eduroam(radius based Federation)
|
|
|
- Esther Beverley Adams
- 10 years ago
- Views:
Transcription
1 eduroam(radius based Federation) Deokjai Choi (Chonnam National University, Korea)
2 WHAT IS eduroam? eduroam: EDUcation ROAMing Provides secure internet access for academic roamers. User experience - Open your laptop and be online.
3 WHY eduroam? Researchers: Travel with WLAN-enabled notebooks. Want transparent, secure network access. Want similar experience at visited institution as home. Experience facilitated by seamless sharing of network resources. Better for roamers, easier for administrators.
4 History of eduroam Europe : Started as pilot under TERENA TF-Mobility - Since Sept 2004: ops&dev of European eduroam funded by GEANT : European eduroam confederation policy agreed, & Operation Team (OT) formed OT deployed eduroam global database, support services : Production service commenced 17th September AARNet eduroam 4 of 10
5 History of eduroam APAN 2006: eduroam Project Group commenced 2008: eduroam AU (incl. NZ) Pilot Service commenced eduroam NROs in Hong Kong, Japan, Macao, Taiwan 2011: eduroam production service commenced 2014: REANNZ became eduroam NZ NRO 17th September AARNet eduroam 5 of 10
6 History of eduroam Canada US (BCNet), transferred responsibility to CANARIE Internet2 announced offering eduroam service to US institutions > 2012: Africa, South America 17th September AARNet eduroam 6 of 10
7 Global eduroam 현황 Number of independent sovereign states in the world 195 Number of countries listed by GeGC * GeGC : Global eduroam Governance Committee 85 Number of signatory NROs Globally 67 -> 69 Number of NROs in global database Number of service locations registered in eduroam db Number of NROs being monitored by monitor.eduroam.org Number of Institutions using F-Ticks (all under EU TLRS except CA) 36 (all under EU TLRS except CA) Number of Institutions using CAT From NWitheridge s presentation at TNC
8 Asia-Pacific eduroam 현황 NRS KOREA KISTI Asia-Pacific Confederation is being prepared.
9 AUTHENTICATION AND 802.1x User EAPOL EAP over RADIUS f.i. LDAP Authenticator (AP or switch) RADIUS server Institution A User DB [email protected] Internet 교직원 VLAN 학생 VLAN Guest VLAN signalling data
10 HOW DO THE PIECES FIT TOGETHER? AN EXAMPLE User Authenticator (AP or switch) RADIUS server University A User DB RADIUS server University B User DB user [email protected] XYZnet 교직원 VLAN 학생 VLAN Guest VLAN Central RADIUS Proxy server Trust: RADIUS & policy documents signalling data 802.1X + EAP (VLAN assignment)
11 802.1x Authentication(EAP-PEAP/EAP-TTLS)
12 MAIN COMPONENTS OF eduroam Network Access Server (NAS): Wireless Access Point or 802.1x compatible wired switch. Client with configured supplicant. Hierarchy of RADIUS Authentication Servers (AS). IEEE 802.1x. IEEE 802.1q. Standard for VLAN assignment.
13 eduroam service KEY Points Eduroam value proposition realized - becoming increasingly global Global expansion brings challenges - Trust (importance of Policy & Proof of Compliance) - Scalability of infrastructure Resourcing - Shoe-string budgets Ease of deployment & participation Global collaboration - Shared effort in development of ancillary services
14 Understanding Roles 1. NRO(National Roaming Operator) KISTI = Korea NRO 2. RO(Roaming Operator) For colleges and universities in Korea Chonnam National University 3. IdP(Identity Provider) Each university will provide Idp service for its users. Normally, each university will play roles of Idp and SP. 4. SP(Service Provider) Visiting university will play a role of SP for the visitor. * Telecommunication provider which provides Aps for the campus will play a role of SP only.
15 NRO : Things to do Entity which is approved by RC(Roaming Confederation). If there is no RC, it should be approved by GeGC. NRO has a responsibility to take care of eduroam service for the country. RC(Roaming Confederation) : a set of NROs which locate nearby, and approved by GeGC such as Europe RC. GeGC(Global eduroam Governance Committee) : consists of NROs and RCs, and operated by TERENA - Responsibility for eduroam service for the country. - Determines each IDP is legally registered education/research organization for the country. - Determines each SP is adequate or not. - Should have communication channel with other NRO - Should publicize the available SP accoridng to the GeGc guideline. - Should have communication channel with all SPs to solve the problems or needs. - Should put technical people, available eduroam sites, Idp lists, RC policy etc through web - Should maintain enough log information to track users. - Should register eduroam name and logo to its own country.
