NETWORK WORLD NEWSLETTER: TIM GREENE ON VPNS 10/14/04 Today's focus: Juniper gives a clear signal to VoIP
Dear [EMAIL PROTECTED], In this issue: * Updated Juniper operating system aims to better support VoIP ��apps * Links related to VPNs * Featured reader resource _______________________________________________________________ This newsletter is sponsored by Aventail Challenging the Myth of IPSec Security While giving more users remote access increases productivity, it also exposes your network to malicious attack. For remote access, clientless SSL VPNs provide stronger security, while reducing administration and support costs. Before buying IPSec, consider the security challenges posed by today's users, devices, and locations, in the paper "Challenging the Myth of IPSec Security." http://www.fattail.com/redir/redirect.asp?CID=84913 _______________________________________________________________ SECURITY CONCERNS STOPPING YOUR WLAN PLANS? Is it possible to deploy a secure wireless LAN with technology available today? That question preys on the minds of IT executives who are tempted to deploy enterprise WLANs, but are hesitant because of security concerns. Find out what we uncovered when we assembled 23 wireless products trying to get to the answer. Click here: http://www.fattail.com/redir/redirect.asp?CID=84761 _______________________________________________________________ Today's focus: Juniper gives a clear signal to VoIP By Tim Greene Juniper is upgrading the operating system for its IPSec VPN gear so it better supports VoIP, instant messaging and other peer-to-peer applications. The company's NetScreen Screen OS 5.2 has new support for network address translation for VoIP gear that uses the session initiation protocol for signaling, a complex configuration problem to accommodate the many firewall ports used in VoIP calls. The software is also tuned to look for attacks that take advantage of SIP or the alternative H.323 signaling. For instance, the software can monitor for how often a device initiates SIP or H.323 calls and block those efforts if they exceed a set threshold. Enhancements to the devices' deep inspection capabilities make it possible to defend against attacks by limiting how applications can be used. By defining which groups, IP addresses or zones can use an application and how they can use it, the software can define acceptable use of applications and block other potentially malicious uses. The company says it is also engaged in SIP interoperability testing so it can work with other vendors' SIP gear. The company also says its gear is compatible with Avaya H.323 equipment. While some of this is peripheral to the VPN functions of the boxes, they are all important to customers who use these gateways and are looking to adopt interactive IP applications. They help current customers protect the value of gear they have already bought and make it simpler to migrate to technologies such as VoIP by removing the complexity of dealing with firewall issues. RELATED EDITORIAL LINKS MCI getting a better handle on its VPN services Network World, 10/11/04 http://www.nwfusion.com/news/2004/101104mcivpn.html _______________________________________________________________ To contact: Tim Greene Tim Greene is a senior editor at Network World, covering virtual private networking gear, remote access, core switching and local phone companies. You can reach him at <mailto:[EMAIL PROTECTED]>. _______________________________________________________________ This newsletter is sponsored by Aventail Challenging the Myth of IPSec Security While giving more users remote access increases productivity, it also exposes your network to malicious attack. For remote access, clientless SSL VPNs provide stronger security, while reducing administration and support costs. Before buying IPSec, consider the security challenges posed by today's users, devices, and locations, in the paper "Challenging the Myth of IPSec Security." http://www.fattail.com/redir/redirect.asp?CID=84912 _______________________________________________________________ ARCHIVE LINKS Breaking VPN news from Network World, updated daily: http://www.nwfusion.com/topics/vpns.html Archive of the VPN newsletter: http://www.nwfusion.com/newsletters/vpn/index.html _______________________________________________________________ FEATURED READER RESOURCE CHECK OUT NW FUSION'S WHITE PAPER LIBRARY Visit Today: NW Fusion's White Paper Library with new features and improved capabilities! Sort NW Fusion's library of white papers by Date and Vendor, view white papers by TECHNCIAL CATEGORY, mouse over white paper descriptions and take advantage of our IMPROVED white paper search engine. CLICK HERE: <http://www.nwfusion.com/vendorview/whitepapers.html> _______________________________________________________________ May We Send You a Free Print Subscription? You've got the technology snapshot of your choice delivered at your fingertips each day. Now, extend your knowledge by receiving 51 FREE issues to our print publication. Apply today at http://www.subscribenw.com/nl2 International subscribers click here: http://nww1.com/go/circ_promo.html _______________________________________________________________ SUBSCRIPTION SERVICES To subscribe or unsubscribe to any Network World e-mail newsletters, go to: <http://www.nwwsubscribe.com/Changes.aspx> To unsubscribe from promotional e-mail go to: <http://www.nwwsubscribe.com/Preferences.aspx> To change your e-mail address, go to: <http://www.nwwsubscribe.com/ChangeMail.aspx> Subscription questions? Contact Customer Service by replying to this message. This message was sent to: [EMAIL PROTECTED] Please use this address when modifying your subscription. _______________________________________________________________ Have editorial comments? Write Jeff Caruso, Newsletter Editor, at: <mailto:[EMAIL PROTECTED]> Inquiries to: NL Customer Service, Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 For advertising information, write Kevin Normandeau, V.P. of Online Development, at: <mailto:[EMAIL PROTECTED]> Copyright Network World, Inc., 2004 ------------------------ This message was sent to: [EMAIL PROTECTED]
