<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Wireless &#8211; David&#039;s Church Information Technology</title>
	<atom:link href="/category/wireless/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>David Szpunar: Owner, Servant 42 and Servant Voice</description>
	<lastBuildDate>Tue, 21 Feb 2012 14:38:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.2</generator>
	<item>
		<title>Bye Meraki, Hello Open-Mesh: Revisiting the Campground WiFi!</title>
		<link>/2009/07/23/open-mesh-wifi-order/</link>
					<comments>/2009/07/23/open-mesh-wifi-order/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Thu, 23 Jul 2009 19:20:54 +0000</pubDate>
				<category><![CDATA[Companies]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Wireless]]></category>
		<category><![CDATA[campground]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[Meraki]]></category>
		<category><![CDATA[mesh]]></category>
		<category><![CDATA[Open-Mesh wireless]]></category>
		<category><![CDATA[WiFi]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=391</guid>

					<description><![CDATA[Two years ago, almost to the day (which I just noticed!), I went up to the Indiana District Assemblies of God campground in Hartford City,  IN. Purpose? Set up and test four Meraki Mini mesh routers with their satellite internet connection. You can read about my initial escapade here and here (corny play on words [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Two years ago, almost <em>to the day</em> (which I just noticed!), I went up to the Indiana District Assemblies of God campground in Hartford City,  IN. Purpose? Set up and test four Meraki Mini mesh routers with their satellite internet connection. You can read about my initial escapade <a title="My Post: Off to do some Mesh Networking with Meraki" href="http://infotech.davidszpunar.com/2007/07/24/off-to-do-some-mesh-networking-with-meraki/">here</a> and <a title="My Post: I Can Play The Merakis!" href="http://infotech.davidszpunar.com/2007/07/24/i-can-play-the-merakis/">here</a> (corny play on words and all :-)</p>
<p>Here&#8217;s what&#8217;s changed in two years: Meraki has since redefined their entire business and offers much more expensive solutions, and no Meraki Minis. Also, the campground can now get DSL and not just satellite internet, which is awesome. And although Meraki is for my purposes defunct, <a title="Open-Mesh homepage" href="http://www.open-mesh.com/">Open-Mesh</a> has taken over where Meraki left off and has a similar device at the same price, with better accessories and more power!</p>
<p>This time, we&#8217;re covering more ground as well. So I just ordered nine <a title="Open-Mesh Professional Mini Router OM1P" href="https://www.open-mesh.com/store/products.php?product=Professional-Mini-Router">Open-Mesh OM1P Professional Mini Routers</a>. And six <a title="Open-Mesh: 7dbi Antenna" href="https://www.open-mesh.com/store/products.php?product=7dbi-Antenna">7 dbi antennas</a>, plus three <a title="Open-Mesh: Indoor Wallplug Enclosure for OM1P" href="https://www.open-mesh.com/store/products.php?product=Indoor-Wallplug-Enclosure-for-OM1P">Indoor Wallplug Enclosures</a>. This time I&#8217;m going to be covering more area, and I&#8217;m hoping that using some larger antennas as well as the reports I&#8217;ve heard that the Open-Mesh devices have better range than the Meraki units out of the box mean that we&#8217;ll have a very successful network this time! We&#8217;ll also have two or three DSL lines to serve as injection gateways, which should be a major improvement over the horrendous satellite connection we had before (if you could call it a connection half of the time when it wasn&#8217;t, you know, connected :-)</p>
<p>I plan on taking some pictures and documenting the setup more than last time, and if I find the time I might even blog some of it!</p>
<p>Did I mention my whole order including shipping was under $550? That&#8217;s cool.</p>]]></content:encoded>
					
					<wfw:commentRss>/2009/07/23/open-mesh-wifi-order/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>Using Free Wireless and VPNs</title>
		<link>/2008/05/31/free-wireless-wifi-vpn-security/</link>
					<comments>/2008/05/31/free-wireless-wifi-vpn-security/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sun, 01 Jun 2008 03:23:22 +0000</pubDate>
				<category><![CDATA[Companies]]></category>
		<category><![CDATA[Cool Services]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[People]]></category>
		<category><![CDATA[Remote Access]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Wireless]]></category>
		<category><![CDATA[public wireless]]></category>
		<category><![CDATA[Tony Dye]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=251</guid>

					<description><![CDATA[I read Tony Dye&#8217;s post on Wireless Safety: The VPN Question and wanted to share a comment. It turned into a post of its own, so I&#8217;ve moved it into one :-) Read his post first so this makes sense. If a laptop user establishes a VPN connection to your corporate VPN server, and doesn&#8217;t [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I read <a title="Tony Dye's blog" href="http://tonydye.typepad.com/">Tony Dye&#8217;s</a> post on <a title="Wireless Safety: the VPN Question" href="http://tonydye.typepad.com/main/2008/05/wireless-safe-1.html">Wireless Safety: The <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> Question</a> and wanted to share a comment. It turned into a post of its own, so I&#8217;ve moved it into one :-) Read his post first so this makes sense.</p>