16 RO 역할(eduroam 서비스 구성도) *.kr에 대해 KISTI로 전달 eduroam Korea RO KISTI 기 연동된 KAIST, GIST 등 을 제외한 *.ac.kr에 대해 교육기관RO로 전달 Federation level 교육기관 RO에 속하지 않은 요청에 대해 KISTI로 전달 통신사 USIM 정보를 이용한 접속 필터링.com / co,kr 등 렐름 필터링 루핑 방지를 위한 룰 설정 전국대학 RO 전남대 1 2 Institutional level 전남대 Keduroam으로 서비스 중인 35개 대학 eduroam 으로 SSID 변경 KAIST GIST
17 IdP Roles Entity which manages user ID and provides authentication for its users. Idp should be also SP, and it is called home organization. - Should agree to global policy as well as domestic policy - Should understand its own authentication servers (product name, version, functions) - Should open firewall to other RO s authentication server - Should set aside staffs for eduroam, helpdesk, security - Should configure or modify radius server according to the RO s guide. - Should prepare test account for automatic monitoring by RO. - Should guide how to use to its own member, and provide web link to NRO. - Should notify the logging items and usage of those loging information
18 SP Roles Entity which provides WLAN service to the valid user, and called visiting organization. Normally, each member university will be a SP as well as Idp. Sometimes, telecommunication provider can play a role of SP only. - Should agree to global as well as domestic policy. - It is recommended to use VLAN to separate visitors traffic (very important) - Should broadcast eduroam SSID - Should keep the log file to defend itself from security issues. - Should notify the logging information and the reason of the logging
19 Trends Next generation roaming service - Next generation i.e RADIUS over TCP using TLS - Dynamic Discovery - Seek advice from GeGC Moonshot : ID Federation based on Radius - authentication : Radius / for rich authorisation semantics - From only wi-fi to various services
20 Moonshot technologies Moonshot builds on the eduroam technologies EAP (RFC 3748): strong mutual authentication RADIUS (RFC 2865): federation between domains To this, Moonshot adds SAML, for rich authorisation semantics Integration using operating system security APIs SSPI: Windows GSS-API (RFC 2078): Other operating systems SASL (RFC 4422): Windows and other operating systems 20
21 Deployment requirements Most Higher Education organisations are nearly Moonshot-ready today A connection to eduroam A RADIUS server (any modern RADIUS product should support pre-production testing today). There is also an experimental capability to integrate FreeRADIUS with the Shibboleth IdP Moonshot client and server plug-in Linux: packaging available for Debian & RHEL; Scientific Linux soon Windows: native support using prototype plugin Mac: Packaging almost complete for Snow Leopard and Lion Moonshot Identity Selector to facilitate the selection of an identity to use, for GUI environments (Windows, Mac & Linux)
22 Architecture (1) Credentialing (6) SSH session (5) Attributes (3) Authentication (2) SSH negotiation (4) RADIUS SSH client SSH server RADIUS server OpenSSH used as example of application; many others also apply 22
23 Application support Most modern applications use at least one of the security APIs supported by Moonshot Correctly written applications will just work without modification or recompilation Less correctly written applications may require minor modifications Project Moonshot is testing applications and sending patches upstream 23
24 24 PuTTY OpenSSH
25 25 IE Apache
26 26 Outlook 2010 Exchange 2010
27 Q & A Ερωτήσεις και απαντήσεις 質 問 と 回 答 Fragen und Antworten 질문과 답변 問 題 與 解 答 Questions et réponses Questions and Answers Domande e risposte أسئلة وأجوبة Quaestiones et Answers Frågor och svar Вопросы и ответы 감사합니다!
