|
|
|
- Robert Norris
- 10 years ago
- Views:
Transcription
1 Securing a Mul t icas t N et w o rk Michael B ehr in g er < m b ehr in cis co. co m > E S N O G, 1 6 O ct , B ar celo n a SE C Cisco Systems, Inc. All rights reserved. Cisco P u b lic 1
2 Securing a Multicast Network A gend a Background / Introduction S e curing a M ul ticas t N e tw ork M V P N S e curity O v e rv ie w M ul ticas t and IP s e c 2
3 B ack gro und 3
4 M G eneral C om m ents M cas t op tim is ation dif f e re nt f rom unicas t Unicast: Optimise around topology cast: Optimise around applications M cas t attack s p e cif ics : H ard to attack end system ( receiv er driv en) B ut can create state, attack netw ork F ocus on state ( Unicast attack s also on b andw idth ) M cas t p acke ts : data p l ane * and* control p l ane C omplicates security 4
5 m M Z ones of T rust: SP C ore RP SDP o t h e r d o m a i n s SENDER DR P I M P I M DR I G M P M L D REC EI V ER m m Z one of trus t: D e f ine s trus te d and untrus te d ( not 1 00% reliab le def inition; ignores insider attack s) S im p l if ie s s e curity : S ecure b oundaries: M cast, I G M P/ M L D, M S D P Bas ic ide a: Bl ock e v e ry th ing e l s e ( e g P IM, if not ne e de d) 5
6 s m T h reats C onf ide ntial ity : e av e s drop p ing on m s tre am T raf f ic inte grity : m odif ication E.g.: control plane traf f ic, eg: PI M S e rv ice inte grity :, OS PF E.g.: unauth orised senders or receiv ers A v ail ab il ity V arious f orms of D os attack s, resource starv ation cas t G D O I (G E T V P N ) g en er al u lt icas t s ecu r it y 6
7 Securing a Mul t icas t N et w o rk 7
8 m M Securing a Multicast Network S e N e E l e m e S e e N e S e S s s R e e s s C l M P A s C curing a tw ork nt curing th tw ork nde r / ource is ue ce iv r is ue ontrol ing IG dm is ion ontrol RP SDP o t h e r d o m a i n s SENDER DR P I M P I M DR I G M P M L D REC EI V ER m m 8
9 m m M m Securing a Network E lem G ent e ne ral route r s e curity ph ysical security, strong passw ords, secure protocols, A A A, P rote cting th e control p l ane ra C L, C opp C ontrol l ing m cas t s tate ip multicast route-limit; no ip sap listen; SENDER ip multicast mrinf o-f ilter; ( note: permit/ deny counter intuitiv e) DR P I M RP P I M SDP DR I G M P M L D o t h e r d o m a i n s REC EI V ER 9
10 m m M m Securing th e Network SENDER DR P I M RP P I M SDP DR I G M P M L D o t h e r d o m a i n s REC EI V ER ip m ul ticas t group -range < s td-acl > ( onl y ip v 6 today ) glob al; limits * all* mcast operations, plus data plane. ip m ul ticas t b oundary interf ace; permit only groups you need; deny auto-r P; can deny ( *, G ip m s dp s a-l im it ) b y deny ip h ost any R ate limit source activ e messages inter-domain. 3 A P I M R I G M P ( /24) Local Network Control Block ll ou ters
11 m m M m Send er / Source I ssues U nicas t f e ature s, re com m e nde d: S ource address spoof ing prev ention: A C L s, A A A, ur PF. I nf rastructure A C L ( ia C L ) F il te ring p e rm itte d s rc m cas t group part of normal interf ace A C L SENDER DR P I M RP P I M SDP DR I G M P M L D o t h e r d o m a i n s REC EI V ER 11
12 m m M m R eceiv er I ssues: C ontrolling I G MP / ML D SENDER DR P I M RP P I M SDP DR I G M P M L D o t h e r d o m a i n s REC EI V ER W ith out IG M P /M L D, cannot re q ue s t s tre am s N o data plane security req uired in principle F ocus on I G M P/ M L D H os t doe s n t ne e d m cas t: Bl ock IG M P /M L D I Pv 4 : I G M P is an I Pv 4 protocol type ( I Pv 4 procotol 2 ) I Pv 6 : M L D is carried in I C M Pv 6 protocol type pack ets F il te r s p e cif ic IG M P ty p e s ( s e e ne x t s l ide ) C ontrol IG M P on s w itch : R outer G uard: def ine h ost port ex plicitely I G M P snooping ( enf orce a minimum v ersion of I G M P) 12
13 I G MP I nterf ace P acket F iltering ( d ata p lane)! N M v 1! N D V M R h! D w h ! I G M 3 1 4! M 1 5! M q h! I G M 1 / 2 / 3 q h! I G M 1 / ! I G M 2! I I G M h! ip access-list ex tended igmp-control deny igmp any any pim o PI deny igmp any any dv mrp o P pack ets deny igmp any any ost-q uery o not use ith redundant routers permit igmp any ost Pv memb ersh ip reports permit igmp any any trace responses permit igmp any any trace ueries permit igmp any ost-q uery Pv uer. permit igmp any ost-report Pv reports permit igmp any Pv leav e messages deny igmp any any mplicitly deny unicast P ere! permit ip any any Permit oth er pack ets interf ace eth ernet 0 ip access-group igmp-control in 13
14 I G MP F iltering ( control p lane) ip igm p acce s s -group < acl > / ip v 6 m l d acce s s -group I nterf ace command; def ines w h ich groups and sources can b e req uested b y th e receiv er. F or A S M / I G M Pv 1 / 2 : source is ignored F or S S M / I G M Pv 3 : source is f iltered as w ell 14
