Network Communications News (NCN) December 2016 | Page 26

SPECIAL FEATURE
IP security
With greater ease of access as the digital landscape grows , effective IP security is vital .
on the continuity of services or the speed of deployment .
It can also expose companies to many risks around managing complex data . The amount of information in constant progression , combined with manual management of obsolete or unsuitable management tools , often affects the performance of a company . This type of administration is usually inefficient and can cause many errors and problems . IT teams working on projects using outdated solutions waste valuable time and the unavailability of applications or services can have a direct impact on the profitability and reputation of an organisation .
Collaboration can be a big problem too . If different departments , subsidiaries or companies work together using the same data , it can become very complicated to support this without the correct tools to integrate entire information systems . Manual management of IPAM with spreadsheets is possible , but is done with very high risks .
Modern DDI solutions on the other hand require less specific skills and use
tools that monitor the implementation of best practices and ensure compliance on pre-defined business rules .
The control of the security around DNS architectures is also an important feature in an integrated DDI project . Hackers that target DNS servers are now using different techniques , as well as using the server as the route of their attack . But the temporary loss of a DNS service in an attack is highly detrimental to operations , business continuity and even the entire company ; loss of access puts its reputation at stake and can even damage the brand permanently .
To be able to mitigate against the three main types of DNS threats : ‘ Volumetric ’, ‘ Exploit ’ and ‘ Stealth ’, organisations must implement the latest DDI solutions . These solutions s use the DNS server itself to act as the security layer , as it ’ s a connectionless s protocol with the objective to always answer requests .
In addition to using an effective DDI solution , to ensure IP security and establish a secure DNS and DHCP , there are further measures that are recommended . These include Media Access Control ( MAC ) address and client class device identification and authentication , user ID and password verification and automated device scanning .
Absolute control
MAC address identification uses a ‘ white list ’ ( or alternatively , a ‘ black list ’) to grant or deny network access based on a device ’ s manufacturers assigned MAC ID . Having absolute
control over who joins the network is this approach ’ s biggest advantage , however , this isn ’ t necessarily best for guest devices , as there ’ s the possibility that a hacker might ‘ spoof ’ a valid MAC address . So , this method does typically require considerable effort to maintain the white and black lists .
Client class device identification and authentication grants or denies network access based on a settable text field in a DHCP request message . This approach means the organisation can set preconfigured text field values , which allows individual devices onto a network . However , it requires significant management as a hacker might discover and use a valid client class ID to gain access .
User ID and password verifi cation is one of the most secure approaches , while automated device scanning can ensure a device that ’ s about to join a network doesn ’ t contain viruses or malware and only contains approved software applications . But this method does nothing to identify a device or its user .
In order to ensure IP security and business continuity , these IP address management recommendations should be taken seriously so company reputation and bottom line isn ’ t put at risk . There are highly dependable DDI solutions that can unify an entire network infrastructure , to guarantee security , reliability , scalability and flexibility , while also speeding up deployment , reducing costs and increasing productivity .

If companies continue to rely on archaic methods , they will inevitably face speed and agility implications .

26