Network Access ControlNetwork World's Network Access Control Newsletter, 07/12/07NAC protection extends to VoIPBy Tim GreeneNAC has trouble giving much information about network devices that can’t be scanned for virus software, operating system patches, firewall configuration and the like. This is particularly true of VoIP phones, which likely run on proprietary operating systems and won’t submit to a NAC client for scanning or even external probing for much data. NAC can’t supply the same depth of information about a VoIP phone as it can about a PC. But that doesn’t mean NAC is useless in the task of protecting VoIP. For instance, the most common threat to VoIP is a denial-of-service attack, and to the extent that NAC can prevent infected machines from launching these attacks, it also protects VoIP.
Similarly, if infected machines are used to launch attacks against known operating system vulnerabilities, it could impair VoIP gear based on those operating systems. If NAC reduces the number of infected machines that access networks by flagging them, it reduces the number of these attacks against VoIP equipment. Servers necessary to VoIP can be scanned in more depth by NAC devices than VoIP handsets, and they are also susceptible to infection. To the extent that NAC can expose these machines before they do damage, it can protect the voice network. Some exploits against call servers has made it possible to take over the machines, leaving the voice network open to fraud and abuse. So while NAC doesn’t evaluate all VoIP gear in the same ways it does desktops and laptops, NAC’s generalized threat mitigation value does extend to VoIP and can be considered an important layer of protection for voice networks.
|
Contact the author: Tim Greene is a senior editor at Network World, covering network access control, virtual private networking gear, remote access, WAN acceleration and aspects of VoIP technology. You can reach him at tgreene@nww.com. ARCHIVEArchive of the Network Access Control Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: networking.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment