© 2006 Cisco Systems, Inc. All rights reserved. SND v2.01-1 Introduction to Network Security Policies Module Self-Check.

Презентация:



Advertisements
Похожие презентации
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Module Summary Serial point-to-point connections are used to connect your LAN and a service.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. SND v Building IPsec VPNs Module Self-Check.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Module Summary Using ACLs, you can classify or filter packets on inbound and outbound routed.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Module Summary The Cisco SDN strategy offers a layered approach to providing integrated network.
© 2005 Cisco Systems, Inc. All rights reserved. INTRO v Topologies.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Module Summary An IPsec VPN is a collection of protocols that help you to hook up your company.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v Module Summary Cisco provides several conceptual network models: IIN, SONA, and Cisco Enterprise.
© 2006 Cisco Systems, Inc. All rights reserved.SND v Module Summary To secure network access at Layer 2, follow these steps: –Protect administrative.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Module Summary ISDN uses end-to-end digital technology to allow for faster call setup times.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Security Design Review Define the security requirements. Define the security policy. Integrate.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Module Summary A WAN allows the transmission of data across broad geographic distances. There.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Remote Connectivity Design Review Analyze network requirements: –Type of applications, the.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring CSA.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary Cisco Secure ACS can be used as AAA server to manage identity. Cisco IBNS uses.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary Company ABC is unsecured and vulnerable to attack. There are many types of Layer.
© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Module Summary VPNs enable network connectivity for an organization, its business partners,
© 2005 Cisco Systems, Inc. All rights reserved. Course acronym vx.x#-1 © 2005 Cisco Systems, Inc. All rights reserved. SND v Module Summary Cisco.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Working with Variables and Application Classes.
© 2006 Cisco Systems, Inc. All rights reserved. GWGK v Module Summary IP-to-IP gateways can be used to interconnect VoIP networks by allowing VoIP.
© 2005 Cisco Systems, Inc. All rights reserved.SND v Module Summary Applying an effective security policy is the most important step that an organization.
Транксрипт:

© 2006 Cisco Systems, Inc. All rights reserved. SND v Introduction to Network Security Policies Module Self-Check

© 2006 Cisco Systems, Inc. All rights reserved. SND v Classes of Attacks Against a Network Private Classified Network Environment Public Local Network Environment Private Local Network Environment Site Boundary PBX Connections to Other Corporate Offices PSTN Internet Private WAN Classified Networks PSTN = public switched telephone network

© 2006 Cisco Systems, Inc. All rights reserved. SND v Classes of Attacks Against a Network Private Classified Network Environment Public Local Network Environment Private Local Network Environment Site Boundary PBX Connections to Other Corporate Offices A P P P P P PSTN Internet Private WAN Classified Networks A A A