15 m m M m A d m ission C ontrol SENDER DR P I M RP P I M SDP DR I G M P M L D o t h e r d o m a i n s REC EI V ER G l ob al and p e r inte rf ace IG M P / M L D l im its : ip igmp limit < n> [ ex cept < ex t-acl> ] ipv 6 mld limit < n> [ ex cept < ex t-acl> ] P e r inte rf ace m route l im it: ip multicast limit [ rpf out connected ] < ex t-acl> < max > Bandw idth l im its : ip multicast limit cost < ex t-acl> < multiplier> 15
16 m m M m P I M Security SENDER DR P I M RP P I M SDP DR I G M P M L D o t h e r d o m a i n s REC EI V ER PI M can b e b lock ed at th e edge; only used internally. R ate limiting PI M register messages f rom D R to R P On R P: ip pim r e g is t e r -r a t e -l im it ip/ ipv 6 pim a c c e pt -r e g is t e r l is t < a c l > ( a c l l is t s s o u r c e s ) ( n o t e : c o n t r o l pl a n e f e a t u r e ; D o S v e c t o r ) I nterf ace b ased PI M neigh b or f iltering: ip pim n e ig h b o r f il t e r < a c l > A uto R P security ip pim r p-a n n o u n c e -f il t e r r p-l is t 1 g r o u p-l is t 2 o n M a ppin g A g e n t B S R control ( f ilter B S R messages on domain edge) ip pim b s r -b o r d e r 16
17 M-V P N Securit y 17
18 MP L S V P N: Z ones of T rust I nternet S erv ice Prov ider V PN C ustomer C ustomer PE P I nternet C E I nternet PE P C ustomer PE V PN C ustomer V PN V PN C ustomer C ustomer A s s um p tion: E ach z one is in its e l f s e cure P roce dure : e x am ine inte rf ace s b e tw e e n z one s! 18
19 Sep aration with MV P N: B etween V P Ns, and V P N and I nternet U nicas t traf f ic re m ains s e p arate, as in s tandard T h is includes unicast PI M pack ets: H andled per ( M ) V R F E v en spoof ed PI M w ill remain w ith in V PN ; control plane inf ormation h andled in M V PN contex t only. T raf f ic M ul ticas t addre s s e s A lso stays w ith in th e V PN E ach V PN may use th e same mc groups E ach V PN may use mc groups w h ich are used also on th e core ( f or I nternet mc f or ex ample) Sep arat io n f o r unicas t and m ul t icas t t raf f ic b et w een ( M) V P N s, and co re 19
20 O A d d ress P lanes: T rue Sep aration f or unicast and m ulticast! C E C E V P N 1 addre s s s p ace including mc addresses V P N 2 addre s s s p ace C E C E including mc addresses sev eral data planes control plane PE P core address space PE P E -C E in t e r f a c e s b e l o n g t o V P N. n l y a t t a c k po in t!! including mc addresses 20
21 I nterf ace P E -C E : MV P N Non-T h reats F or M V P N s p e cif ic traf f ic f l ow s : P IM b e tw e e n C E and P E ( control p l ane ) One MM VV PN controlling anoth er M V PN th rough f ak ed PI M messages M V PN and core mc interf erence M ul ticas t traf f ic ( data p l ane ) S ending / receiv ing data traf f ic ( mc) to / f rom anoth er M V PN or core I ntegrity b reach es cannot h appen due to contex t separation 21
22 I nterf ace P E -C E : MV P N P ossib le T h reats F or M V P N s p e cif ic traf f ic f l ow s : P IM b e tw e e n C E and P E ( control p l ane ) F looding w ith control messages DD os M ul ticas t traf f ic ( data p l ane ) F looding w ith data messages D os F l o o d ing m us t b e co nt ro l l ed o n co nt ro l p l ane and d at a p l ane 22
23 A ttacks against P E : F aked P I M p ackets (Hacker s Goal: Integrity Breach) A l l P IM m c p acke ts are l ink l ocal A ttack s must originate on th e same sub net ( or C E must b e compromised / f aulty) V arious attacks p os s ib l e F orged j oin/ prune, h ello, assert, B UT : A ll attack s h av e only local ef f ect ( th is V PN ) F ake d P IM unicas t p acke ts A lso remain w ith in th e contex t of th e V PN core PE mcast C E V PN N o int egrit y b reach o n o t h er ( M) V P N s o r MP L S co re p o s s ib l e (d u e to s ep arati on) B ut see nex t slide 23
24 A ttacks against P E : D os with P I M p ackets V arious D os attacks p os s ib l e F l ooding of p acke ts C PU ov erload on PE F l ooding of s tate memory ex h austion on PE core PE mcast C E V PN D o S A t t ack s can af f ect o t h er V P N s o r t h e co re! (s i nce th e P E h as s h ared CP U / m em ory ) But: T h is can b e s e cure d! S e e ne x t s e ction! 24
25 A ttacks against P E : D os with Multicast D ata T raf f ic H ow w oul d y ou f l ood w ith m cas t traf f ic? J ust send it? F rom many sources? H igh b andw idth? N o, mcast traf f ic is only sent if th ere are receiv ers Y ou w ould h av e to create b oth senders and receiv ers N ot easy C ounte rm e as s ure s : R ate-limit mcast traf f ic per router per interf ace I n M V PN : per M D T R E C O M M E N D E D! 25
