Network Technology & Infrastructure community blogs

    Blog
    Janet

    One of Jisc’s activities is to monitor and, where possible, influence regulatory developments that affect us and our customer universities, colleges and schools as operators of large computer networks. Since Janet and its customer networks are classified by Ofcom as private networks, postings here are likely to concentrate on the regulation of those networks.Postings here are, to the best of our knowledge, accurate on the date they are made, but may well become out of date or...

    Blog
    Janet

    Keep up to date with our progress for Janet6 - the new Janet infrastructure - as we move through to the design, build and roll-out stages of the project.

    Blog
    Community

    This blog monitors and reports on broadband policy and marketplace developments in the UK, Europe and worldwide that are likely to be of interest to the Janet community.

    Posts here may also reference my Broadband Policy Watch blog and you can also find me on Twitter.

    Blog
    Community

     

    These printers are very basic ones and work fine if only used by the PC that they are connected to.

    BUT on our network we have these shared and sometimes they will totally stop printing and won't print again until you have cleared the spooler and done reboot...

     

    Here is the fix to allow these printers to be shared without GRIEF!

    (Windows XP/VISTA)

     

    1) Before you start make sure the printer now works from the PC that it's...

    Blog
    Community

    TLDR: clients will move to not supporting Diffie-Hellman keys of less than 1024 bit - upgrade your RADIUS server configuration or release to ensure its providing bigger Diffie-Hellman parameters in the EAP session

    overview

    On the back of the recent wave of further SSL attacks and weakness identitication, several vendors are now making moves to stop SSL clients from negotiating connections where the parameters have weak Diffie-Hellman (DH) keys. In the world of web browsers ,...

    Blog
    Community

    Are we bypassing policy by using mac-address authorisation for devices that cannot do 802.1x or can but don't have a university username? Personally I don't think so.

     

    We record the owner of the device and therefore have an auditable record of where the device authenticated by storing the mac-address in a mac-authorisation bypass file on the RADIUS Servers. This writes a log entry for all login attempts. After successful authentication and the...