© 2006 Cisco Systems, Inc. All rights reserved.ISCW v1.05-1 Module Summary Attacks can target various components of modern networks, such as system integrity,

Презентация:



Advertisements
Похожие презентации
© 2006 Cisco Systems, Inc. All rights reserved.SND v Module Summary Routers play an important role in ensuring that network perimeters are secure;
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary Cisco Secure ACS can be used as AAA server to manage identity. Cisco IBNS uses.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Cisco Network Foundation Protection Securing the Management Plane.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing the Perimeter Disabling Unused Cisco Router Network Services and Interfaces.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Module Summary Using ACLs, you can classify or filter packets on inbound and outbound routed.
Designing Security Services © 2004 Cisco Systems, Inc. All rights reserved. Implementing Network Security Using the SAFE Security Blueprints ARCH v
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v Module Summary Cisco provides several conceptual network models: IIN, SONA, and Cisco Enterprise.
© 2006 Cisco Systems, Inc. All rights reserved.ONT v Module Summary Video and voice applications are used with wireless clients as well as wired.
© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Module Summary An effective enterprise network management strategy is critical to guarantee.
© 2006 Cisco Systems, Inc. All rights reserved.CIPT2 v Module Summary Cisco Unified CallManager provides several features to prevent toll fraud.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Module Summary Key switch security issues should be identified on a switched network and.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v Module Summary The IKE protocol is a key management protocol standard used in conjunction with.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Minimizing Service Loss and Data Theft in a Campus Network Securing Network Switches.
© 2005 Cisco Systems, Inc. All rights reserved. BSCI v Module Summary Using multiple IP routing protocols can be a result of migrating to a more.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v Module Summary Modern enterprise networks have to support various remote connection topologies,
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing LAN and WLAN Devices Applying Security Policies to Network Switches.
© 2006 Cisco Systems, Inc. All rights reserved.SNRS v Adaptive Threat Defense Examining Cisco IOS Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Evaluating Security Solutions for the Network Selecting Network Security Solutions.
© 2006 Cisco Systems, Inc. All rights reserved.SND v Module Summary To secure network access at Layer 2, follow these steps: –Protect administrative.
Транксрипт:

© 2006 Cisco Systems, Inc. All rights reserved.ISCW v Module Summary Attacks can target various components of modern networks, such as system integrity, confidentiality, and availability. Disabled unneeded router services and interfaces make the router less vulnerable to attacks. Administrative access should be secured using password security features, proper failed login handling, and role- based CLI. Network devices should be managed using secure protocols, such as SNMPv3, SSH, SSL, and authenticated NTP. Syslog is the ubiquitous logging protocol. ACLs filter malicious traffic and mitigate attacks. AAA operations can be offloaded to a TACACS+ or RADIUS server to increase security and scalability.

© 2006 Cisco Systems, Inc. All rights reserved.ISCW v1.05-2