<p>If a laptop user establishes a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connection to your corporate <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> server, and doesn&#8217;t use split tunneling (in other words, from the time they&#8217;re connected, all traffic goes through the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> as its default gateway no matter what), assuming that you&#8217;re using a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> client that verifies the identity of the server (rather than blindly trusting DNS, which is easily spoofable on a wireless network), the user moves from the realm of insecurity into a much more secure environment, similar to being plugged into your wired network at the office. Of course, then your office WAN connection has to support <em>everything</em> they do, including web browsing!</p>
<p>However, using a free or paid &#8220;<span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>&#8221; service from a company that just turns your wireless connection into a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>-enabled &#8220;wired&#8221; connection is only going to help thwart unencrypted wifi sniffing and other such attacks. Unless you also use <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> and other encryption technologies, those services are just giving you a wired internet connection just like your home connection rather than the easier-to-sniff unencrypted wireless. It&#8217;s better than nothing, but it&#8217;s not like an encrypted pipe into your own network.</p>
<p>Don&#8217;t discount unencrypted wireless attacks. It&#8217;s never happened to me, but if you hop over and read some of <a title="Chief Security Monkey: Case Files Index" href="http://blogs.ittoolbox.com/security/investigator/archives/official-securitymonkey-case-file-index-14787">Security Monkey&#8217;s case files</a> at you&#8217;ll discover that there&#8217;s a lot of bad stuff going on in the world on computers :-) Those case files are slightly modified true stories from this guy&#8217;s career! His old 2005-2007 podcast episodes are worth listening to for some cool security tips and tools as well, to digress for a moment!</p>
<p>I don&#8217;t have a good answer; <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connections to the office make internet run very slowly unless you have the WAN bandwidth to support fast throughput to and from all your remote users including web browsing! But that&#8217;s a much more secure way to operate. The number of ways wireless can be hijacked, sniffed, spoofed, and hacked, especially if it&#8217;s unencrypted to begin with, is downright scary! At the very least use <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> with verified certificates for anything you do of any importance (or if passwords are transmitted) on an encrypted wireless connection. As an IT guy, I can tell you (or myself) whether a particular session (POP3, IMAP, <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Remote Procedure Call' );"><acronym class="uttInitialism">RPC</acronym></span> over <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HyperText Transfer Protocol' );"><acronym class="uttInitialism">HTTP</acronym></span>, <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HTTP protocol using SSL encryption','caption', 'HyperText Transfer Protocol Secure' );"><acronym class="uttInitialism">HTTPS</acronym></span>, etc.) is happening over an encrypted connection or not and can be careful. However, the average user is, obviously, not going to know or even care necessarily if Outlook is using POP3 unencrypted or via <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span>, or using <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Remote Procedure Call' );"><acronym class="uttInitialism">RPC</acronym></span> over <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HTTP protocol using SSL encryption','caption', 'HyperText Transfer Protocol Secure' );"><acronym class="uttInitialism">HTTPS</acronym></span> securely. And if they log into Gmail, they&#8217;re not likely to know that although their password is always encrypted on login, their email is transmitted in the clear unless they initiate the session using <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> from the start (using https://mail.google.com/ rather than http://mail.google.com)./ Even if their email contains passwords and confirmations for other accounts!</p>
