does the enterprise wlan market need to figure out how to look more like
a consumer wlan? Is this a problem EDU's have created because of some
desire to provide a service that's more complex or invasive to use then it
has to be? Is there really a need to on-board devices and have them
associate
But our environments are unique in the sense that we have many of the same data
security concerns that a hospital has, but unlike their tenants, ours are 1)
largely irresponsible children, 2) using systems we have to maintain (I’ve
never seen a hospital help a patient fix a laptop) and 3) live
No easy answer. The dorms could be set up “consumer style” with a different
operational profile, SSID, etc and don’t HAVE to be run like the rest of campus.
But in classrooms, labs and meeting rooms there is now way to deliver highest
performance, regulatory compliance, and accommodation of
I think you could accomplish the same consumer friendly setup in
classrooms, labs, etc. and still provide meet your goals including
regulatory compliance. I see this sort of hybrid approach today in
hospital settings, so I'm not sure why it can't be accomplished in EDU.
The new Kaiser hospital in
My thoughts too. I'm not sure how much we an complain about vendors seeking
ways to differentiate their products with a unique value-add. Because a
vendor's value-add is nothing other than their reason for being. If there
is nothing they bring to the table that everyone else doesn't, then they
I especially agree about the onboarding issue. While it's great that the
market for onboarding tools is growing (we currently have three systems
capable on wireless onboarding, only one of which was bought for that
purpose!) they all feel like ridiculously expensive rolls of duct tape
“Don't assume I'm counter to what we've traditionally been doing in EDU, but
I'm constantly reevaluating if some of these best practices have outlived
their usefulness.”
I think that is a very healthy approach. We shouldn’t do things just because
we’ve always done them a certain way or because
On 01/23/2015 01:45 PM, Jeffrey Sessler wrote:
I'll toss this out - who made us responsible for the protection of consumer
data passing over our wireless networks? Why do we care?
We get stuck with it when a professor who can bypass central purchasing picks
up a New! Shiny! that:
- only
On Fri Jan 23 2015 14:25:29 CST, Hinson, Matthew P
matthew.hin...@vikings.berry.edu wrote:
Cleared the chain of nested replies
insert obligatory tilting at windmills snarky remark about top posting
:):)
--
Julian Y. Koh
Acting Associate Director, Telecommunications and Network Services
I'll toss this out - who made us responsible for the protection of consumer
data passing over our wireless networks? Why do we care?
For devices the college owns, we have the capability today to secure them if
necessary for compliance or other business requirements. For the rest of the
BYOD
I've lost track of part of this discussion. Can someone roughly state what
is being called onboarding in this thread?
On Fri, Jan 23, 2015 at 11:42 AM, Peter P Morrissey ppmor...@syr.edu
wrote:
“Don't assume I'm counter to what we've traditionally been doing in
EDU, but I'm constantly
Our environments have _some_ data security concerns like a hospital, but
when you really drill down and look at what those are, they are more
exception then rule. In cases were we need to provide a greater level of
security, we typically have full control (and ownership) of the device.
Show me in
Well stated Peter.
Could you imagine the outrage if ISP's started requiring their
residential customers to on-board their systems? If you couldn't pass a
bit of traffic without registering first, applying patches, etc. What if
starbucks or others did the same? It's what we are effectively doing
Isn’t the certificates thing being described something like EAP-TLS?
Frank
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Lee H Badman
Sent: Friday, January 23, 2015 12:10 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
In theory, yes. In practice, good luck finding it implemented that way in a
product we can actually deploy, or supported in a product in use by our
constituents.
On Fri, Jan 23, 2015 at 2:30 PM, Frank Bulk frnk...@iname.com wrote:
Isn’t the certificates thing being described something like
http://en.wikipedia.org/wiki/Extensible_Authentication_Protocol
http://en.wikipedia.org/wiki/Extensible_Authentication_Protocol
read about UNAUTH-TLS …
Philippe Hanset
www.anyroam.net
On Jan 23, 2015, at 3:30 PM, Frank Bulk frnk...@iname.com wrote:
Isn’t the certificates thing being
On Fri, Jan 23, 2015 at 1:42 PM, Peter P Morrissey ppmor...@syr.edu wrote:
We get authentication and thus historical retribution from 802.1x by default,
which is also considered NAC by some definitions. This is handy. We also get
encryption, although I’m with you on questioning that as well.
Last I checked it worked in everything but Windows. Eh no one uses
that, right? :D
--
Hunter Fuller
Network Engineer
VBRH M-9B
+1 256 824 5331
Office of Information Technology
The University of Alabama in Huntsville
Systems and Infrastructure
I am part of the UAH Safe Zone LGBTQIA support
I didn't say that it was perfect, just that something along those lines has
already been invented. =)
Frank
-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Hunter Fuller
Sent: Friday, January 23,
Except the wifi in EDU is no longer a experimental environment where
investing in and/or playing around with a niche vendor has little risk.
I won't say that wifi is as mature as other markets, but a lot of the
fundamentals are from off-the-shelf parts, and the innovation (if you
call it that) is
20 matches
Mail list logo