Educause Security Discussion mailing list archives
Re: student wireless security model
From: "Foerst, Daniel P." <FOERST () CUA EDU>
Date: Mon, 30 Aug 2010 18:32:32 +0000
We currently offer open unsecure access with an SSL secured captive portal for user authentication in our residential space. Once a semester, although this may become more frequent, our students are asked to login and download a security key that register their system with us and provides an easy means of remediation. Services such as Microsoft networking, wireless printing, dorm to dorm communication, or other network resources that may be available on campus are not accessible from the residential space. On the campus side we are piloting WPA2/PSK (until we can get enterprise up and running) with a captive portal for our school of architecture. This allows the modular and often changing classroom landscape within that building to continue to have access to network resources and not worry about a LAN line being available. We have setup other WPA2/PSK environment where needed until we have an WPA2 Enterprise solution available, which is currently under development. Daniel Foerst Manager, Networks & Security The Catholic University of America Washington, DC 20064 From: The EDUCAUSE Security Constituent Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Semmens, Theresa Sent: Monday, August 30, 2010 11:13 AM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: Re: [SECURITY] student wireless security model We are using only secure wireless on campus and is required for everyone. Those who wish to use wireless have to request the service and install a certificate on their machine. It is a standard EAP-TLS system that will work with anything that supports EAP-TLS. Theresa Semmens, CISA Chief IT Security Officer North Dakota State University IACC 210D PO Box 6050 Fargo, ND 58108 Phone: 701-231-5870 Fax: 701-231-8541 Theresa.Semmens () ndsu edu<mailto:Theresa.Semmens () ndsu edu> Security is a process, privacy is a consequence Security is action, privacy is a result of successful action Security is the strategy, privacy is the outcome Security is the sealed envelope, privacy is the successful delivery of the message inside the envelope ~ Unknown From: The EDUCAUSE Security Constituent Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Mayne, Jim Sent: Monday, August 30, 2010 10:05 AM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: [SECURITY] student wireless security model I am curious what security model other universities are now using for their student wireless networks. - Encrypted or unencrypted - Authentication (mac, 802.1x, web portal etc.) - Any NAC security checks on the client Thanks, Jim
Current thread:
- student wireless security model Mayne, Jim (Aug 30)
- Re: student wireless security model Semmens, Theresa (Aug 30)
- Re: student wireless security model Foerst, Daniel P. (Aug 30)
- Information Security Specialist position Plesco, Todd (Aug 30)
- Re: student wireless security model Foerst, Daniel P. (Aug 30)
- Re: student wireless security model Chris Mielke (Aug 30)
- Re: student wireless security model Taylor, James R (Aug 30)
- Re: student wireless security model Randall C Grimshaw (Aug 30)
- Re: student wireless security model Mayne, Jim (Aug 30)
- Re: student wireless security model Flynn, Gary - flynngn (Aug 30)
- Re: student wireless security model Ken Connelly (Aug 30)
- Re: student wireless security model Miller,James R (Aug 30)
- Re: student wireless security model Daniel Bennett (Aug 30)
- Re: student wireless security model Nguyen, Tung (Aug 30)
(Thread continues...)
- Re: student wireless security model Semmens, Theresa (Aug 30)