Firewall Wizards mailing list archives
RE: Discretionary WiFi Access
From: "Orca" <klrorca () hotmail com>
Date: Thu, 14 Jul 2005 18:30:40 -0700
I had this issue come up. What I did was feed a Wi-Fi network into a 3030 Cisco VPN concentrator. I then set up a key card access for passwords, ands assigned multiple guest accounts. I used SB radius for AAA. I used RFC 1918 space for the DHCP so they had to NAT to get out, just to add another layer (and use the firewall). I also made sure to kill split tunnel. I logged the mac-address/IP address with the account login, so I had a audit trail for forensics in case I ever needed it. I used ACLs and physical separation for these accounts they could then access the internet, and limited DMZ resources, but completely were cut off from our intranet. If a vendor needed them the receptionist would hand out a key card, the client, log the time in and out, and make them present ID, so we knew what account matched which guest. I also checked the signal bleed outside the building, just to be sure, and monitored the bandwidth with remote alerts for high bandwidth use, to watch for abuse. It worked very well, well enough that I did the same for employees - but with more access. Hope this helps. -Steve
Dave Null wrote:Its not firewall related, but there's some smart minds on this list. My company has started looking into campus-wide WiFi. I'll keep my personal feeling on this to myself though. One thing that keeps comming up is that one of the largest user communities that would take advantage of this would be non-employees. Vendors, Salesmen, people meeting with GMs/VPs/Execs are probably going to be the main users of this. My question is, if you currently have a similar situation in your work environment, how do you handle granting these people temp/guest WiFi access. Access controls for employees can be fairly stringent (i.e. only connect from company owned assets who's MAC is inventoried, use of 2 factor authentication, etc), but a lot of this isnt applicable for temporary visitors. I know one company that would give you a WiFi card when you signed in that was in their database of 'allowed' MAC addresses (I know, dont get me started on MAC spoofing), however I would bet cash money that those cards walked away regularly. Similar thing with issuing a temporary token fob (SecureID or the like). I know the easy answer here is 'Dont give them WiFi access', but I don't think that is going to be an option. Thoughts, comments, flames? -noidI have setup an access point outside of our firewall for this express purpose. It is wide open and I simply monitor port usage to keep an eye out for any abuse, it hasn't been an issue so far. Josh _______________________________________________ firewall-wizards mailing list firewall-wizards () honor icsalabs com http://honor.icsalabs.com/mailman/listinfo/firewall-wizards
_______________________________________________ firewall-wizards mailing list firewall-wizards () honor icsalabs com http://honor.icsalabs.com/mailman/listinfo/firewall-wizards
Current thread:
- Re: Discretionary WiFi Access, (continued)
- Re: Discretionary WiFi Access Paul D. Robertson (Jul 21)
- Re: Discretionary WiFi Access Jim Seymour (Jul 21)
- Re: Discretionary WiFi Access Josh Welch (Jul 22)
- Re: Discretionary WiFi Access Roger Rustad (Jul 21)
- Re: Discretionary WiFi Access Josh Welch (Jul 22)
- Re: Discretionary WiFi Access Paul D. Robertson (Jul 21)
- Re: Discretionary WiFi Access Tom Carmichael (Jul 14)
- Re: Discretionary WiFi Access Chris Byrd (Jul 14)
- Re: Discretionary WiFi Access Jim Seymour (Jul 14)
- RE: Discretionary WiFi Access Brian Loe (Jul 21)
- Re: Discretionary WiFi Access vbwilliams (Jul 08)
- RE: Discretionary WiFi Access Orca (Jul 21)