PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS WITH CISCO SELF-DEFENDING NETWORKS
|
|
|
- Ophelia Fitzgerald
- 10 years ago
- Views:
Transcription
1 WHITE PAPER PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS WITH CISCO SELF-DEFENDING NETWORKS Today s large, sophisticated distributed denial of service (DDoS) attacks target organizations of all sizes. How can you protect your organization from these debilitating attacks both now and in the future? SUMMARY The increase in Internet-based transactions and communications offers new opportunities for hackers to disrupt business operations with DDoS attacks. Organizations that are not adequately protected risk losing customers, revenue, and their good reputations. This white paper discusses the challenges of identifying, countering, and avoiding crippling DDoS attacks. With the comprehensive Cisco Self-Defending Network, organizations can deploy layers of defense to detect and mitigate the effects of DDoS attacks. THE SECURITY LANDSCAPE The convenience, efficiency, and global reach of e-business benefit both consumers and businesses. But the accessibility of today s business operations brings increased security challenges. Legions of malicious hackers target e-commerce sites, online banks, partner networks, and Internet or servers seeking revenge or profit. The problem is serious countering Internet crime is the U.S. FBI s third-highest priority, behind only countering terrorism and espionage. Network security is a fairly new discipline. As a result, finding qualified security professionals and justifying additional security spending is challenging. Network and IT spending is often justified on return on investment (ROI), whereas network security has been traditionally viewed as a cost center. This perception is changing as well-publicized outages caused by security breaches demonstrate that comprehensive network security actually saves money for organizations. DDOS PREVENTION CHALLENGES A DDoS attack quickly overwhelms a company s server, router, firewall or network link with traffic; if successful, the attack floods the network or its resources so completely that legitimate traffic cannot be processed, and the company cannot function. The results are disastrous frustrated customers place orders elsewhere, service-level agreements are violated, and corporate reputations are damaged. Meanwhile, all IT and security resources focus on responding to the attack. Unfortunately, their efforts are usually too late and only partially effective. A security strategy must instantly identify and respond to DDoS threats, while maintaining the availability of critical network resources for customers, partners, and employees. DDoS attacks are the second-most costly security incident overall for organizations.* Estimates predict the cost of a 24-hour outage for a large e- commerce company would approach US$30 million. Smaller organizations are not immune, however, with 12 percent reporting a DDoS attack in the previous 12 months.** Gartner predicts that half of all Internet-connected businesses will feel the impact of a DDoS attack in the next two years.*** * Source: CSI/FBI Computer Crime and Security Survey, 2004 ** Source: Yankee Group, Small and Medium Business Infrastructure Survey, December 2004 *** Source: Gartner, December 2004 All contents are Copyright All rights reserved. Important Notices and Privacy Statement. Page 1 of 5
2 Identifying and responding effectively to DDoS attacks is becoming increasingly challenging. In the past, filtering specific source addresses was enough to stop basic DoS attacks. Today s DDoS attacks distributed by definition often use tens to hundreds of thousands of sources, courtesy of broadband-connected computers that have been infiltrated by hackers and turned into zombies. Zombie traffic resembles legitimate user traffic; separating them can be extremely difficult, and often requires large computing resources. Originally, hackers generated DDoS attacks for mischief or revenge. Today, professionals motivated by profit launch sophisticated DDoS attacks the deadlier the attack, the higher the gain. Some hackers target large financial institutions or e-commerce sites for extortion, threatening to launch attacks unless their payment demands are met. Others hire themselves out to organizations seeking to bring down a competitor s e-business operations, or launch DDoS attacks to manipulate a company s stock price. These attacks are often timed to produce the maximum negative impact for an organization, such as at the start of a holiday shopping season, or before a major corporate launch. Sometimes, a DDoS attack is part of another security threat. For example, hackers successfully use DDoS attacks as a diversion while they steal information, such as credit card numbers. The flood of DDoS traffic successfully masks suspicious network activity, diverts security resources, and shuts down security monitoring devices that might otherwise detect and prevent the intrusion. To prevent DDoS attacks from crippling business operations, organizations must detect and mitigate DDoS attacks automatically; ensure