D a a y y --Z Z e e r r o o A A tttta a c c k

Size: px
Start display at page:

Download "D a a y y --Z Z e e r r o o A A tttta a c c k"

Transcription

1 Cisco Systems Secu r ity 1

2 Self Defending Network Stra tegie I NT EG R AT ED S ECU R I T Y Secure C onnectiv ity T h rea t D ef ens e T rus t & I dentity II nn ii tan t ii aa tt iiiivvnn e e ii tt iziz aa uu tt r ir i vv Ve e e tt rro o bb eded ssrr aass mmee rr aauu tt nnii cc g g aa ll ldld y y ee r r Ne tt zzii mmww pepe rrrr koko ffvv äh e e titi ghgh ke ke ee nn ii ttee ee tt n n ww,, oo BB rr k ek e s d d rr ooaa hbhb uiui ll inin tt y gy g ee n n zz u u ee rrtt kko o ee iinndd nnee eenn n n tt ii,, ff y y zz, u, u pp vv rr eeee rrvv hh ee ii nnnn t t dd,, ee aa rr nn n n d d uu nn d d ss ii cc h h ddaa eedd r r aa npnp et et uutt o o ee n n tt hh rrss ee ii aatt uutt ssaa tt ii oo n n aa nn zz uu pp aa ss ss ee nn ADVANCED S ECU R I T Y T ECH NO LO G I ES Endpoint Security A ppl ica tion F irew a l l SSL V P N N etw ork A nom a l y D etection S Y S T EM LEVEL S O LU T I O NS Endpoints + N etw + P ol icies Serv ices P a rtners h ips ork s 2

3 O O Ständig kleiner werdende R ea ktions fens ter Vu l n e Vr a b iel i t Iy D i s c o v e r e d P EPa PI t c h Is s u e d Pa Et c h ExI p l o i t Is s u epu d b l i s h e d In c i d e n Ex t p l o i t c c u Pu r s b l i s h e d In c i d e n t c c u r s Operation Slot (#vulnerability & resources) B l a s t e r : 2 5 Nachi: Wenn S l a m m e r : d 1 er 8 0 E x p l o i t v o w r i deem w o lp l en a t c S h i e d a en u f tv r io t t r f a l l v er h i nd er n, Nis m el d b a s: t3 3 1 T a g e b ei m a x i m a l er A ns t r eng u ng? Day-Zero Attack 3

4 M E v olu tion der Sic h erh eits a nforderu ngen Vergangenheit NN oo tw end ige M aßnahma en R e a k t i v Au t o m a t i s c h, P r o a k t i v, Ei n z e l p r o d u k t e P r o d u k t - p o s i t i o n i e r u n g I n t e g r i e r t üb e r a l l e S c h i c h t e n Lös u n g s d e s i g n / M n g. S e c. S e r v i c e Üb b ee rr gg rr ee ii ff ee nn dd ee rr Lös s uu nn gg ss aa nn ss aa tt zz 4

5 M Q C is c o Sec u rity V is ion: Üb ergreifender Lös u ngs a ns a tz INTEGRATED S EC U RITY ( P h a s e I) ADAP TIV E TH REAT DEF ENS E ( P h a s e III) C O L L AB O RATIV E S EC U RITY ( P h a s e II) S S L VPN IPS e c VPN D D o S i t i g a t i o n C i s c o S e c u r i t y A g e n t F i r e w a l l s a n d In t r u s i o n D e t e c t i o n En c r y p t e d L A N / W A N C o m m u n i c a t i o n s A V A g e n t Id e n t i t y -B a s e d N e t w o r k i n g u a r a n t i n e VL A N ( R e m e d i a t i o n ) N e t w o r k In f e c t i o n C o n t a i n m e n t C i s c o T r u s t A g e n t N e t w o r k A d m i s s i o n C o n t r o l 5

6 C is c o S ec u rity A gent 6

7 F u nktion Signa tu r-b a s ierter V erfa h ren Tägl ic h neu e, s tänd ig w ec hs el nd e B ed ro hu ngen S ic herheits l üc k en in A nw end u ngen -> P atc h v o m H ers tel l er N eu e Viren -> S ignatu ren v o m A nti-viru s H ers tel l er H o s t I D S -> S ignatu ren v o m H o s t I D S H ers tel l er S t u n d e n T im e l in e Erstes A u f treten Erster Patch Erste S i g n atu r K ri ti scher B erei ch! 7

8 C i s c o S e c u r i t y A g e n t R e g e l b a s i e r t e s V e r f a h r e n Z e r o U p d a t e Regelbasierend ( w h it elist ) K E I N E S ignat u r-u p dat es no t w endig Z ent rale I nst allat io n u nd L iz ensieru ng Erstes A u f treten T im e l in e C C S S A A g g eschütz eschütz tt D D ay ay -Z -Z ero ero Pro Pro tecti tecti o o n n 8

9 C S A i n A c t i o n : S c h u t z g e g e n S l a m m e r S e n d U DP / p a c k e t l o o k i n g fo r M S S Q L O v e o w b u i n M S S Q L S e e rfl ffe r DE/ rv r D ef en se i n D ep th = 3 R eg el n g eg en S l am m er No p e rs i s t re b o o ti n g s y s te m k i l l s w o rm PP ii cc k k ra nn dd oo m m IP aa dd dd re ss ss ee s s aa nn d d ss pp re aa d d to nn ee w w ta rg ee ts Ne tw o rk i s c ri p p l e d b y tra ffi c o v e rl o a d 9

10 G C SA - V erteilu ng der P olic ies üb er P U LL - A ns a tz e n e r i e r u n g d e r A g e n t K i t s V M S 2. 3 CA Agent Kits In s t a l l a t i o n d e r K i t s ( m i t Z e r t i f i k a t ) üb e r VM S 2. 3 R e g i s t r i e r u n g u n d PU L L d e r Po l i c y v i a S S L S S L A g e n t CA S S L CA CA CA CA A g e n t A g e n t A g e n t A g e n t 10

11 N etw o rk A d m is s io n C o ntro l 11

12 W H a u p tu rs a c h e für V irenb efa ll Wo w a r d e r R e m ot e -U s e r m i t s e i n e m L a p t op? H Q WAN F l u g h a fe n, H o te l, L AN H o ts p o ts Etc Au s s e n s te l l e n Te l e w o rk e r B ei sp i el S l am m er Netzwerkausfall d urc h D D o s A ttac ken Für A usb rei tun g war led i g li c h ei n e K o n fi g uri erte I P -A d resse erfo rd erli c h S o g ar d i e b este Fi rewall i st g eg en I n fekti o n i m i n n eren m ac h tlo s 12

13 C is c o Network A dm V orteile is s ion C ontrol: Ein int e g r ie r t e s S y s t e m : E nd geräte S ic herheits l ös u ngen k ennen S ic herheits s tatu s R b m K o o u Z u ic htl iniens erv er es tim en nf rm ität nd gangs regel n N etz w erk z u gangs geräte s etz en Z u gangs ric htl inien d u rc h 13

14 QQ Network A dm is s ion C ontrol in A c tion C l i en t b au t V erb i n d u n g De s k to p au f A u then ti f i z i eru n g u n d Üb erp rüf u n g d er Po l i cy ( C i sco S ecu re A C S ) C i s c o Tru s t Ag e n t Si Re m e d i a ti o n C o rp o rate N et Z u g a n g e r l a u b t Z u g a n g v e r w e i g e r t Q u a r a n tän e R e m e d i a ti o n uu aa ra nn ti nn e e VV LL AN 14

15 O O NA C Logic a l C om Shipping and NAC2 p onents N E W N A C 2 H o s t Ne t w o r k Ac c e s s De v i c e No n-r e s p o ns i v e Au d i t S e r v e r GAME V e nd o r S e r v e r S e c ur i t y A p p C T A Many V e nd o r s p e n L i c e ns e P r o g r am S h i p p i n g Plug-i n s C T A C T A NT, X P, , E AP o U DP E AP o x E AP o U DP R o u t e r s ( 8 x x -7 5 x x ) V P N R ADI U S AAA S e r v e r C i s c o S e c u r e AC S H C AP Many V e nd o r s p e n L i c e ns e P r o g r am NAC2 R e d H at L i nu x E AP o x S w i t c he s ( , , , , ) W i r e l e s s AP & W L S M NR Au d i t S e r v e r AP I I ni t i al v e nd o r s i nt e g r at e d 15

16 m C O L L A B O R A T I V E S E C U R I T Y P a rtnerp rogra m Üb e r 6 0 P a rtn e r m i t d u tz e n d e n b e re i ts V e rfüg b a re n An w e n d u n g e n ANTI V IRU S REM EDIATIO N AU DIT C L IENT S EC U RITY 16

