-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Wireless Authentication
Dear Colleagues,
The start of the semester has brought us numerous problems with students not being able to authenticate to our wireless portal to access our network and the Internet. I’m curious how other campuses control WiFi access. Specifically, are you forcing authentication? Do you allow students to use the wireless without any authentication/registration?
Thank you.
Michael S. Hoffman
Executive Director for Information Technology
St. Bonaventure University

















Comments
We steer students to our open network where they download a connection utility which sets them up for our secure1x network. Our open network is heavily filtered and extremely slow intentionally. This indirectly forces students to connect to the secure1x network.
Tim Cappalli, ACMP CCNA | (802) 626-6456
Office of Information Technology (OIT) | Lyndon
» cappalli@lyndonstate.edu | oit.lyndonstate.edu
Sent from Windows 8 and Outlook 2013
We have two SSID’s, guest and authenticated. The guest network provides limited access on ports 80,443 only. Authenticated is 802.1x AeS, providing all access using their Active Directory credentials.
We are moving toward the portal solution though..we hold numerous conferences, groups throughout the year
I Hope this is helpful,
Russ
Gordon College
All network access here requires authentication. We don’t offer any “open” access. All of our students have Active Directory login accounts that they can use.
--
Ron Parker, Director of Information Technology, Brazosport College
Voice: (979) 230-3480 FAX: (979) 230-3111
http://www.brazosport.edu
A single ton of uranium produces more energy than a million tons of coal.
You are a little ahead of us in the fall explosion of traffic. What kinds of problems are you encountering? I admit to anticipating problems without any evidence so far.
Theresa
Dear Colleagues,
The start of the semester has brought us numerous problems with students not being able to authenticate to our wireless portal to access our network and the Internet. I'm curious how other campuses control WiFi access. Specifically, are you forcing authentication? Do you allow students to use the wireless without any authentication/registration?
Thank you.
Michael S. Hoffman
Executive Director for Information Technology
St. Bonaventure University
mhoffman@sbu.edu
www.sbu.edu
Each device must be registered through our NAC for both wired and wireless access. Registration requires authentication to AD. It is only necessary to register a device once per academic year. Guests request an access code through a self-service process managed by the NAC. Guest access codes are automatically disabled after 24 hours requiring registration each day.
Certain devices, primarily gaming consoles, are not able to register through the NAC. In these cases students provide the MAC address of the device to the help desk where the device is manually registered in the NAC.
I share Theresa’s sentiment. So far, it has gone well but I’m far from ready to declare victory.
Instructions for our students are available at www.umhb.edu/network
Brent Harris
Associate Vice President for Information Technology
University of Mary Hardin-Baylor
From: The EDUCAUSE CIO Constituent Group Listserv [mailto:CIO@LISTSERV.EDUCAUSE.EDU] On Behalf Of Theresa Rowe
Sent: Tuesday, August 28, 2012 11:23 AM
To: CIO@LISTSERV.EDUCAUSE.EDU
Subject: Re: [CIO] Wireless Authentication
We force login authentication through our NAC system.
You are a little ahead of us in the fall explosion of traffic. What kinds of problems are you encountering? I admit to anticipating problems without any evidence so far.
Theresa
We are using a similar setup as Thomas. SSIDs for Faculty/Staff, Students and Guests but we add one or Events as well. Guests is really just a single day pass where Events will last up to 5 days. All users are authenticated via AD.
-------------------------------------------------------------------------------------------
Jason Best
Director of Media and IT at The Seattle School of Theology & Psychology
jbest@theseattleschool.edu | 206.876.6111 | theseattleschool.edu
-------------------------------------------------------------------------------------------
Sent from my Android phone using TouchDown (www.nitrodesk.com)
-----Original Message-----
From: Steve Swartz [sswartz@FITCHBURGSTATE.EDU]
Received: Tuesday, 28 Aug 2012, 11:49am
To: CIO@LISTSERV.EDUCAUSE.EDU [CIO@LISTSERV.EDUCAUSE.EDU]
Subject: Re: [CIO] Wireless Authentication
Thanks everyone.
Theresa, we are having problems automatically re-directing students to our Aruba captive portal for authentication. Many computers work fine, but large numbers are encumbered by wireless card issues, toolbars, proxies etc. Thus we are considering how best to proceed in the future.
All of the feedback has been most appreciated.
Mike
From: The EDUCAUSE CIO Constituent Group Listserv [mailto:CIO@LISTSERV.EDUCAUSE.EDU] On Behalf Of Theresa Rowe
Sent: Tuesday, August 28, 2012 12:23 PM
To: CIO@LISTSERV.EDUCAUSE.EDU
Subject: Re: [CIO] Wireless Authentication
We force login authentication through our NAC system.
