implementation

14 April 2014 at 3:43pm
eduroam (education roaming) is the secure, world-wide roaming access service developed for the international research and education community. eduroam provides an infrastructure that allows users to authenticate onto a visited network (wireless and/or wired) using their home site credentials, without any local administrative burden or complexities on the user or the local IT staff. This course provides and overview of the service, its configuration & deployment and overall monitoring & troubleshooting of the service.
Anonymous
Scott Armitage is a member of the IT Services department at Loughborough University and works within the Network & Security Team. Scott has been one of the key people responsible for the deployment and management of wireless networking at Loughborough and is also heavily involved in deploying 802.1X on the wired network. Recently he has also been contracted to JANET(UK) as an advisor for the newly created Wireless Technology Advisory Service (WTAS).
Anonymous
Operating System Support Currently client devices pose the largest potential problem when deploying 802.1X. Whilst modern operating systems such as Microsoft® Windows Vista/XP®, Mac OS X® 10.4/10.5 and Linux® natively support 802.1X, older OS such as Microsoft® Windows 98/ME® do not. Additionally there are many other devices on the network which do not support 802.1X such as printers, network music player, desktop hubs/switches, and the current iPhone (Firmware 1.1.4.). Workarounds must be found if these devices are to continue functioning on the network.
Anonymous
Updated: 4/06/2021 The key component in 802.1X is the RADIUS server which is capable of AAA. There are several widely-deployed commercial RADIUS servers available: Microsoft® IAS, Cisco® ACS, Funk Steel-Belted Radius. There are also two widely deployed Open Source RADIUS servers available, FreeRADIUS and RADIATOR. FreeRADIUS is non-commercial GPL software, RADIATOR is commercial.
Anonymous
Prerequisites To deploy 802.1X within your organisation you will require suitable infrastructure capable of supporting it.
Anonymous
How 802.1X works There are three main components in the 802.1X authentication cycle:
Anonymous
This chapter shows how the facilities provided by IPSec can be used in practice to create secure VPNs. The examples use Cisco® routers and Windows® 2000/XP workstations. These devices have been chosen because they are widely used and most readers will have access to hardware similar to that discussed in the examples. Two common requirements are discussed: providing a secure VPN tunnel between two private networks, for example a remote site or office and a main campus, and providing a secure remote access service for staff working at home.
Subscribe to implementation