<p>Stuart mentioned <a title="WiTopia homepage" href="http://www.witopia.net/">WiTopia</a> on <a title="Stuart's comment on Tony Dye's post" href="http://tonydye.typepad.com/main/2008/05/wireless-safety.html#comment-115001000">his comment</a> to <a title="Tony Dye: Wireless Safety Basics" href="http://tonydye.typepad.com/main/2008/05/wireless-safety.html">Tony&#8217;s original post</a>. I&#8217;d never heard of them before, but I&#8217;ve seen similar services to their personalVPN product. That service appears to be, like I mentioned above, just a way to get a &#8220;wired quality&#8221; connection to the internet over unsecured wireless. An admirable service and a worthy goal even with its limitations, but what caught my eye even more was their <a title="WiTopia's SecureMyWiFi Service" href="http://www.witopia.net/securemore.html">SecureMyWifi</a> service. It&#8217;s still a wireless service but it has to do with your own on-campus wireless access. It lets you move away from using <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span> with a Pre-Shared Key (<span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'WPA-PSK, also known as WPA Personal, this wireless network security setting uses a single key shared among clients and base station for authentication and encryption of network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/WPA-PSK&quot;&gt;link&lt;/a&gt;)','caption', 'Pre-Shared Key' );"><acronym class="uttAbbreviation">PSK</acronym></span>), also known as <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span>-Personal, and use their <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span> services to authenticate users individually to your encrypted wireless access points. It seems a bit pricey (to me&#8211;it&#8217;s currently a $99 setup fee, $99/year for one access point, and $14.95/year for each additional access point), but we have the same thing set up using Microsoft&#8217;s free (built-in on Windows Server 2003) <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Microsoft\'s RADIUS server, which comes included as a part of Windows Server. (&lt;a href=&quot;http://www.microsoft.com/technet/network/ias/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', ' 	Internet Authentication Service' );"><acronym class="uttInitialism">IAS</acronym></span> <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span> server in-house. If you aren&#8217;t familiar with how to set it all up, the WiTopia service could be quite beneficial! They charge per access point, but at Lakeview we have a centrally-managed access points system with one controller that takes care of authentication. I assume that the WiTopia service is based on unique <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span> keys for each access point client; since the central controller (currently running 12 access points) acts as a single client, it should look like &#8220;one&#8221; access point to the service. Whether or not this is allowed with their terms of service I have no idea; we are not likely going to use the service since I already do this in-house for free, but I would recommend reading the terms and/or contacting them if you plan on doing something similar to remain in the spirit of their offering.</p>]]></content:encoded>
					
					<wfw:commentRss>/2008/05/31/free-wireless-wifi-vpn-security/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>I Can Play The Merakis!</title>
		<link>/2007/07/24/i-can-play-the-merakis/</link>
					<comments>/2007/07/24/i-can-play-the-merakis/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Wed, 25 Jul 2007 03:45:17 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[On The Road]]></category>
		<category><![CDATA[Wireless]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/07/24/i-can-play-the-merakis/</guid>

					<description><![CDATA[The install and test was a success! Four Meraki Mini access points are up and running at the campgrounds, providing internet access through the satellite connection (which was the weak link during our testing, being slow or down most of the time, but it was working better before we arrived so we have higher hopes). [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The <a title="My post: Off to do some Mesh Networking with Meraki" href="http://infotech.davidszpunar.com/2007/07/24/off-to-do-some-mesh-networking-with-meraki/">install and test</a> was a success! Four <a title="Meraki Mini" href="http://meraki.com/products/mini/">Meraki Mini</a> access points are up and running at the campgrounds, providing internet access through the satellite connection (which was the weak link during our testing, being slow or down most of the time, but it was working better before we arrived so we have higher hopes). We even made it back to Lakeview before 5 pm, which was our goal!</p>
<p>There&#8217;s not even that much to tell. The setup was the easiest part: unpack, plug in to power. Place near window for best signal. Plug internet line into the one next to the satellite modem. And that part had been done for us! We primarily tested the existing network using <a title="My post: VisiWave Wireless Site Survey" href="http://infotech.davidszpunar.com/2007/03/10/visiwave-wireless-site-survey/">VisiWave</a> to document signal strength, and moved the fourth access point around to various locations to make sure when we order four more, they will cover what we want them to (they will). The VisiWave mapping was the most time-consuming part of the trip (besides waiting for the slow/disconnected internet), but I haven&#8217;t had time to pull useful reports out of that data yet.</p>
