Wednesday 22 October 2008

WiMax Vs LTE : future mobile communication trend ?


After a long debut about the next-generation cellular and WiMax deployment in the near future for the new communication module, seems they will show something to us, LTE and WiMax for future communication module. Both are still struggling to prove their capability, performance reliability and signal efficiency towards higher bandwidth requirement from community. Whihc one will win the segment? However, before we further jump into conclusion, some clarification need to be mentioned here. There are still some people really confused about those two; what are they? what they do? how great performance they can produce? how reliable they are?..Well, if we put these two together, they are almost the same. First, both are 4G technologies designed to move data rather than voice. Both are IP networks based on OFDM technology for fixed (802.16) and OFDMA (802.16m & LTE) for mobile — so rather than rivals such as GSM and CDMA, they’re more like siblings. But does the siblings all the same. no right? So, there a plenty of difference among them.

WiMax is based on a IEEE standard (802.16), and like that other popular IEEE effort, Wi-Fi, it’s an open standard that was debated by a large community of engineers before getting ratified. In fact, we’re still waiting on the 802.16m standard for faster mobile WiMax to be ratified. The level of openness means WiMax equipment is standard and therefore cheaper to buy — sometimes half the cost and sometimes even less. Depending on the spectrum alloted for WiMax deployments and how the network is configured, this can mean a WiMax network is cheaper to build. The speed for the WiMax (802.16) is up to 70 Mbps, while the mobile WiMax (802.16m) is up to 100Mbps.

Malaysia is still in progress in deploying WiMax Technology, but the condition is stillon “testing” for so long . Do not know why. Izzi is a new name in Malaysian Broadband challange and the claim to have 4G connection. Check it first before you subscribe (affraid only for the best effort - as another slumpy monopoly carrier advertise their broadband). Sprint Nextel will aslo deploy this WiMax technology to become their 4G carrier.

Whilst, The LTE, (3GPP Long Term Evolution), is the next-generation network that beyond 3G. In addition to enabling fixed to mobile migrations of Internet applications such as Voice over IP (VoIP), video streaming, music downloading, mobile TV and many others, LTE networks will also provide the capacity to support an explosion in demand for connectivity from a new generation of consumer devices tailored to those new mobile applications. Most of the Telcos believes LTE will be the standard chosen by 80 percent of the carriers in the world

LTE is the natural evolution of 3GPP GSM and WCDMA networks. It is also an evolution candidate for 3GPP2 CDMA networks. Efforts are underway to harmonize the standards. LTE itself is a new paradigm in access, with a new modulation technique, OFDM (Orthogonal Frequency Division Multiplex) or some people said it use Orthogonal Frequency Division Multiple Access (OFDMA), and antenna technology, MIMO (Multiple Input Multiple Output).

Nortel, Nokia , LG, and Alcatel-lucent are among the group who perform test on LTE deployment.

To much technical right?

The funny thing about technology businesses is that technology counts for so little in the final result. Politics, human nature, and all of the frailties inherent therein trump the technology issues in virtually every case. So, logically: LTE will win.

The cellular carriers control the market, so they control the decision. Now if the WiMAX camp could come up with something that was phenomenally better, then the cellular carrier would have to look more closely at this, but unfortunately, physics works the same for everyone. With no compelling technical advantage for WiMAX, LTE will win. Agree?

WiMax Vs LTE : future mobile communication trend ?


After a long debut about the next-generation cellular and WiMax deployment in the near future for the new communication module, seems they will show something to us, LTE and WiMax for future communication module. Both are still struggling to prove their capability, performance reliability and signal efficiency towards higher bandwidth requirement from community. Whihc one will win the segment? However, before we further jump into conclusion, some clarification need to be mentioned here. There are still some people really confused about those two; what are they? what they do? how great performance they can produce? how reliable they are?..Well, if we put these two together, they are almost the same. First, both are 4G technologies designed to move data rather than voice. Both are IP networks based on OFDM technology for fixed (802.16) and OFDMA (802.16m & LTE) for mobile — so rather than rivals such as GSM and CDMA, they’re more like siblings. But does the siblings all the same. no right? So, there a plenty of difference among them.