the business can continue to process legitimate traffic while under attack; and create a scalable, adaptable solution that addresses DDoS attacks now and in the future. Organizations also have a responsibility to protect network endpoints (desktops, servers, and laptops, for example) from becoming zombies that could launch outbound DDoS attacks and use critical network resources. Achieving these goals requires a global systems-based view of network security, where every device connected to the network plays a role in securing the network against unwanted intrusions. THE CISCO SELF-DEFENDING NETWORK Today s DDoS attacks are swift and sophisticated. Security systems must react quickly and automatically to detect and mitigate these attacks before the network and its resources become flooded. A security system must be fully integrated into the network from end to end, so it can facilitate a coordinated response to attacks, regardless of location. It must be intelligent, so that it can differentiate potential threats from normal traffic and events. And it must be able to adapt to changing network security conditions. The Cisco Self-Defending Network is Cisco Systems strategy for network security. By identifying, preventing, and then adapting to both internal and external threats, The Cisco Self-Defending Network allows businesses to maximize their network resources and protect not just their networks, but also their network investments. The results are improved business processes and substantial savings. The Self-Defending Network contains three characteristics that together provide continuous, intelligent, future-proofed security from the network to the application layer: Integrated. Security defense technology is incorporated across all network elements, including routing, switching, wireless, and security platforms, so that every point in the network can defend itself. These security features include firewalling, virtual private networking, and trust/identity capabilities. Collaborative. These secure network components work together as a security system that adheres and responds to an organization s security policies. An example of the Collaborative characteristic is Network Admission Control (NAC), a multi-vendor effort only admits endpoints to the network once they have demonstrated their compatibility with various network security policies. Adaptive. The Self-Defending Network uses several tools to defend against new security threats and changing network conditions. Application awareness defends against security threats entering the network from within Internet-enabled applications. Behavioral recognition defends against worms, viruses, spyware, DDoS attacks, and other threats. Network control intelligently monitors and manages the security infrastructure and provides tools for IT managers to audit, control, and correlate security network episodes All rights reserved. Important notices, privacy statements, and trademarks of can be found on cisco.com. Page 2 of 5
3 A LAYERED DEFENSE AGAINST DDOS ATTACKS DDoS attacks can target many points in an organization s network. Servers (e-commerce, Web, or , for example) are often the targets of DDoS attacks. These servers are physically located in an organization s data center but logically connected to the Internet. Critical network components, such as firewalls or routers, are other common targets. Hackers can also seek to overwhelm the Internet connection between an organization and the rest of the world, cutting off all access to the organization s critical data centers. An organization may also be indirectly affected by a DDoS attack if its endpoints have been turned into zombies. With so many types of attacks, a multilayered approach to defending and securing an organization is required. A Cisco Self-Defending Network incorporates multiple layers of DDoS defense. A Proactive Defense A cost-effective, first-level step to avoiding or minimizing the effects of DDoS attacks is to take advantage of Cisco integrated security features in an existing network infrastructure. Cisco incorporates software capabilities into all routers, switches, and firewalls that protect these network devices from becoming overwhelmed during DDoS attacks, so they can continue to forward legitimate traffic. The Cisco IOS Software feature set with the advanced security option and the Cisco Catalyst integrated security software option protect the router or switch processor, control plane, forwarding tables or interfaces from being flooded in a DDoS attack. The integrated security functions that protect Cisco IOS routers and Cisco Catalyst switches use numerous mechanisms to drop or throttle insecure traffic if the network, or the router or switch itself, is under attack. Security managers can place restrictions on the types of traffic that can address the router or switch directly, helping to ensure that the processor is not overloaded by false requests. However, large-scale DDoS attacks that saturate any device or link capacity, or that result in any defensive throttling action, compromise availability for legitimate users and transactions. If network components are protected from failure but unavailable for legitimate transactions, the DDoS attack has succeeded. Detect and Contain All DDoS Attacks Once a DDoS attack is detected, automatic protection should start containing or minimizing the impact of the attack. Cisco integrated security features in switches, routers, and standalone appliances play a role in DDoS detection and containment. Network performance data from routers can be analyzed to detect DDoS attacks. Firewalls can be configured to weed out many types of protocols associated with less sophisticated DDoS attacks. But firewalls, intrusion prevention systems (IPSs), and integrated router and switch security are not enough to contain large-scale, sophisticated DDoS attacks. Most DDoS attacks generate huge volumes of traffic using cleverly spoofed packets or valid source addresses from large numbers of zombies. This traffic mimics valid transactions and often does not contain abnormal or malicious code, so it will pass through conventional filtering systems in routers, switches, and appliances. These attacks can quickly reach an organization s resources and overwhelm them. Cisco has an industry-leading, adaptive solution that helps ensure business continuity by detecting and automatically defending against all types of DDoS attacks. The Cisco Traffic Anomaly Detector XT 5600 and the Cisco Guard XT 5650 DDoS Mitigation Appliance are intelligent elements of Cisco s Self-Defending Network solution. The detector and guard are available as either standalone appliances or as integrated services modules for Cisco Catalyst 6500 Series switches and Cisco 7600 Series routers. The detector learns what normal traffic looks like, and uses this information to identify abnormal patterns of traffic. Once it recognizes a traffic anomaly destined for a particular server or piece of network infrastructure, it diverts all traffic headed to that destination not just suspicious packets to the guard. Traffic destined for other areas of the organization s network is not affected. The guard uses behavioral recognition and multiple layers of defense to identify and remove packets associated with DDoS attacks. A unique combination of active source verification and anomaly recognition is crucial for accurately distinguishing sophisticated attack sources and packets from legitimate transactions. The guard then forwards the legitimate traffic to its intended destination. The attack is eliminated and business continues without interruption All rights reserved. Important notices, privacy statements, and trademarks of can be found on cisco.com. Page 3 of 5
4 Managed DDoS Services From both a technical and economic viewpoint, it makes the most sense to repel DDoS attacks before they reach an organization s data center. Typical last-mile bandwidth connecting enterprises to the Internet cannot withstand today s large DDoS attacks. Rather than spend money overprovisioning their connection to the outside world, organizations find it more economical to partner with service providers that repel DDoS attacks at the service provider network. The Cisco Guard and Detector solution delivers the performance, scalability, and architecture necessary for a managed DDoS service. Many of the world s leading service providers are already offering managed DDoS protection services based on the Cisco Guard and Detector solution, preventing DDoS attacks from ever reaching their customers data centers and last-mile connections. Deployment options vary and depend on an organization s needs and traffic patterns. A comprehensive DDoS protection service can be securely shared between several organizations or can be dedicated to a single enterprise. A DDoS service can be offered on its own, or combined with a Web hosting or e-commerce solution. Cisco detectors can also be deployed as customer premises equipment (CPE), giving organizations more control over DDoS prevention management and administration. Some large enterprises that operate their own backbones or maintain high-bandwidth connections may choose to operate the solution directly. Ensure Business Continuity Even when under attack, organizations seek to minimize disruption, maintain business productivity, and continue to serve customers. A business continuity plan identifies risks and potential security threats, and defines technological and business processes to detect and mitigate real-time incidents such as DDoS attacks. A business continuity plan is mandatory in some regulated industries, such as finance. However, all organizations can benefit from a properly executed plan. Together, the Cisco Traffic Anomaly Detector and Cisco Guard are a unique DDoS defense solution that helps ensure business continuity during DDoS attacks. They continue to deliver legitimate traffic to a targeted device during an attack, while accurately detecting and removing DDoS traffic. Diverting traffic to the guard also ensures that links from the service provider to the organization do not remain clogged, as they would during a typical attack. The Cisco Traffic Anomaly Detector and Cisco Guard can scale to protect even the largest organizations, with the most amount of online traffic, from the consequences of DDoS attacks. Protect Against Attacks on Others Compromised endpoints are unable to perform productively. Organizations that fail to properly secure their desktops and laptops from malicious mobile code can be unwitting participants in a DDoS attack against their own or another organization. Some worms and viruses create a back door into computers, allowing hackers to send huge amounts of traffic to a targeted organization via infected computers. Other worms or viruses include automatic instructions to start sending requests to a certain server at a certain date and time. Cisco Security Agent uses behavior-based assessment to identify and prevent malicious behavior on endpoints. It analyzes behavior of the system, and can eliminate both known and unknown ( day zero ) security risks based on this behavior. Cisco Security Agent aggregates multiple security functions by providing host intrusion prevention, distributed firewall capabilities, malicious mobile code protection, operating system integrity assurance, and audit log consolidation in a single powerful software package. MONITORING AND MANAGING THE SECURITY STATE OF THE NETWORK In a large, distributed network, it can be difficult to see the big picture. Firewalls, IPS appliances, routers, switches, and secure endpoints continuously send large amounts of security-related network intelligence to management stations. The IT staff needs intelligent tools in order to analyze and act on this information. The Cisco Security Monitoring, Analysis and Response System (CS-MARS) is a family of high-performance, scalable appliances that monitors the enterprise security infrastructure and correlates network and security device information, application logs, and security events. Through graphical network representations, the Cisco Security Monitoring, Analysis and Response System provides a consolidated view of all security devices, 2005 All rights reserved. Important notices, privacy statements, and trademarks of can be found on cisco.com. Page 4 of 5
5 enabling IT staff to identify, track, analyze, and mitigate incidents and attacks in real time from a central location. The Cisco Security Monitoring, Analysis and Response System also provides reports and stores information on network security status, which can help enterprises meet regulatory compliance and audit requirements. PROTECT YOUR NETWORK FROM DDOS ATTACKS WITH CISCO SELF-DEFENDING NETWORKS Organizations need to avoid the disruption caused by DDoS attacks, while controlling the costs of deploying and maintaining a secure network. A Cisco Self-Defending Network identifies, prevents, and adapts to changing security threats; protects corporate assets; helps ensure business continuity; and contains the total cost of network ownership. With a multilayered security approach, a Cisco Self-Defending Network provides the broadest defense against DDoS attacks threatening an organization s servers, network elements, or Internet connections. Cisco is the industry leader in networking and security solutions. Only Cisco offers a unique, systemic approach to business security based on the intelligent collaboration of networking and security technologies and services. Cisco provides the most comprehensive range of integrated, intelligent, adaptable security solutions to best protect organizations of all sizes from disruptive and expensive DDoS attacks. For more information on protecting your organization from DDoS attacks and on the Cisco Self-Defending Network strategy, please visit: Corporate Headquarters 170 West Tasman Drive San Jose, CA USA Tel: NETS (6387) Fax: European Headquarters Cisco Systems International BV Haarlerbergpark Haarlerbergweg CH Amsterdam The Netherlands www-europe.cisco.com Tel: Fax: Americas Headquarters 170 West Tasman Drive San Jose, CA USA Tel: Fax: Asia Pacific Headquarters 168 Robinson Road #28-01 Capital Tower Singapore Tel: Fax: Cisco Systems has more than 200 offices in the following countries and regions. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at /go/offices. Argentina Australia Austria Belgium Brazil Bulgaria Canada Chile China PRC Colombia Costa Rica Croatia Cyprus Czech Republic Denmark Dubai, UAE Finland France Germany Greece Hong Kong SAR Hungary India Indonesia Ireland Israel Italy Japan Korea Luxembourg Malaysia Mexico The Netherlands New Zealand Norway Peru Philippines Poland Portugal Puerto Rico Romania Russia Saudi Arabia Scotland Singapore Slovakia Slovenia South Africa Spain Sweden Switzerland Taiwan Thailand Turkey Ukraine United Kingdom United States Venezuela Vietnam Zimbabwe Copyright 2005 All rights reserved. CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of ; Changing the Way We Work, Live, Play, and Learn, and iquick Study are service marks of ; and Access Registrar, Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iq Expertise, the iq logo, iq Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post- Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, StrataView Plus, TeleRouter, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the 2005 property Cisco of Systems, their respective Inc. owners. All rights The use reserved. of the word partner does not imply a partnership relationship between Cisco and any other company. Important (0502R) notices, privacy statements, and trademarks of can be found on cisco.com P_ETMG_KM_8.05 Page 5 of 5 Printed in the USA