Standardisation of eduroam Testing, Monitoring, Metrics and Support Tools
STANDARDISATION OF EDUROAM TESTING, MONITORING, METRICS AND SUPPORT TOOLS Page 1/16 20 January 2014 Standardisation of eduroam Testing, Monitoring, Metrics and Support Tools Neil Witheridge [email protected]
eduroam in Asian countries - - benefits, and 4ps for opera4on - -
36th APAN Mee4ng Aug. 22, 2013, Daejeon, Korea eduroam in Asian countries - - benefits, and 4ps for opera4on - - Hideaki Goto, Tohoku University, Japan Motonori Nakamura, NII, Japan Hideaki Sone, Tohoku
Belnet Networking Conference 2013
Belnet Networking Conference 2013 Thursday 12 December 2013 @ http://events.belnet.be Workshop roaming services: eduroam / govroam Belnet Aris Adamantiadis, Nicolas Loriau Bruxelles 05 December 2013 Agenda
IdentiFi and Eduroam Roaming Wireless Service Integration CONFIGURATION GUIDE
IdentiFi and Eduroam Roaming Wireless Service Integration CONFIGURATION GUIDE TABLE OF CONTENTS Introduction... 3 Prerequisites... 3 Design and Deployment Overview... 4 Configuring the wireless SSID and
2.1.1 This policy and any future changes requires ratification by CAUDIT.
1.0 Background to this document 1.1 This document sets out guidelines that cover the control of the supply and receipt of Internet access for educational purposes, that is primarily (but not exclusively)
Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security
Secure WiFi Access in Schools and Educational Institutions WPA2 / 802.1X and Captive Portal based Access Security Cloudessa, Inc. Palo Alto, CA July 2013 Overview The accelerated use of technology in the
Using Windows NPS as RADIUS in eduroam
Using Windows NPS as RADIUS in eduroam Best Practice Document Produced by the UNINETT-led working group on campus networking Authors: P. Dekkers (SURFnet), T. Myren (UNINETT) February 2015 GÉANT Association
Licia Florio Project Development Officer [email protected] www.terena.org Identity Federations in Europe
APAN Conference Honolulu, Hawaii 24 January 2008 Licia Florio Project Development Officer [email protected] www.terena.org Identity Federations in Europe Outline Networking Organisations in Europe Requirements
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart [email protected]
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server
Application Note EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server Introduction The demand for wireless LAN (WLAN) access to the public IP network is growing rapidly. It is only
Eduroam wireless network - Windows 7
Eduroam wireless network - Windows 7 How to configure laptop computers and tablets to connect to the eduroam wireless network. Contents Introduction 1 Instructions for Windows 7 Devices 2 Technical Information
Joint Research Activity 5 Task Force Mobility
Joint Research Activity 5 Task Force Mobility Network authentication with Network Roaming with eduroam Stefan Winter TREFpunkt 13, Örebro, Sweden 12 Oct 2005 1 Overview Differences
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
OpenFlow-based authorization mechanism for Wi-Fi roaming systems
29th TF-MNM Meeting Nov. 22, 2012, Belgrade, Serbia OpenFlow-based authorization mechanism for Wi-Fi roaming systems Hideaki Goto NII / Tohoku University, Japan 1 contents Policy-based authorization for
How To Set Up An Ipa 1X For Aaa On A Ipa 2.1X On A Network With Aaa (Ipa) On A Computer Or Ipa (Ipo) On An Ipo 2.0.1
Implementation of IEEE 802.1X in wired networks Best Practice Document Produced by UNINETT led working group on security (UFS 133) Authors: Øystein Gyland, Tom Myren, Rune Sydskjør, Gunnar Bøe March 2013
Network Access Security It's Broke, Now What? June 15, 2010
Network Access Security It's Broke, Now What? June 15, 2010 Jeffrey L Carrell Network Security Consultant Network Conversions SHARKFEST 10 Stanford University June 14-17, 2010 Network Access Security It's
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
Eduroam wireless network Windows Vista
Eduroam wireless network Windows Vista university for the creative arts How to configure laptop computers to connect to the eduroam wireless network Contents Contents Introduction Prerequisites Instructions
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
IDENTITY MANAGEMENT OF USERS IN eduroam
IDENTITY MANAGEMENT OF USERS IN eduroam Maja Górecka-Wolniewicz, Nicolaus Copernicus University Toruń & PIONIER Network, Poland Tomasz Wolniewicz, Nicolaus Copernicus University Toruń & PIONIER Network,
