Library items tagged: advisory

Anonymous
Scott Armitage is a member of the IT Services department at Loughborough University and works within the Network & Security Team. Scott has been one of the key people responsible for the deployment and management of wireless networking at Loughborough and is also heavily involved in deploying 802.1X on the wired network. Recently he has also been contracted to JANET(UK) as an advisor for the newly created Wireless Technology Advisory Service (WTAS).
Anonymous
Operating System Support Currently client devices pose the largest potential problem when deploying 802.1X. Whilst modern operating systems such as Microsoft® Windows Vista/XP®, Mac OS X® 10.4/10.5 and Linux® natively support 802.1X, older OS such as Microsoft® Windows 98/ME® do not. Additionally there are many other devices on the network which do not support 802.1X such as printers, network music player, desktop hubs/switches, and the current iPhone (Firmware 1.1.4.). Workarounds must be found if these devices are to continue functioning on the network.
Anonymous
Updated: 4/06/2021 The key component in 802.1X is the RADIUS server which is capable of AAA. There are several widely-deployed commercial RADIUS servers available: Microsoft® IAS, Cisco® ACS, Funk Steel-Belted Radius. There are also two widely deployed Open Source RADIUS servers available, FreeRADIUS and RADIATOR. FreeRADIUS is non-commercial GPL software, RADIATOR is commercial.
Anonymous
Prerequisites To deploy 802.1X within your organisation you will require suitable infrastructure capable of supporting it.
Anonymous
How 802.1X works There are three main components in the 802.1X authentication cycle:
Anonymous
022 (04/08) This document was produced to share knowledge, experience and current developments surrounding campus 802.1X implementation within the JANET community. Readers are assumed to have a basic knowledge of networking concepts and preventive security awareness. A companion technical guide Security Matters is available.
Anonymous
PB/INFO/071 (10/06) WEP, WPA or Other? The JANET Wireless Advisory Group (WAG) strongly advises the replacement of WEP techniques with WPA or WPA2/802.11i-based security, or alternatives such as encrypted VPN and self-securing protocols like SSH, as soon as possible.
Anonymous
PB/INFO/64 (11/05)
Anonymous
PB/INFO/065 (11/05) The Extensible Authentication Protocol (EAP) is best considered as a framework for transporting authentication protocols, rather than as an authentication protocol itself. EAP can be used for authenticating dial-up and VPN connections, and also Local Area Network (LAN) ports in conjunction with IEEE 802.1X.
Anonymous
PS/JOG/DOC/02 (11/06) 1 Introduction This document is a guide for organisations connected to Janet that wish to have two network connections operating simultaneously, one to Janet and the other to another ISP. Such an arrangement is commonly called multihoming. The guide explains the issues that a customer should take into consideration before submitting a multihoming request to Janet(UK) A multihoming request form is provided in Appendix 1.