A Security Blueprint for Enterprise Networks

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Author(s): Sean Convery, and Bernie Trudel
Publisher: Cisco

Language: English
Pages: 66

Abstract......Page 1
Caveats......Page 2
Module Concept......Page 3
Figure 2 Enterprise SAFE Block Diagram......Page 4
Switches Are Targets......Page 5
Networks Are Targets......Page 6
Applications Are Targets......Page 7
Secure Management and Reporting......Page 8
Expected Threats......Page 10
Figure 3 Enterprise Campus Detail......Page 11
Key Devices......Page 12
Threats Mitigated......Page 13
Design Guidelines......Page 14
Alternatives......Page 15
Figure 8 Building Distribution Module: Detail......Page 16
Key Devices......Page 17
Key Devices......Page 18
Design Guidelines......Page 19
Threats Mitigated......Page 20
Alternatives......Page 21
Figure 16 Enterprise Edge Detail – Part 1......Page 22
Figure 17 Enterprise Edge Detail – Part 2......Page 23
Key Devices......Page 24
Threats Mitigated......Page 25
Design Guidelines......Page 26
Figure 21 Remote Access VPN Module Traffic Flow......Page 28
Threats Mitigated......Page 29
Remote-Access VPN......Page 30
Alternatives......Page 31
Alternatives......Page 32
Figure 27 E-Commerce Module: Detail......Page 33
Design Implementation Description......Page 34
Beyond the Firewall......Page 35
Enterprise Options......Page 36
Migration Strategies......Page 37
Routers......Page 38
Switches......Page 40
Hosts......Page 41
Products Used......Page 42
EIOS-57......Page 43
Products Used......Page 45
Figure 32 Building Access Module: Detail......Page 46
EL3SW-1 and 2......Page 47
Figure 33 Edge Distribution Module: Detail......Page 48
Products Used......Page 49
EIOS-23 and 24......Page 50
Products Used......Page 52
EPIX-32 and 34......Page 53
EIOS-27 and 28......Page 54
Products Used......Page 55
Network Attack Taxonomy......Page 56
Packet Sniffers......Page 57
IP Spoofing......Page 58
Denial of Service......Page 59
Man-in-the-Middle Attacks......Page 60
Network Reconnaissance......Page 61
Virus and Trojan Horse Applications......Page 62
Appendix C: Architecture Taxonomy......Page 63
Diagram Legend......Page 64
SAFE White Papers......Page 65
Acknowledgments......Page 66