CISCO SMALL AND MEDIUM BUSINESS CLASS VOICE SOLUTIONS: CISCO CALLMANAGER EXPRESS BUNDLES
OVERVIEW CISCO SMALL AND MEDIUM BUSINESS CLASS VOICE SOLUTIONS: CISCO CALLMANAGER EXPRESS BUNDLES COMPANY PROFILE Cisco CallManager Express (CME) promotional bundles are appropriate for small businesses
Cisco Router and Security Device Manager File Management
Application Note Cisco Router and Security Device Manager File Management Introduction Cisco Router and Security Device Manager (SDM) allows you to view and manage the file system on your Cisco router
NETWORK AVAILABILITY IMPROVEMENT SUPPORT OPERATIONAL RISK MANAGEMENT ANALYSIS
DATA SHEET NETWORK AVAILABILITY IMPROVEMENT SUPPORT OPERATIONAL RISK MANAGEMENT ANALYSIS Operational Risk Management Analysis helps you maintain and improve network availability by evaluating the risks
CISCO IOS SOFTWARE FEATURE PACKS FOR THE CISCO 1700 SERIES MODULAR ACCESS ROUTERS AND CISCO 1800 SERIES (MODULAR) INTEGRATED SERVICES ROUTERS
CISCO IOS SOFTWARE FEATURE PACKS FOR THE CISCO 1700 SERIES MODULAR ACCESS ROUTERS AND CISCO 1800 SERIES (MODULAR) INTEGRATED SERVICES ROUTERS This product bulletin provides details on the Cisco IOS s for
CISCO IOS SOFTWARE RELEASES 12.4 MAINLINE AND 12.4T FEATURE SETS FOR THE CISCO 3800 SERIES ROUTERS
PRODUCT BULLETIN NO. 2877 CISCO IOS SOFTWARE RELEASES 12.4 MAINLINE AND FEATURE SETS FOR THE CISCO 3800 SERIES ROUTERS This product bulletin details changes to the Cisco IOS Software packaging for Cisco
CISCO CATALYST 3750 SERIES SWITCHES
AT-A-GLANCE CISCO CATALYST 3750 SERIES SWITCHES Product Part Number Port Speed Number Cisco Catalyst 3750-24TS 3750-24TS 3750-24FS 3750-24PS 3750-24PS 3750-48TS 3750-48TS 3750-48PS WS-C3750-24TS-S 10/100
CISCO SFP OPTICS FOR PACKET-OVER-SONET/SDH AND ATM APPLICATIONS
DATA SHEET CISCO SFP OPTICS FOR PACKET-OVER-SONET/SDH AND ATM APPLICATIONS The Cisco industry-standard Small Form-Factor Pluggable Interface Converter (SFP) for packet-over-sonet/sdh (POS), optical networking,
Figure 1. The Cisco Aironet Power Injectors Provide Inline Power to Cisco Aironet Access Points and Bridges
DATA SHEET CISCO AIRONET POWER INJECTOR Cisco Aironet Power Injector products increase the deployment flexibility of Cisco Aironet wireless access points and bridges by providing an alternative powering
CISCO IOS SOFTWARE RELEASES 12.4 MAINLINE AND 12.4T FEATURE SETS FOR THE CISCO 2800 SERIES ROUTERS
PRODUCT BULLETIN NO. 2879 CISCO IOS SOFTWARE RELEASES 12.4 MAINLINE AND FEATURE SETS FOR THE CISCO 2800 SERIES ROUTERS This product bulletin details changes to the Cisco IOS Software packaging for Cisco
Cisco GLBP Load Balancing Options
Data Sheet Cisco GLBP Load Balancing Options Last updated: December 2005 INTRODUCTION The purpose of this document is to discuss the options that Cisco Gateway Load Balancing Protocol (GLBP) one of Cisco
Cisco Aironet 1130AG Series
Ordering Guide Cisco Aironet 1130AG Series The Cisco Aironet 1130AG Series IEEE 802.11a/b/g Access Point is a fixed-configuration, dual-band access point. Built in to the access point are two radios each
CISCO AIRONET POWER INJECTOR
DATA SHEET CISCO AIRONET POWER INJECTOR Cisco Aironet Power Injector products increase the deployment flexibility of Cisco Aironet wireless access points and bridges by providing an alternative powering
CISCO ISDN BRI S/T WIC FOR THE CISCO 1700, 1800, 2600, 2800, 3600, 3700, AND 3800 SERIES
DATA SHEET CISCO ISDN BRI S/T WIC FOR THE CISCO 1700, 1800, 2600, 2800, 3600, 3700, AND 3800 SERIES Offering a single ISDN BRI S/T interface, this WIC may require an external Network Termination 1 (NT1),
CISCO IP PHONE EXPANSION MODULE 7914
DATA SHEET CISCO IP PHONE EXPANSION MODULE 7914 Call coverage is a critical capability for administrative assistants and others who must monitor, manage, and cover the various status of calls. This requires
CISCO 10GBASE X2 MODULES
DATA SHEET CISCO 10GBASE X2 MODULES Figure 1. Cisco 10GBASE X2 and Xenpak Module PRODUCT OVERVIEW The Cisco 10GBASE X2 modules (Figure 1) offers customers a wide variety of 10 Gigabit Ethernet connectivity
CISCO MEETINGPLACE FOR OUTLOOK 5.3
DATA SHEET CISCO MEETINGPLACE FOR OUTLOOK 5.3 Rich-media Conferencing for Microsoft Outlook PRODUCT OVERVIEW Cisco MeetingPlace part of the Cisco IP Communications system is a complete rich-media conferencing
Cisco Solution Incentive Program Asia Pacific
Channel Incentive Offerings Cisco Solution Incentive Program Asia Pacific User Guide This program will expire on December 31, 2006. Cisco Systems reserves the right to cancel or modify this program at
CISCO NETWORK CONNECTIVITY CENTER MPLS MANAGER 1.0
DATA SHEET CISCO NETWORK CONNECTIVITY CENTER MPLS MANAGER 1.0 Cisco Network Connectivity Center (NCC) Multiprotocol Label Switching (MPLS) Manager maximizes the availability of VPNs based on MPLS technology.