26 Securing th e P E : B est P ractices A v oid R P on P E R e as on: h igh e r e x p os ure to D os agains t P E R P re ce iv e s j oin/p rune m e s s age s T h reat: A ttack er sending large v olume of ( *, G spoof ed addresses. C an only b e controlled at th e edge H ard to control R ate-limits??? R P re ce iv e s re gis te r / re gis te r-s top m T h reat: F ak e register messages ) j oin/ prunes w ith e s s age s S olution: F ilter ip pim accept-register, if D R s are k now n S olution: ip pim register-rate-limit on D R s ( if D R s are trusted) 26
27 Securing th e P E : B est P ractices A v oid src/ rec d irectly connected to P E R e as on: h igh e r e x p os ure to D os agains t P E A dditional p rotocol ne e de d ( IG M P ) A dditional ex posure H ard to secure IG M P p e r inte rf ace s tate l im it can s e cure th is IG M P A C L p e r group al l ow e d can b e v al id s e rv ice of f e ring P E as l as t h op not re com m e nde d 27
28 Securing P I M N e igh b or f il te rs ( onl y al l ow know n P IM ne igh b ors ) : ip pim neigh b or-f ilter R ecommended O n R P : F il te r on ( S, G ) ip pim accept-register R ecommended M route tab l e s iz e can b e l im ite d N e igh b or auth e ntication: PI M does not h av e M D 5 auth b uilt in R F C : may use I Psec A H S olution: G E T V PN 28
29 M Securing th e I nternet A ccess: MD T T ree G roup A d d ressing M P L S core runs : M D T s f or each M V PN ( at least one) E ach M D T uses one mcast group plus possib ly nativ e core mcast ( I nternet mc) Using potentially all mcast groups D e s ign R e com m e ndations : A v oid nativ e mcast on same core as M V PN!!! D T groups sh ould use priv ate mcast addresses, to av oid ov erlap w ith nativ e mcast G roups used b y M D T s must b e f iltered ingress f rom I nternet / peers 29
30 Multicast V P N Sum m ary E ach V P N can us e m ul ticas t inde p e nde ntl y S ource and group may ov erlap w ith oth er V PN D if f erent PI M modes can b e used V P N s re m ain f ul l y s e p arate d N o reach ab ility b etw een V PN s, unicast or multicast C annot spoof oth er V PN, unicast or multicast M P L S core re m ains s e cure N ot attack ab le f rom V PN s, unicast or multicast H ow ev er: D os of PE migh t af f ect oth er V PN s on th at PE, th is must b e secured specif ically C ore cannot b e spoof ed 30
31 Mul t icas t and I P s ec 31
32 G Multicast and I P sec G E T V P N / G D O I: roup S A to encrypt mcast streams U s ing G E T V P N / G D O I f or auth e ntication OS PF, PI M, etc S ee I E T F msec w ork ing group 32
33 G G G G G roup Security F unctions ey erv er alid ate Grou em ers anage ecu rity olicy reate Grou eys istrib te olicy eys K e y Se r v e r Ro u t i n g M e m b e r s R ou ting M em b er F orw ard ing R ep lication R ou ting r o u p M e m b e r r o u p M e m b e r Grou p M em b er E ncryp tion D ev ices R ou te Betw een S ecu re / U nsecu re R egions M u lticast P articip ation r o u p M e m b e r r o u p M e m b e r 33
34 R ef erences & F urth er R ead ing Ci s co M u lti cas t S ecu ri ty h t t p : / / w w w.c i s c o.c o m / e n / U S / p r o d u c t s / p s / p r o d u c t s _ i o s _ p r o t o c o l _ g r o u p _ h o m e.h t m l P I M -S M P rotocol S p eci f i cati on R F C , e x t e n s i v e s e c u r i t y s e c t i o n! I E T F M s ec W orki ng G rou p h t t p : / / w w w.i e t f.o r g / h t m l.c h a r t e r s / m s e c -c h a r t e r.h t m l h ttp : // ecu rem u lti cas t.org / M u lti cas t S ecu ri ty : A T ax onom y and S om e E f f i ci ent Cons tru cti ons, R an Canetti et al., h t t p : / / w w w.i e e e -i n f o c o m V ari ou s p ap ers on M.o r g / / p a p e r s / 05 d _ 03.p d f u lti cas t S ecu ri ty W P : T h e M u lti cas t S ecu ri ty T oolki t /ab out/security /intellig ence/multicast_toolk it.html M u lti cas t S ecu ri ty NW 2006 P res entati on /ps6552 /prod_presentation aecd df.pdf 34
ACE-1/onearm #show service-policy client-vips
M A C E E x a m Basic Load Balancing Using O ne A r m M ode w it h S ou r ce N A T on t h e C isco A p p licat ion C ont r ol E ngine Goal Configure b a s ic l oa d b a l a nc ing (L a y er 3 ) w h ere
H ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct
H ig h L e v e l O v e r v iew S te p h a n M a rt in S e n io r S y s te m A rc h i te ct OPEN XCHANGE Architecture Overview A ge nda D es ig n G o als A rc h i te ct u re O ve rv i ew S c a l a b ili
Device I n s t r u m en t a t io n E x a m p l es : I P S L A s & N et F l o w Presented by Emmanuel Tychon Techni cal M ark eti ng Eng i neer TU D resden, J anuary 1 7 th 2 0 0 7 1. C is co I O S I P
1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ).