You are a little ahead of us in the fall explosion of traffic. What kinds of problems are you encountering? I admit to anticipating problems without any evidence so far.
Theresa
Like many of the responders, Seton Hall University requires users in public, academic and administrative spaces to authenticate using AD in order to access the campus wireless network. We provide an open SSID in the residence halls, however, for the convenience of students who bring their gaming and/or older devices that can’t easily authenticate with AD; the open SSID is bandwidth rate limited and tuned so that bleed outside the residence hall is minimized (the older residence halls are so massively constructed we have one AP per suite and bleed isn’t much of an issue). Please note, however, we have very restricted access to our residence halls; guests must be signed in and out by a sponsoring student, we have strict curfews, etc. Our approach wouldn’t work well for campuses that have less restrictive access to the residence halls.
Steve
Stephen G. Landry, Ph.D.
Chief Information Officer
Seton Hall University
Tel.: 973-761-7386
Email: cio@shu.edu
Twitter: @landryst
Facebook: www.facebook.com/landryst
LinkedIn: www.linkedin.com/in/landryst
We currently are not forcing authentication, but we will be within the next couple of weeks. We are undecided as to whether or not to include verification of active anti-virus and the latest windows/mac patches. I believe we will at least warn them about expired anti-virus, and likely by the middle of the term start blocking them if they don’t install one.
Dennis Thibeault
CIO, Curry College
At Suffolk CCC we have a hybrid to the solutions most are posting. We have all students, faculty and staff register up to two device MACs with us. We have a SSID that they can then authenticate with our AD (using one of their pre-registered devices.) We limit their access to three hours at which point they have to re-authenticate. I am wondering what limits others place on sessions; in particular what other community colleges are doing.
Doug
Hello… New to the list.
At Knox we went made a major commitment to wireless technology about 4 years ago. By major commitment I mean that 4 years ago in our residence hall network upgrade we abandoned wired connectivity and only put in enough POE ports to power our access points. We provide wired connectivity in the residence halls only for an additional fee.
We offer a few different SSIDs and have deployed a NAC solution (Bradford Networks). The “primary SSID” that we make available for students, faculty and staff utilizes 802.1x authentication. This ties into our NAC which uses RADIUS on the backend. Upon initial registration, it assesses the security posture of the device (critical patches/updates, has College supplied. Both up to date) and profiles it (who, what OS, MAC Address, and role - assigns device to a particular VLAN based on OU). To gain access you have to an account in Active Directory in the OUs we define for students, faculty and staff.
We’ve run into a few devices that don’t support 802.1x authentication. Generally these are gaming systems, TIVOs, DVRs, some streaming devices, and Internet enabled televisions. We’ve created an SSID that offers WEP authentication to allow these devices on our network. End users still have to provide their credentials to register them. When registered, we move these to a captive VLAN that provides only Internet access. One nice side effect… many of the gaming issues our students were reporting just went away when we did this.
We also offer a guest network with a unique SSID. It is tied into a different authentication mechanism (uses 802.1x) scheme that is integral to our NAC system so that we don’t have to add temporary accounts to Active Directory. We can create username/password pairs that have a start and sunset date associated with them. We ask people inviting guests to campus to request an account and supply us with their e-mail address. The e-mail address becomes the username and the NAC generates a random password. It creates a “ticket” with the username, password, instructions, and the dates when the account will be active and e-mails it address that is the username associated with the account.
Lastly, we create some SSIDs on the fly for large groups coming to campus (e.g. Admission Open House, Board Meetings, Relay for Life, …) where the guest list is unknown or the group is so large that creating guest accounts is impractical. We offer a web form where an authenticated user (even students… e.g. Ultimate Frisbee Tournament) request a WEP keyed network for an event with duration of up to 5 days. Users on these networks are placed on a single VLAN outside our firewall and given restricted (shaped bandwidth and certain ports) access to the Internet only.
Steve Hall
Steven S. Hall | Vice President and Chief Information Officer
KNOX COLLEGE – Information Technology Services
2 East South Street | Galesburg, IL 61401
Tel 309.341.7823 | Fax 309.341.7099
shall@knox.edu | www.knox.edu
Celebrating 175 Years
175.knox.edu
From: The EDUCAUSE CIO Constituent Group Listserv [mailto:CIO@LISTSERV.EDUCAUSE.EDU] On Behalf Of Jason Best
Sent: Tuesday, August 28, 2012 12:20 PM
To: CIO@LISTSERV.EDUCAUSE.EDU
Subject: Re: [CIO] Wireless Authentication
We are using a similar setup as Thomas. SSIDs for Faculty/Staff, Students and Guests but we add one or Events as well. Guests is really just a single day pass where Events will last up to 5 days. All users are authenticated via AD.
