Security: Network Access ControlThis newsletter is sponsored by Raritan Computer, Inc. Data Center Build outs Simplified Network World's Security: Network Access Control Newsletter, 09/06/07Two tales of NAC implementationBy Tim GreeneHere are two cautionary tales about NAC implementations, both from Rob Whiteley, an analyst with Forrester Research. First, a large corporation wanted to implement NAC and tried out the three different categories: software, appliances and network-based. After testing, it settled on an appliance. The appliance used SNMP commands to communicate with switches, and that created a problem. The business already had a complex network management platform in place that kept track of SNMP traffic, and the NAC appliance was essentially hijacking the traffic. That created triggered problems for the management platform.
The second tale involved a business that refreshes its PC configurations periodically as a matter of desktop maintenance. This is automated using pxeboot, a pre-boot execution environment that pulls down a new desktop image before the operating system starts up. When pxeboot tried to do this for several hundred PCs, the NAC appliance the company installed didn’t get a NAC endpoint check report from the devices and quarantined all of them. The company had to make a workaround to solve the problem. Both cases point out that businesses must carefully test NAC in their network environments before they bring NAC live. NAC is primarily a security technology, but it has implications for the IT teams that focus on desktops, operations, networking, identity management, change management, etc. The bottom line for customers is that they should have well-defined tasks for NAC and attempt to address them directly and concisely without introducing any more complexity than is absolutely necessary. And then the NAC solution should be vetted very carefully to avoid these types of unintended effects.
|
Contact the author: Tim Greene is a senior editor at Network World, covering network access control, virtual private networking gear, remote access, WAN acceleration and aspects of VoIP technology. You can reach him at tgreene@nww.com. This newsletter is sponsored by Raritan Computer, Inc. Data Center Build outs Simplified ARCHIVEArchive of the Security: Network Access Control Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: networking.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment