Cisco Updates Network Security Technology 76
* * Beatles-Beatles writes to tell us that Cisco has announced an enhanced version of its Network Admission Control (NAC) technology. From the article: "Under its NAC initiative, Cisco is developing a range of tools that let companies permit, deny, quarantine or restrict admission to networks based on an end user's security status."
You are looking at Trusted Computing. (Score:5, Interesting)
This Cisco technology is implemented in terms of Trusted Network Connect, a specification published by the Trusted Computing Group. Alsee explains how and why major residential ISPs will eventually use it [slashdot.org] to condition customers' Internet access on acceptance of Trusted Computing measures.
Re:You are looking at Trusted Computing. (Score:2)
Re:You are looking at Trusted Computing. (Score:1, Interesting)
If the FCC has anything to do with it (Score:4, Interesting)
The Internet will route around damage, including silliness like trusted networks.
But can a wireless mesh [verilan.com] route around legislators and regulators who ban the transmission of electromagnetic waves for unauthorized wireless meshes? And can it choose a within-50-percent-of-optimal route that minimizes speed-of-light latency and processing latency? And can it route across large bodies of water?
Re:If the FCC has anything to do with it (Score:2)
Harmonization is a virus. (Score:2)
In that case, the "damage" the Internet will route around is the United States. Simple.
Does "harmonization" of other countries' corporate-welfare laws with those of the United States, such as parts of the Australian "free" trade agreement, count as another form of damage? Once the harmonization virus hits the entire developed world, then where should I move?
Re:Harmonization is a virus. (Score:2)
Re:You are looking at Trusted Computing. (Score:1)
Cisco is not a member of the TCG, and NAC is not compatible with TNC.
Details, details. The parts of NAC are said to correspond precisely to the parts of TNC.
Cisco needs to update more than its tech (Score:2, Interesting)
Now if only their Contract website was as easy to manage as their Linksys routers. I try to log in to their website to check the account status, and they make me jump through hoops and look for hidden links. It makes me wonder if any web designer works for them.
Re:Cisco needs to update more than its tech (Score:3, Funny)
That is classic security by obscurity. If you cannot find the links, you cannot access any information.
You can't block the CEO (Score:3, Interesting)
But this is pretty cool. The problem, of course, is how to decide whether someone is "secure" or not without running a scan on that computer. It isn't like infected computers are going to run around flagging routers of their infected status.
I wonder how they will manage this type of security clearance system. If it works, this is one of those technologies that is right on time. If we can stop viruses from infecting whole networks by shutting infections out of the network, then they can't propagate very far at all.
How to "trust" the computer (Score:3, Informative)
The problem, of course, is how to decide whether someone is "secure" or not without running a scan on that computer.
Easy. Just make the computer run a scan on itself (using an approved dialer program) and then prove, using Trusted Computing techniques, that it ran the scan that it says it ran. These PDFs [trustedcom...ggroup.org] explain the process.
Re:You can't block the CEO (Score:4, Funny)
Ahem...I take it you are a CEO of a company?
Re:You can't block the CEO (Score:2)
Now get back to work.
Re:You can't block the CEO (Score:1)
Re:You can't block the CEO (Score:5, Informative)
If you don't have proof that you ran those tools, you may not have to worry about being completely shut out of the network. You may just be admitted onto the network in a restricted way. Maybe only allowed to receive email, browse (maybe certain sites), etc.
Another cool thing is that all this will sit on the front of your network and be coupled with another product. Actually it may be all one product, I can't remember for sure. But the other part is a way to simplify managing your network in the event of an outbreak of a new worm, virus, etc. The way it worked was they were partnered with an AV company (I think Trend Micro maybe) and as soon as that company finds out about a new worm, they can send out some loose information about it. Maybe that it tries to propagate on outgoing port 666, and your router would download this information and block port 666. It would also be able to update all the routers in your network. This would be in roughly 15 minutes of learning of the new attack. Then within typically 90 minutes they will have out a way to digitally fingerprint this attack, and more specific rules are downloaded to the routers. Think something like the string codered sent out could be blocked.
This would be very fast solution to contain these things, especially when you think of large networks at say a large university or corporation with lots of routers. Way faster than what an admin could do by hand. Also it could be configured as to what ports could be blocked. Think not blocking outgoing port 80. Although I never got a clear answer about how this would work in the 15 minute part of initially just blocking a port since some worms do propagate on these commonly used ports. I'm sure they'll work all this out
Lets just hope they stick to opening up the protocols in this trusted networking approach so that more vendors can get involved. If so, I don't think we have to fear trusted computing as this is an example of how it could be a _good_ thing.
Re:You can't block the CEO (Score:3, Informative)
It's a good thing because:
Re:You can't block the CEO (Score:2)
If you don't have proof that you ran those tools, you may not have to worry about being completely shut out of the network. You may just be admitted onto the network in a restricted way.
What garbage. First, their are already products that run scans on an entire network and base access upon those results. They work well and do not require a client-side component. Second, if Cisco requires third parties to register/license with them it will eventually become a tax on connecting to the network, paid to C
I've seen the presentation too. (Score:2)
If they want to enhance security, they should be paring down their codebase for simplicity's sake and extensively testing it under hostile and high-stress traffic loads. Which I can say quite unequivocally, they don't do much. I
Re:You can't block the CEO (Score:1)
Wee! Now we can shutdown the internet with a well placed virus. If you can talk with your router, certainly I can as well. All I need to do is pretend I'm the authorative router (DNS poisoning maybe?) or hack the authoritive router and suddenly I get control of your entire network next time your routers update with m
Re:You can't block the CEO (Score:1)
Re:You can't block the CEO (Score:2)
Just run a scan on them. Either a) they're your (IT's) computers, or (b) they signed an acceptable use policy, which says you might scan for vulnerabilities.