-------------------------------------------------------------------------------------------
Jason Best
Director of Media and IT at The Seattle School of Theology & Psychology
jbest@theseattleschool.edu | 206.876.6111 | theseattleschool.edu
-------------------------------------------------------------------------------------------
Good Morning List: Seems like I'm going against conventional wisdom, but we're getting ready to rewrite the SSID rules at Montana State: MSU-Guest -- open, unauthenticated MSU -- open, unauthenticated MSU-Secure -- 802.1x After weighing the benefits vs risks, the BYOD movement, and any number of other factors, we see little downside and lots of upside to running an open net while also offering those so inclined a secure option. Our users are smart - they'll do what they need to. Might we get some abuses? Yes..but they'll be small in the grand scheme of things. We'll evaluate after a year, so stay tuned. -d
authenticated wireless because of CALEA. Not offering "public" access is
key to being exempt from provisions of CALEA. At least, that is the
stance that many Colleges and Universities have been taking. Does anyone
have other guidance to offer?
Steven S. Hall | VP & CIO
KNOX COLLEGE
2 East South Street | Galesburg, IL 61401
Tel 309.341.7823 | Fax 309.341.7099
-----Original Message-----
From: The EDUCAUSE CIO Constituent Group Listserv
[mailto:CIO@LISTSERV.EDUCAUSE.EDU] On Behalf Of Sandlin, Rebecca
Sent: Wednesday, August 29, 2012 8:24 AM
To: CIO@LISTSERV.EDUCAUSE.EDU
Subject: Re: [CIO] Wireless Authentication
At Roanoke College, we just changed to unauthenticated guest wireless in
time for the parents and families to use. It is a low risk, "free" service
for the community which will please our visitors on campus (parents,
trustees, alumni) and which everyone is beginning to expect.
<http://roanoke.edu/>
Rebecca F. Sandlin
Chief Information Officer
P: 540-375-2585 | M: 540-759-0942
sandlin@roanoke.edu
Like us on Facebook <http://www.facebook.com/roanoke>
On 8/29/12 8:31 AM, "Dewitt Latimer" <dewittlatimer@GMAIL.COM> wrote:
>Good Morning List:
>
>Seems like I'm going against conventional wisdom, but we're getting
>ready to rewrite the SSID rules at Montana State:
>
>MSU-Guest -- open, unauthenticated
>
>MSU -- open, unauthenticated
>
>MSU-Secure -- 802.1x
>
>After weighing the benefits vs risks, the BYOD movement, and any number
>of other factors, we see little downside and lots of upside to running
>an open net while also offering those so inclined a secure option.
>
>Our users are smart - they'll do what they need to. Might we get some
>abuses? Yes..but they'll be small in the grand scheme of things.
>
>We'll evaluate after a year, so stay tuned.
>
>
>-d <gathering no moss>
>
>
--Dave
--
DAVID A. CURRY, CISSP • DIRECTOR OF INFORMATION SECURITY
THE NEW SCHOOL • 55 W. 13TH STREET • NEW YORK, NY 10011
+1 212 229-5300 x4728 • david.curry@newschool.edu
Yes - good catch Jack. I was neglectful in mentioning the role and benefits of eduroam - that certainly will be a tool in our toolbag *soon*. -d
We had a situation about a year ago where someone used a stolen debit card to make online purchases using a generic logon on one of our classroom teacher stations. The FBI contacted us and requested assistance in identifying the culprit who they suspected being part of an organized crime gang. When they found out that a generic logon was used they were quite disappointed and lectured me on the importance of CALEA. They strongly suggested that we avoid generic logons and other forms of guest access to network resources in an effort to deter future criminal activities.
- John
John R. Ellis
Executive Director Information Technology Services
The College of Saint Rose
432 Western Avenue
Albany, New York 12203
518-454-5166
ellisj@strose.edu
www.strose.edu
ITS.strose.edu
From: The EDUCAUSE CIO Constituent Group Listserv [mailto:CIO@LISTSERV.EDUCAUSE.EDU] On Behalf Of David Hoyt
Sent: Wednesday, August 29, 2012 10:56 AM
To: CIO@LISTSERV.EDUCAUSE.EDU
Subject: Re: [CIO] Wireless Authentication
Steve,
I'm no expert on CALEA, but that is still my understanding as well. We gave up on being exempt from CALEA a long time ago as we've always had open wireless. The administration decided it was more important as a community college to be open to the community, so we purchased the hardware needed to comply with CALEA.
