Designing Security Services © 2004 Cisco Systems, Inc. All rights reserved. Implementing Network Security Using the SAFE Security Blueprints ARCH v1.26-1.

Презентация:



Advertisements
Похожие презентации
Introducing Cisco Network Service Architectures © 2004 Cisco Systems, Inc. All rights reserved. Introducing the Enterprise Composite Network Model ARCH.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Structuring and Modularizing the Network Using a Modular Approach in Network Design.
Lab Guide © 2004 Cisco Systems, Inc. All rights reserved. ARCH v1.21 Designing Cisco Network Service Architectures (ARCH) v1.2.
© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Module Summary The Enterprise Edge design methodology enables network designers to design.
© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Module Summary An effective enterprise network management strategy is critical to guarantee.
© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Module Summary The Enterprise Composite Network Model enables network designers to create.
Designing Enterprise Campus Networks © 2004 Cisco Systems, Inc. All rights reserved. Designing the Server Farm ARCH v
© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Module Summary Maintaining a high level of network security requires a continuous effort.
Designing Security Services © 2004 Cisco Systems, Inc. All rights reserved. Evaluating Network Security Policies ARCH v
Designing Network Management Services © 2004 Cisco Systems, Inc. All rights reserved. Developing an Enterprise Network Management Strategy ARCH v
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v Module Summary Cisco provides several conceptual network models: IIN, SONA, and Cisco Enterprise.
Designing Enterprise Edge Connectivity © 2004 Cisco Systems, Inc. All rights reserved. Reviewing the Enterprise Edge Network Design Methodology ARCH v
© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Module Summary The Cisco AVVID framework provides an infrastructure on which to offer intelligent.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Security Design Review Define the security requirements. Define the security policy. Integrate.
Designing Network Management Services © 2004 Cisco Systems, Inc. All rights reserved. Designing the Network Management Architecture ARCH v
© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Module Summary VPNs enable network connectivity for an organization, its business partners,
Designing QoS © 2004 Cisco Systems, Inc. All rights reserved. Designing QoS for Enterprise Networks ARCH v
Designing Enterprise Edge Connectivity © 2004 Cisco Systems, Inc. All rights reserved. Designing the Internet Connectivity Module ARCH v
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Remote Connectivity Design Review Analyze network requirements: –Type of applications, the.
© 2006 Cisco Systems, Inc. All rights reserved.BSCI v Describing Network Requirements Network Requirements.
Транксрипт:

Designing Security Services © 2004 Cisco Systems, Inc. All rights reserved. Implementing Network Security Using the SAFE Security Blueprints ARCH v1.26-1

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Security and attack mitigation based on policy Security implementation throughout the infrastructure (not just on specialized security devices) Secure management and reporting Authentication and authorization of users and administrators to critical network resources Intrusion detection for critical resources and subnets SAFE Design Objectives

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v SAFE Design for Small Networks

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Small Network Internet Connectivity Module Components

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Small Network Attack Mitigation Roles for Internet Connectivity Module

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Small Network Campus Infrastructure Module Components

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Small Network Attack Mitigation Roles for Campus Infrastructure Module

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v SAFE Design for Medium Networks

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Medium Network Internet Connectivity Module

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Medium Network Attack Mitigation Roles for Internet Connectivity Module

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Medium Network Campus Infrastructure Module Components

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Medium Network Attack Mitigation Roles for Campus Infrastructure

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Medium Network WAN Module Key Devices and Mitigation Roles

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v SAFE Security Strategies for the Enterprise Campus

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Example: Secure Building Distribution and Access Submodules

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Example: Secure Network Management Module

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Secure Network Management Module Features

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Secure Server Farm Module Features

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Secure Edge Distribution Features

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v SAFE Security Strategies for the Enterprise Edge

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v E-Commerce Module Features

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Internet Connectivity Module Features

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Remote Access and VPN Module Features

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v WAN Module Features

© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Summary SAFE serves as a guide for network designers considering the security requirements of their network. The SAFE design for a small network includes only a Internet Connectivity module that provides access to the external network, and the Campus Infrastructure containing the internal network. The SAFE medium network design consists of the Internet Connectivity module, the Campus Infrastructure module, and the WAN module. The SAFE large network design consists of the entire Enterprise Composite Network Model. The SAFE architecture defines the Enterprise Edge functional area as containing the Internet Connectivity, E-Commerce, Remote Access and VPN, and WAN modules.