Unfortunately, using DHCP as an access control mechanism is not effective. The purpose of DHCP is to automate the...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
assignment of IP addresses, subnet masks, default gateways and other IP parameters. When machines receive IP addresses via DHCP, controlling their traffic can be difficult. Because remote IP addresses will be prone to change, the firewall rule-configuration process can be time-consuming and error-prone. Setting firewall rules based on machines' MAC (Media Access Control) address is also an option, but I imagine that your students and staff tend to share computers.
As we've seen, simple port blocking isn't effective. IM clients can auto-configure themselves to use common destination ports, such as HTTP port 80 and FTP port 21. Many actually embed IM data within an HTTP request, thereby circumventing any protocol-analysis firewall.
My strong recommendation would be to install an IM firewall, which would sit behind your traditional perimeter firewall. You may also want to consider using an enterprise instant messaging (EIM) service. Microsoft's Office Live Communications Server 2005, for example, not only incorporates IM firewall technologies, but can also integrate access control with Active Directory. This is my preferred security configuration because a proper identity and authentication management system can block specific users or specific groups of users from accessing IM services.
Remember though that both an IM firewall and an enterprise IM service must be backed up by a combination of desktop antivirus and antispyware tools.
Whatever route you take, you will also need an acceptable usage policy for instant messaging. As IM has many of the same security and privacy risks as email, such as malicious file attachments and inappropriate language, many of the rules used to govern email usage can also be applied to IM. This policy should be communicated to staff and students that would make them aware of the consequences of installing and using banned IM software. Finally, just like with email, users should be taught to show the same degree of caution with instant messages from unknown sources.
Dig Deeper on Email and Messaging Threats-Information Security Threats
Related Q&A from Michael Cobb
Android encryption on devices using Qualcomm chips can be broken due to two vulnerabilities. Expert Michael Cobb explains how these flaws affect ...continue reading
A flaw that allows attackers to load malicious DLL files in Symantec products was labeled as severe. Expert Michael Cobb explains the vulnerability ...continue reading
Mobile apps using insecure OAuth could lead to over one billion user accounts being attacked. Expert Michael Cobb explains how developers can ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.