17 F irew al l L ös u ngen: C is c o A S A F W S M 17

18 Vorstellung d er C i sc o A d a p ti v e S ec uri ty A p p li a nc e Ad a p t i v e T h re a t D e fe n s e u n d V P N Lös u n g e n Ad a p ti v e T h r e a t D e f e n s e u n d F l e x i b l e V P N Lös u n g i n e i n e m G e r ät Ap p l i k a ti o n s s i c h e rh e i t, W u rm / V i ru s Ab w e h r, M a l w a re -S c h u tz, Th re a t-p ro te c te d V P N u n d u m fa n g re i c h e Ne tz w e rk fu n k ti o n e n M i n i m i e r t I n b e tr i e b n a h m e - u n d B e tr i e b s k o s te n P l a ttfo rm S ta n d a rd i s i e ru n g, z e n tra l e s M a n a g e m e n t E r w e i te r b a r e T e c h n o l o g i e g e g e n z u k ün f ti g e B e d r o h u n g e n S p e z i a l h a rd w a re, Ad a p ti v e Erk e n n u n g u n d En ts c h ärfu n g s a rc h i te k tu r e rm ög l i c h t n o c h n i e d a g e w e s e n e Erw e i te rb a rk e i t u n d Ri c h tl i n i e n k o n tro l l e Die C is c o A SA Series 18

19 M Cisco ASA 5500 Se r ie Konvergenz von rob u s t en, m a rk t erp rob t en T ec h nol ogi en a rk e t-p ro v e n Te c h n o l o g i e s Ad a p ti v e Th re a t De fe n s e, S e c u re C o n n e c ti v i ty Firewall Technology C is co P I X A p p I ns p ect ion, U s e E nf orcem ent, W eb C ont rol A p p licat ion S ecu rit y N W I P S Technology C is co I P S -A V Technology C is co I P S, A V V P N Technology C is co V P N M alware/ C ont ent D ef ens e, A nom aly D et ect ion A nt i-x D ef ens es Traf f ic/ A d m is s ion C ont rol, P roact iv e R es p ons e N et work C ont ainm ent & C ont rol N et work I nt elligence C is co N et work S erv ices S ecu re C onnect iv it y I P S ec & S S L V P N 19

20 m C is c o A SA P rodu ktline Lös u n g e n für S M B b i s h i n z u m G ro ßu n t e rn e h m e n C i s c o AS A C i s c o AS A C i s c o AS A Z iel m ar k t S M B u n d S M E U n te rn e h m e n Gro ßu n te rn e h m e n Listenp r eis a b $ 3, a b $ 7, a b $ 1 6, Leistungsdaten Max F i r e w al l d u r c hs at z Max C o n. T hr e at Mi t i g at i o n Max I P S e c V P N Du r c hs at z Mb p s Mb p s Mb p s 45 0 Mb p s Mb p s Mb p s Mb p s 45 0 Mb p s Mb p s D ienste der B asisp l attf o r m Ap p F W, I P S e c u nd S S L V P N, A/ S H A ( U p g. ), 3 F E t o 5 F E W i e , z u s ät z l i c h A/ A F ai l o v e r, V P N C l u s t e r i ng, 4 G E + 1 F E W i e j e d o c h i t höhe r e r L e i s t u ng u nd S k al i e r b ar k e i t 20

21 C i sc o A S A O S 7. 0 A p p li c a ti on I nsp ec ti on I ns p ec tio n E ngine C ap ab il ities Ap p l i c a ti o n P o l i c y E n f o r c e m e n t P r o to c o l C o n f o r m a n c e C h e c k i n g P r o to c o l S ta te T r a c k i n g S e c u r i ty C h e c k s NAT / P AT S u p p o r t D y n a m i c P o r t Al l o c a ti o n M u l ti m e d i a / V o i c e o v e r IP H v 1-4 S I P S C C P ( S k i nny) G T P ( 3 G W i r e l e s s ) MG C P R T S P T AP I / J T AP I S p e c i fi c Ap p l i c a ti o n s Enhanced NN ew Enhanced Mi c r o s o f t W i nd o w s Me s s e ng e r Mi c r o s o f t Ne t Me e t i ng R e al P l aye r C i s c o I P P ho ne s C i s c o S o f t p ho ne s C o re In te rn e t P ro to c o l s H T T P F T P T F T P S MT P / E S MT P DNS / E DNS I C MP T C P U DP Da ta b a s e / O I L S / L DAP O r ac l e / S Q L * Ne t ( V 1 / V 2 ) Mi c r o s o f t Ne t w o r k i ng NF S R S H S u nr P C / NI S + X W i nd o w s ( X DMC P ) S e c u ri ty S e rv i c e s S S e rv i c e s I K E I P S e c P P T P C i s c o S y s t e m s, I n c. A l l r i g h t s r e Cisco s e r v e d. Con f id e n t ia l N D A U se O n l y 21 NN ew NN ew NN ew NN ew NN ew 21

22 s C i sc o A S A O S 7. 0 Active-Active F a il o ver Active-Active F a il o ver Ad d s M u l tigro u p H S R P s ty l e a ctive-a ctive fa il o ver a s a l tern a tive to ex is tin g a ctive/ p a s s ive fa il o ver E ffectivel y d o u b l es th ro u gh p u t o f fa il o ver p a ir S u p p o rt fo r a s y m m etric ro u tin g l evera ges H A p a ir b id irectio n a l s ta te s h a rin g fo r res il ien cy in m u l ti-h o m ed n etw o rk s L evera ges s ecu rity co n tex ts a rch itectu re to p ro vid e a s ca l a b l e H A Ne ww ii n !! L i c e n s e d F e a tu re a i l a b l e o n e 5 1 5, a n d p l a w i U F O l i c e n s e s Av th E, tfo rm th R/ -AA C o nt e x t 1 Ac t i v e P I X CC oo nt ee xx t t 22 SS tt and bb y IS P P 11 Ne tw oo rk CC oo nt ee xx t t 11 SS tt and bb y P I X C o nt e x t 2 Ac t i v e 22 Cisco Con f id e n t ia l N D A U se O n l y IS P P 22 22

23 C i sc o A S A O S 7. 0 M u l ti-c o n tex t S ecu r ity S er vices Security Contexts (Virtual Firewalls) lower operational costs Reduce overall management and support costs b y h osti ng multi ple vi rtual f i rew alls i n a si ngle appli ance E nab les th e logi cal parti ti oni ng of a si ngle C i sco P I X S ecuri ty A ppli ance i nto multi ple logi cal f i rew alls, each w i th th ei r ow n uni q ue poli ci es and admi ni strati on E ach contex t provi des th e same pri mary f i rew all f eatures provi ded b y a standalone C i sco P I X S ecuri ty A ppli ance S upports up to contex ts, dependi ng on platf orm I deal soluti on f or enterpri ses consoli dati ng multi ple f i rew alls i nto a si ngle larger appli ance, or servi ce provi ders w h o of f er managed f i rew all or h osti ng servi ces Ne ww ii n !! L i c e n s e d F e a tu re Av ai l ab l e o n t he 5 1 5, E, and p l at f o r m s w i t h U R / F O l i c e ns e s. T i e r s : 5, 1 0, 2 0, 5 0, and c o nt e x t s. Dept/C u s t 1 Dept/C u s t 2 Dept/C u s t 3 Dept/C u s t N Dept/C u s t 1 Dept/C u s t 2 Dept/C u s t 3 Dept/C u s t N PIX PIX PIX PIX P IX C i s c o S y s t e m s, I n c. A l l r i g h t s r e Cisco s e r v e d. Con f id e n t ia l N D A U se O n l y 23 23

24 C i sc o A S A O S 7. 0 Layer2 Firewall Ne ww ii n !! T ra n s p a ren t F irew a l l p ro vid es ra p id d ep l o y m en t s ecu rity s ervices S im p l ifies a n d s p eed s d ep l o y m en t o f s ecu rity s ervices in to S M B a n d E n terp ris e n etw o rk en viro n m en ts P rov id es ab ility to rapid ly d rop in Cisco P I X Security A ppliances into existing network s with out req uiring any ad d ressing ch ang es D eliv ers h ig h -perf orm ance stealth L 2 -L 7 security serv ices and prov id es protection ag ainst network layer attack s Seam less security appliance integ ration in com plex routing, h ig h av ailab ility, and m ulticast env ironm ents I d ea l fo r en viro n m en ts w ith l im ited I T res o u rces / b u d get T r ans p ar e nt F i r e w al l R o u t e r / 2 4 P IX / 2 4 R o u t e r S AME S u b ne t C i s c o S y s t e m s, I n c. A l l r i g h t s r e Cisco s e r v e d. Con f id e n t ia l N D A U se O n l y 24 24

