Вы находитесь на странице: 1из 2

Authenticating Public Access Networking

Joseph W. Graham II
University of Pittsburgh
717 Cathedral of Learning, Pittsburgh, Pennsylvania 15260
+1 (412) 624-5244
jwg@pitt.edu

ABSTRACT time, the number of residence hall beds has increased to 6,000 and
The University of Pittsburgh began offering network connections to the connection rate has continued to increase to the current 74%.
residence hall students in 1998. Initially, students were assigned Several methods for authenticating users to the residence hall wired
static IP addresses and manual processes were implemented to network have been evaluated and implemented over time, each
record the each computer’s network card MAC address. This successively leading to simplified configuration of user devices and
quickly became unwieldy as service was expanded to all of the reductions in support overhead. Problems persisted, however, that
nearly 6,000 residence hall rooms. In 2000, DHCP was used to required a much more effective solution than had been available
provide student IP addresses in conjunction with registration previously.
software to record the necessary machine information. Tracing At approximately the same time, a pilot effort was introduced to
activity in response to security issues was still time-consuming offer wireless network service to University students using a
because of the time needed to research activity logs. program in which laptop computers equipped for wireless access
The adaptation of the Point-to-Point Protocol (PPP) for broadband were available for student checkout in the main campus library.
use by commercial Internet Services Providers (ISP’s) provided a This program continued until 1999 at which time it was abandoned
much simpler solution for registering users, and providing IP due to the high cost of equipment maintenance and because of user
addresses. Direct user authentication to the network is complaints regarding slow performance and other issues. The
accomplished by requiring the entry of a username and password library has maintained a wireless service since that time, but the
each time the user establishes a connection. Tracing specific activity service is available only to library staff. Pressure to offer wireless
is simplified because it is not necessary to research different sets of service throughout the University community has been increasing
logs to determine the IP address and username. Management of the substantially in recent years.
system is entirely dynamic. The system can be used just as easily for In the past academic year, a pilot program designed to implement
ports located in public areas, classrooms, and in conjunction with wireless service in public areas, offices, and classrooms was
wireless network services. The need for authenticated access to the conducted and yielded highly positive results due to the
network from these locations is even more important than from the improvements in technology and in the ability to secure access to the
residence halls. wireless network using PPPoE technology. This paper will explore
Although PPPoE has been used for authenticated access in the in more detail the PPPoE solution that has been most recently used
residence halls during the past academic year, this service will be with a high degree of success to authenticate residence hall users
converted to the IEEE 802.1x standard, which eliminates the and the wireless gateway solution that is being implemented to
requirement for client authentication software in the coming year. authenticate users to various wireless network implementations
Our experience with PPPoE is that support requirements are very across campus. Both of these methods take full advantage of the
low and are primarily limited to client software installation University’s central directory and authentication services that have
assistance. Further reduction of support requirements is expected been implemented over the past two years.
with the introduction of 802.1x authentication for residence hall,
2. EVALUATION OF TECHNOLOGIES
public access, classroom, and wireless network connections.
2.1 Residence Hall Network Authentication
Categories and Subject Descriptors During the first two years in which residence hall network access
C.2.1 [Network Architecture and Design]: Wireless was provided, users were assigned static IP addresses upon
Communications registration of their Ethernet card MAC addresses. The drawback of
this method was that a tremendous amount of effort was needed to
General Terms: Management, Documentation, Performance, record user information and to research records when tracking down
Design a problem.
Keywords: Wireless, Authentication, Networking, PPPoE, In September 1999, Dynamic Host Configuration Protocol (DHCP)
Directory, LDAP, Kerberos, NDS, Active Directory, DHCP service was introduced to assign IP addresses to users without the
need to manually record and research user information. Lucent
Technologies’ QIP software was selected for this purpose because in
1. INTRODUCTION addition to IP address assignment, the software offered an
The University of Pittsburgh began providing Ethernet ports in its automated means of registering user Ethernet card addresses via a
Pittsburgh Campus residence halls in 1996. All residence hall web page. This software was used throughout the 1999 academic
rooms were wired with one “port per pillow” in 1998. The year, but serious problems occurred with the registration
connection rate at that time was approximately 40%. Since that management component as participation in the ResNet program
grew and the demand for service outstripped the ability of the
Copyright is held by the author/owner(s).
SIGUCCS’02, November 20-23, 2002, Providence, Rhode Island, USA.
ACM 1-58113-564-5/02/0011.