Yes, you can. (Score:2)
But this is pretty cool. The problem, of course, is how to decide whether someone is "secure" or not without running a scan on that computer. It isn't like infected computers ar
patches smaches (Score:1, Offtopic)
Re:patches smaches (Score:2)
arr matey.
Cisco moving up to the application layer (Score:3, Informative)
The PCs mentioned in the article could be clients for their application oriented networking and message queueing [paraz.com] architecture and product line.
Re:Cisco moving up to the application layer (Score:1)
Statement of bias: I'm an employee of Cisco. Not anywhere near Layers 2 or 3, but an employee nonetheless.
--
lds
Clueless Analyst Syndrome (Score:4, Informative)
Eh? NAC has been available on Cisco switches for a while now. Technically it's been available since they started supported 802.1x, and switches have been compatible with the Cisco Security Agent since it was developed about a year ago. In fact, I haven't heard of routers being used in conjunction with NAC, CSA, or 802.1x. The only admissions control routers have ever done is access lists, which of course are also supported on layer 3 switches.
Mr. Conover: did you actually do any research on the technology involved or did you just read through the glossies and spew out something you remembered from the CCNA class you took 5 years ago?
Re:Clueless Analyst Syndrome (Score:5, Informative)
NAC Phase 1 was deployed using EAPoUDP (EAP over UDP). It used routers to quarantine devices. It is a layer 3 solution. Other devices could still infect layer 2 connected devices.
NAC Phase 2 (just announced) is deployed using EAPo802.1x (EAP over 802.1x). It uses switches to quarantine devices. It is a layer 2 solution. Thus an infected device cannot infect other layer 2 devices.
http://www.acuitive.com/musings/hmv7-12.htm [acuitive.com]
http://newsroom.cisco.com/dlls/2005/prod_101805.h
Re:Clueless Analyst Syndrome (Score:2)
Re:Clueless Analyst Syndrome (Score:1)
Re:Clueless Analyst Syndrome (Score:2)
Re:Clueless Analyst Syndrome (Score:1)
Re:Clueless Analyst Syndrome (Score:2)
I was in a pissy mood but I had no right to fire a shot in your direction because of it. If I had mod points and could mod my own post down I'd gladly do so. Please accept my humblest apologies sir.
On a related note, I'm instituting a self-enforced ban on posting in tech forums right after getting out of a change control meeting.
For the Internetworking Challenged (Score:5, Informative)
Cisco's Internetworking Technology Handbook [cisco.com] is a bit dated but a great base resource downloadable in pdf.
Pair the above with IBM's TCP/IP Tutorial and Technical Overview [ibm.com], and round things off by downloading Bable: A Glossary of Computer Oriented Abbreviations and Acronyms [geocities.com] since you'll be in acrynom hell.
Probably few /.ers need the above but they've given me a good overview and reference.
For What it's Worth :)
be wary (Score:2, Interesting)
This will work great.... (Score:1)
Re:This will work great.... (Score:1)
Re:This will work great.... (Score:2)
Pity most OSs authenticate to hosts, not switches (Score:2)
But I bet the way it integrates with the OS is a bit of a kludge (I haven't played with it, just guessing). Most network OSs have methods to integrate with host based auth systems - kerberos, LDAP or some such. Adding a secondary auth to the switch (which from what I hear of these technologies, they do) seems a bit hacky.
It'd be great if the switch only let the client send auth packets to the kerberos / LDAP server, only enabling them to do anything
Re:Pity most OSs authenticate to hosts, not switch (Score:1)
Compatibility? (Score:3, Informative)
Somebody mentioned the Cisco Clean Access Agent in a previous post, googling around a bit shows that only Windows is supported for the AV/Patch scan, and this is easily bypassed by changing the User-Agent on the HTTP login page. Details here [securityfocus.com]
Cisco's canned response [cisco.com] is to use Nessus to determine the real OS, or write your own plugin. Although windows boxen are probably the most common, and the biggest threat, non-Windows products need some sort of working by-pass that doesn't involve simply spoofing the UA.
Re:Compatibility? (Score:2)
NAC sucks (Score:5, Interesting)
NAC is great in theory, but it's Windows-only, it requires extra software on Windows boxes, it requires all of your switches to be NAC aware, and it requires a NAC aware authenticator.
Can you say "not going to happen"?
If someone else comes out with something similar that can be used in the real world, like 802.1x supplicants with a bit more smarts, it will deployed so fast that Cisco's NAC will be a sad memory.
NAC: Good in theory. Cisco "gets" routers. They don't "get" network administration.
Re:NAC sucks (Score:1)
Re:NAC sucks (Score:1, Informative)
Re:NAC sucks (Score:1, Insightful)
Cisco hasn't made a good product since the Cisco 2500 router running IOS 11.
I like to remind my PHB when he says "Nobody ever got fired for buying Cisco" that people have gotten fired for wasting money on lousy hardware with 20% failure rates and software the requires more reboots than a Wind
Yay! (Score:1)
Why is this here? (Score:2, Interesting)
Cisco is a late player... (Score:2)
Last time I checked this only works with Cisco hardware in the wiring closets.
Other than that, does it yet come close to the capabilities of Bradford's Campus Manager [bradfordnetworks.com]? Any college trying to lock down their resnet probably used Campus Manager.
Trust Cisco! (Score:2)
Cisco Updates Network Security Technology (Score:2, Funny)
Was At the Live Launch in New York Yesterday (Score:1)
Re:Was At the Live Launch in New York Yesterday (Score:1)
Most websites require the use of garish colours and Flash to achieve the level of horror that you have managed with just black and white.
I would prefer to spend a week looking at Goatse than experience that again.