25 m C i sc o A d a p ti v e S ec uri ty D ev i c e M a na ger v 5. 0 C i s c o AS DM v 5.0 d e l i v e rs e x te n s i v e IP S m a n a g e m e n t a n d o n i to ri n g o f a s i n g l e C i s c o AS A a p p l i a n c e S u p p o rts fu l l c o n fi g u ra ti o n o f: - En g i n e s - S i g n a tu re s - Th re a t Ri s k Ra ti n g - IP S Ac ti o n s - An d m o re! S u p p o rts m o n i to ri n g o f: - Ev e n ts - Di a g n o s ti c re p o rts - S e n s o r s ta ti s ti c s A S A I n t r o CC ii ss cc o o SS yy ss tt ee mm s s,, II nn c c.. AA ll l l rr ii gg hh tt s s rr ee ss ee rr vv ee d d.. 25

26 Firewall Service M o d u l High Performance Firewall I ntegriert in C ataly s t S witch V ergleichb ar Pix 6. 3 / 7. 0 L ay er 2 od er L ay er 3 Firewall V irtu elle Firewall Fu nk tionen U nters tütz t V L A N s Performance K ein I D S u nd k ein V PN 5, 5 G b it D u rchs atz K neu e V erb ind u ngen / s ec 1 M illion gleichz eitige V erb ind u ngen 3 M p p s FWSM 26

27 W Remote Access VPN eb VPN 27

28 V P N D ien s t e für j ed en Robuste I P S ec - un d S S L -V P N D i en ste A n wen d u n g s fall B ranch O f f i ce S i te-to-s i te S up p l y P artner E x tranet ZZ uu ga nn gs ss zz en aa rien : S i te -to -S i te, M a n a g e d D e s k to p, E m p l o y e e D e s k to p, K i o s k A c c e s s V o l l e r o d e r e i n g e s c h r än k te r N e tz w e r k z u g a n g P a r tn e r Z u g a n g P u b l i c In te rn e t Account Manager Mob i l e U s er E m p l oy ee at H om e U nm anaged D es k top AS A KK oo nn vv ee rr gg ee nn zz vv oo n n II PP SS ee c c,, WW ee bb VV PP N N,, FF ii rr ee ww aa ll l l : Üb e r w a c h u n g v o n V P N V e r b i n d u n g e n R e m o te A c c e s s V P N I n f r a s tr u k tu r i n e i n e m G e r ät Z e n tr a l e, e i n h e i tl i c h e B e n u tz e r v e r w a l tu n g O p ti m a l e V e r f üg b a r k e i t I n te g r i e r te L a s tv e r te i l u n g B ietet s icheren Z u gang für j ed en B enu tz er v on j ed em O rt in einem G erät mit u mfas s end em M anagement 28

29 W eb V P N : SSL -B as iert er R em o t e A cces s E r m ög l i c h t si c h er en Rem otez ug r i f f oh n e C l i en t W eb P a ge Z u griff ( H T T P / H T T P S ) R em o te E -M a il Z u griff O u tl o o k ( M AP I ), O W A, P O P, I M AP, S M T P, N o tes, in o tes F il e Z u griff a u f U n tern eh m en s s erver W in d o w s C I F S F il e S h a res via W eb I n terfa ce F l ex ib l e L o gin O p tio n en, in d ivid u el l a n p a s s b a r für u n ters ch ied l ich e B en u tz ergru p p en G ru p p en -b a s ierte Z u ga n gs k o n tro l l e P o rt F o rw U n ters tütz u n g a l l er gän gigen U n tern eh m en s w eiten Au th en tis ieru n gs m ech a n is m en a rd in g Z u ga n g z u T C P -b a s ierten T h ick C l ien t An w en d u n gen W eb -B a s iertes M a n a gem en t U m fa s s en d e K o n figu ra tio n u n d Üb erw a ch u n g KK oo ss te nn ll oo ss ee r SS SS L L VV PP N Tri aa l l ii mm BB aa ss ii ss pp re ii ss ee nn th aa ll te n n KK ee ii nn ee PP ee r-fr F ee aa tu re LL ii cc ee nn ss e e! 29

30 C ustom i z a b le A p p li c a ti on A c c ess Al l l SS SS L L VV PP N N FF eatures II ncl ud ed ii n BB as e PP ri ci ng NN o SS pp eci al LL ii cens es!! Deployment Examples: Extend i ng A ppr opr i ate C onnec ti v i ty CC CComp is co any SS SS -M L L anaged VV PN TT uu nneling DD es kk top CC: lient CC Pers ontrolled is tent, ss oftware L AA NN -lik env e ironment network ed connectiv ity KK AAnown cces s ss s ecu to vv rity irtu ppally os tu any re && ap ss pp yy lication ss tem pp riv ileges DD UUiv tiliz ers es ap ss mall, pp lication dd yy namically req uu irements load ed client Pos BB es t-s t es op sstion for clean-u bb road p p op ap tional pp lication acces ss L AA NN -lik e remote connectiv ity dd es ired Home/ CC lientles KK ios s s k k,, WWAA cces eb -B s s as : ed AA cces ss UU RRncontrolled ev ers e pp rox env y y firewalled ironment - ss connection uu pp pp ort is ss uu es UU AAnk cces nown s s to ss ecu web rity -b as pp os ed tu ap re pp && lications ss yy ss tem and pp riv CCileges itrix LL imited NN o ss oftware ap pp lication dd ownload acces ed s s allowed Pos BB es tu t re op as tion ss es for ss ment, limited pp os web t-s es ap ss pion p lication clean-u acces p p req s s uu and ired CC uuuu nmanaged s s tomiz acces dd kk s s top pp ortal ss often dd es irab le Partner TT hin CC AAlient cces Port s s : Forward ing UU ncontrolled RR ev ers e pp rox env y y firewalled ironment - ss uconnection u pp pp ort is ss uu es UU nk AA cces nown s s to ss ecu web rity,, , pp os tu calend re && ss yy ar, ss tem II M M and p p riv ileges many other VV ery TT CC P granu ap pp lications lar acces s s controls Pos SS mall tu re JJ as av ss a es ap ss ment, pp let dd yypp namically os t-s es ss ion load clean-u ed p p req uu ired CC uubb ss es tomiz t op ed tion acces for limited s s pp ortal web often and dd es client/ irab le s s erv er ap pp lications and uu nmanaged dd es kk top ss 30

31 C SD in A ct io n 31

32 C i sco VPN L ösu n g en I n teg r a ted S er v i ce Rou ter 32

33 M C is co I n t eg rat ed Services R o u t er I n teg r a ted S er v i ces Rou ter u l ti s e rv i c e Ac c e s s Ro u te r S w i tch i ng, rou ti ng W i rel es s E ncry p ti on, F i rew al l, I D S / I PS S p ra c h - u n d S i c h e rh e i ts - P ro z e s s o re n C ontent D el i v ery V oi ce & I PT A O N L i efert S i ch erh ei t, p aral l el e D aten-, S p rach - u nd V i d eod i ens te i n L ei tu ng s g es ch w i nd i g k ei t B es ch l eu ni g t A nw end u ng s b erei ts tel l u ng u nd red u z i ert K os ten u nd K omp l ex i tät B ei s p i el l os e D i ens te, L ei s tu ng s fäh i g k ei t u nd I nv es ti ti ons s ch u tz s ch affen neu e Mög l i ch k ei ten für K u nd en 33

34 MM Cisco Integrated Services Router The Right Ro u ter f o r E v er y O f f ic e Office Size Performance and Services Density M ark ets SS eries H i gh es t D ens i ty and P erf orm ance f or C oncurrent S erv i ces SS eries E m b ed d ed, Ad v anced V oi ce, V i d eo, D ata & S ecuri ty S erv i ces H i gh P erf orm S ecure B road b and and W Enterprise ance I ntegrated S ecuri ty & D ata Enterprise Branch Office i rel es s C onnecti v i ty M ed iu m B u siness S m al l Branch S m a l l B u siness oo dd uu ll aa r SS eries FF ix ed New Models f or S m a ll O f f i c es SS ee ri ee ss S m al l R em o te Offices T el ew o rk er S ing l e S ite S m al l Bu siness 34

