Have you seen the video of the one year old child trying to use a magazine like an iPad? It makes for fascinating viewing and an indication that while today’s students consider the internet to be important in their lives, many of tomorrow’s students will not know a world without internet, particularly mobile internet.
Some schools are already tackling this mobile experience. Brisbane Girls Grammar School is a secondary school in Queensland, Australia with 1000 students. It has recognised the extent to which mobile devices, communications and technology play an integral role in business and consumer lifestyles and recently implemented a “bring your own device” strategy for students and teachers. It runs a wireless network across its campus that supports two personal devices per person — whether laptop, mobile phone or tablet — as well as school owned devices. Up to 3,000 devices are supported on the network for educational purposes at one time.
Read More »
Tags: bring your own device, Brisbane Girls Grammar School, byod, Cisco, education, K-12, mobile, network, school, student, video, wireless
We saw what happened when William Wallace upgraded to the Right Network, but how about Paul Revere? Equipped with a Cisco Cius tablet and a reliable wireless connection, Paul can quickly communicate the impending British invasion to fellow Patriots. There’s no need for a midnight ride when you’ve got the Right Network.
Watch the video!
Read More »
Tags: Cisco, Cius, mid-market, midnight ride, networking, patriots, Paul Revere, right network, small business, wireless
Many small businesses opt for wireless networks; they provide the connection you need and are easier and less expensive to set up than a wired network. But that convenience can cost your company in compromised security and lost data if the network isn’t appropriately encrypted.small_business, wireless, wireless network, WLAN, security
Although most wireless LAN (WLAN) equipment comes with many settings preconfigured, encryption isn’t one of them. In this latest installment of Mythbusters, we explain why the encryption protocol you choose—Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA)—makes a difference.
Read More »
Tags: security, small_business, wireless, wireless network, wlan
Answering these six questions can point you in the right direction
Most small companies invest in the very best networking equipment they can afford when they first build their network, choosing a router, a switch, and a server that will support the business they envision growing in the near future. But has that future come and gone for your company? Even the best small business networking gear needs to be upgraded at some point—the trick is knowing when that time is.
Here are six questions to ask yourself about your network. If your answer to any of the questions is “yes,” then it may be time to upgrade.
Read More »
Tags: network upgrade, small business, switch, wireless
Not too long ago I was assigned to a troubleshooting and remediation project for a hospital here in the SF bay area. The problem, after much troubleshooting and lab recreations, was determined to be due to an unique issue with client roaming and authentication. During the course of troubleshooting my coworker and myself often found ourselves explaining 802.1X and 802.11i to others working on the troubleshooting effort, or requesting technical updates. So based on that experience, I started thinking this might a be a good topic to cover here.
Let’s review the some of typical components of the enterprise wireless security model.
What is 802.1X?
802.1X is not a protocol, but rather a framework for a “port-based” access control method. 802.1X was initially created for use in switches, hence the port-based terminology, which really doesn’t fit too well in wireless since users don’t connect to a port. In the end it’s meant to be a logical concept in the 802.11 world. 802.1X was adopted for wireless networks with the creation of 802.11i to provide authenticated access to wireless networks. At a high level. the framework allows for a client that has connected to the WLAN to remain in a blocked port status until it has been authenticated by a AAA server. Essentially the only traffic allow through this virtual blocked port is EAP traffic, things like HTTP would be dropped.
What is EAP?
EAP (Extensible Authentication Protocol) is the authentication method used by 802.1X. It can take on various forms, such as PEAP, EAP-TLS, EAP-FAST, to name a few. There is one thing to remember when determining what EAP type to use in your network, is that it is dependent upon what your client and AAA server supports. This is it, your AP or AP/Controller hardware or code version will play no part in version is supported. Unless your AP/controller is acting as the AAA server, but I’ll stay away from that in this post. I think this can be a point of confusion for people who haven’t read much or anything about EAP methods. So, if some one asks what version of EAP the AP will support, all you need to do is ask them, what does their Client and AAA server support.
What is 802.11i?
Simply put, 802.11i is an amendment to the original 802.11 standard to address the well documented security short comings of WEP. It incorporates WPA as a part of the 802.11i amendment and adds the fully approved WPA2 with AES encryption method. 802.11i introduces the concept of a Robust Security Network (RSN) with the Four-way handshake and the Group key Handshake.
Read More »
Tags: 802.11, 802.11i, 802.1x, AAA server, access point, access points, EAP, EAP-FAST, EAP-TLS, engineer, engineers, PEAP, wi-fi, wifi, wireless, wireless controller, wireless LAN, wlan, WLC