!. So the day was a big success from our point of view..Thanks Again,

Future Developments  There has been much interest from the College community in this new service, strong demand is anticipated during 05/06 academic year  Automate process of distributing access codes  Using other authentication methods and additional VLAN’s to provide: – Quarantine/basic services network – PDA and handhelds – Facilitate Eduroam visitors