35 G E G E MM VV Cisco Integrated Security Architecture Integrated Hardware Security Serv ices B u i l t-i n V P N Ac c e l e ra ti o n H ig h P erf o rm a nc e C ry pto o f f l o a d 3 D ES / A ES Enc ry ptio n U p to 4 x f a ster th a n prev io u s ro u ters S e c u re V o i c e P V D M M o d u l es S u ppo rt S R T P A ES Enc ry ptio n H i g h P e rfo rm a n c e AIM O ptio na l A I M -V P N P L U S 3 D ES, A ES & C o m pressio n U p to 1 0 x f a ster th a n prev io u s ro u ters U S B P o rt R em o v a b l e S ec u re C red entia l s FF II PP SS Po ww G E G E ee r r aa ff HH WW II CC HH WW II CC HH WW HH WW II CC II CC VPN EE VV M AIM AIM UU SS BB UU SS BB II KK E E CC rr ac kk HH II PP AA AA Man in the Middle NN ME BB AA K K DD EE S S CC rr ac kk oo II P P SS ec uu rr ity CC ommon Hard ware AA rchitectu re od uu lar DD es ign II nv es tment Protection 35

36 Cisco Router and Security Device Manager (( SDM) ff or Sim pp ll if ied Managem ent O ne tou ch rou ter lock -d own, au to s ecu re K nowled geb as e of T A C recommend ed configu rations B u ilt-in G U I av ailab le for all , , s eries I nd u s try lead ing rou ter and s ecu rity management tool for: V P N F i re w a l l, IP S S ta ti c / Dy n a m i c Ro u ti n g Q o S, NB AR L AN/ W AN/ V L AN In te rfa c e s One Touch R R out er er L L ock - d d ow ow n, n, A A ut uto S S ecur e 36

37 GG Adv anced Secure Connectiv ity Faster Deployment, Reduced Configuration VV 33 PN BB ee ss t ii n n cc ll aa ss s s QQ oo S S ww ii th IP SS ee c c VV PP Ns fo r mm uu ll ti ss ee rv ii cc ee hh ii gg hh - qq uu aa ll ii ty,, jj ii tte r-frer e e vv oo ii cc e e,, vv ii dd ee o o aa nn d d hh ii gg hh -p p ri oo ri ty dd aa ta II PS ec EE as yy VV PN Re mm oo te Ac cc ee ss s s hh uu b b aa nn d d ss pp oo kk e e VV PP Ns uu ss ii nn g g cc ee nn tra ll ii zz ee d d pp oo ll ii cc y y pp uu ss hh VV irtu aliz ed SS erv ices SS uu pp pp oo rt mm uu ll ti pp ll e e oo rg aa nn ii zz aa ti oo nn s s ww ii th oo vv ee rl aa pp pp ii nn g g IP aa dd dd re ss ss ee s s ww hh ii ll e e mm aa ii nn ta ii nn ii nn g g ss ee pp aa ra ti oo n n oo f dd aa ta,, ro uu ti nn g g,, aa nn d d pp hh yy ss ii cc aa l l ii nn te rfa cc ee ss Cost Effectively Ensuring Information Integrity and P rivacy II PS ec DD yy namic MM uu ltip oint VV PN (( DD MM VV PN )) ZZ ee ro to uu cc h h pp ro vv ii ss ii oo nn ii nn g g,, dd yy nn aa mm ii c c mm ee ss h h VV PP N tu nn nn ee ll ss RR E E // II PS ec with DD yy namic RR ou ting LL ee vv ee ra gg e e th e e bb ee ss t ro uu ti nn g g ii n n th e e bb uu ss ii nn ee ss s s fo r mm aa xx ii mm uu m m cc oo nn tro l l aa nn d d fl ee xx ii bb ii ll ii ty Internet = D M V P N T u nnel P E C u sto m er A C u sto m er B C u sto m er C w w w.c i s c o.c o m / g o / i p s e c 37

38 DMV P N - E ncryp ts V oice T raf f ic D y n a m i c & P e r m a n e n t S p o k e A -t o -H u b a n d S p o k e B -t o -H u b I P s e c t u n n e l s f o r e n c r y p t i o n o f s i g n a l i n g t r a f f i c b e t w e e n s a n d C a l l M a n a g e r H u b D y n a m i c & T e m p o r a r y S p o k e A -t o -S p o k e B I P s e c t u n n e l f o r e n c r y p t i n g m e d i a t r a f f i c b e t w e e n t w o c o n f e r e n c i n g s t a t i o n s S p o k e B S p o k e A S i g n a l i n g t r a f f i c Me d i a t r a f f i c N O T E b l a c k = u n e n c r y p t e d, c o l o r = e n c r y p t e d 38

39 O M O s V oice/ V ideo V P N s ( V 3 P N ) C i s c o IO S V P N Ro u te rs o r V P N Ap p l i a n c e s V o i c e, V i d e o i n te g ra ti o n w i th IP S e c C i s c o IP P h o n e 7 9 x x P h o n e h a n d s e t w i th i n te g ra te d Q o S V P N a i n ffi c e VV PP NN PP II XX L AN I P I P Re m o te ffi c e C i s c o C a l l M a n a g e r C a l l s e tu p a n d s i g n a l i n g ; H o s t IDS p ro te c ti o n C i s c o IO S V P N Ro u te rs / Ap p l i a n c e s In te g ra te d W AN, V P N, a n d v o i c e g a te w a y fo r re m o te o ffi c e s P IX o r IO S F i re w a l l S ta te fu l l y i n s p e c ts C i s c o IP Te l e p h o n y a n d V i d e o s tre a m 39

40 Cisco E asy V P N Z entra l e B ro w ser-b a siertes G U I a u f C isc o 8 0 0, 9 0 0, C isc o P I X F W & C V P N I nternet C isc o I O S R o u ter, V P N C o nc entra to r, P I X F irew a l l C isc o 8 0 0, S eries R o u ter, C isc o P I X F W, C V P N C isc o , , S eries, C isc o P I X F irew a l l, C V P N U nters tütz u ng v on d y namis chen V PN V erb ind u ngen E rlau b t k leine b is s ehr große E inführu ngen ohne A nwend erinterv ention Ei n fa c h e K o n fi g u ra ti o n Au to m a ti s c h e r V e rb i n d u n g s a u fb a u P o n g u o n s c h n e l l e s l l a o n E k V R D I C V D G B re -K fi ra ti für In ta ti rz wingt ons is tente PN Policy au f allen emote ev ices nterop erab ility üb er alle is co PN ev ices hinweg arantierte as is fu nk tionalität mit and eren Hers tellern 40

41 S ecurity M anagement 41

42 Security Managem ent P roduk tüb ersich t S ec u ri ty A u d i to r C S -M A R S D ev i c e M g rs S ec u ri ty M a na g er S D M V M S 2.3 C V D M A S D M C W -S IM S C o nf ig u ra tio n A u d iting C isc o S ec u rity M a na g em ent S u ite M itig a tio n S e s s io n N u m b e r P r e s e n ta tio n _ ID M o nito ring S ec u ri ty M a na g er A na l y sis 42

43 Cisco Mitigation and Response System (MARS) Next Generation SIM/STM Nutzung d e r v o r h a nd e ne n Ne tzw e r k i nf r a s tr uk tur zur S i c h e r h e i ts a na l y s e D a te nk o r r e l l i e r ung i m k o m p l e tte n Ne tz N I D S, Firewall, R ou ter, S witches, C S A S y s log, S N M ev ent logs P, R D E P, S D E E, N etflow, E nd p oint S c h ne l l e L o k a l i s i e r ung v o n A ngr i f f e n und E i nl e i tung v o n G e ge nm a ßna h m e n K e y F e a tur e s M e l d e t S e c u ri ty incidents b a s i e re n d a u f D ev ice m essa g es, ev ents, u n d sessio ns I w e e n g p h i s c h i n d e p o l o g i e d a e s l l ncidents rd ra r to rg te t g e n m a a h m e n a u L 2 p o u n d L 3 n Ge ßn f rts Ge räte S k a l i e rb a rk e i t a u c h i n k o m p l e x e re n U m g e b u n g e n 43

44 CS-MA RS Üb ersich t und K ontrol l e 44

45 P N -MA RS Datenk orrel ierung Genaue Darstellung des Angriffsweges H o A P o S c a T a X, f o l l o w b y H o A B u f f O v l o w A c k T a X W h X v u l b l A c k, f o l l o w b y T a X u o a c k o T a Y st rt ns rg et ed st er erf tta to rg et ere is nera e to tta ed rg et ex ec tes pa ssw rd tta n rg et 45

46 CS-MARS E inl eitu ng v on G egenmaßnah men Nutzung d e r A b w e h r m ögl i c h e i te n i nne r h a l b d e s Ne tzw e r k s p h i s c h e l l u n g d e s L a y e 2 a c k p a Gra Da rs te r 3 tta th. Ge g e n m a ßn a h m e n w e rd e n a u f d e m Ne tz w e rk g e rät d u rc h g e füh rt. S w i tc h C i s c o M ARS k o n fi g u ri e rt Ge g e n m a ßn a h m e n R o ute r F i r e w a l l ] 46

47 47

1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ).