WiMax is based on a IEEE standard (802.16), and like that other popular IEEE effort, Wi-Fi, it’s an open standard that was debated by a large community of engineers before getting ratified. In fact, we’re still waiting on the 802.16m standard for faster mobile WiMax to be ratified. The level of openness means WiMax equipment is standard and therefore cheaper to buy — sometimes half the cost and sometimes even less. Depending on the spectrum alloted for WiMax deployments and how the network is configured, this can mean a WiMax network is cheaper to build. The speed for the WiMax (802.16) is up to 70 Mbps, while the mobile WiMax (802.16m) is up to 100Mbps.

Malaysia is still in progress in deploying WiMax Technology, but the condition is stillon “testing” for so long . Do not know why. Izzi is a new name in Malaysian Broadband challange and the claim to have 4G connection. Check it first before you subscribe (affraid only for the best effort - as another slumpy monopoly carrier advertise their broadband). Sprint Nextel will aslo deploy this WiMax technology to become their 4G carrier.

Whilst, The LTE, (3GPP Long Term Evolution), is the next-generation network that beyond 3G. In addition to enabling fixed to mobile migrations of Internet applications such as Voice over IP (VoIP), video streaming, music downloading, mobile TV and many others, LTE networks will also provide the capacity to support an explosion in demand for connectivity from a new generation of consumer devices tailored to those new mobile applications. Most of the Telcos believes LTE will be the standard chosen by 80 percent of the carriers in the world

LTE is the natural evolution of 3GPP GSM and WCDMA networks. It is also an evolution candidate for 3GPP2 CDMA networks. Efforts are underway to harmonize the standards. LTE itself is a new paradigm in access, with a new modulation technique, OFDM (Orthogonal Frequency Division Multiplex) or some people said it use Orthogonal Frequency Division Multiple Access (OFDMA), and antenna technology, MIMO (Multiple Input Multiple Output).

Nortel, Nokia , LG, and Alcatel-lucent are among the group who perform test on LTE deployment.

To much technical right?

The funny thing about technology businesses is that technology counts for so little in the final result. Politics, human nature, and all of the frailties inherent therein trump the technology issues in virtually every case. So, logically: LTE will win.

The cellular carriers control the market, so they control the decision. Now if the WiMAX camp could come up with something that was phenomenally better, then the cellular carrier would have to look more closely at this, but unfortunately, physics works the same for everyone. With no compelling technical advantage for WiMAX, LTE will win. Agree?

WiMax Vs LTE : future mobile communication trend ?


After a long debut about the next-generation cellular and WiMax deployment in the near future for the new communication module, seems they will show something to us, LTE and WiMax for future communication module. Both are still struggling to prove their capability, performance reliability and signal efficiency towards higher bandwidth requirement from community. Whihc one will win the segment? However, before we further jump into conclusion, some clarification need to be mentioned here. There are still some people really confused about those two; what are they? what they do? how great performance they can produce? how reliable they are?..Well, if we put these two together, they are almost the same. First, both are 4G technologies designed to move data rather than voice. Both are IP networks based on OFDM technology for fixed (802.16) and OFDMA (802.16m & LTE) for mobile — so rather than rivals such as GSM and CDMA, they’re more like siblings. But does the siblings all the same. no right? So, there a plenty of difference among them.

WiMax is based on a IEEE standard (802.16), and like that other popular IEEE effort, Wi-Fi, it’s an open standard that was debated by a large community of engineers before getting ratified. In fact, we’re still waiting on the 802.16m standard for faster mobile WiMax to be ratified. The level of openness means WiMax equipment is standard and therefore cheaper to buy — sometimes half the cost and sometimes even less. Depending on the spectrum alloted for WiMax deployments and how the network is configured, this can mean a WiMax network is cheaper to build. The speed for the WiMax (802.16) is up to 70 Mbps, while the mobile WiMax (802.16m) is up to 100Mbps.

Malaysia is still in progress in deploying WiMax Technology, but the condition is stillon “testing” for so long . Do not know why. Izzi is a new name in Malaysian Broadband challange and the claim to have 4G connection. Check it first before you subscribe (affraid only for the best effort - as another slumpy monopoly carrier advertise their broadband). Sprint Nextel will aslo deploy this WiMax technology to become their 4G carrier.