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments Centralized WLAN management and auto provisioning Manages up to 0 APs with granular access control Advanced RF management
An Infocard-based proposal for unified SSO to eduroam
An Infocard-based proposal for unified SSO to eduroam Enrique de la Hoz, Antonio García, Diego López, Samuel Muñoz University of Alcala (Spain), RedIRIS (Spain) TNC2009, Málaga (Spain), June 9 th 2009
A practical guide to Eduroam
1 A practical guide to Eduroam Rok Papež ARNES - Academic and research network of Slovenia [email protected] Akyaka,Gökova, April 2007 2 Eduroam AAI 3 Eduroam wireless network components Access Points
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
Eduroam wireless network Apple Mac OSX 10.5
Eduroam wireless network Apple Mac OSX 0. How to configure laptop computers to connect to the eduroam wireless network Contents university for the creative arts Contents Introduction Prerequisites Instructions
RadSec RADIUS improved. Stig Venaas [email protected]
RadSec RADIUS improved Stig Venaas [email protected] Overview RADIUS overview RadSec overview What is wrong with RADIUS RadSec benefits Radsec implementations, deployment and standardisation RADIUS overview
Mobility, Network Access Control and Convergence for Voice, Video and Data Applications on Corporate Wireless & Wired Networks. UCOPIA White Paper
Mobility, Network Access Control and Convergence for Voice, Video and Data Applications on Corporate Wireless & Wired Networks UCOPIA White Paper October 2008 TABLE OF CONTENT 1 Introduction... 4 2 UCOPIA
MSC-131. Design and Deploy AirDefense Solutions Exam. http://www.examskey.com/msc-131.html
Motorola MSC-131 Design and Deploy AirDefense Solutions Exam TYPE: DEMO http://www.examskey.com/msc-131.html Examskey Motorola MSC-131 exam demo product is here for you to test the quality of the product.
WLAN Information Security Best Practice Document
WLAN Information Security Best Practice Document Produced by FUNET led working group on wireless systems and mobility (MobileFunet) (WLAN security) Author: Wenche Backman Contributors: Ville Mattila/CSC
UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU
UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU ITMS: 26140230008 DOPYTOVO ORIENTOVANÝ PROJEKT Moderné
Penn State Wireless 2.0 and Related Services for Network Administrators
The following document provides details about the operation and configuration parameters for Penn State Wireless 2.0 and Visitor Wireless. It is intended for Penn State network administrators who are considering
Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks
Cisco IT Article December 2013 End-to-End Security Policy Control Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks Identity Services Engine is an integral
Particularities of security design for wireless networks in small and medium business (SMB)
Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, [email protected]
Application Note Secure Enterprise Guest Access August 2004
Application Note Secure Enterprise Guest Access August 2004 Introduction More and more enterprises recognize the need to provide easy, hassle-free high speed internet access to people visiting their offices,
The All-in-One, Intelligent WLAN Controller
The All-in-One, Intelligent WLAN Controller Centralized management for up to 64* APs ZyMESH mitigates complex, inconvenient cabling Wi-Fi deployments Client steering enhances efficiency of wireless spectrum
Eduroam wireless network Apple Mac OSX 10.4
Eduroam wireless network Apple Mac OSX 0.4 How to configure laptop computers to connect to the eduroam wireless network Contents university for the creative arts Contents Introduction Prerequisites Instructions
Canterbury College Eduroam Wi-Fi Guide
Canterbury College Eduroam Wi-Fi Guide Version 2.2 (Sept 2014) DG11 Phone: 01227 811144 Email: [email protected] Web: ITservicedesk.cant-col.ac.uk Table of Contents I. Overview... 2
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2 1 Dept of CSE, P.A.College of Engineering 2 Dept of CSE, Srnivas institute
Aerohive Private PSK. solution brief
Aerohive Private PSK solution brief Table of Contents Introduction... 3 Overview of Common Methods for Wi-Fi Access... 4 Wi-Fi Access using Aerohive Private PSK... 6 Private PSK Deployments Using HiveManager...