PROCEDIMIENTO DE RECUPERACION Y COPIAS DE SEGURIDAD DEL CORTAFUEGOS LINUX P ar a p od e r re c u p e ra r nu e s t r o c o rt a f u e go s an t e un d es a s t r e ( r ot u r a d e l di s c o o d e l a
UNDERSTANDING FLOW PROCESSING WITHIN THE CISCO ACE M ODULE Application de liv e r y pr odu cts can distr ib u te tr af f ic to applications and w e b se r v ice s u sing v ar y ing le v e ls of application
IronPort Gateway Security Products The Leader in Communication Security Reiner Baumann IronPort Systems The Principles of Industry Leadership A n a l y s t L e a d e r s h i p R e c o g n i z e d a s t
3 k t h R e m e A c c e s s b t t t V T T c h t h p V T. Cl ic e ot rad io ut on nex o PN unnel yp e and oose e ap rop riat e PN unnel Int erfac e. 4.
C i s c o P r o f i l e C o n t a c t s & F e e d b a c k H e l p Cisc o SM B Sup p ort Assist ant Configure ASA/PIX as Easy VPN Server or Client H om e > W ork W it h M y Sec urit y D ev ic es > Cisc
First A S E M R e c to rs C o n f e re n c e : A sia E u ro p e H ig h e r E d u c a tio n L e a d e rsh ip D ia l o g u e Fre ie U n iv e rsitä t, B e rl in O c to b e r 2 7-2 9 2 0 0 8 G p A G e e a
G ri d m on i tori n g w i th N A G I O S (*) (*) Work in collaboration with P. Lo Re, G. S av a and G. T ortone WP3-I CHEP 2000, N F N 10.02.2000 M e e t i n g, N a p l e s, 29.1 1.20 0 2 R o b e r 1
O s OAM Requirements for 40/100 GE Eth ernet AI S? Gary Nicholl C is co S ys t e m I E E E 8 0 2. 3 b a T as k F orce M arch 1 8, 2 0 0 8 rlan d o, F L 1 O O O O Background E t h e r n e t i s r a p i
SIV for VoiceXM 3.0: a n g u a g e a n d A p p l ica t ion D es ig n C on s id era t ion s Ken Rehor C i s c o S y s t em s, I nc. [email protected] March 05, 2009 G VoiceXM Application Architecture PSTN
Positioning 40 and 100 GbE in data center inter-sw itch l ink ap p l ications and 40GbE PM D recom m endations Adam Carter, Cisco Al essan dro B arb ieri, Cisco 1 m Data Center inter-s w itc h l ink ap
PSTN. Gateway. Switch. Supervisor PC. Ethernet LAN. IPCC Express SERVER. CallManager. IP Phone. IP Phone. Cust- DB
M IPCC EXPRESS Product Solution (IPCC - IP Co n t a c t Ce n t e r ) E i n f ü h r u n g Ü b e r h u nd e r t M il l io ne n N u t ze r - P r o g no s e n zu f o l g e w e r d e n e s in d ie s e m J ah
SCHOOL PESTICIDE SAFETY AN D IN TEG R ATED PEST M AN AG EM EN T Statutes put into law by the Louisiana Department of Agriculture & Forestry to ensure the safety and well-being of children and school personnel
AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981. P. A. V a le s, Ph.D.
AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981 P. A. V a le s, Ph.D. SYNOPSIS Two in d ep en d en t tre a tm e n t g ro u p s, p a r t ic ip
Collaboration in Public H e alth be tw e e n U niv e rs ity of H e id e lbe rg and U niv e rs ity of D ar e s S alaam How t h e c oop e r a t i on e m e r g e d Informal c ont ac t s from e arly 1 9
The Business Case for D om aink ey s I d ent ified M ail Andy Spillane V ic e P r es ident, Y ah o o! M February 13, 2006 ail 1 Fighting Spam & Email Abuse R eq uir es a M ulti-fac eted Appr o ac h DomainKeys
Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management
The EU D a t a G r i d D a t a M a n a g em en t (EDG release 1.4.x) T h e Eu ro p ean Dat agri d P ro j ec t T eam http://www.e u - d a ta g r i d.o r g DataGrid is a p ro j e c t f u n de d b y th e
M Mobile Based Clinical Decision Support System Bhudeb Chakravarti & Dr. Suman Bhusan Bhattacharyya Provider & Public Health Group, VBU-HL P S aty am C om puter S ervices L im ited Bhudeb_ C hak ravarti@
M P L S /V P N S e c u rity. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.