1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ). PROCEDIMIENTO DE RECUPERACION Y COPIAS DE SEGURIDAD DEL CORTAFUEGOS LINUX P ar a p od e r re c u p e ra r nu e s t r o c o rt a f u e go s an t e un d es a s t r e ( r ot u r a d e l di s c o o d e l a

More information

H ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct

H ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct H ig h L e v e l O v e r v iew S te p h a n M a rt in S e n io r S y s te m A rc h i te ct OPEN XCHANGE Architecture Overview A ge nda D es ig n G o als A rc h i te ct u re O ve rv i ew S c a l a b ili

More information

Application Note: Cisco A S A - Ce r t if ica t e T o S S L V P N Con n e ct ion P r of il e Overview: T h i s a p p l i ca ti o n n o te e x p l a i n s h o w to co n f i g u r e th e A S A to a cco m

More information

First A S E M R e c to rs C o n f e re n c e : A sia E u ro p e H ig h e r E d u c a tio n L e a d e rsh ip D ia l o g u e Fre ie U n iv e rsitä t, B e rl in O c to b e r 2 7-2 9 2 0 0 8 G p A G e e a

More information

ACE-1/onearm #show service-policy client-vips

ACE-1/onearm #show service-policy client-vips M A C E E x a m Basic Load Balancing Using O ne A r m M ode w it h S ou r ce N A T on t h e C isco A p p licat ion C ont r ol E ngine Goal Configure b a s ic l oa d b a l a nc ing (L a y er 3 ) w h ere

More information

G ri d m on i tori n g w i th N A G I O S (*) (*) Work in collaboration with P. Lo Re, G. S av a and G. T ortone WP3-I CHEP 2000, N F N 10.02.2000 M e e t i n g, N a p l e s, 29.1 1.20 0 2 R o b e r 1

More information

EM EA. D is trib u te d D e n ia l O f S e rv ic e

EM EA. D is trib u te d D e n ia l O f S e rv ic e EM EA S e c u rity D e p lo y m e n t F o ru m D e n ia l o f S e rv ic e U p d a te P e te r P ro v a rt C o n s u ltin g S E p p ro v a rt@ c is c o.c o m 1 A g e n d a T h re a t U p d a te IO S Es

More information

W Cisco Kompetanse eek end 2 0 0 8 SMB = Store Mu ll ii gg hh eter! Nina Gullerud ng ulleru@ c is c o. c o m 1 Vår E n t e r p r i s e e r f a r i n g... 2 S m å o g M e llo m s t o r e B e d r i f t e

More information

i n g S e c u r it y 3 1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his å ] í d : L : g u id e Scanned by CamScanner

i n g S e c u r it y 3 1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his å ] í d : L : g u id e Scanned by CamScanner í d : r ' " B o m m 1 E x p e r i e n c e L : i i n g S e c u r it y. 1-1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his g u id e å ] - ew i c h P e t e r M u la e n PACKT ' TAÞ$Æo

More information

m Future of learning Zehn J a hr e N et A c a d ei n E r f o l g s p r o g r a m Cisco E x p o 2 0 0 7 2 6. J u n i 2 0 0 7, M e sse W ie n C. D or n in g e r, b m u k k 1/ 12 P r e n t t z d e r p u t

More information

SIV for VoiceXM 3.0: a n g u a g e a n d A p p l ica t ion D es ig n C on s id era t ion s Ken Rehor C i s c o S y s t em s, I nc. krehor@cisco.com March 05, 2009 G VoiceXM Application Architecture PSTN

More information

Campus Sustainability Assessment and Related Literature

Campus Sustainability Assessment and Related Literature Campus Sustainability Assessment and Related Literature An Annotated Bibliography and Resource Guide Andrew Nixon February 2002 Campus Sustainability Assessment Review Project Telephone: (616) 387-5626

More information

M P L S /V P N S e c u rity. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.

M P L S /V P N S e c u rity. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. M P L S /V P N S e c u rity M ic h a e l B e h rin g e r < m b e h rin g @ c is c o.c o m > M b e h rin g - M P L S S e c u rity 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. 1 W h

More information

Device I n s t r u m en t a t io n E x a m p l es : I P S L A s & N et F l o w Presented by Emmanuel Tychon Techni cal M ark eti ng Eng i neer TU D resden, J anuary 1 7 th 2 0 0 7 1. C is co I O S I P

More information

Data Center end users for 40G/100G and market dy nami c s for 40G/100G on S M F Adam Carter Ci s c o 1 W Now that 40GbE is part of the IEEE 802.3ba there will be a wid er array of applic ation s that will

More information

B a rn e y W a r f. U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8

B a rn e y W a r f. U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8 U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8 T e le c o m m u n ic a t io n s a n d th e C h a n g in g G e o g r a p h ie s o f K n o w le d g e T r a n s m is s io n in th e L a te

More information

Enterprise Data Center A c h itec tu re Consorzio Operativo Gruppo MPS Case S t u d y : P r o g et t o D i sast er R ec o v er y Milano, 7 Febbraio 2006 1 Il G r u p p o M P S L a B a n c a M o n t e d

More information

SCO TT G LEA SO N D EM O Z G EB R E-

SCO TT G LEA SO N D EM O Z G EB R E- SCO TT G LEA SO N D EM O Z G EB R E- EG Z IA B H ER e d it o r s N ) LICA TIO N S A N D M ETH O D S t DVD N CLUDED C o n t e n Ls Pr e fa c e x v G l o b a l N a v i g a t i o n Sa t e llit e S y s t e

More information

W h a t is m e tro e th e rn e t

W h a t is m e tro e th e rn e t 110 tv c h a n n e ls to 10 0 0 0 0 u s e rs U lf V in n e ra s C is c o S y s te m s 2 0 0 2, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. 1 W h a t is m e tro e th e rn e t O b je c tiv

More information

Collaboration in Public H e alth be tw e e n U niv e rs ity of H e id e lbe rg and U niv e rs ity of D ar e s S alaam How t h e c oop e r a t i on e m e r g e d Informal c ont ac t s from e arly 1 9

More information

IronPort Gateway Security Products The Leader in Communication Security Reiner Baumann IronPort Systems The Principles of Industry Leadership A n a l y s t L e a d e r s h i p R e c o g n i z e d a s t

More information

SCHOOL PESTICIDE SAFETY AN D IN TEG R ATED PEST M AN AG EM EN T Statutes put into law by the Louisiana Department of Agriculture & Forestry to ensure the safety and well-being of children and school personnel

More information

Video og IP TV - h v or da n p هv ir k es n et t v er k en e? t t a d A c c o u n t M a n a g S P / T o m S m t Ole-P et er R s er elec eg en 1 Hva gjorde vi u t en T V.... 2 2 0 0 m il l s am t idige

More information

C o a t i a n P u b l i c D e b tm a n a g e m e n t a n d C h a l l e n g e s o f M a k e t D e v e l o p m e n t Z a g e bo 8 t h A p i l 2 0 1 1 h t t pdd w w wp i j fp h D p u b l i c2 d e b td S t

More information

Cisco Self-D efen d in g N et w Adaptive Threat Defense or k Latest Product Announcements 1 N ew Secu r it y Ch a llen g es E d g e F i r e w a l l i n g I n t r u s i o n & W o r m M i t i g a t i o n

More information

PSTN. Gateway. Switch. Supervisor PC. Ethernet LAN. IPCC Express SERVER. CallManager. IP Phone. IP Phone. Cust- DB

PSTN. Gateway. Switch. Supervisor PC. Ethernet LAN. IPCC Express SERVER. CallManager. IP Phone. IP Phone. Cust- DB M IPCC EXPRESS Product Solution (IPCC - IP Co n t a c t Ce n t e r ) E i n f ü h r u n g Ü b e r h u nd e r t M il l io ne n N u t ze r - P r o g no s e n zu f o l g e w e r d e n e s in d ie s e m J ah

More information

I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y

I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y and KB rl iak s iol mi a, hme t a ro cp hm a5 a 2k p0r0o 9f i,e ls hv oa nr t ds eu rmv oedye l o nf dae cr

More information

M Fast forward into th e fu tu re Accelerating b u s ines s o p p o rtu nity and natio nal p ro s p erity Viktor Kovacs anaging D irecto r H u ngary & Ad riatic R egio n C h a n g e t h e w o r l d» O

More information

How To Know If You Are A Good Or Bad Person

How To Know If You Are A Good Or Bad Person QuesCom I P -T E L E F O N I E & G S M -G A T E W A Y S Robert Urban D i rec tor I nternati onal S al es Agenda Üb e r Q u e s C o m K u n d e n M a r k t üb e r s i c h t Q u e s c o m Lös u n g Q u e

More information

CIS CO S Y S T E M S. G u ille rm o A g u irre, Cis c o Ch ile. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.