CISCO CATALYST 6500 SUPERVISOR ENGINE 32
PRODUCT BULLETIN NO. 2678 CISCO CATALYST 6500 SUPERVISOR ENGINE 32 Cisco Systems introduces the Cisco Catalyst 6500 Series Supervisor Engine 32, the next generation of supervisor engine for the Cisco Catalyst
Cisco Outbound Option
Data Sheet Cisco Outbound Option Today s contact center is about more than just handling inbound telephone calls it is about fully integrated, multi-channel customer interaction. The Cisco Intelligent
City Government Improves Caller Service and Cultivates Economic Vitality
Customer Case Study City Government Improves Caller Service and Cultivates Economic Vitality EXECUTIVE SUMMARY CITY OF SACRAMENTO, CALIFORNIA 445,000 residents 97 square miles INDUSTRY Local Government
CISCO CALLMANAGER EXPRESS 3.2
ORDERING GUIDE CISCO CALLMANAGER EXPRESS 3.2 To be used by authorized partners and direct accounts only. HOW TO ORDER CISCO CALLMANAGER EXPRESS 3.2 Cisco CallManager Express (CME) is a feature in Cisco
CISCO IP CONTACT CENTER HOSTED EDITION A CROSS-NETWORK (PSTN TO IP), DISTRIBUTED, INTELLIGENT, HOSTED PLATFORM FOR CONTACT CENTERS
BROCHURE CISCO IP CONTACT CENTER HOSTED EDITION A CROSS-NETWORK (PSTN TO IP), DISTRIBUTED, INTELLIGENT, HOSTED PLATFORM FOR CONTACT CENTERS Responding to a changing marketplace and intense competition,
CISCO ISDN BRI S/T WIC FOR THE CISCO 1700, 1800, 2600, 2800, 3600, 3700, AND 3800 SERIES
DATA SHEET CISCO ISDN BRI S/T WIC FOR THE CISCO 1700, 1800, 2600, 2800, 3600, 3700, AND 3800 SERIES Offering a single ISDN BRI S/T interface, this WIC may require an external Network Termination 1 (NT1),
Enabling High Availability for Voice Services in Cable Networks
White Paper Enabling High Availability for Voice Services in Cable Networks When customers place a telephone call, they expect it to go through on the first attempt and they expect it to continue without
SURGE PROTECTION CABLES FOR SMART SERIAL INTERFACES
DATA SHEET SURGE PROTECTION CABLES FOR SMART SERIAL INTERFACES Surge events, including ElectroStatic Discharge (ESD) and lightning surges, are common in many parts of the world, especially during electrical
CISCO WAN MANAGER 15.1
DATA SHEET CISCO WAN MANAGER 15.1 Cisco WAN Manager is a high-performance, carrier-class element- and network-management product for the Cisco MGX Family, Cisco BPX Family, and Cisco IGX Family of multiservice
NETFLOW PERFORMANCE ANALYSIS
WHITE PAPER NETFLOW PERFORMANCE ANALYSIS INTRODUCTION The Cisco IOS NetFlow feature set allows for the tracking of individual IP flows as they are received at a Cisco router or switching device. Network
CISCO WAN MANAGER 15 DATA SHEET
DATA SHEET CISCO WAN MANAGER 15 Cisco WAN Manager is a high-performance carrier-class element and network management product for the Cisco MGX, Cisco BPX, and Cisco IGX series multiservice switches and
CISCO 100BASE-X SFP FOR FAST ETHERNET SFP PORTS
DATA SHEET CISCO 100BASE-X SFP FOR FAST ETHERNET SFP PORTS PRODUCT OVERVIEW The Cisco 100BASE-X Small Form-factor Pluggable (SFP) is a hot-swappable input/output device that plugs into a Fast Ethernet
PREVENTING WORM AND VIRUS OUTBREAKS WITH CISCO SELF-DEFENDING NETWORKS
WHITE PAPER PREVENTING WORM AND VIRUS OUTBREAKS WITH CISCO SELF-DEFENDING NETWORKS Worm and virus attacks are among the most common security breaches for organizations today*. A server, laptop, or personal
END-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR SELECTIVE CISCO CATALYST 6503, CATALYST 6506 AND CATALYST 6509 CHASSIS
PRODUCT BULLETIN NO. 3037 END-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR SELECTIVE CISCO CATALYST 6503, CATALYST 6506 AND CATALYST 6509 CHASSIS Cisco Systems announces the end-of-sale and end-of-life dates
SERIAL AND ASYNCHRONOUS HIGH-SPEED WAN INTERFACE CARDS FOR CISCO 1800, 2800, AND 3800 SERIES INTEGRATED SERVICES ROUTERS
DATA SHEET SERIAL AND ASYNCHRONOUS HIGH-SPEED WAN INTERFACE CARDS FOR CISCO 1800, 2800, AND 3800 SERIES INTEGRATED SERVICES ROUTERS Serial and asynchronous high-speed WAN interface cards (HWICs) provide
NTL teams with Cisco Advanced Services to reduce risk and deliver the world s largest Cisco Content Delivery Network deployment in just two months
Customer Success Story NTL teams with Cisco Advanced Services to reduce risk and deliver the world s largest Cisco Content Delivery Network deployment in just two months EXECUTIVE SUMMARY CUSTOMER NAME
End-of-Sale and End-of-Life Announcement for the Cisco Catalyst 2970 Series Switches
Product Bulletin No. EOL1092 End-of-Sale and End-of-Life Announcement for the Cisco Catalyst 2970 Series Switches Cisco Systems announces the end-of-sale and end-of-life dates for Cisco Catalyst 2970 Series
How To Get A New Phone System For Your Business
Cisco Phone Systems Telemarketing Script Cold Call 1. Locate Contact: Name listed Owner General Manager / Office Manager Chief BDM (Business Decision Maker) Note: Avoid talking to IT since this is not
