For those using a VPN to control the WLAN, what measures do you have
in place to defend the systems from one another?

For example, with Cisco VPN client, you can have it disable the
system's interface to its actual LAN while tunneled to the VPN
address.  But with others (e.g. MS-PPTP), the system's "real" LAN
interface remains accessible, so a weakly defended system becomes prey
for LAN neighbors (maybe some walk-by's who never bother to
authenticate to the VPN), even if they're busy working over their VPN
tunnel.

--

  ------------------------------------------------------------
  Gary Dobbins, CISSP -- [EMAIL PROTECTED]
  Director, Information Security
  University of Notre Dame, Office of Information Technologies
  Voice: 574.631.5554
  ------------------------------------------------------------



Bradford B. Saul wrote:

Okay:

we've seen some discussion on 802.1x usage (is there more out there?)  Some
PEAP, some LEAP, and TLS seems to be out unless you have an existing PKI
infrastructure (yeah, right).

We saw one mention of Bluesocket.  How many other schools are opting for WLAN
edge treatment using Bluesocket or Reefedge products?  Are you happy with the
performance?  Client issues?  Cost/value?

Then there's the tried & true firewall/VPN solution.  Client issues?  Do you
permit your cloud to be open in private address space or do you control
somehow control association with your APs  Do you pemit limited access to
resources (without the benefit of the VPN session) to those services that have
strong AuthN support (e.g. SSL enabled Webmail for instance)?

Finally -- how many schools have opted not to broadcast SSIDs?

come on folks -- the list is only as good as those who take time to contrubute
meaningful dialogue.

-d


********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/cg/.


OK, Dewitt has thrown down the gauntlet......

The setup at JMU is as follows:

    1)  We broadcast the SSID's
            - Simply a support issue.  We wanted to make the wireless
                network as "user" proof as possible
    2)  Address space is private (10.x.x.x)
            - No other reason than why burn real addresses.
    3)  Anyone can associate with an AP.
            - We only have ~35 at this point
            - Our goal was to cover large common areas and move
                slowly into all areas
    4)  Access to resources is controlled by the resource
            - ie. Passwords etc....
    5)  VPN Client free to all users
            - Currently: Win 2K/XP and MacOSX
            - Working on Linux
            - Working on PDA's (Need help, hint to Bill Paraska!)
    6)  VPN Concentrator
            - Brand C
    7)  Auth is proxied through RADIUS to LDAP
    8)  No public access
            - Only users with valid JMU LDAP credentials can
                use the wireless network
            - This does at times, although limited, create support
                issues for visitors.  But most of the time there is
                a member of the JMU community in the crowd that can help.

I realize what we have done is not exactly cutting edge, but we have had
great success and with the wireless Vlan being propagated campus wide we
have a single procedure for the users.  I think that is the single biggest
reason it has gone so well so far....

Brad
-----------------------------------
Bradford B. Saul
Lead Network Engineer
IT - Network Engineering
Hoffman Hall Room 10, MSC 1401
James Madison University
Harrisonburg, VA 22807
V: (540) 568-2379
F: (540) 568-1696
M: (540) 435-3079
[EMAIL PROTECTED]

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/cg/.

--


  ------------------------------------------------------------
  Gary Dobbins, CISSP -- [EMAIL PROTECTED]
  Director, Information Security
  University of Notre Dame, Office of Information Technologies
  Voice: 574.631.5554
  ------------------------------------------------------------

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/cg/.

Reply via email to