How To Manage An 802.11 Wireless Network At A University



Similar documents
Wireless Network Standard and Guidelines

Wireless Ethernet LAN (WLAN) General a/802.11b/802.11g FAQ

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

Wireless Network Policy

Chapter 2 Configuring Your Wireless Network and Security Settings

Wireless Troubleshooting

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

How To Use The Cisco Aironet 1240G Series For A Wireless Network (Wired) And For A Wired Network (Wireless)

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

INFORMATION GOVERNANCE POLICY: NETWORK SECURITY

Medical Device Connectivity

Chapter 3 Safeguarding Your Network

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

Frequently Asked Questions: Home Networking, Wireless Adapters, and Powerline Adapters for the BRAVIA Internet Video Link

Cisco Aironet 1130G Series IEEE g Access Point

Cisco Aironet Wireless Bridges FAQ

Wireless Technology Seminar

Developing Network Security Strategies

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

White Paper. Wireless Network Considerations for Mobile Collaboration

Wireless. Secure. MobileLink wireless ECG communication

Link Layer and Network Layer Security for Wireless Networks

How To Protect A Wireless Lan From A Rogue Access Point

The next generation of knowledge and expertise Wireless Security Basics

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications

HANDBOOK 8 NETWORK SECURITY Version 1.0

Municipal Mesh Network Design

Guidelines on Wireless Networks for Schools (March 2015)

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Chapter 2 Wireless Settings and Security

Go Wireless. Open up new possibilities for work and play

The Cave Hill Campus Wireless Access Guide

WLAN Authentication and Data Privacy

Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System

Student Halls Network. Connection Guide

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

Configuring Security Solutions

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

QuickSpecs. HP M n Access Point Series. Models HP M n WW Access Point. Key features

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka

Technology in Schools. School Wireless LAN Guidelines Building and Maintaining a Wireless Network. Version 1.2

54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 2.0

54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 1.8

This chapter discusses how to design a wireless network, and includes the following sections: Making the Business Case. Wireless Technology Overview

The Wireless LAN (Local Area Network) USB adapter can be operated in one of the two following networking configurations :

A Division of Cisco Systems, Inc. Wireless A/G. USB Network Adapter. User Guide WIRELESS WUSB54AG. Model No.

ALL Mbits Powerline WLAN N Access Point. User s Manual

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.

Best Practices for Deploying Wireless LANs

Linksys WAP300N. User Guide

HP AP8760 Dual Radio a/b/g Access Point Overview

Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan Wharf T&T Limited. Version: 1.0 Date: 26 January 2004

This KnowledgeShare document addresses the main types of wireless networking today based on the IEEE standard.

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Best Practices for Outdoor Wireless Security

Table of Contents. Product Overview...3 Package Contents...3 System Requirements...3 Introduction...4 Features...5 Hardware Overview...

Installation, Configuration and Operation FRITZ!WLAN. USB Stick N

Key Features. Multiple Operation Modes ENH500 can operate into four different modes with Access Point, Client Bridge, Client Router and WDS Mode.

CHAPTER 1 1 INTRODUCTION

Setting up of a Wireless Distribution System (WDS)

HUAWEI Enterprise AP Series ac Brochure

Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY

communication over wireless link handling mobile user who changes point of attachment to network

SmartDiagnostics Application Note Wireless Interference

Deploy WiFi Quickly and Easily

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/ Semester 2

Security in Wireless Local Area Network

Wireless LANs vs. Wireless WANs

Wireless Network Security Position Paper. Overview for CEO s

Interference Identification Guide. Table of Contents

HP M n Access Point Series

LTE, WLAN, BLUETOOTHB

Apple AirPort Networks

WIRELESS SETUP FOR WINDOWS 7

Expert Reference Series of White Papers. Wireless Bandwidth Not Necessarily as Advertised COURSES.

How To Secure Wireless Networks

PCMCIA Wireless LAN Card User s Manual

Setting Up Your Wireless Network

A White Paper from Laird Technologies

XX-XXX Wireless Local Area Network Guidelines. Date: August 13, 2003 Date Adopted by NITC: Other:

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

Securing Wireless LANs with LDAP

Cisco on Cisco Best Practices Cisco Wireless LAN Design

Transcription:

WIRELESS POLICY 1 INTRODUCTION 1.1 Wireless networking is a fast emerging technology and is set to continue to grow for the foreseeable future. It is recognised that wireless networking could offer benefits to the University community in the pursuit of its primary objectives. The recent ratification of further 802.11 standards for wireless access will continue to develop interest in the technology which is by its nature relatively straightforward to deploy. While this may be true and suitable for some environments, wireless LANs within the University form part of the bigger infrastructure which includes the wired network. In order to protect the business needs of the University the wireless network must meet the same level of security employed by the rest of the infrastructure. This policy is to ensure that the deployment of wireless networking is controlled and managed in a centralised way to provide functionality and optimum levels of service whilst maintaining network security. It can no longer be acceptable practice to allow the installation and operation of wireless devices on campus without a clear and agreed policy outlining the roles and responsibilities of all parties. This policy sets out a framework to deal with these issues. The intention of this policy is to define roles and responsibilities for the design of any emerging wireless network, the installation, registration and management of wireless access points, adequate management and allocation of the wireless frequency spectrum and the services offered to end users for wireless access. 1.2 The Policy is maintained and regulated by the University s Information Services department. 1.3 The Policy is cross-referenced to other University policies and the University IT Regulations. Copies of these policy statements are obtainable via Information Services, as appropriate. 1.4 The Policy will be reviewed and if necessary amended from time-to-time, with particular regard to the expected developments in wireless technology and operational use within the University, and by reference to the development of recognised best practice. 2 RATIONALE AND PURPOSE 2.1 This policy outlines a common set of procedures and operational criteria, in order to effectively manage 802.11 wireless LANs. Due to the characteristics of Wireless Copyright Staffordshire University Page 1 of 8 Wireless Policy

technology, all wireless developments must be planned, deployed and managed in a careful and controlled manner, and developed in accordance with the Universities computer and standardisation initiative (see appendix A). Information Services has to address the topic of wireless deployment in order to avoid certain issues. There are three main issues this policy aims to address:- Interference 802.11 wireless technology uses frequencies from a band which is divided into channels. In order for adjacent access points to work with each other and not cause interference, a different channel must be used for each Access Point (AP). Although there are multiple channels within the band, only three are nonoverlapping and can guarantee a signal free from interference. It is therefore required that the appropriate channel is assigned to the AP by Information Services in order to avoid any interference related performance issues. Security Problems Wireless LANs offer connectivity to anyone within range of an access point; physical boundaries are no longer a relevant option for preventing access to the network. Installation of non-approved devices with little or no security which, if connected to the University network, would breach the security of the main infrastructure allowing any unauthorised user with appropriate equipment to connect. Danger of Device Diversity Non-standard or misconfigured wireless devices can cause disruptions to the wireless LANs and subsequently the wired network. Staffordshire University therefore prohibits the installation of any non-standard wireless access points. This policy is to centralise the purchase and installation of wireless equipment to ensure that inappropriate devices are not installed and used on the University network. 2.2 The Policy describes the standards that users are expected to observe when using University wireless facilities, and ensures that users are aware of the consequences attached to inappropriate use of the facilities. 2.3 The Policy also specifies the actions that the University will take in the investigation of complaints received from both internal and external sources, about any unacceptable use of University wireless facilities. 3 POLICY STATEMENT 3.1 Scope of the Policy This wireless policy applies to all areas of wireless connectivity to the University network infrastructure, and includes all wireless devices operating within the University IP address range, on any of the University premises, or any remote location directly connected to the campus network. Information Services are currently responsible for the University network infrastructure. The wireless network is an extension to this network and therefore Information Services has the sole responsibility for the design, deployment and management of the University wireless LANs. Copyright Staffordshire University Page 2 of 8 Wireless Policy

3.2 Policy Restrictions i. All Access Points must abide by all national regulations relating to Wireless Devices. ii. iii. iv. All existing Access Points must conform to recommended specifications as defined by Information Services. All new Access Points must be purchased via Information Services, in-line with Staffordshire University s current purchasing policy and University IT Standardisation initiative. All Access Points must follow the Information Services Standard Configuration settings for Access Points. v. Access Points will only support the 802.11b and 802.11g standards. vi. vii. viii. ix. Information Services prohibit the installation of any non-standard Access points. In line with the IT Regulations (See Appendix B) Information Services has the right to disable any non-standard device which may cause interference with existing approved Access Points. The offending device may be removed without prior notice. Proactive monitoring of wireless networks is undertaken by Information Services on a regular basis and any unauthorised Access Point will be removed from the network. Any future request for installation of new Access Points must be directed through Information Services. x. Information Services acts as the central management body in regulating the installation and maintenance of all 802.11 wireless LANs. 3.3 Appropriate and Proper Use Staffordshire University supports the appropriate and proper use of services and facilities that the University provides for its students, staff and other authorised users. 3.4 Regulatory Framework Associated with the provision of these services and facilities, Staffordshire University takes seriously its responsibility to provide an appropriate regulatory framework, including specific standards and guidance for the appropriate use of these University services and facilities. The Wireless Policy constitutes a component part of this regulatory framework. Copyright Staffordshire University Page 3 of 8 Wireless Policy

