Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Networking

    Todays NAC Remains Vulnerable to Attack

    Written by

    Matt Hines
    Published October 18, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      According to the latest figures from Forrester Research, some 40 percent of all enterprises in North America will have some form of Network Admission Control in place by the end of 2006, as businesses seek more effective ways to identify devices connecting to their networks and to enforce IT security policies.

      The systems are available today from a wide range of technology vendors including Cisco Systems, Insightix, Nortel Networks and StillSecure, with Microsoft planning to launch its NAP (Network Access Protection) products in 2007.

      Despite the benefits offered by the systems, however, industry experts say that the tools are far from complete and, by themselves, do not yet provide an adequate level of security for companies to depend on.

      The most outspoken critic of NAC security has been Ofir Arkin, chief technology officer of Insightix, based in Raanana, Israel. Arkin presented his methods for bypassing the technologies in early August at the annual Black Hat hacker convention in Las Vegas.

      Arkin maintains that, despite his public warnings and other software vendors concessions that NAC is not yet foolproof, many companies are adopting the technologies without understanding the risks involved.

      /zimages/4/28571.gifFor advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub.

      “I believe that many companies may be entertaining a false sense of security because they dont understand all the implications and potential weak points,” said Arkin. “And its not that NAC is immature, its just that people need to understand what it gives you and what it doesnt; some technologies out there promise full protection based on their NAC capabilities, and, in most cases, that isnt really accurate.”

      Arkin has outlined a series of weaknesses that he believes exist in current NAC installations. Among those vulnerabilities is the ability for outsiders to dupe NAC systems so-called IP sniffers, which are used to scan data packets passing through the products monitoring tools to validate information about devices connecting to a network.

      Common loopholes that let devices communicate inside their network segment without sending IP traffic through a monitoring point could allow for virus infections or for a device to gain access to unauthorized areas of a companys network, Arkin contends.

      Other NAC vulnerabilities cited by Arkin include the ability for devices to circumvent the systems DHCP (Dynamic Host Configuration Protocol) proxies, broadcast listeners, SNMP traps and various forms of client-based applications, all of which are used to determine whether a device should be granted access to a network or denied.

      Other vendors agree that NAC systems still are vulnerable to attacks against those components. Companies should be using NAC to help improve their ability to keep unwanted parties off their networks, but they shouldnt believe that the technologies can stand alone in completing the task, said Alan Shimel, chief strategy officer for StillSecure, in Superior, Colo.

      /zimages/4/28571.gifNAC systems are all the rage at Interop. Click here to read more.

      “The way companies should look at it is that NAC is going to vastly improve their ability to control network access, but that its no panacea,” said Shimel. “Compared to the systems companies have been using for the same purposes up until now, it is far superior, but we wouldnt subscribe to the notion that NAC is a silver bullet; theres still a lot of work that needs to be done.”

      Experts maintain that industry standards such as IEEE 802.1x are key to developing NAC into systems that can provide the sort of comprehensive network protection that is already associated with the technologies. The advancement of the standard for port-based NAC technologies—used to authenticate devices attached to wired or wireless networks—will allow for higher levels of interoperability among NAC products and increase companies ability to garner consistent security reports from the systems, industry analysts say.

      “The industry consensus is that 802.1x is the most solid security standard for authentication and access control. It works at a Layer 2 level, and all the authentication mechanisms go to work before any type of network access is granted,” said Andrew Braunberg, an analyst with Current Analysis, in Sterling, Va. “Thats the most bulletproof NAC security method in use today, but there are still big headaches in getting everything compliant with 802.1x.”

      Part of the problem is that companies are approaching the technology as a security project, when in essence the products available today are still more oriented toward network management, Braunberg contends.

      “People are forgetting that NAC isnt really designed as a security solution; its a systems management solution that was created to allow endpoints to leverage network security tools,” he said. “NAC really operates in a configuration and management function. In a lot of ways, it should be thought of as adding a management and control overlay that aids security, but not as a security solution.”

      /zimages/4/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Matt Hines
      Matt Hines

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.