CIS CO S Y S T E M S. G u ille rm o A g u irre, Cis c o Ch ile. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. CIS CO S Y S T E M S A c c e s s T e c h n o lo g y T e le c o m /IT Co n n e c tiv ity W o rk s h o p G u ille rm o A g u irre, Cis c o Ch ile g m o.a g u irre @ c is c o.c o m S e s s io n N u m b e

More information

e Videobewaking ov er I P Marty K n o p e rt 1 A l l m z u l l b t g r u m a k h w k h w k z a l z r E p r m a r k t t c m a r k t Video vision: e vor en va n video en in de na ij e oek om st eb ik en

More information

AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981. P. A. V a le s, Ph.D.

AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981. P. A. V a le s, Ph.D. AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981 P. A. V a le s, Ph.D. SYNOPSIS Two in d ep en d en t tre a tm e n t g ro u p s, p a r t ic ip

More information

Der Bologna- P roz es s u nd d i e S t aat s ex am Stefan Bienefeld i na Service-St el l e B o l o g n a d er H R K Sem in a r D er B o l o g n a P ro z es s U m s et z u n g u n d M it g es t a l t u

More information

Erfa rin g fra b y g g in g a v

Erfa rin g fra b y g g in g a v Erfa rin g fra b y g g in g a v m u ltim e d ia s y s te m e r Eirik M a u s e irik.m a u s @ n r.n o N R o g Im e d ia N o rs k R e g n e s e n tra l fo rs k n in g s in s titu tt in n e n a n v e n d

More information

FORT WAYNE COMMUNITY SCHOOLS 12 00 SOUTH CLINTON STREET FORT WAYNE, IN 468 02 6:02 p.m. Ma r c h 2 3, 2 015 OFFICIAL P ROCEED ING S Ro l l Ca l l e a r d o f h o o l u e e o f t h e r t y m m u t y h o

More information

/* ------------------------------------------------------------------------------------

/* ------------------------------------------------------------------------------------ Pr o g r a m v a r e fo r tr a fik k b e r e g n in g e r b a s e r t p å b a s is k u r v e m e to d e n n M a tr ix * x M a tr ix E s ta lp h a B e ta ; n M a tr ix * z M a tr ix ; g e n M a tr ix X

More information

1. Oblast rozvoj spolků a SU UK 1.1. Zvyšování kvalifikace Školení Zapojení do projektů Poradenství 1.2. Financování 1.2.1.

1. Oblast rozvoj spolků a SU UK 1.1. Zvyšování kvalifikace Školení Zapojení do projektů Poradenství 1.2. Financování 1.2.1. 1. O b l a s t r o z v o j s p o l k a S U U K 1. 1. Z v y š o v á n í k v a l i f i k a c e Š k o l e n í o S t u d e n t s k á u n i e U n i v e r z i t y K a r l o v y ( d á l e j e n S U U K ) z í

More information

UNDERSTANDING FLOW PROCESSING WITHIN THE CISCO ACE M ODULE Application de liv e r y pr odu cts can distr ib u te tr af f ic to applications and w e b se r v ice s u sing v ar y ing le v e ls of application

More information

w ith In fla m m a to r y B o w e l D ise a se. G a s tro in te s tin a l C lin ic, 2-8 -2, K a s h iw a z a, A g e o C ity, S a ita m a 3 6 2 -

w ith In fla m m a to r y B o w e l D ise a se. G a s tro in te s tin a l C lin ic, 2-8 -2, K a s h iw a z a, A g e o C ity, S a ita m a 3 6 2 - E ffic a c y o f S e le c tiv e M y e lo id L in e a g e L e u c o c y te D e p le tio n in P y o d e r m a G a n g re n o su m a n d P so r ia sis A sso c ia te d w ith In fla m m a to r y B o w e l D

More information

J a re k G a w o r, J o e B e s te r, M a th e m a tic s & C o m p u te r. C o m p u ta tio n In s titu te,

J a re k G a w o r, J o e B e s te r, M a th e m a tic s & C o m p u te r. C o m p u ta tio n In s titu te, 1 4 th IE E E In te r n a tio n a l S y m p o s iu m o n H ig h P e r fo r m a n c e D is tr ib u te d C o m p u tin g (H P D C -1 4 ), R e s e a rc h T ria n g le P a rk, N C, 2 4-2 7 J u ly 2 0 0 5.

More information

W Regional Cooperation in the Field of A u tom otiv e E ngineering in S ty ria Dr. Peter Riedler 2 9.1 1.2 0 1 1 i e n GmbH Graz B u s ines s S trategy S ty ria 2 0 2 0 H is tory 1 9 9 4 1 9 9 5 1 9 9

More information

3 k t h R e m e A c c e s s b t t t V T T c h t h p V T. Cl ic e ot rad io ut on nex o PN unnel yp e and oose e ap rop riat e PN unnel Int erfac e. 4.

3 k t h R e m e A c c e s s b t t t V T T c h t h p V T. Cl ic e ot rad io ut on nex o PN unnel yp e and oose e ap rop riat e PN unnel Int erfac e. 4. C i s c o P r o f i l e C o n t a c t s & F e e d b a c k H e l p Cisc o SM B Sup p ort Assist ant Configure ASA/PIX as Easy VPN Server or Client H om e > W ork W it h M y Sec urit y D ev ic es > Cisc

More information

M Mobile Based Clinical Decision Support System Bhudeb Chakravarti & Dr. Suman Bhusan Bhattacharyya Provider & Public Health Group, VBU-HL P S aty am C om puter S ervices L im ited Bhudeb_ C hak ravarti@

More information

A n d r e w S P o m e r a n tz, M D

A n d r e w S P o m e r a n tz, M D T e le h e a lth in V A : B r in g in g h e a lth c a r e to th e u n d e r s e r v e d in c lin ic a n d h o m e A n d r e w S P o m e r a n tz, M D N a tio n a l M e n ta l H e a lth D ir e c to r f

More information

Victims Compensation Claim Status of All Pending Claims and Claims Decided Within the Last Three Years

Victims Compensation Claim Status of All Pending Claims and Claims Decided Within the Last Three Years Claim#:021914-174 Initials: J.T. Last4SSN: 6996 DOB: 5/3/1970 Crime Date: 4/30/2013 Status: Claim is currently under review. Decision expected within 7 days Claim#:041715-334 Initials: M.S. Last4SSN: 2957

More information

Positioning 40 and 100 GbE in data center inter-sw itch l ink ap p l ications and 40GbE PM D recom m endations Adam Carter, Cisco Al essan dro B arb ieri, Cisco 1 m Data Center inter-s w itc h l ink ap

More information

proxy cert request dn, cert, Pkey, VOMS cred. (short lifetime) certificate: dn, ca, Pkey mod_ssl pre-process: parameters->

proxy cert request dn, cert, Pkey, VOMS cred. (short lifetime) certificate: dn, ca, Pkey mod_ssl pre-process: parameters-> Overview of the New S ec u rity M od el WP6 Meeting V I D t G R I D C o nf er enc e B r c el o ne, 1 2-1 5 M y 2 0 0 3 Overview focus is on VOMS C A d e t il s r e in D 7. 6 Se cur it y D e sig n proxy

More information

B rn m e d s rlig e b e h o v... 3 k o n o m i... 6. S s k e n d e tils k u d o g k o n o m is k frip la d s... 7 F o r ld re b e ta lin g...