vwlan External RADIUS 802.1x Authentication
6ABSCG0002-29B July 2013 Configuration Guide vwlan External RADIUS 802.1x Authentication This configuration guide provides an in-depth look at external Remote Authentication Dial-In User Service (RADIUS)
The All-in-One, Intelligent WLAN Controller
The All-in-One, Intelligent WLAN Controller Centralized management for up to 64* APs mitigates complex, inconvenient cabling Wi-Fi deployments Comprehensive features for WLAN performance optimization and
Network Access Control ProCurve and Microsoft NAP Integration
HP ProCurve Networking Network Access Control ProCurve and Microsoft NAP Integration Abstract...2 Foundation...3 Network Access Control basics...4 ProCurve Identity Driven Manager overview...5 Microsoft
Cisco WAP321 Wireless-N Selectable-Band Access Point with Single Point Setup
Data Sheet Cisco WAP321 Wireless-N Selectable-Band Access Point with Single Point Setup Secure and Easy to Deploy Wireless-N Networking with Gigabit Ethernet Connectivity Highlights Provides selectable-band
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security. Cisco Small Business Access Points
Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points Advanced, High-Performance Wireless Access for the Small Business Highlights Supports high-bandwidth applications
NXC5200/ NWA5000-N Series Wireless LAN Controller/ 802.11 a/b/g/n Managed Access Point
Higherbandwidth, higher density with full range of 802.11n s (NWA5000N Series) Comprehensive guest network management with auto guest account generator and Web authentication support Manage up to 240 APs
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2)
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) SUNY Technology Conference June 21, 2011 Bill Kramp FLCC Network Administrator Copyright 2011 William D. Kramp All Rights
Edith Cowan University Information Technology Services Centre
Information There are three wireless networks on campus which give you access to the ECU website, the staff intranet, the internet and other ECU resources: ECU This is the easiest to use and safest wireless
WIRELESS SECURITY IN 802.11 (WI-FI ) NETWORKS
January 2003 January WHITE 2003 PAPER WIRELESS SECURITY IN 802.11 (WI-FI ) NETWORKS With the increasing deployment of 802.11 (or Wi-Fi) wireless networks in business environments, IT organizations are
Palo Alto Networks User-ID Services. Unified Visitor Management
Palo Alto Networks User-ID Services Unified Visitor Management Copyright 2011 Aruba Networks, Inc. Aruba Networks trademarks include Airwave, Aruba Networks, Aruba Wireless Networks, the registered Aruba
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
Solving the Sticky Client Problem in Wireless LANs SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS. Aruba Networks AP-135 and Cisco AP3602i
SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS Aruba Networks AP-135 and Cisco AP3602i Conducted at the Aruba Proof-of-Concept Lab May 2013 Statement of test result confidence Aruba makes every attempt
Ruckus-Bradford Interop Setup
Ruckus-Bradford Interop Setup Bradford Network Sentry was purpose-built to deliver Network Access Control (NAC). It dynamically leverages the continuously growing library of security commands and controls
Wi-Fi Security. More Control, Less Complexity. Private Pre-Shared Key
Wi-Fi Security More Control, Less Complexity Private Pre-Shared Key Mobility Meets Security Are the consumer devices in your environment exploding? Are your employees bringing their own devices? And has
Deploy WiFi Quickly and Easily
Deploy WiFi Quickly and Easily Table of Contents 3 Introduction 3 The Backhaul Challenge 4 Effortless WiFi Access 4 Rate Limiting 5 Traffic Filtering 5 Channel Selection 5 Enhanced Roaming 6 Connecting
CISCO WIRELESS SECURITY SUITE
Q&A CISCO WIRELESS SECURITY SUITE OVERVIEW What is the Cisco Wireless Security Suite? The Cisco Wireless Security Suite is an enterprise-ready, standards-based, wireless LAN (WLAN) security solution for
Wireless Network Configuration Guide
CIT Table of Contents Introduction... 1 General Wireless Settings... 1 1. Windows XP Wireless Configuration... 2 2. Windows XP Intel Pro Wireless Tool... 7 3. Windows Vista Using the Windows Wireless Tools...
