802.1x Authentication & Authorization Deployment for Wireless Network at BYU-Hawaii

2151 Words5 Pages

802.1x Authentication & Authorization Deployment for Wireless Network at BYU-Hawaii Executive Summary: In this report we will have a detailed look in to BYU-Hawaii’s “Brigham Young University” current and suggested network layout with the help of diagrams and descriptions. BUY-Hawaii’s network consists of or approximately 3000 active user in which 2,500 are students and rest is staff. The main concern of BYU-Hawaii current network is that they have no authentication and authorization control so any one can easily access their network in nearby area of the campus and had no monitoring system that how the network is being utilized further more important information can easily be sniffed out by anyone on their network. In the proposed network we will be giving authentication and authorizations using firewalls, 802.1X and other technique for wired & wireless clients. Authentication can be achieved through 802.1X authentication server whereas authorization can be achieved using Radius. Furthermore we will be implementing WPA2 Personal “Wireless Protected Access version 2” on the access points through which we will get access point secured from unauthorized users by using setup password. Contents Executive Summary: 2 Introduction: 4 Current Network: 5 Description: 5 Current Network Diagram: 5 Proposed Network: 6 Proposed Network Diagram: 6 Security Requirements: 7 IEEE 802.1X: 7 Supplicant: 7 Authenticator: 7 Authentication Server: 7 RADIUS Servers: 8 Port-based Authentication: 8 WPA: 9 Equipment’s: 9 CISCO 7301 Router: 9 Switches: 10 Access Points: 12 Cisco Aironet 3502i Indoor Access Point: 14 Cabling: 15 Conclusion 15 References: 16 Introduction: In this report we ... ... middle of paper ... ...pa-and-wpa2-wireless-encryption-and-why-it-matters/: http://www.howtogeek.com/167783/htg-explains-the-difference-between-wep-wpa-and-wpa2-wireless-encryption-and-why-it-matters/. [Accessed 27 May 2013]. [3] C. Australia, “Cisco Routers,” Cisco Pvt Ltd, 11 August 2008. [Online]. Available: http://www.cisco.com/c/en/us/products/collateral/routers/7301-router/product_data_sheet09186a008014611a.html. [Accessed 27 May 2014]. [4] C. America, “Cisco Switch,” Cisco Pvt Ltd, 10 August 2010. [Online]. Available: http://www.cisco.com/c/en/us/products/collateral/interfaces-modules/catalyst-4500-series-supervisor-engine-ii-plus-ts/product_data_sheet0900aecd8017a0c5.html. [Accessed 27 May 2014]. [5] Cisco, “Cisco Access Point,” Cisco Pvt Ltd, [Online]. Available: http://www.cisco.com/c/en/us/products/wireless/aironet-3500-series/index.html. [Accessed 27 May 2014].

More about 802.1x Authentication & Authorization Deployment for Wireless Network at BYU-Hawaii

Open Document