B rn m e d s rlig e b e h o v... 3 k o n o m i... 6. S s k e n d e tils k u d o g k o n o m is k frip la d s... 7 F o r ld re b e ta lin g... V e lf rd s s e k re ta ria te t S a g s n r. 1 4 3 4 1 5 B re v id. 9 9 3 9 7 4 R e f. S O T H D ir. tlf. 4 6 3 1 4 0 0 9 s o fie t@ ro s k ild e.d k G o d k e n d e ls e s k rite rie r fo r p riv a tin

More information

Practice Writing the Letter A

Practice Writing the Letter A Aa Practice Writing the Letter A A a A a Write a in the blank to finish each word. c t re h d Write A in the blank to finish each word. nn US ndy Bb Practice Writing the Letter B B b B l P b Write b in

More information

IT-S i c h e r h e i t Stephan Meier s m eier@ c is c o. c o m 1 The Evolution d er Z iele Vom H ob b y i s t e n z u m P r of e s s i on a l T hreats b ec o m ing inc reas ing l y d if f ic u l t to d

More information

Ontwikkelingen van R o u ter N etwer ken Fred Rabouw 1 3-t i e r R o u t e r N e t w e r k e n. Core: forwarden van grote h oeveel h eden data. D i s tri b u ti e: Cl as s i fi c eren en fi l teren A c

More information

G S e r v i c i o C i s c o S m a r t C a r e u ي a d e l L a b o r a t o r i o d e D e m o s t r a c i n R ل p i d a V e r s i n d e l S e r v i c i o C i s c o S m a r t C a r e : 1 4 ع l t i m a A c

More information

The Business Case for D om aink ey s I d ent ified M ail Andy Spillane V ic e P r es ident, Y ah o o! M February 13, 2006 ail 1 Fighting Spam & Email Abuse R eq uir es a M ulti-fac eted Appr o ac h DomainKeys

More information

Put the human back in Human Resources.

Put the human back in Human Resources. Put the human back in Human Resources A Co m p l et e Hu m a n Ca p i t a l Ma n a g em en t So l u t i o n t h a t em p o w er s HR p r o f essi o n a l s t o m eet t h ei r co r p o r a t e o b j ect

More information

T ra d in g A c tiv ity o f F o re ig n In s titu tio n a l In v e s to rs a n d V o la tility

T ra d in g A c tiv ity o f F o re ig n In s titu tio n a l In v e s to rs a n d V o la tility T ra d in g A c tiv ity o f F o re ig n In s titu tio n a l In v e s to rs a n d V o la tility V. Ravi Ans human Indian Ins titute of Manag ement B ang alore Rajes h Chakrabarti Indian S chool of Bus ines

More information

Unit 16 : Software Development Standards O b jec t ive T o p r o v id e a gu ide on ho w t o ac h iev e so f t wa r e p r o cess improvement through the use of software and systems engineering standards.

More information

O s OAM Requirements for 40/100 GE Eth ernet AI S? Gary Nicholl C is co S ys t e m I E E E 8 0 2. 3 b a T as k F orce M arch 1 8, 2 0 0 8 rlan d o, F L 1 O O O O Background E t h e r n e t i s r a p i

More information

Internationalization strategy of the SEPT Program Design of market-oriented training and ed u c ation p rod u c ts Utz D o r n b e r g e r ( Un i v e r s i ty o f L e i p zi g ) & N g u y e n T h i T h

More information

MPLS VPN (RFC2547bis) Seminar P c h i u p c h i. i u p c h i @ c i s c c Umberto os mberto@ os t os o. om Umberto P os c h i 1 MPLS What i t I s N o t an d What I t I s MPLS IS NOT a mechanism that allows

More information

IntИg r a ti o n d e s s o l u ti o ns IB M e t C i s c o : C o l l a b o r a ti o n e t C o m m u ni c a ti o ns U ni f i Иe s ( U C 2 ) Mathieu in tr at Sales Business ev elop ent anag er om unic at

More information

G d y n i a U s ł u g a r e j e s t r a c j i i p o m i a r u c z a s u u c z e s t n i k ó w i m p r e z s p o r t o w y c h G d y s k i e g o O r o d k a S p o r t u i R e k r e a c j i w r o k u 2 0

More information

Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management

Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management The EU D a t a G r i d D a t a M a n a g em en t (EDG release 1.4.x) T h e Eu ro p ean Dat agri d P ro j ec t T eam http://www.e u - d a ta g r i d.o r g DataGrid is a p ro j e c t f u n de d b y th e

More information

Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage

Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage CAS Loss Reserve Seminar 23 Session 3 Private Passenger Automobile Insurance Frank Cacchione Carlos Ariza September 8, 23 Today

More information

COMTECH 2005 Dresden Ci sc o I P - Tel efo ni e i n der P ra x i s Dirk E b e rh a rd t I n t e rn e t w o rkin g C o n s u l t a n t 1 Aktuelle M a r ktz a h len Kundenzahl s t ei g t w ei t er an 28,000+

More information

Bewährte Six Sigma Tools in der Praxis

Bewährte Six Sigma Tools in der Praxis Frankfurt School of Finance & Management 2. ProcessLab-Workshop 03.2.2008, 8h Bewährte Six Sigma Tools in der Praxis A. Raab BB Certified GE Commercial Finance Agenda Intro Teaser Vortrag Break Out Sessions

More information

<?xml version="1.0" encoding="utf-8"?> <soapenv:envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"

<?xml version=1.0 encoding=utf-8?> <soapenv:envelope xmlns:soapenv=http://schemas.xmlsoap.org/soap/envelope/ Applicazioni Java W S con Ax is sistema di tr ac c iab il ità ag r o al imen tar e Ing. Mario G.C.A. Cimino M.G.C.A.Cimino, Applicazioni Java-W S con Ax is, D ipar t ime nt o d i I ng e g ne r ia d e ll

More information

Cisco Connected Real Estate Lead the Experience Can Habib Vertical Sales Manager C entral & E astern E u ro p e 1 yy Trends Shaping the Future of Buildings PP oo pp uu ll at io n GG rr oo ww tt hh Doubled

More information

Understanding, Modelling and Improving the Software Process. Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1

Understanding, Modelling and Improving the Software Process. Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1 Process Improvement Understanding, Modelling and Improving the Software Process Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1 Process improvement Understanding existing processes

More information

Emerging Security T h rea ts Maurizio Taffone m t affone@ c is c o. c om P rod uc t Manag er S ec urit y E urop ean Mark et s 1 Agenda Trends in Motivation E x ist ing t h rea t s a nd L e s s ons f r

More information

T c k D E GR EN S. R a p p o r t M o d u le Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r BJB 06 013-0009 0 M /V. ja a r.

T c k D E GR EN S. R a p p o r t M o d u le Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r BJB 06 013-0009 0 M /V. ja a r. D a t a b a n k m r in g R a p p o r t M Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r I d e n t if ic a t ie v a n d e m S e c t o r BJB V o lg n r. 06 013-0009 0 V o o r z ie n in g N ie u w la

More information

Overview of Spellings on www.spellzoo.co.uk

Overview of Spellings on www.spellzoo.co.uk Overview of Spellings on www.spellzoo.co.uk Year 1 Set 1: CVC words Set 2: CVC and CCVC words Set 3: CVC, CCVC and CCVCC words Set 4: Words containing 'ch', 'sh', 'th' and 'wh' Set 5: Words ending in 'll',

More information

CREATE SHAPE VISUALIZE

CREATE SHAPE VISUALIZE SHAPE VISUALIZE B I M E q u i t y BIM Workflow Guide SHAPE VISUALIZE Introduction We o e to t e r t ook i t e BIM Workflow erie I t e o owi ter we wi o er e eryt i eeded or you to ter t e i o re ti i d

More information

Cisco Security Agent (CSA) CSA je v í c eúčelo v ý s o f t w a r o v ý ná s t r o j, k t er ý lze p o už í t k v ynuc ení r ů zný c h b ezp ečno s t ní c h p o li t i k. CSA a na lyzuje c h o v á ní a

More information

CORSO AVANZATO DI NEGOZIAZIONE Un laboratorio intensivo per lo sviluppo e la pratic a d elle c apac ità neg oz iali Scotwork Italia S.r.l. C op y rig h t 2 0 0 6 1 O I m p l t l t z o l N o z n n l h l

More information

Software Quality Requirements and Evaluation, the ISO 25000 Series

Software Quality Requirements and Evaluation, the ISO 25000 Series Pittsburgh, PA 15213-3890 Software Quality Requirements and Evaluation, the ISO 25000 Series PSM Technical Working Group February 2004 Dave Zubrow Sponsored by the U.S. Department of Defense Background

More information

How to Subnet a Network How to use this paper Absolute Beginner: Read all Sections 1-4 N eed a q uick rev iew : Read Sections 2-4 J ust need a little h elp : Read Section 4 P a r t I : F o r t h e I P

More information

B I N G O B I N G O. Hf Cd Na Nb Lr. I Fl Fr Mo Si. Ho Bi Ce Eu Ac. Md Co P Pa Tc. Uut Rh K N. Sb At Md H. Bh Cm H Bi Es. Mo Uus Lu P F.