APPENDIX 3 LOT 3: WIRELESS NETWORK
APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
ClickShare Network Integration
ClickShare Network Integration Application note 1 Introduction ClickShare Network Integration aims at deploying ClickShare in larger organizations without interfering with the existing wireless network
The All-in-One, Intelligent NXC Controller
The All-in-One, Intelligent NXC Controller Centralized management for up to 24 APs ZyXEL Wireless Optimizer for easily planning, deployment and maintenance AP auto discovery and auto provisioning Visualized
Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points
Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points Advanced, High-Performance Wireless Access for the Small Business Highlights Supports high-bandwidth applications
ARCHITECT S GUIDE: Mobile Security Using TNC Technology
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 [email protected] www.trustedcomputinggroup.org
NXC5500/2500. Application Note. Captive Portal with QR Code. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note Captive Portal with QR Code Copyright 2015 ZyXEL Communications Corporation Captive Portal with QR Code What is Captive Portal with QR code?
Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet
Разработка программного обеспечения промежуточного слоя TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet Contents - SURFnet Middleware Services department: - eduroam, SURFfederatie,
Network Services One Washington Square, San Jose, CA 95192-0209 408-924-1530
SJSU Premier Wi-Fi Service Network Services One Washington Square, San Jose, CA 95192-0209 408-924-1530 The SJSU Premier Wi-Fi service transmits your data across a secure, encrypted connection. This ensures
Server Certificate Practices in eduroam
Server Certificate Practices in eduroam Best Practice Document Produced by the CSC/Funet-led working group MobileFunet Authors: Tomi Salmi (CSC/Funet), Tuukka Vainio (University of Turku) September 2015
WatchGuard SSL 2.0 New Features
WatchGuard SSL 2.0 New Features For Secure Remote Access, Identity Management, and Network Access Control Introduction WatchGuard SSL 2.0 unifies identity and access management capabilities, with features
Deploy and Manage a Highly Scalable, Worry-Free WLAN
Deploy and Manage a Highly Scalable, Worry-Free WLAN Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control simplifies complex, inconvenient cabling Wi-Fi
Cellular Data Offload. And Extending Wi-Fi Coverage. With Devicescape Easy WiFi
Cellular Data Offload And Extending Wi-Fi Coverage With Devicescape Easy WiFi Case Study October 2010 List of Acronyms 3G Third Generation 4G Fourth Generation API Application Programming Interface AP
Intelligent WLAN Controller with Advanced Functions
Intelligent WLAN Controller with Advanced Functions Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control ZyMESH simplifies complex, inconvenient cabling
Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.
Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
WIRELESS SETUP FOR WINDOWS 7
Computing & Communications WIRELESS SETUP FOR WINDOWS 7 For assistance during the configuration process please call the Computing and Communications Help Desk at 639-2049, [email protected] Who should
Cisco 526 Wireless Express Mobility Controller
Cisco 526 Wireless Express Mobility Controller Product Overview The Cisco 526 Wireless Express Mobility Controller is a network appliance that automatically optimizes the basic wireless network and supports
Mobility Task Force. Deliverable D. Inventory of 802.1X-based solutions for inter-nrens roaming
Mobility Task Force Deliverable D Inventory of 802.1X-based solutions for inter-nrens roaming Version 1.2 Authors: Erik Dobbelsteijn [email protected] Contributions: Klaas Wierenga (SURFnet
Wireless Technology Seminar
Wireless Technology Seminar Introduction Adam Worthington Network Consultant [email protected] Wireless LAN Why? Flexible network access for your users? Guest internet access? VoWIP? RFID? Available
Aruba-Certified Design Expert (ACDX) Study Guide
Aruba-Certified Design Expert (ACDX) Study Guide Table of Contents Introduction Prerequisites for the ACDX Exam Format Software Versions Exam Deliverables Exam Equipment Scheduling and Paying for an Exam
Software-Defined Networking for Wi-Fi White Paper
Software-Defined Networking for Wi-Fi Introduction Software-Defined Networking for Wi-Fi The explosion in the number and diversity of wireless devices in today s enterprise networks has increased the pressure
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
Authentication and Security in IP based Multi Hop Networks
7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security
How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility
w h i t e p a p e r How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility So much is happening today to give you a chance to rethink your wireless architecture. Indeed, you
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
Virtuelle WLAN Controller Alcatel Lucent Wireless LAN Instant AP
Virtuelle WLAN Alcatel Lucent Wireless LAN Instant AP S. 1 Alcatel Lucent Instant Technology Over-the-air provisioning: Industry only wireless over the air WLAN setup Wizard driven setup: 5 minute WLAN