Dave
David Hoyt
Chief Information Systems Officer
Collin College
Collin Higher Education Center
3452 Spur 399
McKinney, TX 75069
P - 972.599.3133 F - 972.599.3131
dhoyt@collin.edu
>>> On 8/29/2012 at 9:30 AM, in message <02f901cd85f2$e2763570$a762a050$@knox.edu>, Steve Hall <shall@KNOX.EDU> wrote:
Perhaps my thinking is outdated here... but I've always wanted to operate
authenticated wireless because of CALEA. Not offering "public" access is
key to being exempt from provisions of CALEA. At least, that is the
stance that many Colleges and Universities have been taking. Does anyone
have other guidance to offer?
Steven S. Hall | VP & CIO
KNOX COLLEGE
2 East South Street | Galesburg, IL 61401
Tel 309.341.7823 | Fax 309.341.7099
-----Original Message-----
From: The EDUCAUSE CIO Constituent Group Listserv
[mailto:CIO@LISTSERV.EDUCAUSE.EDU] On Behalf Of Sandlin, Rebecca
Sent: Wednesday, August 29, 2012 8:24 AM
To: CIO@LISTSERV.EDUCAUSE.EDU
Subject: Re: [CIO] Wireless Authentication
At Roanoke College, we just changed to unauthenticated guest wireless in
time for the parents and families to use. It is a low risk, "free" service
for the community which will please our visitors on campus (parents,
trustees, alumni) and which everyone is beginning to expect.
<http://roanoke.edu/>
Rebecca F. Sandlin
Chief Information Officer
P: 540-375-2585 | M: 540-759-0942
sandlin@roanoke.edu
Like us on Facebook <http://www.facebook.com/roanoke>
On 8/29/12 8:31 AM, "Dewitt Latimer" <dewittlatimer@GMAIL.COM> wrote:
>Good Morning List:
>
>Seems like I'm going against conventional wisdom, but we're getting
>ready to rewrite the SSID rules at Montana State:
>
>MSU-Guest -- open, unauthenticated
>
>MSU -- open, unauthenticated
>
>MSU-Secure -- 802.1x
>
>After weighing the benefits vs risks, the BYOD movement, and any number
>of other factors, we see little downside and lots of upside to running
>an open net while also offering those so inclined a secure option.
>
>Our users are smart - they'll do what they need to. Might we get some
>abuses? Yes..but they'll be small in the grand scheme of things.
>
>We'll evaluate after a year, so stay tuned.
>
>
>-d <gathering no moss>
>
>
--Dave
--
DAVID A. CURRY, CISSP . DIRECTOR OF INFORMATION SECURITY
THE NEW SCHOOL . 55 W. 13TH STREET . NEW YORK, NY 10011
+1 212 229-5300 x4728 . david.curry@newschool.edu
--
Rick Matthews
Rick, how to you deal with conferences or sports camps on campus in the summer or overnight visiting high school seniors who need to have internet access and most likely wireless internet access? Do you make each person register and use a unique username?
From: The EDUCAUSE CIO Constituent Group Listserv [mailto:CIO@LISTSERV.EDUCAUSE.EDU] On Behalf Of Matthews, Rick
Sent: Wednesday, August 29, 2012 12:51 PM
To: CIO@LISTSERV.EDUCAUSE.EDU
Subject: Re: [CIO] Wireless Authentication
Dear all,
We used to have open unauthenticated guest wireless. There was some level of abuse by members of the community coming to campus to download their media of choice. However, what drove us to eliminate unauthenticated wireless to assure that we are exempt from the requirements of CALEA. From http://www.nacua.org/documents/ACECalea.pdf:
"While CALEA exempts “private networks,” neither the statute nor the FCC’s rules define
that key term. Without question, the term encompasses networks that are “closed” in the sense
that they are self-contained and do not interconnect with a public network (either the Internet or
the telephone network). The FCC’s order also strongly suggests that interconnected networks
will be considered private when made available only to limited constituencies, rather than to the
general public. Thus, campus networks that offer Internet connectivity but are made available
only to students, faculty, and administrators—and that exclude the public at large, for example
by requiring university ID cards to gain access to networked terminals and by requiring password
authentication on wireless networks, among other measures—almost certainly would be
considered private."
We set up a portal where any faculty, staff, or student can create a temporary wireless account for their guests.
Rick
--
Rick Matthews
Associate Provost for Technology & Information Systems
Wake Forest University
--
Rick Matthews
Reply-To: "The EDUCAUSE CIO Constituent Group Listserv <CIO@LISTSERV.EDUCAUSE.EDU>" <CIO@LISTSERV.EDUCAUSE.EDU>
Date: Wednesday, August 29, 2012 6:24 AM
To: "The EDUCAUSE CIO Constituent Group Listserv <CIO@LISTSERV.EDUCAUSE.EDU>" <CIO@LISTSERV.EDUCAUSE.EDU>
Subject: Re: [CIO] Wireless Authentication