Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

4/30/2006
02:45 AM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail

Interop Brings Big NAC Attack

Network access control is on a roll. Here's a quick market overview and a roundup of newly-announced products



LAS VEGAS -- After simmering quietly on the back burner for the past few years, Network Access Control (NAC) technology is this year's hot security dish at the Interop show here.

NAC is fast becoming the hot technology. For the past few years, it's been simmering at the edges, but with more pushes into integration, more published standards from groups like the Trusted Computing Group , and more pilots being tested, you’re bound to hear about it.

NAC, which helps enterprises automatically limit network access based on the identity and characteristics of a particular device, dates back to the days of directory-enabled networks. First-generation NAC products were limited to host firewalling and centralized command and control. Today, however, NAC products can collect a variety of information -- including host status, user authentication, and device location -- to determine the applicable access policy. NAC systems can ask questions such as "Who are you?" and "What is your condition?" and then use the answers to allow access to some parts of the network, while restricting others.

Up to now, NAC has received a lukewarm welcome from IT managers, because it puts a heavy load on technical staff who must administer the access policies and determine how they should be applied. Many IT organizations would like to shift that administrative function to business managers and department heads, who are in a better position to determine which systems a user might need to access.

NAC technology remains complex, but as standards emerge from Trusted Computing Group and other industry organizations, users are climbing on board. In fact, research firm Infonetics Research Inc. predicts that the NAC market will grow from $323 million in 2005 to $3.9 billion in 2008. Such growth would be remarkable, given the high cost and complexity of current NAC technology, but clearly, it is a hot market -- and a hot topic at the Interop conference this week.

NAC at the show
After laying low on the NAC front, Extreme Networks Inc. (Nasdaq: EXTR) is demonstrating a product that plays to its strengths in network hardware. Like other infrastructure vendors such as Enterasys Networks Inc. (NYSE: ETS) and Nortel Networks Ltd. (NYSE/Toronto: NT), Extreme offers network-wide policy enforcement through its routing/switching platform running ExtremeXOS. To fill in the policy gaps that aren't covered in ExtremeXOS, the switch vendor is partnering with IBM Internet Security Systems for intrusion detection and prevention, with StillSecure for host assessment and policy, and CipherOptics Inc. for VPN encryption.

Extreme's network architecture ties all of this functionality together within the NAC product line while ensuring high availability. For example, instead of inserting an in-line IDS/IPS that can fail and halt traffic, the ExtremeXOS solution moves the traffic over the switch fabric to be analyzed by the IDS, and then cuts offending hosts off at the port.

To achieve its full potential, Extreme's NAC strategy requires an end-to-end Extreme switch network, but as the industry gravitates toward standards, it could become an important player.

Enterasys is making its NAC presence felt at Interop with the unveiling of its new Sentinel product, as well as partnerships with Lockdown Networks Inc. and Q1 Labs Inc. Sentinel is an agentless host assessment engine that reports on a host’s condition and, after checking other data points such as user authentication and location, applies an access policy on a host.

Enterasys's products work well with other vendors' hardware for NAC command and control via 802.1x or SNMP. Dragon, Enterasys’s IDS, can reconfigure the network if it detects that a host has been infected and is acting badly.

So far, Enterasys is focusing on LAN-connected hosts and doesn’t have a solution for IPSec or SSL VPN-connected users. If the company hopes to compete with the likes of Nortel and Cisco Systems Inc. (Nasdaq: CSCO), it will have to fill that hole.

One of the oldest NAC appliance vendors, InfoExpress Inc. , is demonstrating its product line, which uses a technology called Dynamic NAC (DNAC). DNAC is a peer-to-peer-style solution, where clients essentially use a man-in-the-middle attack to force unknown hosts on the LAN to route through a DNAC peer via ARP spoofing.

ARP spoofing tricks the target host into thinking the DNAC client is the router and tricks the router into thinking the DNAC client is the host. If an unknown host is validated by InfoExpress's CyberGatekeeper, the DNAC client releases it to run on the network. If the unknown host is not authorized, it still routes through the DNAC host until it can be remediated or until some other policy can be applied.

The InfoExpress technology might work well for small and medium-sized businesses -- it goes in a direction opposite to enterprise technologies that focus on network-centric or host-centric policy enforcement.

At Interop, Lockdown Networks is demonstrating its integration with Microsoft Corp. (Nasdaq: MSFT)'s Network Access Protection (NAP) technology, as well as enhancements to to its EnforcerT NAC appliance. Lockdown has added a "guest registration" capability that lets guest users identify themselves before being granted access to the network. The company has added support for infrastructure products from Cisco, Extreme, Nortel, Allied Telesyn International Inc. , and Foundry Networks Inc. (Nasdaq: FDRY). Lockdown also has unveiled a rarity in the NAC market: a MacOSX agent.

Lockdown's strategy is similar to the traditional infrastructure vendors'. Lockdown hasn't penetrated the enterprise market as deeply as competitors such as Check Point Software Technologies Ltd. (Nasdaq: CHKP) or Symantec Corp. (Nasdaq: SYMC), but if it provides the right authorization and validation services, it could make some hay.

Nortel, like Extreme and Enterasys, is focusing on policy enforcement in the network, not the host, and is partnering with other vendors to fill in missing components such as host validation, authentication, and other support technologies. Nortel also has integrated its NAC technology with its widely deployed VPN Router, allowing it to reach out to remote hosts. Going forward, Nortel has hitched its wagon to Microsoft’s NAP initiative, which might not be such a great idea, given Microsoft's history in security. Remember when everyone thought Microsoft’s VPN initiatives in Windows 2000 would kill the market? NAP still has a long way to go.

Like InfoExpress, Nortel was an early innovator in host validation with the TunnelGuard technology in its IPSec VPN client. Early implementations of TunnelGuard were difficult to use, but ease of use has improved over time. The big question is how dedicated Nortel is to standards. It participates in the Trusted Computing Group's Trusted Network Connect working group -- the NAC people -- but its solutions aren’t TNC-conformant. It seems as if even Nortel is waiting to see how the market will shake out.

— Mike Fratto, Editor at Large, Dark Reading

Mike Fratto is a principal analyst at Current Analysis, covering the Enterprise Networking and Data Center Technology markets. Prior to that, Mike was with UBM Tech for 15 years, and served as editor of Network Computing. He was also lead analyst for InformationWeek Analytics ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Well I dont run on MacOS, so I need to take extra precautions"
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13659
PUBLISHED: 2020-06-02
address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.
CVE-2020-10703
PUBLISHED: 2020-06-02
A NULL pointer dereference was found in the libvirt API responsible introduced in upstream version 3.10.0, and fixed in libvirt 6.0.0, for fetching a storage pool based on its target path. In more detail, this flaw affects storage pools created without a target path such as network-based pools like ...
CVE-2020-10739
PUBLISHED: 2020-06-02
Istio 1.4.x before 1.4.9 and Istio 1.5.x before 1.5.4 contain the following vulnerability when telemetry v2 is enabled: by sending a specially crafted packet, an attacker could trigger a Null Pointer Exception resulting in a Denial of Service. This could be sent to the ingress gateway or a sidecar, ...
CVE-2020-10136
PUBLISHED: 2020-06-02
Multiple products that implement the IP Encapsulation within IP standard (RFC 2003, STD 1) decapsulate and route IP-in-IP traffic without any validation, which could allow an unauthenticated remote attacker to route arbitrary traffic via an exposed network interface and lead to spoofing, access cont...
CVE-2020-13757
PUBLISHED: 2020-06-01
Python-RSA 4.0 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing exces...