Whilst, The LTE, (3GPP Long Term Evolution), is the next-generation network that beyond 3G. In addition to enabling fixed to mobile migrations of Internet applications such as Voice over IP (VoIP), video streaming, music downloading, mobile TV and many others, LTE networks will also provide the capacity to support an explosion in demand for connectivity from a new generation of consumer devices tailored to those new mobile applications. Most of the Telcos believes LTE will be the standard chosen by 80 percent of the carriers in the world

LTE is the natural evolution of 3GPP GSM and WCDMA networks. It is also an evolution candidate for 3GPP2 CDMA networks. Efforts are underway to harmonize the standards. LTE itself is a new paradigm in access, with a new modulation technique, OFDM (Orthogonal Frequency Division Multiplex) or some people said it use Orthogonal Frequency Division Multiple Access (OFDMA), and antenna technology, MIMO (Multiple Input Multiple Output).

Nortel, Nokia , LG, and Alcatel-lucent are among the group who perform test on LTE deployment.

To much technical right?

The funny thing about technology businesses is that technology counts for so little in the final result. Politics, human nature, and all of the frailties inherent therein trump the technology issues in virtually every case. So, logically: LTE will win.

The cellular carriers control the market, so they control the decision. Now if the WiMAX camp could come up with something that was phenomenally better, then the cellular carrier would have to look more closely at this, but unfortunately, physics works the same for everyone. With no compelling technical advantage for WiMAX, LTE will win. Agree?

Thursday 16 October 2008

Laptop Mini Wireless Antenna Made from Pen

A small antenna to boost the signal of a laptop wireless card, that can be stuck to the back of the laptop screen.

mini antenna


The design is the same as for the larger homemade antenna, but uses thin RG58 cable and is only 2 sectors long. The size was chosen so it could be housed inside the tube of an old pen, to provide rigidity and protection to the antenna.

mini antenna I also tried building it with even less tools than last time, so all you really need is

  • 300mm (1 foot) or rg58 cable

  • pen knife

  • ruler

  • small wirecutters

  • masking tape (any adhesive tape should do)

  • soldering iron and solder


The rg58 cable has a velocity factor of 0.66 , which is the same as for the rg213 cable I used to make the original larger antenna. This means that I can reuse all of the dimensions I had previously calculated of 41mm for each half wave sector and 31mm for the quarter wave whip.

The first step is to make the 1/4 wave whip, you need to cut off 31mm of the outside covering and shielding.

mini antenna I've left the insulation on for now, so that the wire for the whip doesn't get too bent, while I working on the sector, but it will be removed later, just before all the sectors are soldered together.

Next up is the other end of the sector that is attached to the quarter wave whip, and the rest of the sectors (if you want more) Once joined togeter, each sector needs to be 40.5mm long, so I make the main body of each sector 37mm with 4mm of central wire sticking out each end, to be used to solder to the sectors either side.

mini antenna


I found the easiest way to cut the sectors was to hold the knife still and roll the cable on the worktop, so it rotates along the knife blade, cutting through the outer plastic and the wire shielding. Then carefully cut into the central insulation paying special attention to not cutting the central wire. I used the wire cutters to snip the sectors apart. You should then end up with the pieces as shown below.

mini antenna


Now we just need to join all the parts together. You need to cut a small v shaped notch into the outer plastic to reveal the wire shielding below, being careful not to cut the shielding. For the larger antenna I built a custom jig to hold the pieces together while soldering, but for this small antenna I've found just taping the parts down to the surface seems adequate for the job. Remember that the overall length of each sector needs to be 40.5mm. I measure from the end of one sector to the same point on the next.

mini antenna


All you need now is to put a connector on the other end that is compatible with the connector on your wireless card. If you can't find a suitable connector, you may have to buy a short pigtail for your wireless card, which is a short cable designed for connecting the card to an antenna, and either put an N-connector on the end of your mini antenna, or as I did, cut up the pigtail, and solder it directly to the antenna cable. To protect your mini antenna from damage, you may want to house it in the body of an old felt tip pen. Find one that fits the assembled antenna snugly, and glue or stick them together.

Disclaimer I should point out now that I don't claim that the above design is fit for any purpose, and don't accept any liability for use of the design, or any antenna based on this design. If you want to build an antenna using this design, then you are responsible for ensuring that it doesn't breach any laws where you are, and is compatible with any hardware you connect it to. If in doubt, buy a commercial antenna.


