Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...


NameDescriptionStatusTools
1Physical signageNRO advises member organisations to deploy physical signage in areas where eduroam is available (e.g. to assist visitors with medical prosthetics)ShouldEvidence: copy of documentation/web page
2Published locationsNRO ensures all member venue location data is added to the eduroam database (for use in maps etc.)Should
3Web presencePublishes a site at (tld)/eduroam documenting eduroam activities and locations in their NRENShouldEvidence: URL/screenshots
4MapsWebsite (3) includes graphical maps of accessible locations, noting additional services such as charging pointsMay
5Contact dataNRO has arranged 365 cover of all named contact points (mail and phone redirects for leave etc)Should
6

CAT enabled

NRO maintains a CAT adminstrator/config for its own staff and recommends CAT usage to all membersShould
7TrainingNRO provides eduroam training to member organisations (either directly or through a third party)Should
8



9



1011



3c. Technical requirements (MOL)

13

NameDescriptionStatusTools
1FirewallA layer 4 firewall MUST separate the internet-facing RADIUS server and the internal network. Access must be controlled and monitored.MUST
2Firewall ICMPFirewalls MUST permit ICMP to allow centralised monitoring of RADIUS serversMUST
3Admin accessSystem administration (RADIUS and associated systems) MUST be preformed over a private internal network ONLY.MUST
4DMZ connectivityAll protocols permitted access to the servers MUST be risk-assessed (e.g. SMB and RDP may present security risks)MUST
5External port accessA deny-all policy MUST be applied, permitting only the minimum ports necessary for authentication (e.g. UDP 1812, Status-Server 18121, TCP 2083 if RadSec is used). UDP 1645 MUST NOT be used.MUST
6Internal port accessA deny-all policy MUST be applied, permitting only the minimum ports necessary for administration functions (e.g. TCP 3389 for RDP or TCP 22 for SSH)MUST
7Traffic interceptionNROs MUST NOT deploy interception technology or otherwise monitor the content of visitor or roaming traffic (e.g. do not use TLS or SSL interception proxies)MUST NOT
8RadSecIf RadSec is used, X.509 certificates must be used to identify RADIUS serversMUST (optional)
89Network segmentationNetwork segmentation SHOULD be considered, placing roaming users into a separate segment to local organisation users.SHOULD
910VLAN spoofing countermeasuresthe visitor network design should prevent devices from mailiciously placing themselves into unauthorised VLANsSHOULD
1011Penetration External penetration testingNROs SHOULD regularly conduct vulnerability assessment of internet-facing eduroam infrastructure.SHOULD1112
12Internal vulnerability testingNROs SHOULD regularly conduct vulnerability testing from within the internal network of eduroam infrastructure.SHOULD
13Non-eduroam guestsNRO and its members may offer a public guest Wi-Fi service for thsoe unable to access eudroam; such users SHOULD be provisioned onto a separate network from eduroam visitors, with its own authentication, monitoring, and anti-circumvention measures. SHOULD
14



15



4. References

eduroam Compliance Statement https://www.eduroam.org/support/eduroam_Compliance_Statement.pdf

...