B I N G O B I N G O. Hf Cd Na Nb Lr. I Fl Fr Mo Si. Ho Bi Ce Eu Ac. Md Co P Pa Tc. Uut Rh K N. Sb At Md H. Bh Cm H Bi Es. Mo Uus Lu P F. Hf Cd Na Nb Lr Ho Bi Ce u Ac I Fl Fr Mo i Md Co P Pa Tc Uut Rh K N Dy Cl N Am b At Md H Y Bh Cm H Bi s Mo Uus Lu P F Cu Ar Ag Mg K Thomas Jefferson National Accelerator Facility - Office of cience ducation

More information

B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g S y s te m

B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g S y s te m Symposium on Public Transportation in Indian Cities with Special focus on Bus Rapid Transit (BRT) System New Delhi 20-21 Jan 2010 B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g

More information

Online Department Stores. What are we searching for?

Online Department Stores. What are we searching for? Online Department Stores What are we searching for? 2 3 CONTENTS Table of contents 02 Table of contents 03 Search 06 Fashion vs. footwear 04 A few key pieces 08 About SimilarWeb Stepping up the Competition

More information

Cisco Unified Com m u nica t ions M a na g er 6. 0 I S A M, E d u c N o N o b 2 7, 2 0 0 7 Christian Greve atio n rthw est vem er 2 0 0 7 C i s c o S y s t e m s, I n c. A l l r i g h t s r e s e r v e

More information

The SmartView Tracker

The SmartView Tracker CHAPTER 5 S m a r tv ie w T r a c k e r In This Chapter The Need for Tracking p ag e 8 9 The C heck P oint S olu tion for Tracking p ag e 9 0 Tracking C onsiderations p ag e 9 6 Tracking C onfigu ration

More information

d e f i n i c j i p o s t a w y, z w i z a n e j e s t t o m. i n. z t y m, i p o jі c i e t o

d e f i n i c j i p o s t a w y, z w i z a n e j e s t t o m. i n. z t y m, i p o jі c i e t o P o s t a w y s p o і e c z e t s t w a w o b e c o s у b n i e p e і n o s p r a w n y c h z e s z c z e g у l n y m u w z g lb d n i e n i e m o s у b z z e s p o і e m D o w n a T h e a t t i t uodf

More information

Bonn Declaration on Regional Cooperation in Quality Assurance in Higher Education Adopted on 20 June 2007 during the Conference Enhancing Quality Across Borders R egional Cooperation in Quality Assurance

More information

Cisco D a t a Ce n t e r N e t w or k A r ch it e ct u r e 1 What is Cisco Data Center? Cisco Systems Core Technologies A d v a nced Technologies Switching R o u ting D a ta C e nte r W ir e l e s s U

More information

CUSTOMER INFORMATION SECURITY AWARENESS TRAINING

CUSTOMER INFORMATION SECURITY AWARENESS TRAINING CUSTOMER INFORMATION SECURITY AWARENESS TRAINING IN T RO DUCT ION T h i s c o u r s e i s d e s i g n e d to p r o v i d e yo u w i t h t h e k n o w l e d g e to p r o t e c t y o u r p e r s o n a l

More information

R e t r o f i t o f t C i r u n i s g e C o n t r o l

R e t r o f i t o f t C i r u n i s g e C o n t r o l R e t r o f i t o f t C i r u n i s g e C o n t r o l VB Sprinter D e s c r i p t i o n T h i s r e t r o f i t c o n s i s t s o f i n s t a l l i n g a c r u i s e c o n t r o l s wi t c h k i t i n

More information

Opis przedmiotu zamówienia - zakres czynności Usługi sprzątania obiektów Gdyńskiego Centrum Sportu

Opis przedmiotu zamówienia - zakres czynności Usługi sprzątania obiektów Gdyńskiego Centrum Sportu O p i s p r z e d m i o t u z a m ó w i e n i a - z a k r e s c z y n n o c i f U s ł u i s p r z» t a n i a o b i e k t ó w G d y s k i e C eo n t r u m S p o r t us I S t a d i o n p i ł k a r s k i

More information

How To Be A Successful Thai

How To Be A Successful Thai D The Joint Master of Science eg ree C ou rse in V eterinary P u b l ic H eal th ( MScVPH), F U -C MU Dr. L e rt ra k S ri k i t j a k a rn R e g i o n a l C e n t re f o r V e t e ri n a ry P u b l i

More information

MS IN EARLY CHILDHOOD STUDIES

MS IN EARLY CHILDHOOD STUDIES MS IN EARLY CHILDHOOD STUDIES Child Development (CD) C D001 - T h eo r ies of C h i ld D eve l opm e nt Demo ns t rate a n understand i ng of theories and concepts o f ch ild deve lo pme nt. C D002 - K

More information

Heliophysics Integrated Observatory Coordinated Data Analysis Workshop

Heliophysics Integrated Observatory Coordinated Data Analysis Workshop Heliophysics Integrated Observatory Coordinated Data Analysis Workshop 24 th of October 2011 Trieste Architecture and Demonstrations http://www.helio-vo.eu Mapping the General Science Use Case to an Architecture

More information

OPENBARE ZITTING 1. U ni f o r m e a l g e m e ne p o l i t i e v e r o r d e ni ng e n p u nc t u e l e i m p l e m e nt a t i e GAS ( g e m e e nt e l i j k e a d m i ni s t r a t i e v e s a nc t i

More information

UFPA Brazil. d e R e d e s Ó p tic a s e s e u s Im p a c to s n o F u tu r o d a In te r n e t

UFPA Brazil. d e R e d e s Ó p tic a s e s e u s Im p a c to s n o F u tu r o d a In te r n e t A v a n ç o s n o P la n o d e C o n tr o le d e R e d e s Ó p tic a s e s e u s Im p a c to s n o F u tu r o d a In te r n e t A n to n io A b e lé m a b e le m @ u fp a.b r Agenda In tr o d u ç ã o C

More information

U S B Pay m e n t P r o c e s s i n g TM

U S B Pay m e n t P r o c e s s i n g TM U S B Pay m e n t P r o c e s s i n g T h a t s S m a r t P r o c e s s i n g TM USB was simple to enroll in. They had competitive rates and all the fees were listed clearly with no surprises. Everyone

More information

Tsukuba Recent Trends in Higher Education in Japan I. In t e r n a t i o n a l i z a t i o n o f J a p a n e s e U n i v e r s i t i e s II. C h a n g i n g U n i v e r s i t i e s i n J a p a n Hiroshi

More information

Thuraya XT-LITE Simple. Reliable. Affordable.

Thuraya XT-LITE Simple. Reliable. Affordable. Thuraya XT-LITE Simple. Reliable. Affordable. www.thuraya.com Follow us on /thurayatelecom Stayi n g c on n ec ted has n ever b een thi s eas y. In trodu c i n g T hu raya X T -LIT E, the wo r l d s be

More information

Middagserie Eschatologie Oosterparkkerk, Amsterdam, December 2007

Middagserie Eschatologie Oosterparkkerk, Amsterdam, December 2007 Amserdam m Middagserie Eschalgie Oserparkkerk, Amserdam, December 2007 Onderweg na a r rgen Serie kerkdiensen ver chriselijke ekm sverw a ching f escha lg ie A m s e r d a m D e c e m b e r 2 0 0 7 V r

More information

M Official Bologna S e m inar Joint d e gr e e s- A H allm ar k of t h e E u r op e an H igh e r E d u cat ion A r e a? R e s u l t s o f q u e s t i o n n a i r e s e n t t o B o l o g n a F o l l o w

More information

ASCENT TM Integrated Shipment Management

ASCENT TM Integrated Shipment Management ASCENT TM Integrated Shipment Management Software Solutions Production mail Shipping systems Copier systems Facsimile systems Mailing systems Management services Financial services Consulting Supplies

More information

Creating a best fit between Business Strategy and Web Services Capabilities using Problem Frames Modeling approach

Creating a best fit between Business Strategy and Web Services Capabilities using Problem Frames Modeling approach Creating a best fit between Business Strategy and Web Services Capabilities using Problem Frames Modeling approach Anju Jha 1, Karl Cox 2 & Keith T. Phalp 3 1 School of Computer Science and Engineering

More information

GlasCraft Air Motor Repair Kits

GlasCraft Air Motor Repair Kits Parts GlasCraft ir Motor Repair Kits 30393B ENG For replacing wear items used on GlasCraft air motors. For professional use only. Not for use in explosive atmospheres. Models M-325, M-500-02, GC2267, GC2273

More information