Source: wireless.gumph.org

Laptop Mini Wireless Antenna Made from Pen

A small antenna to boost the signal of a laptop wireless card, that can be stuck to the back of the laptop screen.

mini antenna


The design is the same as for the larger homemade antenna, but uses thin RG58 cable and is only 2 sectors long. The size was chosen so it could be housed inside the tube of an old pen, to provide rigidity and protection to the antenna.

mini antenna I also tried building it with even less tools than last time, so all you really need is

  • 300mm (1 foot) or rg58 cable

  • pen knife

  • ruler

  • small wirecutters

  • masking tape (any adhesive tape should do)

  • soldering iron and solder


The rg58 cable has a velocity factor of 0.66 , which is the same as for the rg213 cable I used to make the original larger antenna. This means that I can reuse all of the dimensions I had previously calculated of 41mm for each half wave sector and 31mm for the quarter wave whip.

The first step is to make the 1/4 wave whip, you need to cut off 31mm of the outside covering and shielding.

mini antenna I've left the insulation on for now, so that the wire for the whip doesn't get too bent, while I working on the sector, but it will be removed later, just before all the sectors are soldered together.

Next up is the other end of the sector that is attached to the quarter wave whip, and the rest of the sectors (if you want more) Once joined togeter, each sector needs to be 40.5mm long, so I make the main body of each sector 37mm with 4mm of central wire sticking out each end, to be used to solder to the sectors either side.

mini antenna


I found the easiest way to cut the sectors was to hold the knife still and roll the cable on the worktop, so it rotates along the knife blade, cutting through the outer plastic and the wire shielding. Then carefully cut into the central insulation paying special attention to not cutting the central wire. I used the wire cutters to snip the sectors apart. You should then end up with the pieces as shown below.

mini antenna


Now we just need to join all the parts together. You need to cut a small v shaped notch into the outer plastic to reveal the wire shielding below, being careful not to cut the shielding. For the larger antenna I built a custom jig to hold the pieces together while soldering, but for this small antenna I've found just taping the parts down to the surface seems adequate for the job. Remember that the overall length of each sector needs to be 40.5mm. I measure from the end of one sector to the same point on the next.

mini antenna


All you need now is to put a connector on the other end that is compatible with the connector on your wireless card. If you can't find a suitable connector, you may have to buy a short pigtail for your wireless card, which is a short cable designed for connecting the card to an antenna, and either put an N-connector on the end of your mini antenna, or as I did, cut up the pigtail, and solder it directly to the antenna cable. To protect your mini antenna from damage, you may want to house it in the body of an old felt tip pen. Find one that fits the assembled antenna snugly, and glue or stick them together.

Disclaimer I should point out now that I don't claim that the above design is fit for any purpose, and don't accept any liability for use of the design, or any antenna based on this design. If you want to build an antenna using this design, then you are responsible for ensuring that it doesn't breach any laws where you are, and is compatible with any hardware you connect it to. If in doubt, buy a commercial antenna.


Source: wireless.gumph.org

Laptop Mini Wireless Antenna Made from Pen

A small antenna to boost the signal of a laptop wireless card, that can be stuck to the back of the laptop screen.

mini antenna


The design is the same as for the larger homemade antenna, but uses thin RG58 cable and is only 2 sectors long. The size was chosen so it could be housed inside the tube of an old pen, to provide rigidity and protection to the antenna.

mini antenna I also tried building it with even less tools than last time, so all you really need is

  • 300mm (1 foot) or rg58 cable

  • pen knife

  • ruler

  • small wirecutters

  • masking tape (any adhesive tape should do)

  • soldering iron and solder


The rg58 cable has a velocity factor of 0.66 , which is the same as for the rg213 cable I used to make the original larger antenna. This means that I can reuse all of the dimensions I had previously calculated of 41mm for each half wave sector and 31mm for the quarter wave whip.

The first step is to make the 1/4 wave whip, you need to cut off 31mm of the outside covering and shielding.

mini antenna I've left the insulation on for now, so that the wire for the whip doesn't get too bent, while I working on the sector, but it will be removed later, just before all the sectors are soldered together.