<p>The <a title="Meraki Dashboard" href="http://meraki.com/products/dashboard/">Meraki Dashboard</a> is the truly novel and useful tool. You can place your nodes on a map, view how they are interconnected, monitor bandwidth usage and speeds by node and by user, block or whitelist users, set up a splash page, security, and quite a few other nice tweaks that I wouldn&#8217;t have thought of but make perfect sense when you see them!</p>
<p>I took a couple of screenshots of the node map overview, using standard and satellite maps:</p>
<p><a title="Meraki at Campgrounds, Standard Map Overview" href="http://infotech.davidszpunar.com/2007/07/24/i-can-play-the-merakis/meraki-at-campgrounds-standard-map-overview/" rel="attachment wp-att-101"><img decoding="async" src="http://infotech.davidszpunar.com/wp-content/uploads/2007/07/merakilp_overview_map.thumbnail.jpg" alt="Meraki at Campgrounds, Standard Map Overview" /></a> <a title="Meraki at Campgrounds, Satellite Hybrid Overview" href="http://infotech.davidszpunar.com/2007/07/24/i-can-play-the-merakis/meraki-at-campgrounds-satellite-hybrid-overview/" rel="attachment wp-att-100"><img decoding="async" src="http://infotech.davidszpunar.com/wp-content/uploads/2007/07/merakilp_overview_hybrid.thumbnail.jpg" alt="Meraki at Campgrounds, Satellite Hybrid Overview" /></a></p>
<p>If you hold your mouse over a node (in the real Dashboard, not these pictures of course! But you knew that&#8230;), the route to the internet turns green (one of the gray lines between nodes in the standard map), and some external text shows some additional status information. The number on a node is the number of users in the last 24 hours. These pictures just scratch the surface of the control interface, which is well thought out and feature rich. But that&#8217;s all I have time for, so you&#8217;ll have to grab some of your own Minis and mess around!</p>
<p>Oh yeah&#8230;sorry for the joke in the title. I do love my bad puns&#8230;</p>
<p><strong>UPDATE:</strong> On Feb. 21st, 2012, after a new comment and response below, I wrote a post that&#8217;s a bit of a followup to this one, over at my current (though still infrequently-updated) blog: <a href="http://www.existdifferently.com/2012/ubiquity-unifi-vs-open-mesh-wifi/">Ubiquity UniFi vs. Open Mesh</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/07/24/i-can-play-the-merakis/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Off to do some Mesh Networking with Meraki</title>
		<link>/2007/07/24/off-to-do-some-mesh-networking-with-meraki/</link>
					<comments>/2007/07/24/off-to-do-some-mesh-networking-with-meraki/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Tue, 24 Jul 2007 12:49:21 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Wireless]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/07/24/off-to-do-some-mesh-networking-with-meraki/</guid>

					<description><![CDATA[Today I&#8217;m going up to the Assemblies of God Indiana District campgrounds with volunteer Jeroen to install and test some mesh networking made by Meraki. They just got a satellite internet connection (their only affordable option due to location) last week and need to populate the internet access to several locations on the campgrounds, probably [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Today I&#8217;m going up to the Assemblies of God Indiana District campgrounds with volunteer Jeroen to install and test some mesh networking made by <a href="http://www.meraki.net/" title="Meraki homepage">Meraki</a>. They just got a satellite internet connection (their only affordable option due to location) last week and need to populate the internet access to several locations on the campgrounds, probably using seven or eight <a href="http://meraki.com/products/mini/" title="Meraki Mini">Meraki Mini</a> devices. One of them connects to the internet connection, the others are placed within range of the first one, or just within range of any of the others (up to three hops away I believe), extending internet access to the entire coverage area!</p>
<p>If they had a second internet connection, &#8220;injecting&#8221; another point of internet access would be an option, and the network would automatically send traffic to the best internet access point. Thus, the mesh part of mesh networking. I&#8217;ve been wanting to try the Meraki products for a while, so I&#8217;m excited! More details to come when we&#8217;re done!</p>
<p>The trip to the campgrounds is about two hours each way, so we&#8217;ll only have three or four hours of actual set up and testing time.</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/07/24/off-to-do-some-mesh-networking-with-meraki/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>Wireless 802.1x Authentication: Overview</title>
		<link>/2007/05/18/wireless-8021x-authentication-overview/</link>
					<comments>/2007/05/18/wireless-8021x-authentication-overview/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sat, 19 May 2007 03:52:29 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Wireless]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/18/wireless-8021x-authentication-overview/</guid>