247
software to keep pace. As a result, QIP was implemented without Demands for immediate deployment of wireless network service in
the registration management component. public areas, classrooms, and office areas led to the consideration of
An evaluation of available DHCP solutions resulted in the wireless gateway solutions from several different vendors. The
identification of Point-to-Point Protocol over Ethernet (PPPoE) as a requirements for consideration included the ability to authenticate
viable alternative to the previous solutions. The PPPoE protocol is users against one of the University’s central authentication systems,
a standard Internet protocol as defined by RFC 2516. This protocol the ability to employ roles-based access, the ability to restrict access
requires a user to authenticate to a RADIUS server in order to obtain to specific applications and services over the wireless network.
and use an IP address to connect to the Internet over a standard Based upon these criteria, a product selection has been made and
Ethernet network. In this way, PPPoE is similar to the PPP protocol wireless network service is being deployed in various campus
used on the University’s remote access dialup modem pool. locations.

Early in the project planning process for the implementation of


PPPoE user authentication, the need to deploy a single vendor,
cross-platform client software solution was identified in order to
simplify documentation and user support. It was also determined
that the process in which users obtain, install, and configure the
client software was critical to success given the need to quickly
deliver the solution to a potential 6,000 residence hall users within a
few days of the start of the fall term. In order to simplify this
process for users, a special Web site was set up that is accessible
only to these users providing the ability to download preconfigured Figure 1: Wireless Gateway Architecture
software and simplified installation instructions.
2.3 Unified Authentication to the Network
At this time, the University has implemented two distinctly different
mechanisms for authenticating users to the network: PPPoE for
residence hall students and wireless gateways for wireless network
The Internet

users. One obvious potential problem is the need for the same student
NAS to install and configure a PPPoE client in order to access the wired
network from a residence hall room and then authenticate to the
network using the wireless gateway from a classroom. As the
deployment of wireless service increases, we anticipate the need to
implement a single mechanism for user authentication to the network
Figure 2: PPPoE Architecture regardless of whether a user accesses the network from a wired port or
wireless service anywhere at the University. The extension of the
2.2 Wireless User Authentication requirement for users to authenticate to the University’s wired network
Security was a paramount concern during the wireless networking to all wired ports, irrespective of the location or purpose of the port is
pilot program. It was quickly decided that both Wire Equivalent underway using the 802.1x protocol.
Privacy (WEP) and individual user authentication would both be
employed in conjunction with wireless networking to encrypt data 3. LESSONS LEARNED
and to identify users if needed in connection with security incidents. The primary lesson that we learned is that it is both practical and
PPPoE was implemented during the wireless pilot in part because of possible to implement effective systems for user authentication to
the successful implementation of this protocol for residence hall user wired and wireless networks. While PPPoE requires the distribution
authentication. Feedback received during the pilot implementation of client software and does have user support requirements, we have
indicated that users were dissatisfied with the lengthy process of demonstrated that the protocol offers improved security and can
installing and configuring a wireless radio card, WEP key, and actually reduce the need to provide extensive individual support for
PPPoE client software and that some users experienced student users. Fears that this deployment would dramatically
incompatibility problems that made it difficult for them to increase student support calls at the start of the previous Fall term
participate in the program. were quickly dispelled.
The pilot program experience made it clear that an alternative The Web-based user authentication interface provided by wireless
solution of for user authentication was needed that did not involve gateway solutions offers a client software-free method that is readily
the installation of client-side software. The IEEE 802.1x protocol understandable by a variety of users. Further, the Web interface is
was initially evaluated to provide this alternative in light of the fact readily usable in conjunction with a wide range of end user devices,
that current operating systems include 802.1x functionality. In from laptops to handheld devices, offering a much more flexible
addition, all of the wireless radio cards under consideration support solution for wireless deployment than is available with PPPoE.
the authentication protocol. Implementation of 802.1x has been
Ultimately, a single system that offers ease of configuration and use
delayed, however, because the implemented version of RADIUS
for all users, regardless of whether the network is accessed from
software is not capable of native communication with the
wireless or traditional wired ports must be implemented in order to
University’s LDAP, NDS, Active Directory, or Kerberos
avoid confusion and to offer users flexibility in roaming from
authentication systems. This problem required the identification of
classroom to public area to residence hall or office without needing
an interim solution until a compatible 802.1x solution has been
to re-authenticate or switch to a different authentication mechanism.
developed and deployed.
We believe that the 802.1x coupled with RADIUS provides this
functionality.

248

Вам также может понравиться