Next up is the other end of the sector that is attached to the quarter wave whip, and the rest of the sectors (if you want more) Once joined togeter, each sector needs to be 40.5mm long, so I make the main body of each sector 37mm with 4mm of central wire sticking out each end, to be used to solder to the sectors either side.

mini antenna


I found the easiest way to cut the sectors was to hold the knife still and roll the cable on the worktop, so it rotates along the knife blade, cutting through the outer plastic and the wire shielding. Then carefully cut into the central insulation paying special attention to not cutting the central wire. I used the wire cutters to snip the sectors apart. You should then end up with the pieces as shown below.

mini antenna


Now we just need to join all the parts together. You need to cut a small v shaped notch into the outer plastic to reveal the wire shielding below, being careful not to cut the shielding. For the larger antenna I built a custom jig to hold the pieces together while soldering, but for this small antenna I've found just taping the parts down to the surface seems adequate for the job. Remember that the overall length of each sector needs to be 40.5mm. I measure from the end of one sector to the same point on the next.

mini antenna


All you need now is to put a connector on the other end that is compatible with the connector on your wireless card. If you can't find a suitable connector, you may have to buy a short pigtail for your wireless card, which is a short cable designed for connecting the card to an antenna, and either put an N-connector on the end of your mini antenna, or as I did, cut up the pigtail, and solder it directly to the antenna cable. To protect your mini antenna from damage, you may want to house it in the body of an old felt tip pen. Find one that fits the assembled antenna snugly, and glue or stick them together.

Disclaimer I should point out now that I don't claim that the above design is fit for any purpose, and don't accept any liability for use of the design, or any antenna based on this design. If you want to build an antenna using this design, then you are responsible for ensuring that it doesn't breach any laws where you are, and is compatible with any hardware you connect it to. If in doubt, buy a commercial antenna.


Source: wireless.gumph.org

Trial run of Aruba Wireless Controller and InfoExpress NAC

IT Division of IIUM has run a prove of concept in implementing Aruba wireless and InfoExpress Network Access Control (NAC). The simulation test was done in their mini test lab known as Communication Testing Lab.

The setup are as follows




Cyber Gatekeeper




Aruba AP, Aruba Controller (white box), Cisco C500


Features that ITD wants to test

  1. To verify, users have Anti Virus or not

  2. To check the Anti Virus version

  3. To identify bridging activies


We also test other features offered by InfoExpress.



So far, there haven yet publish the final finding about the integration of Aruba Controller and InfoExpress NAC. I'm still waiting their final release about the result of their testing.

Trial run of Aruba Wireless Controller and InfoExpress NAC

IT Division of IIUM has run a prove of concept in implementing Aruba wireless and InfoExpress Network Access Control (NAC). The simulation test was done in their mini test lab known as Communication Testing Lab.

The setup are as follows




Cyber Gatekeeper




Aruba AP, Aruba Controller (white box), Cisco C500


Features that ITD wants to test

  1. To verify, users have Anti Virus or not

  2. To check the Anti Virus version

  3. To identify bridging activies


We also test other features offered by InfoExpress.



So far, there haven yet publish the final finding about the integration of Aruba Controller and InfoExpress NAC. I'm still waiting their final release about the result of their testing.

Trial run of Aruba Wireless Controller and InfoExpress NAC

IT Division of IIUM has run a prove of concept in implementing Aruba wireless and InfoExpress Network Access Control (NAC). The simulation test was done in their mini test lab known as Communication Testing Lab.

The setup are as follows




Cyber Gatekeeper




Aruba AP, Aruba Controller (white box), Cisco C500


Features that ITD wants to test

  1. To verify, users have Anti Virus or not

  2. To check the Anti Virus version

  3. To identify bridging activies


We also test other features offered by InfoExpress.



So far, there haven yet publish the final finding about the integration of Aruba Controller and InfoExpress NAC. I'm still waiting their final release about the result of their testing.

Wireless Security Overview

Wireless security standards and protocols fall into 3 categories

Encryption
Ensures privacy of data transmitted through the air
Can be done at Layer 2 (WEP, TKIP, AES) or Layer 3 (VPN)

Authentication
Ensures that only authorized users with proper credentials are allowed to use the network
Authentication methods include EAP, captive portal, VPN

Access Control
Provides a policy enforcement structure to control the traffic of authorized users, including networks, bandwidth, time of day, and protocols

Wireless Security Overview

Wireless security standards and protocols fall into 3 categories

Encryption
Ensures privacy of data transmitted through the air
Can be done at Layer 2 (WEP, TKIP, AES) or Layer 3 (VPN)

Authentication
Ensures that only authorized users with proper credentials are allowed to use the network
Authentication methods include EAP, captive portal, VPN

Access Control
Provides a policy enforcement structure to control the traffic of authorized users, including networks, bandwidth, time of day, and protocols

Wireless Security Overview

Wireless security standards and protocols fall into 3 categories

Encryption
Ensures privacy of data transmitted through the air
Can be done at Layer 2 (WEP, TKIP, AES) or Layer 3 (VPN)

Authentication
Ensures that only authorized users with proper credentials are allowed to use the network
Authentication methods include EAP, captive portal, VPN

Access Control
Provides a policy enforcement structure to control the traffic of authorized users, including networks, bandwidth, time of day, and protocols

NAC on Heterogeneous Wireless Network: Campus Network


Tested products: Consentry, Infoexpress, Aruba ECS, Bradford, Juniper
schematic wireless network diagram

The most critical feature which can be considered compulsory to the tested NAC that it must be able to detect the network bridging activities running by the users: bridging via UTP cable, Bluetooth, GPRS, Edge, 3G, HSDPA and other possible method of bridging such as via firewire, USB, PCMCIA etc. It must also able to quarantine or disconnect or isolate the users from the wireless network once they activate the bridging processes. In fact, most of the bridging activities is able to create a back door to our secure network. That’s why this feature is really really important to us.
Since we are having heterogeneous network, this NAC must able to support multiple protocol such 802.1x and non 802.1x including all OS platform: e.g Windows, MAC OS and Linux Clients.
We will announce later which product is the most suitable to be deployed to protect our campus wide wireless network.


[more]

NAC on Heterogeneous Wireless Network: Campus Network


Tested products: Consentry, Infoexpress, Aruba ECS, Bradford, Juniper
schematic wireless network diagram

The most critical feature which can be considered compulsory to the tested NAC that it must be able to detect the network bridging activities running by the users: bridging via UTP cable, Bluetooth, GPRS, Edge, 3G, HSDPA and other possible method of bridging such as via firewire, USB, PCMCIA etc. It must also able to quarantine or disconnect or isolate the users from the wireless network once they activate the bridging processes. In fact, most of the bridging activities is able to create a back door to our secure network. That’s why this feature is really really important to us.
Since we are having heterogeneous network, this NAC must able to support multiple protocol such 802.1x and non 802.1x including all OS platform: e.g Windows, MAC OS and Linux Clients.
We will announce later which product is the most suitable to be deployed to protect our campus wide wireless network.


[more]

NAC on Heterogeneous Wireless Network: Campus Network


Tested products: Consentry, Infoexpress, Aruba ECS, Bradford, Juniper
schematic wireless network diagram

The most critical feature which can be considered compulsory to the tested NAC that it must be able to detect the network bridging activities running by the users: bridging via UTP cable, Bluetooth, GPRS, Edge, 3G, HSDPA and other possible method of bridging such as via firewire, USB, PCMCIA etc. It must also able to quarantine or disconnect or isolate the users from the wireless network once they activate the bridging processes. In fact, most of the bridging activities is able to create a back door to our secure network. That’s why this feature is really really important to us.
Since we are having heterogeneous network, this NAC must able to support multiple protocol such 802.1x and non 802.1x including all OS platform: e.g Windows, MAC OS and Linux Clients.
We will announce later which product is the most suitable to be deployed to protect our campus wide wireless network.


[more]

Blacklisting wireless user in IIUM

What Is Blacklisting?

Blacklisting prevents a wireless client from associating with any AP in the network for a specified amount of time. If a client is connected to the network when it is blacklisted, a deauthentication message is sent to force the client to disconnect. While blacklisted, the client cannot associate with another SSID in the network. The authorize SSID for IIUM community (staff and student) is iium-community.

Methods Of Blacklisting

If the system find out that the client fails to successfully authenticate for a configured number of times for a specified authentication method. The client is automatically blacklisted. The Aruba controller deploys the detection method of a denial of service (DoS) or man in the middle (MITM) attack in the network. If the user attempt to launch DoS and MITM attack in the wireless environment in IIUM, they will immediately being blacklisted by the controller.

Duration Of Blacklisting

IT Division can configure the duration that clients are blacklisted.

For clients that are blacklisted due to authentication failure. By default, this is set to 0 (the client is blacklisted indefinitely).

For clients that are blacklisted due to other reasons, including manual blacklisting. By default, this is set to 3600 seconds (one hour). But, ITD can set this to 0 to blacklist clients indefinitely.

Considerations When Blacklisting Clients

Blacklisting clients allows the administrator to allow the network infrastructure to handle policy enforcement. Blacklisted users will be completely disconnected from the wireless network, so some care should be exercised when applying the blacklist rule to users. Commonly this rule is used to protect the network from devices running weak encryption (not supproting WPA, WPA2 athentication method), such as scanner guns and wireless phones. It can also be used to secure sensitive IIUM wireless network infrastructure from users and especially guests or contractors, or to prevent hacking attempts

Source

Blacklisting wireless user in IIUM

What Is Blacklisting?

Blacklisting prevents a wireless client from associating with any AP in the network for a specified amount of time. If a client is connected to the network when it is blacklisted, a deauthentication message is sent to force the client to disconnect. While blacklisted, the client cannot associate with another SSID in the network. The authorize SSID for IIUM community (staff and student) is iium-community.

Methods Of Blacklisting

If the system find out that the client fails to successfully authenticate for a configured number of times for a specified authentication method. The client is automatically blacklisted. The Aruba controller deploys the detection method of a denial of service (DoS) or man in the middle (MITM) attack in the network. If the user attempt to launch DoS and MITM attack in the wireless environment in IIUM, they will immediately being blacklisted by the controller.

Duration Of Blacklisting

IT Division can configure the duration that clients are blacklisted.

For clients that are blacklisted due to authentication failure. By default, this is set to 0 (the client is blacklisted indefinitely).

For clients that are blacklisted due to other reasons, including manual blacklisting. By default, this is set to 3600 seconds (one hour). But, ITD can set this to 0 to blacklist clients indefinitely.

Considerations When Blacklisting Clients

Blacklisting clients allows the administrator to allow the network infrastructure to handle policy enforcement. Blacklisted users will be completely disconnected from the wireless network, so some care should be exercised when applying the blacklist rule to users. Commonly this rule is used to protect the network from devices running weak encryption (not supproting WPA, WPA2 athentication method), such as scanner guns and wireless phones. It can also be used to secure sensitive IIUM wireless network infrastructure from users and especially guests or contractors, or to prevent hacking attempts

Source

Blacklisting wireless user in IIUM

What Is Blacklisting?

Blacklisting prevents a wireless client from associating with any AP in the network for a specified amount of time. If a client is connected to the network when it is blacklisted, a deauthentication message is sent to force the client to disconnect. While blacklisted, the client cannot associate with another SSID in the network. The authorize SSID for IIUM community (staff and student) is iium-community.

Methods Of Blacklisting

If the system find out that the client fails to successfully authenticate for a configured number of times for a specified authentication method. The client is automatically blacklisted. The Aruba controller deploys the detection method of a denial of service (DoS) or man in the middle (MITM) attack in the network. If the user attempt to launch DoS and MITM attack in the wireless environment in IIUM, they will immediately being blacklisted by the controller.

Duration Of Blacklisting

IT Division can configure the duration that clients are blacklisted.

For clients that are blacklisted due to authentication failure. By default, this is set to 0 (the client is blacklisted indefinitely).

For clients that are blacklisted due to other reasons, including manual blacklisting. By default, this is set to 3600 seconds (one hour). But, ITD can set this to 0 to blacklist clients indefinitely.

Considerations When Blacklisting Clients

Blacklisting clients allows the administrator to allow the network infrastructure to handle policy enforcement. Blacklisted users will be completely disconnected from the wireless network, so some care should be exercised when applying the blacklist rule to users. Commonly this rule is used to protect the network from devices running weak encryption (not supproting WPA, WPA2 athentication method), such as scanner guns and wireless phones. It can also be used to secure sensitive IIUM wireless network infrastructure from users and especially guests or contractors, or to prevent hacking attempts

Source