					<description><![CDATA[I&#8217;ve been asked to post some information on how I implemented 802.1x authentication in our wireless network. This setup involved a lot of experimentation, and I&#8217;m not completely done although I have a working solution. This post will be a high-level overview of the process. I will post some additional information when I have time [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I&#8217;ve been <a href="http://infotech.davidszpunar.com/2007/05/08/8021x-port-based-authentication/#comment-111" title="Hunter French's comment on my blog">asked</a> to post some information on how I implemented 802.1x authentication in our wireless network.  This setup involved a lot of experimentation, and I&#8217;m not completely done although I have a working solution.  This post will be a high-level overview of the process.  I will post some additional information when I have time (no guarantees!) that contains a bit more of the nitty-gritty details of some of the steps.  How did I learn?  I had a burning desire to figure out how &#8220;real enterprises&#8221; did wireless security and authentication, so I read, and Googled, and read, and read, and tested, and read, and tested some more.  And that was just with an off-the-shelf Linksys router!  When we got the good equipment and I learned its configuration options, I just needed to do a bit more configuration and testing to get it functional at the level of the Linksys, but with more flexibility.</p>
<p>I&#8217;m using the built-into-Windows-Server <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Microsoft\'s RADIUS server, which comes included as a part of Windows Server. (&lt;a href=&quot;http://www.microsoft.com/technet/network/ias/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', ' 	Internet Authentication Service' );"><acronym class="uttInitialism">IAS</acronym></span>, which is the Microsoft implementation of a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span> server.  Basically, I set up a profile in the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Microsoft\'s RADIUS server, which comes included as a part of Windows Server. (&lt;a href=&quot;http://www.microsoft.com/technet/network/ias/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', ' 	Internet Authentication Service' );"><acronym class="uttInitialism">IAS</acronym></span> configuration to allow specific Windows Active Directory groups to be allowed &#8220;dial-up&#8221; access through a Wireless port type.  Then I created a new client in <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Microsoft\'s RADIUS server, which comes included as a part of Windows Server. (&lt;a href=&quot;http://www.microsoft.com/technet/network/ias/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', ' 	Internet Authentication Service' );"><acronym class="uttInitialism">IAS</acronym></span> with its IP address and a secret key that I also enter in the wireless access point (AP) where it asks for a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span> server (while setting up <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span>/WPA2 authentication, not the Pre-Shared Key (<span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'WPA-PSK, also known as WPA Personal, this wireless network security setting uses a single key shared among clients and base station for authentication and encryption of network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/WPA-PSK&quot;&gt;link&lt;/a&gt;)','caption', 'Pre-Shared Key' );"><acronym class="uttAbbreviation">PSK</acronym></span>) kind).  If I did everything right (insert hours of testing and learning here), I can connect to the wireless <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Very basically, the string that shows up as the &quot;network name&quot; in an 802.11x wireless network. (&lt;a href=&quot;http://en.wikipedia.org/wiki/SSID&quot;&gt;link&lt;/a&gt;)','caption', 'Service Set Identifier' );"><acronym class="uttInitialism">SSID</acronym></span> I configured by specifying a username and password (or to use the Windows logon credentials) in the settings, rather than needing a pre-shared key that&#8217;s the same for everyone.</p>
<p>If I go a step further and put a certificate on the server that the clients trust, I can also authenticate with the certificates rather than the username/password credentials, which is actually more secure due to the certificate being longer, more random, and harder to obtain than a username and password (this is why I limit access for now to users in the Active Directory group I specify, creating fewer users with wireless login privileges).  I haven&#8217;t completed the certificate step of the process, and I&#8217;m still running a <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span>-PSK <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Very basically, the string that shows up as the &quot;network name&quot; in an 802.11x wireless network. (&lt;a href=&quot;http://en.wikipedia.org/wiki/SSID&quot;&gt;link&lt;/a&gt;)','caption', 'Service Set Identifier' );"><acronym class="uttInitialism">SSID</acronym></span> as an alternate connection method until I&#8217;m sure I have everyone switched over to the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span>-based <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Very basically, the string that shows up as the &quot;network name&quot; in an 802.11x wireless network. (&lt;a href=&quot;http://en.wikipedia.org/wiki/SSID&quot;&gt;link&lt;/a&gt;)','caption', 'Service Set Identifier' );"><acronym class="uttInitialism">SSID</acronym></span>.  