M P L S /V P N S e c u rity M ic h a e l B e h rin g e r < m b e h rin g @ c is c o.c o m > M b e h rin g - M P L S S e c u rity 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. 1 W h
Application Note: Cisco A S A - Ce r t if ica t e T o S S L V P N Con n e ct ion P r of il e Overview: T h i s a p p l i ca ti o n n o te e x p l a i n s h o w to co n f i g u r e th e A S A to a cco m
EM EA. D is trib u te d D e n ia l O f S e rv ic e
EM EA S e c u rity D e p lo y m e n t F o ru m D e n ia l o f S e rv ic e U p d a te P e te r P ro v a rt C o n s u ltin g S E p p ro v a rt@ c is c o.c o m 1 A g e n d a T h re a t U p d a te IO S Es
Campus Sustainability Assessment and Related Literature
Campus Sustainability Assessment and Related Literature An Annotated Bibliography and Resource Guide Andrew Nixon February 2002 Campus Sustainability Assessment Review Project Telephone: (616) 387-5626
SCO TT G LEA SO N D EM O Z G EB R E-
SCO TT G LEA SO N D EM O Z G EB R E- EG Z IA B H ER e d it o r s N ) LICA TIO N S A N D M ETH O D S t DVD N CLUDED C o n t e n Ls Pr e fa c e x v G l o b a l N a v i g a t i o n Sa t e llit e S y s t e
Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management
The EU D a t a G r i d I n f o r m a t i o n a n d M o n i t o r i n g S er v i c es The European D at ag ri d P roj ec t Team http://www.eu- d a ta g r i d.o r g DataGrid is a p ro j e c t f u n de d
W Regional Cooperation in the Field of A u tom otiv e E ngineering in S ty ria Dr. Peter Riedler 2 9.1 1.2 0 1 1 i e n GmbH Graz B u s ines s S trategy S ty ria 2 0 2 0 H is tory 1 9 9 4 1 9 9 5 1 9 9
Unit 16 : Software Development Standards O b jec t ive T o p r o v id e a gu ide on ho w t o ac h iev e so f t wa r e p r o cess improvement through the use of software and systems engineering standards.
i n g S e c u r it y 3 1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his å ] í d : L : g u id e Scanned by CamScanner
í d : r ' " B o m m 1 E x p e r i e n c e L : i i n g S e c u r it y. 1-1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his g u id e å ] - ew i c h P e t e r M u la e n PACKT ' TAÞ$Æo
Bonn Declaration on Regional Cooperation in Quality Assurance in Higher Education Adopted on 20 June 2007 during the Conference Enhancing Quality Across Borders R egional Cooperation in Quality Assurance
Video og IP TV - h v or da n p هv ir k es n et t v er k en e? t t a d A c c o u n t M a n a g S P / T o m S m t Ole-P et er R s er elec eg en 1 Hva gjorde vi u t en T V.... 2 2 0 0 m il l s am t idige
Objectivity Data Migration after C5 presentation, 18 th O c t 2 0 0 2 Marcin Nowak, C E R N D at ab as e G rou p, h t t p : / / ce rn.ch / d b Overview Objectivity/DB cu r r en t u s a g e Da ta th a t
Data Center end users for 40G/100G and market dy nami c s for 40G/100G on S M F Adam Carter Ci s c o 1 W Now that 40GbE is part of the IEEE 802.3ba there will be a wid er array of applic ation s that will
Service Provider IPv6 Deployment Igor Giangrossi [email protected] 2 0 0 8 C i s c o S y s t e m s, I n c. A l l r i g h t s r e s e r v e d. C i s c o P u b l i c 1 Prerequisites: Session Abstract
W h a t is m e tro e th e rn e t
110 tv c h a n n e ls to 10 0 0 0 0 u s e rs U lf V in n e ra s C is c o S y s te m s 2 0 0 2, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. 1 W h a t is m e tro e th e rn e t O b je c tiv
W Cisco Kompetanse eek end 2 0 0 8 SMB = Store Mu ll ii gg hh eter! Nina Gullerud ng ulleru@ c is c o. c o m 1 Vår E n t e r p r i s e e r f a r i n g... 2 S m å o g M e llo m s t o r e B e d r i f t e
A n d r e w S P o m e r a n tz, M D
T e le h e a lth in V A : B r in g in g h e a lth c a r e to th e u n d e r s e r v e d in c lin ic a n d h o m e A n d r e w S P o m e r a n tz, M D N a tio n a l M e n ta l H e a lth D ir e c to r f
Ontwikkelingen van R o u ter N etwer ken Fred Rabouw 1 3-t i e r R o u t e r N e t w e r k e n. Core: forwarden van grote h oeveel h eden data. D i s tri b u ti e: Cl as s i fi c eren en fi l teren A c
S y ste m s. T h e D atabase. D atabase m anagem e n t sy ste m
