Information Technology Reference
In-Depth Information
Anomaly Guard Module provides the attack response by blocking malicious traffic
at Gbps line rates. With multiple layers of defense, it can divert traffic destined for
specific targeted devices only whereby not affecting legitimate traffic.
Endpoint Security
Endpoint security solutions protect server and desktop endpoints from the latest threats
caused by malicious network attacks. Endpoint security solutions can identify and pre-
vent network attacks that are considered unknown or “day-zero”-type threats. Endpoint
security solutions are packed with many features, including firewall capabilities, intrusion
prevention, malicious mobile code protection, operating system integrity assurance, and
audit log consolidation. Cisco Network Admission Control (NAC) enables the network to
enforce security policies on both wired and wireless devices seeking access to the net-
work infrastructure. Cisco NAC protects data and prevents unauthorized network access
by initially confirming a user's identity before allowing access. Cisco NAC also provides
posture assessment to reduce the risks associated with noncompliant devices by not al-
lowing network access until the device is compliant with the configured policy. Cisco
endpoint security solutions are based on integrations with various third-party vendors
such as Trend, Sophos, and Priveon (Bit9).
Securing the Enterprise
The Cisco SAFE architecture provides the most comprehensive security systems for secur-
ing the enterprise network from the threats of today and tomorrow.
Each location in the enterprise network has unique security requirements because con-
cerns are different and vary by location. In most cases, however, customizing network se-
curity solutions by functional area offers the best protection for the enterprise network.
The following sections examine some ways to use Cisco security solutions in the campus,
data center, and enterprise edge.
Implementing Security in the Campus
Security for the campus begins with remembering that you need to implement security
throughout your network. Several technologies, protocols, solutions, and devices work to-
gether to provide the secure campus. Network security should be implemented in the
core, distribution, and access layers and can be grouped into four broad categories, as de-
scribed in Table 13.4.
Ta b l e 1 3 - 4
Security in the Campus
Key
To p i c
Cisco Security
Category
Security Solutions
Identity and access
control
802.1X, NAC, ACLs, and firewalls
Threat detection and
mitigation
NetFlow, syslog, SNMP, RMON, CS-MARS, and NIPS
 
 
 
Search WWH ::




Custom Search