But once I deactivate the <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span>-PSK network, security should go up because now you can&#8217;t just share the <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'WPA-PSK, also known as WPA Personal, this wireless network security setting uses a single key shared among clients and base station for authentication and encryption of network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/WPA-PSK&quot;&gt;link&lt;/a&gt;)','caption', 'Pre-Shared Key' );"><acronym class="uttAbbreviation">PSK</acronym></span> key, which has a way of getting out no matter how hard you try and protect it (having free wi-fi now helps this as well, since if someone just wants internet access, they don&#8217;t need the internal network key!).  And your keys get changed every time your passwords change, rather than coordinating updating the <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'WPA-PSK, also known as WPA Personal, this wireless network security setting uses a single key shared among clients and base station for authentication and encryption of network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/WPA-PSK&quot;&gt;link&lt;/a&gt;)','caption', 'Pre-Shared Key' );"><acronym class="uttAbbreviation">PSK</acronym></span> and then making sure everyone needing wireless access has the new key (if they don&#8217;t, expect cell phone calls asking for it pretty quickly).</p>
<p>That&#8217;s the high level why and how. I sleep now :-)</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/05/18/wireless-8021x-authentication-overview/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Wi-Fi Fully Functional and Fabulous!</title>
		<link>/2007/05/15/wi-fi-fully-functional-and-fabulous/</link>
					<comments>/2007/05/15/wi-fi-fully-functional-and-fabulous/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Wed, 16 May 2007 03:33:52 +0000</pubDate>
				<category><![CDATA[People]]></category>
		<category><![CDATA[Wireless]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/15/wi-fi-fully-functional-and-fabulous/</guid>

					<description><![CDATA[Success! This past weekend was our first weekend providing free wireless internet access. I haven&#8217;t figured out the exact details that will let me log every access in the way I want to use for trending, but it appears it was used by several people on Sunday. The bigger test of the Indiana District Council [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Success!  This past weekend was our first weekend providing free wireless internet access.  I haven&#8217;t figured out the exact details that will let me log every access in the way I want to use for trending, but it appears it was used by several people on Sunday.  The bigger test of the Indiana District Council yesterday and today, however, is a bigger success!  For one, I was actually here :-)  But the use was a lot heavier, due to all the brochures on the cafe tables, handed out to people, personalized assistance from yours truly&#8230;not that it was needed, the brochure did an admirable job if I do say so myself.</p>
<p>I checked on the stats of how many people were connected at a time throughout the day (the stats-gathering was a bit random but better than nothing) and it looks like the highest number of connections I saw was this afternoon, at about 18 simultaneous users.  Yesterday one man I talked to came up to me later and said he was glad there was wireless access and was very appreciative!  Given that wireless access was not announced prior to the event, the turnout of people with laptops was still pretty high.  Right about right, I&#8217;m not sure I would want to support more users than that on the first test.  Better a successful slow ramp-up than an all-out crash-and-burn, in my opinion.</p>
<p>While making the rounds on Monday afternoon, I ended up talking to a speaker who had a booth at the Council and ended up showing him how to remove some annoying spyware someone had hacked into showing up on his website, and giving him a pointer to <a href="http://www.google.com/analytics" title="Google Analytics homepage">Google Analytics</a> for some more useful stats than the tools his cPanel installation provided.</p>
<p>So&#8230;success!  There wasn&#8217;t a single issue that was made aware of with the wireless the entire time.  No complaints, no issues with speed throttling, no issues connecting even though it required a password from the brochure and going through a portal page (I&#8217;ll get some more details on how I have this set up when I get a chance).  And no issues with things being blocked that shouldn&#8217;t have been through <a href="http://www.scrubit.com/" title="ScrubIT DNS filtering homepage">ScrubIT</a>.  Well, I take it back, there was one issue.  One of our volunteers was trying to use a PPTP <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> to connect to her workplace and do some work on downtime.  The connection kept timing out and would never connect.  The <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connectoid kept throwing Error 619.  Google didn&#8217;t turn up anything related, but I suspect it has to do with the connection being double-NATted.  I did see someone else&#8217;s Cisco <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connecter work just fine, but that&#8217;s just a success story, not related to the PPTP error I&#8217;m sure.</p>