1 C h apte r 1 1 A D atabase M anagem e n t S y ste m s 1 D atabase M anagem e n t S y ste m s D atabase m anagem e n t sy ste m (D B M S ) S to re larg e co lle ctio n s o f d ata O rg anize th e d ata
Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage
Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage CAS Loss Reserve Seminar 23 Session 3 Private Passenger Automobile Insurance Frank Cacchione Carlos Ariza September 8, 23 Today
B a rn e y W a r f. U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8
U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8 T e le c o m m u n ic a t io n s a n d th e C h a n g in g G e o g r a p h ie s o f K n o w le d g e T r a n s m is s io n in th e L a te
e Videobewaking ov er I P Marty K n o p e rt 1 A l l m z u l l b t g r u m a k h w k h w k z a l z r E p r m a r k t t c m a r k t Video vision: e vor en va n video en in de na ij e oek om st eb ik en
CS254 Network Technologies
CS254 Network Technologies Lecture 9: Peer-to-Peer Networks I James Salter Department of Computing University of Surrey Autumn 2006 What is P 2 P C o m p u tin g? Everybody seems to have a different idea
IntИg r a ti o n d e s s o l u ti o ns IB M e t C i s c o : C o l l a b o r a ti o n e t C o m m u ni c a ti o ns U ni f i Иe s ( U C 2 ) Mathieu in tr at Sales Business ev elop ent anag er om unic at
Tsukuba Recent Trends in Higher Education in Japan I. In t e r n a t i o n a l i z a t i o n o f J a p a n e s e U n i v e r s i t i e s II. C h a n g i n g U n i v e r s i t i e s i n J a p a n Hiroshi
m Future of learning Zehn J a hr e N et A c a d ei n E r f o l g s p r o g r a m Cisco E x p o 2 0 0 7 2 6. J u n i 2 0 0 7, M e sse W ie n C. D or n in g e r, b m u k k 1/ 12 P r e n t t z d e r p u t
proxy cert request dn, cert, Pkey, VOMS cred. (short lifetime) certificate: dn, ca, Pkey mod_ssl pre-process: parameters->
Overview of the New S ec u rity M od el WP6 Meeting V I D t G R I D C o nf er enc e B r c el o ne, 1 2-1 5 M y 2 0 0 3 Overview focus is on VOMS C A d e t il s r e in D 7. 6 Se cur it y D e sig n proxy
Internationalization strategy of the SEPT Program Design of market-oriented training and ed u c ation p rod u c ts Utz D o r n b e r g e r ( Un i v e r s i ty o f L e i p zi g ) & N g u y e n T h i T h
I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y
I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y and KB rl iak s iol mi a, hme t a ro cp hm a5 a 2k p0r0o 9f i,e ls hv oa nr t ds eu rmv oedye l o nf dae cr
CUSTOMER INFORMATION SECURITY AWARENESS TRAINING
CUSTOMER INFORMATION SECURITY AWARENESS TRAINING IN T RO DUCT ION T h i s c o u r s e i s d e s i g n e d to p r o v i d e yo u w i t h t h e k n o w l e d g e to p r o t e c t y o u r p e r s o n a l
M Fast forward into th e fu tu re Accelerating b u s ines s o p p o rtu nity and natio nal p ro s p erity Viktor Kovacs anaging D irecto r H u ngary & Ad riatic R egio n C h a n g e t h e w o r l d» O
FORT WAYNE COMMUNITY SCHOOLS 12 00 SOUTH CLINTON STREET FORT WAYNE, IN 468 02 6:02 p.m. Ma r c h 2 3, 2 015 OFFICIAL P ROCEED ING S Ro l l Ca l l e a r d o f h o o l u e e o f t h e r t y m m u t y h o
Stratesave 6.0 The comfortably organized backup solution for your PCs U ser M an u al Stratesave Systems GmbH Copyright 1996-2010, Strate s av e Sys te m s G m bh, al l rights re s e rv e d. A l l trad
CIS CO S Y S T E M S. G u ille rm o A g u irre, Cis c o Ch ile. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.
CIS CO S Y S T E M S A c c e s s T e c h n o lo g y T e le c o m /IT Co n n e c tiv ity W o rk s h o p G u ille rm o A g u irre, Cis c o Ch ile g m o.a g u irre @ c is c o.c o m S e s s io n N u m b e
Understanding, Modelling and Improving the Software Process. Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1
Process Improvement Understanding, Modelling and Improving the Software Process Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1 Process improvement Understanding existing processes
Enterprise Data Center A c h itec tu re Consorzio Operativo Gruppo MPS Case S t u d y : P r o g et t o D i sast er R ec o v er y Milano, 7 Febbraio 2006 1 Il G r u p p o M P S L a B a n c a M o n t e d
Put the human back in Human Resources.