Use of all IT facilities provided by Staffordshire University is subject to the relevant Policies and Regulations, in particular the University IT Regulations and the University Internet Policy Statement. 3.5 Acceptance of Policies and Regulations It is a condition of use of IT facilities provided by Staffordshire University, by a student, member of staff or other authorised person, that the user agrees to be bound by the relevant University Policies and Regulations. 4 ROLES AND RESPONSIBILITIES 4.1 All Wireless LANs are monitored and maintained by the Networks & Telecommunications Group within Information Services. Any Access Point which is connected to the University network infrastructure becomes the responsibility of Information Services. 4.2 User responsibilities The following specific responsibilities apply to users of the University Wireless network. i. Users of the wireless network are responsible for their own computer equipment. The University accepts no responsibility for any loss or damage to your machine as a result of connection to the wireless network. ii. iii. Users have the responsibility to ensure that they are running up to date antivirus software and that the operating system is fully patched with the latest service packs and hot fixes. Users will authenticate on the wireless network for each session. Copyright Staffordshire University Page 4 of 8 Wireless Policy

Appendix A University Computer Standardisation Recommendations Ref recommendation 16: In order to protect the business needs of the University and to minimise any risk of damage to the security or integrity of University systems, all developments of the University network infrastructure must be in compliance with approved standards and approved by Information Services. Ref recommendation 17: For the avoidance of any adverse interaction with the University network, the provision and operation of any wireless networks in the University separate from the main network must also be in compliance with approved standards and agreed in advance of purchase with Information Services. Copyright Staffordshire University Page 5 of 8 Wireless Policy

Appendix B IT Regulations Ref recommendation 13: Users must not connect any unauthorised equipment to the University network without consultation and the prior written approval from Information Services. If Information Services has reasonable grounds for believing that any equipment may be the cause of unacceptable degradation of the performance of the network detrimental to other Users, then the User must co-operate with the disconnection of the equipment from the network pending resolution of the problem. Copyright Staffordshire University Page 6 of 8 Wireless Policy

Appendix C Glossary of Terms 802.11 Refers to a family of specifications developed by the IEEE for wireless LAN technology. 802.11 specifies an over-the-air interface between a wireless client and an access point or between two wireless clients. 802.11a Operates in the 5-GHz frequency range (5.125 to 5.85 GHz) with a maximum 54Mbit rate. The 5-GHz frequency band isn't as crowded as the 2.4-GHz frequency because it offers significantly more radio channels than the 802.11b and is used by fewer applications. It has a shorter range than 802.11g, is actually newer than 802.11b and isn't compatible with 802.11b. 802.11b Operates in the 2.4-GHz Industrial, Scientific and Measurement (ISM) band (2.4 to 2.4835 GHz) and provides rates of up to 11Mbit/sec. This is a very commonly used frequency. Microwave ovens, cordless phones, medical and scientific equipment, as well as Bluetooth devices, all work within the 2.4-GHz ISM band 802.11g Similar to 802.11b, but this standard supports data rates of up to 54Mbit/sec. It also operates in the heavily used 2.4-GHz ISM band but uses a different radio technology to boost overall throughput. It is compatible with 802.11b. 802.1X As the IEEE standard for access control for wireless and wired LANs, 802.1x provides a means of authenticating and authorizing devices to attach to a LAN port. This standard defines the Extensible Authentication Protocol (EAP), which uses a central authentication server to authenticate each user on the network Access Point (AP) is a WLAN transceiver or "base station" that can connect a network to one or many wireless devices. APs can also bridge to one another. Wireless devices, such as laptops or PDAs, connect to a wired LAN via an AP, which is a hardware device or a computer's software that acts as a communication hub. APs provide heightened wireless security and extend the physical range of a wireless LAN Extensible Authentication Protocol (EAP) is an 802.1x standard that allows developers to pass security authentication data between RADIUS and the access point (AP) and wireless client. EAP has a number of variants, including: EAP MD5, EAP-Tunnelled TLS (EAP-TTLS), Lightweight EAP (LEAP), and Protected EAP (PEAP Site Survey is undertaken at the location for a new wireless LAN in an effort to avoid what could be time-consuming and costly problems during deployment. It involves diagramming the network, checking the building and testing the equipment. Copyright Staffordshire University Page 7 of 8 Wireless Policy

WEP (Wired-Equivalent Privacy) protocol was specified in the IEEE 802.11 standard to provide a WLAN with a minimal level of security and privacy comparable to a typical wired LAN, using data encryption. It's now widely recognized as flawed because of an insufficient key length and other associated problems. Wi-Fi (Wireless fidelity) the generic term for 802.11 technology Wireless LAN uses radio frequency technology to transmit network messages through the air for relatively short distances, like across an office building or college campus. A wireless LAN can serve as a replacement for or more usually an extension to a wired LAN. WPA (Wi-Fi Protected Access) is a data encryption specification for 802.11 wireless networks that replaces the weaker WEP. It improves on WEP by using dynamic keys, Extensible Authentication Protocol to secure network access, and an encryption method called Temporal Key Integrity Protocol to secure data transmissions *definitions taken from www.computerworld.com Copyright Staffordshire University Page 8 of 8 Wireless Policy