<p>But if that&#8217;s the worst that happened (and it was)&#8230;I&#8217;m happy!  It&#8217;s been a long process through to the release, since I ordered the equipment at the end of last October!</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/05/15/wi-fi-fully-functional-and-fabulous/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>VisiWave Wireless Site Survey</title>
		<link>/2007/03/10/visiwave-wireless-site-survey/</link>
					<comments>/2007/03/10/visiwave-wireless-site-survey/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sun, 11 Mar 2007 04:01:50 +0000</pubDate>
				<category><![CDATA[Cool Tools]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Wireless]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/03/10/visiwave-wireless-site-survey/</guid>

					<description><![CDATA[We just put in a new core network with all-new switches, along with an extensive wireless network, as part of our new building addition program. In order to determine the best locations to place wireless access points (13 total), we needed to do a site survey. I researched several software tools, and most of them [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>We just put in a new core network with all-new switches, along with an extensive wireless network, as part of our new building addition program.  In order to determine the best locations to place wireless access points (13 total), we needed to do a site survey.  I researched several software tools, and most of them were expensive to the point of being out of our price range ($1500 or more in general).  Eventually, I found a relatively new piece of software I found called <a href="http://www.visiwave.com/" title="VisiWave wireless site survey software">VisiWave</a> that fit the bill perfectly, and was inexpensive enough for our budget: $549 minus a 20% non-profit discount (contact them and ask for the discount code).  It also integrates with the <a href="http://www.metageek.net/" title="MetaGeek: home of the Wi-Spy">Wi-Spy</a> spectrum analyzer (I didn&#8217;t find it through Jason Powell but he has two good posts I found recently about it: <a href="http://jpowell.blogs.com/jason_powell_church_it/2007/02/wispy_good_inex.html" title="Jason Powell: Wi-Spy ... good inexpensive wifi scanning tool">Part 1</a> and <a href="http://jpowell.blogs.com/jason_powell_church_it/2007/02/wispy_part_ii.html" title="Wi-Spy part II">Part 2</a>) if you purchase it, to map channel interference as well as its primary job of mapping existing access point strengths/weaknesses.</p>
<p>VisiWave is easy to use, even without the Pro version (the SO version, for Software Only, is the one we purchased, and is significantly less expensive).  You need a floor plan of some sort for your facility (whatever area you&#8217;re going to survey).  Import this into the survey half of the VisiWave software (the other half is a separate reporting application for creating a report from the data collected by the collection tool), and then walk around your facility clicking at key spots where you&#8217;re located on the map on the laptop you&#8217;re carrying with you (a Pocket PC is an option as well, but we used a laptop).  A time-saving feature lets you switch to a mode where you can click on your current location, walk at a steady pace in a straight line, and click your ending location, and it will distribute the data points collected evenly over the line you walked.  It sounds simple, but it saved me a <em>lot</em> of time!  The VisiWave website has good instructions and example reports.</p>
<p>I&#8217;ll most more example of the survey report and such in the future (our initial survey was last October), but this has proved to be a very useful tool that we can use over and over again, rather than hiring someone to do a site survey once.  I did the survey before placing new access points, but I haven&#8217;t had time to re-survey since we installed the new APs, and there are four I haven&#8217;t installed yet.  We do have very good coverage based on the 9 that I have installed based on the original survey already, however!  I&#8217;m looking forward to the final survey and report, and to fine-tuning based on those results.  Our grand opening is the week after Easter next month.  I may or may not have the public internet stuff set up by then (using a <a href="http://www.nomadix.com/" title="Nomadix homepage">Nomadix</a> <a href="http://www.nomadix.com/products/platforms/ag3000" title="Nomadix AG 3000 product page">AG 3000</a>) but the equipment will be there for when I figure out the software and the filtering solution to use, so it should be ready shortly thereafter.</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/03/10/visiwave-wireless-site-survey/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