Put the human back in Human Resources A Co m p l et e Hu m a n Ca p i t a l Ma n a g em en t So l u t i o n t h a t em p o w er s HR p r o f essi o n a l s t o m eet t h ei r co r p o r a t e o b j ect
How to Subnet a Network How to use this paper Absolute Beginner: Read all Sections 1-4 N eed a q uick rev iew : Read Sections 2-4 J ust need a little h elp : Read Section 4 P a r t I : F o r t h e I P
B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g S y s te m
Symposium on Public Transportation in Indian Cities with Special focus on Bus Rapid Transit (BRT) System New Delhi 20-21 Jan 2010 B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g
Bewährte Six Sigma Tools in der Praxis
Frankfurt School of Finance & Management 2. ProcessLab-Workshop 03.2.2008, 8h Bewährte Six Sigma Tools in der Praxis A. Raab BB Certified GE Commercial Finance Agenda Intro Teaser Vortrag Break Out Sessions
C o a t i a n P u b l i c D e b tm a n a g e m e n t a n d C h a l l e n g e s o f M a k e t D e v e l o p m e n t Z a g e bo 8 t h A p i l 2 0 1 1 h t t pdd w w wp i j fp h D p u b l i c2 d e b td S t
Software Quality Requirements and Evaluation, the ISO 25000 Series
Pittsburgh, PA 15213-3890 Software Quality Requirements and Evaluation, the ISO 25000 Series PSM Technical Working Group February 2004 Dave Zubrow Sponsored by the U.S. Department of Defense Background
w ith In fla m m a to r y B o w e l D ise a se. G a s tro in te s tin a l C lin ic, 2-8 -2, K a s h iw a z a, A g e o C ity, S a ita m a 3 6 2 -
E ffic a c y o f S e le c tiv e M y e lo id L in e a g e L e u c o c y te D e p le tio n in P y o d e r m a G a n g re n o su m a n d P so r ia sis A sso c ia te d w ith In fla m m a to r y B o w e l D
Farmers attitudes toward and evaluation and use of insurance for income protection on Montana wheat farms by Gordon E Rodewald
Farmers attitudes toward and evaluation and use of insurance for income protection on Montana wheat farms by Gordon E Rodewald A THESIS Submitted to the Graduate Faculty in partial fulfillment of the requirements
PRIMER TESTIMONIO. -F o l i o n ú m e r o 1 2 0. ḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋ ESC RITU RA NU MERO TREINTA.- E n l a c i u d a d d e B u e n os A i r e s, c a p i t a l d e l a R e p ú b l i c
Public Health is Like..
Public Health is Like.. A box of chocolates. you never know what your gonna get, Forrest Gump. So... Build the evidence-base for public health practice Building the Evidence- Base Science is contributing
B A R M A G - F R I C T I O N U N I T
B A R M A G - F R I C T I O N U N I T F R I C T I O N U N I T T P _ 8 MT - B A R - 1 1 0 1 F R I C T I O N U N I T T P _ 7 MT - B A R - 1 1 0 2 TYP E 7 F R I C T I O N G ж V DE MT - B A R - 1 1 0 2 A TYP
G d y n i a U s ł u g a r e j e s t r a c j i i p o m i a r u c z a s u u c z e s t n i k ó w i m p r e z s p o r t o w y c h G d y s k i e g o O r o d k a S p o r t u i R e k r e a c j i w r o k u 2 0
The SmartView Tracker
CHAPTER 5 S m a r tv ie w T r a c k e r In This Chapter The Need for Tracking p ag e 8 9 The C heck P oint S olu tion for Tracking p ag e 9 0 Tracking C onsiderations p ag e 9 6 Tracking C onfigu ration
http://www.springer.com/3-540-24371-2
http://www.springer.com/3-540-24371-2 3 F o u n d a t i o n s T h i s c h ap t e r l ay s d o w n t h e f u n d am e n t al i d e as an d c h o i c e s o n w h i c h o u r ap p r o ac h i s b as e d. F
<?xml version="1.0" encoding="utf-8"?> <soapenv:envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"
Applicazioni Java W S con Ax is sistema di tr ac c iab il ità ag r o al imen tar e Ing. Mario G.C.A. Cimino M.G.C.A.Cimino, Applicazioni Java-W S con Ax is, D ipar t ime nt o d i I ng e g ne r ia d e ll
How To Be A Successful Thai
D The Joint Master of Science eg ree C ou rse in V eterinary P u b l ic H eal th ( MScVPH), F U -C MU Dr. L e rt ra k S ri k i t j a k a rn R e g i o n a l C e n t re f o r V e t e ri n a ry P u b l i
M UNICAST VIDEO WITHOUT BREAKING THE BANK: ECONOMICS, STRATEGIES, AND ARCHITECTURE S.V. Vasudevan, Xiaomei Liu, and Robert Kidd C isco Abstract D ri v e n by co m p e ti ti o n an d co n su m e r d e m
GTER24 I n t r o d u c t i o n t o I P v 6 Igor Giangrossi [email protected] B R K R S T -1 3 0 0 1 3 7 4 5 _ 0 5 _ 2 0 0 7 _ c 2 2 0 0 7 C i s c o S y s t e m s, I n c. A l l r i g h t s r e s
PRESENTATION FOR SWERN
PRESENTATION FOR SWERN C lick to editm astersubtitle style Michael Queenan HISTORY Established, Growing Company Privately held Management team have history of successfully growing a company Over 50% of
Online Department Stores. What are we searching for?
Online Department Stores What are we searching for? 2 3 CONTENTS Table of contents 02 Table of contents 03 Search 06 Fashion vs. footwear 04 A few key pieces 08 About SimilarWeb Stepping up the Competition
BMC ITSM Suite - nabité skúsenosťami. Juraj Izák, 13.10.2011
BMC ITSM Suite - nabité skúsenosťami Juraj Izák, 13.10.2011 MATERNA GmbH 2011 www.materna.com 1 Presenter Name Function E-mail Telephone Fax Mobile Ing. Juraj Izák Senior Consultant [email protected]
Data Center N etw o rk i ng A rc h i tec tu re and Des i g n G u i d el i nes 1 Agenda Data Center Infrastructure Co re l ay er d esi g n A g g reg ati o n l ay er d esi g n A ccess l ay er d esi g n Densi
1. Oblast rozvoj spolků a SU UK 1.1. Zvyšování kvalifikace Školení Zapojení do projektů Poradenství 1.2. Financování 1.2.1.
1. O b l a s t r o z v o j s p o l k a S U U K 1. 1. Z v y š o v á n í k v a l i f i k a c e Š k o l e n í o S t u d e n t s k á u n i e U n i v e r z i t y K a r l o v y ( d á l e j e n S U U K ) z í
HR DEPARTMENTAL SUFFIX & ORGANIZATION CODES
HR DEPARTMENTAL SUFFIX & ORGANIZATION CODES Department Suffix Organization Academic Affairs and Dean of Faculty, VP AA 1100 Admissions (Undergraduate) AD 1330 Advanced Ceramics, Colorado Center for--ccac
Cisco Self-D efen d in g N et w Adaptive Threat Defense or k Latest Product Announcements 1 N ew Secu r it y Ch a llen g es E d g e F i r e w a l l i n g I n t r u s i o n & W o r m M i t i g a t i o n
R e t r o f i t o f t C i r u n i s g e C o n t r o l
R e t r o f i t o f t C i r u n i s g e C o n t r o l VB Sprinter D e s c r i p t i o n T h i s r e t r o f i t c o n s i s t s o f i n s t a l l i n g a c r u i s e c o n t r o l s wi t c h k i t i n
U S B Pay m e n t P r o c e s s i n g TM
U S B Pay m e n t P r o c e s s i n g T h a t s S m a r t P r o c e s s i n g TM USB was simple to enroll in. They had competitive rates and all the fees were listed clearly with no surprises. Everyone
Cisco Security Agent (CSA) CSA je v í c eúčelo v ý s o f t w a r o v ý ná s t r o j, k t er ý lze p o už í t k v ynuc ení r ů zný c h b ezp ečno s t ní c h p o li t i k. CSA a na lyzuje c h o v á ní a
Üb e r s e t z u n g d e r N e t A c a d C u r r i c u l a Carsten Johnson c arsj ohn@ c i sc o. c om 1 NetAcad C u r r i cu l a i m Üb er s etz u n g s p r o z es s W w d s u w W S v W k h m h I T E s
OPENBARE ZITTING 1. U ni f o r m e a l g e m e ne p o l i t i e v e r o r d e ni ng e n p u nc t u e l e i m p l e m e nt a t i e GAS ( g e m e e nt e l i j k e a d m i ni s t r a t i e v e s a nc t i
III Bienal de Autismo Página 1 / 43
III Bienal de Autismo Página 1 / 43 A Direcção da APPDA N ort e dá -v os as B oas V in das à I I I B ien al de Au t is m q u e es t a corres p on da à s v os s as ex p ect at iv as com o t em a em deb
d e f i n i c j i p o s t a w y, z w i z a n e j e s t t o m. i n. z t y m, i p o jі c i e t o
P o s t a w y s p o і e c z e t s t w a w o b e c o s у b n i e p e і n o s p r a w n y c h z e s z c z e g у l n y m u w z g lb d n i e n i e m o s у b z z e s p o і e m D o w n a T h e a t t i t uodf
Scope and Seqence C C N A D i s cov er y v 4. 0 I R S E S p p m E 2 0 0 w w h l l q j P l m H l B l m B E H l B h l l C l m H l B l m B h ( E l w l l w l The corse objectives and otline o the inal two
MS IN EARLY CHILDHOOD STUDIES
MS IN EARLY CHILDHOOD STUDIES Child Development (CD) C D001 - T h eo r ies of C h i ld D eve l opm e nt Demo ns t rate a n understand i ng of theories and concepts o f ch ild deve lo pme nt. C D002 - K
Third Party Risks. Mick Atteberry Nebraska CERT Conference August 2006. August 2006 1
Third Party Risks Mick Atteberry Nebraska CERT Conference August 2006 August 2006 1 Disclaimer Views expressed in this presentation are those of my own and do not reflect those of my employer. Examples
T c k D E GR EN S. R a p p o r t M o d u le Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r BJB 06 013-0009 0 M /V. ja a r.
D a t a b a n k m r in g R a p p o r t M Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r I d e n t if ic a t ie v a n d e m S e c t o r BJB V o lg n r. 06 013-0009 0 V o o r z ie n in g N ie u w la
Victims Compensation Claim Status of All Pending Claims and Claims Decided Within the Last Three Years
Claim#:021914-174 Initials: J.T. Last4SSN: 6996 DOB: 5/3/1970 Crime Date: 4/30/2013 Status: Claim is currently under review. Decision expected within 7 days Claim#:041715-334 Initials: M.S. Last4SSN: 2957
Thuraya XT-LITE Simple. Reliable. Affordable.
Thuraya XT-LITE Simple. Reliable. Affordable. www.thuraya.com Follow us on /thurayatelecom Stayi n g c on n ec ted has n ever b een thi s eas y. In trodu c i n g T hu raya X T -LIT E, the wo r l d s be
Practice Writing the Letter A
Aa Practice Writing the Letter A A a A a Write a in the blank to finish each word. c t re h d Write A in the blank to finish each word. nn US ndy Bb Practice Writing the Letter B B b B l P b Write b in
