© 2007 Cisco Systems, Inc. All rights reserved.DESGN v2.06-1 Security Design Review Define the security requirements. Define the security policy. Integrate.

Презентация:



Advertisements
Похожие презентации
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Module Summary The Cisco SDN strategy offers a layered approach to providing integrated network.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Module Summary The hierarchical network structure is composed of the access, distribution,
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Remote Connectivity Design Review Analyze network requirements: –Type of applications, the.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Enterprise Campus and Data Center Design Review Analyze organizational requirements: –Type.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Module Summary Serial point-to-point connections are used to connect your LAN and a service.
Designing Security Services © 2004 Cisco Systems, Inc. All rights reserved. Implementing Network Security Using the SAFE Security Blueprints ARCH v
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Integrating Voice in the Network Design Define the requirements for voice services. Select.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Evaluating Security Solutions for the Network Selecting Network Security Solutions.
© 2006 Cisco Systems, Inc. All rights reserved.ONT v Module Summary Video and voice applications are used with wireless clients as well as wired.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary Cisco Secure ACS can be used as AAA server to manage identity. Cisco IBNS uses.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Module Summary An IPsec VPN is a collection of protocols that help you to hook up your company.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Structuring and Modularizing the Network Using a Modular Approach in Network Design.
Designing Security Services © 2004 Cisco Systems, Inc. All rights reserved. Evaluating Network Security Policies ARCH v
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Wireless Networking Review Define the wireless requirements. Conduct an RF site survey to.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary IPsec is designed to provide interoperable, high-quality, cryptographically.
© 2006 Cisco Systems, Inc. All rights reserved.SND v Module Summary Routers play an important role in ensuring that network perimeters are secure;
© 2004 Cisco Systems, Inc. All rights reserved. ARCH v Module Summary An effective enterprise network management strategy is critical to guarantee.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Module Summary Cisco SONA is the enterprise framework for implementing intelligent networks.
© 2005 Cisco Systems, Inc. All rights reserved. IPTX v The Building Blocks of IP QoS Case Study: QoS Mechanisms.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary Cisco NFP includes protection of the control, management, and data planes. CPPr.
Транксрипт:

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Security Design Review Define the security requirements. Define the security policy. Integrate security in the network design: –Implement trust and identity management to secure network access and admission. –Deploy threat defense to provide a defense against known and unknown attacks. –Use secure connectivity for encryption and authentication on untrusted networks. –Deploy security management to scale policy administration and enforcement. Select locations to deploy appropriate Cisco Self-Defending Network elements and Cisco network devices.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Module Summary Network security is a continuous process built around a security policy and integrated with network design. The Cisco Self-Defending Network is based on a secure network platform and uses trust and identity management, threat defense, and secure connectivity to integrate security into the network. Cisco Self-Defending Network elements and Cisco network devices with integrated security are deployed throughout the enterprise network.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v2.06-3