Network Access ControlThis newsletter is sponsored by GatewayNetwork World's Network Access Control Newsletter, 08/07/07Nevis adds cloaking featureBy Tim GreeneNevis Networks has a new feature to block devices from sending or receiving packets from other devices they are barred from by NAC policy. Called cloaking, the new feature makes it impossible for devices and their users to access resources they are not authorized to reach, even if the devices and the resources are on the same virtual LAN. If a device launched an attack at another resource on a VLAN, it would be picked off by the Nevis gear. New software for both the company’s LANenforcer appliance and Secure Access Switch enable the devices to drop packets that fall outside the policy definitions of individual users.
Before, parameters that Nevis gear could use to restrict access to resources included source/destination addresses, IP and MAC addresses and protocols. The new software adds application layer intelligence with an application firewall built in to the LANenforcer software. Cloaking can be linked to protocols as well. So all the VoIP phones on a network can be restricted to sending and receiving only those protocols used for VoIP. If a VoIP phone tried to download an FTP file, for example, the request would be blocked. This finer-grained filtering enables a much narrower definition of what resources are and are not available to users and user groups. This gives Nevis gear the ability to recognize applications and map policies to them. Policies are set within the Nevis gear and imposed on groups or individuals as defined by existing directory systems. The software upgrade that adds the application firewall to Nevis gear is available now. Editor's Note: Starting Aug. 14, this newsletter will be renamed "Security: Network Access Control" to better reflect the focus of the newsletter. We thank you for reading Network World newsletters!
|
Contact the author: Tim Greene is a senior editor at Network World, covering network access control, virtual private networking gear, remote access, WAN acceleration and aspects of VoIP technology. You can reach him at tgreene@nww.com. This newsletter is sponsored by GatewayARCHIVEArchive of the Network Access Control Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment