Friday, November 30, 2007

Cisco confirms ability to eavesdrop on phone calls using its VoIP gear

Cisco Alert Network World logo
NetworkWorld.com | LANs & WANs Research Center | Update Your Profile

Welcome to the Friday edition of Network World's Cisco News Alert in which we focus on the top items from Cisco Subnet, your gateway to Cisco news, blogs, discussion forums, security alerts, giveaways and more. Enjoy!

THIS WEEK'S TOP PICK: Cisco confirms ability to eavesdrop on phone calls using its VoIP gear 

Cisco confirmed it is possible to eavesdrop on remote conversations using Cisco voIP phones. In its security response, Cisco says: "An attacker with valid Extension Mobility authentication credentials could cause a Cisco Unified IP Phone configured to use the Extension Mobility feature to transmit or receive a Real-Time Transport Protocol (RTP) audio stream." Cisco adds that Extension Mobility authentication credentials are not tied to individual IP phones and that "any Extension Mobility account configured on an IP phone's Cisco Unified Communications Manager/CallManager (CUCM) server can be used to perform an eavesdropping attack." Read more.


SPONSORED BY BLUE COAT
rule

Get the latest on Web Acceleration Tools
Discover how to significantly improve document delivery times for users that are physically away from your centralized data center. A document that takes 80 minutes to delivery to a user across the globe could be delivered in three minutes with Web acceleration. Learn how your IT organization can benefit from this technology. Listen to this Webcast now.

rule
RELATED NEWS:

MORE TOP PICKS:

Cisco fires top dog in Brazil

Cisco’s legal problems in Brazil: a timeline

Cisco's Chambers makes it into Fortune's Power 25 list where Steve Jobs rules

Cisco in the emerging markets: Is it all as rosy as it seems?

FROM OUR BLOGGERS:

Brad Reese on Cisco: Cisco-invented NetFlow MIA as Cisco invests in the network behavior analysis business
Beware Mazu Networks, Lancope, Q1Labs, Arbor Networks and the like, the creator of NetFlow: Cisco, appears to be investing in the Network Behavior Analysis Business and unlike the above companies, they aren’t doing it with NetFlow. "We can very quickly tell users, how people are behaving on the network, what threats exist and help them optimize it for business purposes," said Paul Brady – President of Mazu Networks. "We are able to without agents or inline devices through the use of NetFlow which is pervasive on almost all networks and transparent, meaning very little to no overhead." However, Cisco’s strategy appears to take a different approach.

Joe Panettieri's Eye on Cisco: Cisco prepares marketing surprise
Hundreds of Cisco partners are heading to Miami on December 2 for a private gathering with the networking giant. Is this yet another geek fest with plenty of golf mixed in? Guess again. The invitation-only gathering is a first-of-its-kind marketing summit for partners, and provides important clues about Cisco's strategic thinking for 2008.

Jeff Doyle on IP Routing: What about a volume III?
When Cisco Press approached me in 1996 or so about writing a book, they were a pretty new operation and they left it to me to choose the topic. So I chose the plum, "Routing TCP/IP," which originally was supposed to be one volume. Halfway through the project my editor and I both realized we couldn’t squeeze everything I wanted to cover in a single book so it evolved into two volumes. And those two volumes have been a cornerstone of my career. Given the success of these two volumes I had a conversation last year with Brett Bartow, the Executive Editor at Cisco Press, about doing a Volume III ...

Wendell Odom's Cisco Cert Zone: A few hints and another question about frame relay addressing
Monday's sample question focused on the data link layer addresses used as frames pass over a Frame Relay WAN. Today, I’ll summarize the key points that must be considered when answering that question, as well as posing a follow-on general question about Frame Relay addressing. (If you’ve not looked at Monday’s question yet, it may be worth reading the question, and picking some answers, before reading these suggestions.)

Dheeraj Tolani's Cisco Routing Switching Essentials: Securing Cisco devices
So far, we’ve discussed securing your devices by implementing passwords on your console, your aux, and your VTY. We’ve discussed using SSH rather than telnet for security purposes, and we’ve talked about using “enable secret passwords” on your accounts. In my last article, we discussed disabling protocols like CDP for security purposes since it gives away too much information about your network. There are still many other things covered in Global Knowledge courses that you can do to secure your network.

Michael Morris From the Field: Routing iSCSI with 10GIG
We recently redesigned our DC network templates. Part of this redesign created a "Storage Pod" where our network storage resources would be located and virtualized. This consolidated storage devices not just physically, but logically into separate VLANs. The previous DC design had the storage resources in the same VLAN as the application and database servers. All iSCSI access was at Layer-2, ignoring the "i" in iSCSI. This was a legacy decision driven by our storage teams who were convinced that any Layer-3 routing of iSCSI would severely impact performance.

Jamey Heary: Cisco Security Expert: PCI compliance, the 12 step program
If your company stores, processes, or transmits the primary account number on a credit card then you are required to meet, or exceed, the data security standards set forth in the PCI security standards. These security requirements apply to all network components that forward or have access to card holder data. This would include switches, routers, firewalls, IPS, Servers, workstations, wireless, storage, etc. So basically, if the device is IP (Internet Protocol) reachable to cardholder data then it is in scope for the PCI requirements.

ChannelSurfing with Ken Presti: Green Google and the Cisco channel
The blogosphere has been full of reactions to Google’s renewable energy initiative. If you’re still coming out of a turkey-induced slumber, the company announced plans to invest huge quantities of money in the development of renewable energy technologies, especially solar, wind, and geothermal. Some of the reactions are very complimentary; others more skeptical. But I had a completely different reaction jump into my mind when I saw the announcement.

Author Expert: Michael Behringer: Who is responsible for abuse of Internet technology?
The Internet with all its peripheral infrastructure has an enormous potential, to the good guys as well as to the bad ones. No surprise. Lots of technologies are extremely powerful, and provide a lot of detail on the network as well as its users. Somehow the potential abuse of Internet based data needs to be controlled. But how? And who is responsible for this?

Joe Chapman's Network Training Edge: The line and the LAN
Depending on the person - or provider - you ask you may get different answers as to what types of services are supported in a 'metro ethernet' environment. Fortunately, the Metro Ethernet Forum (MEF) has gotten together the leading providers and manufacturers in the industry and has built a cohesive list of the products, platforms, standards and services which should constitute a great starting point for anyone looking to get into this area.

HOT DISCUSSIONS AMONG CISCO SUBNET READERS:

Cisconet: Parts of Cisco.com inaccessible for most of Monday

Morris: Any CCIEs in Syria???

Cisconet: What admin tasks would you like to offload?

Odom: The confidence that comes from sniffing/tracing

Badccie: Cisco Gold partners who hire and fire just for certification

FREEBIES, GIVEAWAYS AND OTHER NOTABLES:

* Enter to win a Skyline-ATS training course of your choice worth up to $3,495. Details here. FINAL FEW DAYS TO ENTER!

*Enter to Win a Cisco Press Book: Up for grabs are 15 copies of "MPLS VPN Security" by Michael H. Behringer and Monique J. Morrow, is the first book to address the security features of MPLS VPN networks and to show you how to harden and securely operate an MPLS network. Details here.  Get a sneak peek of a chapter from one of the books here. Read Michael Behringer's blog for Cisco Subnet here.

* Read a free chapter from "Firewall Fundamentals" by Wes Noonan and Ido Dubrawsky. Free excerpt here

*Browse through our library of other free Cisco Press book chapters.

* Check out Cisco Subnet's library for more free chapters from Cisco Press books.


HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

'07 ENTERPRISE ALL-STARS
'07 ENTERPRISE ALL-STARS Honoring outstanding technology projects.

SPONSORED BY BLUE COAT
rule

Get the latest on Web Acceleration Tools
Discover how to significantly improve document delivery times for users that are physically away from your centralized data center. A document that takes 80 minutes to delivery to a user across the globe could be delivered in three minutes with Web acceleration. Learn how your IT organization can benefit from this technology. Listen to this Webcast now.

rule

Join Network World's Technology Opinion Panel
Here is your chance to help shape the future of IT. You know what products and enhancements are needed, you have the insight and foresight to be out front and provide direction to Network Word and the network industry. To join the panel, complete a brief registration survey
. The panel is strictly for technology professionals to share their vision.

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

11/30/07

TODAY'S MOST-READ STORIES:

  1. 3.3 billion mobile accounts
  2. EFF fires at Internet traffic interference
  3. Open source's future
  4. Which certifications are worth your time?
  5. 2007 Cool Yule Tools Gift Guide
  6. First large-scale 802.11n WLAN working
  7. Teleworkers called back to cubicle life
  8. 2007 Enterprise All-Star Awards
  9. Testing all-in-one firewalls
  10. Lotus Notes vulnerable to e-mail attack

MOST DOWNLOADED PODCAST:
Streaming content to a desktop near you


Compare Network Monitoring and Management Products

Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's newly enhanced Network Monitoring and Management Buyer's Guide.

Visit now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Cisco Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments:

Post a Comment