Cisco Unified IP Phone 7906G
Q&A Cisco Unified IP Phone 7906G GENERAL QUESTIONS What is the Cisco IP Phone 7906G? The new Cisco Unified IP Phone 7906G is the latest Cisco Systems full-featured basic set IP phone providing enhanced
Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features
Data Sheet Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features Introduction to Public Key Infrastructure Public Key Infrastructure (PKI) offers a scalable method of securing networks,
Cisco CNS NetFlow Collection Engine Version 4.0
Data Sheet Cisco CNS NetFlow Collection Engine Version 4.0 Cisco CNS is a suite of intelligence engines that work with device agents to create a programmable network. Cisco CNS extends the management plane
CISCO IP PHONE SERVICES SOFTWARE DEVELOPMENT KIT (SDK)
DATA SHEET CISCO IP PHONE SERVICES SOFTWARE DEVELOPMENT KIT (SDK) Cisco Systems IP Phone Services bring the power of the World Wide Web to Cisco IP Phones. An integral part of a Cisco AVVID (Architecture
CISCO CONTENT SWITCHING MODULE SOFTWARE VERSION 4.1(1) FOR THE CISCO CATALYST 6500 SERIES SWITCH AND CISCO 7600 SERIES ROUTER
PRODUCT BULLETIN NO. 2438 CISCO CONTENT SWITCHING MODULE SOFTWARE VERSION 4.1(1) FOR THE CISCO CATALYST 6500 SERIES SWITCH AND CISCO 7600 SERIES ROUTER NEW FEATURES New features of the Cisco Content Switching
CISCO METRO ETHERNET SERVICES AND SUPPORT
SERVICES OVERIVEW CISCO METRO ETHERNET SERVICES AND SUPPORT In the ever-changing communications market, incumbent service providers are looking for ways to grow revenue. One method is to deploy service
6000 WATT AC POWER SUPPLY FOR THE CISCO CATALYST 6500 SERIES CHASSIS
DATA SHEET 6000 WATT AC POWER SUPPLY FOR THE CISCO CATALYST 6500 SERIES CHASSIS PRODUCT OVERVIEW The 6000-watt (W) power supply for the Cisco Catalyst 6500 Series chassis (Figure 1) is a dual AC input
Cisco Conference Connection
Data Sheet Cisco Conference Connection Cisco IP Communications a comprehensive system of powerful, enterprise-class solutions including IP telephony, unified communications, IP video/audio conferencing,
CISCO NETWORK ANALYSIS SOFTWARE 3.4
PRODUCT BULLETIN NO. 2764 CISCO NETWORK ANALYSIS SOFTWARE 3.4 Cisco Systems is proud to announce Cisco Network Analysis Module (NAM) Software 3.4 for both the Cisco Catalyst 6500 and Cisco 7600 Series
CISCO NETWORK CONNECTIVITY CENTER
DATA SHEET CISCO NETWORK CONNECTIVITY CENTER The Cisco Network Connectivity Center (NCC) delivers end-to-end management across multiple tools, technologies, and silos. From networks and applications to
Cisco CNS NetFlow Collection Engine Version 5.0
Data Sheet Cisco CNS NetFlow Collection Engine Version 5.0 Cisco CNS consists of software and appliance-based applications, which support scalable network deployment, configuration, service assurance monitoring,
Customizing Your Cisco Unified IP Phone on the Web
Phone Guide Customizing Your Cisco Unified IP Phone on the Web Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
CISCO RFID SOLUTIONS. Q. How is RFID being applied? A. Cisco Systems sees RFID technology initially affecting three areas:
Q&A CISCO RFID SOLUTIONS GENERAL Q. What is RFID? A. RFID stands for radio frequency identification. It is a wireless technology that uses radio frequency waves to transfer data between a moveable item
CISCO 7604 ROUTER. Figure 1. Cisco 7604 Router
DATA SHEET CISCO 7604 ROUTER PRODUCT OVERVIEW The Cisco 7604 Router is one of the smallest, redundant routers to offer n x 10 Gigabit Ethernet performance with services. This router is part of the Cisco
THE CISCO CRM COMMUNICATIONS CONNECTOR GIVES EMPLOYEES SECURE, RELIABLE, AND CONVENIENT ACCESS TO CUSTOMER INFORMATION
CUSTOMER SUCCESS STORY THE CISCO CRM COMMUNICATIONS CONNECTOR GIVES EMPLOYEES SECURE, RELIABLE, AND CONVENIENT ACCESS TO CUSTOMER INFORMATION EXECUTIVE SUMMARY CUSTOMER NAME Coleman Technologies INDUSTRY
CISCO NETWORK ASSISTANT
DATA SHEET CISCO NETWORK ASSISTANT PRODUCT OVERVIEW Cisco Network Assistant is a PC-based network management application optimized for LANs of small and medium-sized business with up to 250 users. Cisco
CISCO PIX SECURITY APPLIANCE LICENSING
DATA SHEET CISCO PIX SECURITY APPLIANCE LICENSING The market-leading Cisco PIX Security Appliance Series supports a variety of licensing options, enabling businesses to select the capabilities that are
CISCO CATALYST EXPRESS 500 SERIES SWITCHES
Q&A CISCO CATALYST EXPRESS 500 SERIES SWITCHES GENERAL What are the Cisco Catalyst Express 500 Series switches? The Cisco Catalyst Express 500 Series switches deliver Cisco class networking tailored for
New Cisco Catalyst 3750 Series Switches Overview
Product Bulletin No. 2119 New Cisco Catalyst 3750 Series Switches Overview Cisco Systems is pleased to introduce the new Cisco Catalyst 3750 Series switches, an innovative product line that improves LAN
CONNECT TO COMPREHENSIVE NETWORK SECURITY SOLUTIONS WITH THE CISCO IP NETWORK DEFENDER PROGRAM.
CONNECT TO COMPREHENSIVE NETWORK SECURITY SOLUTIONS WITH THE CISCO IP NETWORK DEFENDER PROGRAM. THE CISCO ADVANTAGE: SELF-DEFENDING NETWORKS Network security threats are becoming more frequent and alarmingly
Cisco Router and Security Device Manager USB Storage
Application Note Cisco Router and Security Device Manager USB Storage Introduction The USB Storage feature on the Cisco Router and Security Device Manager (Cisco SDM) allows the Cisco 871 and Cisco 1800,
Cisco IP Phone 7912G (Part Number CP-7912G-A)
Q&A CISCO IP PHONE 7911G GENERAL QUESTIONS What is the Cisco IP Phone 7911G? The new Cisco IP Phone 7911G is the latest Cisco Systems full-featured basic set IP phone providing enhanced functions for those
State Agency Improves Service Effectiveness by Giving Employees Database Access from Their IP Phones
Customer Case Study State Agency Improves Service Effectiveness by Giving Employees Database Access from Their IP Phones EXECUTIVE SUMMARY CUSTOMER NAME Arizona Department of Commerce 100 employees 12
DATA COMPRESSION ADVANCED INTEGRATION MODULES (AIM-COMPR2-V2 AND AIM-COMPR4)
DATA SHEET DATA COMPRESSION ADVANCED INTEGRATION MODULES (AIM-COMPR2-V2 AND AIM-COMPR4) The Data Compression Advanced Integration Modules (AIMs) deliver cost-effective options for reducing recurring wide-area
SERIAL CONNECTIVITY NETWORK MODULES (NM-1HSSI, NM-4T, NM-4A/S, NM-8A/S, NM-16A/S, NM-16A, NM-32A)
DATA SHEET SERIAL CONNECTIVITY NETWORK MODULES (NM-1HSSI, NM-4T, NM-4A/S, NM-8A/S, NM-16A/S, NM-16A, NM-32A) Cisco Multi-Service Access Routers and Integrated Services Routers offer a wide variety of serial
INTEGRATED COMMUNICATIONS INTEROPERABILITY
Solution Overview Cisco IPICS INTEGRATED COMMUNICATIONS INTEROPERABILITY Today s myriad options for instantaneous communications allow organizations of all kinds to establish and maintain real-time voice
NetFlow Feature Acceleration
WHITE PAPER NetFlow Feature Acceleration Feature Description Rapid growth in Internet and intranet deployment and usage has created a major shift in both corporate and consumer computing paradigms. This
CISCO MDS 9000 FAMILY PERFORMANCE MANAGEMENT
WHITE PAPER CISCO MDS 9000 FAMILY PERFORMANCE MANAGEMENT As storage area networks (SANs) grow, so do the challenges for monitoring and resolving performance issues. Summary views of networkwide historical
It looks like your regular telephone.
It looks like your regular telephone. But it s a lot better. CISCO PHONE SYSTEM SOLUTIONS FOR SMALL AND MEDIUM BUSINESSES Between the increased productivity and administrative savings we ve experienced,
Cisco 2-Channel SFP WDM Transponder
Data Sheet Cisco 2-Channel SFP WDM Transponder The Cisco 2-Channel SFP WDM Transponder expands the range of applications and platforms supported by coarse wavelength-division multiplexing (CWDM) and dense
CISCO WIRELESS SECURITY SUITE
Q&A CISCO WIRELESS SECURITY SUITE OVERVIEW What is the Cisco Wireless Security Suite? The Cisco Wireless Security Suite is an enterprise-ready, standards-based, wireless LAN (WLAN) security solution for
Danish Train Operator Gets Customer Service Back On Track
Danish Train Operator Gets Customer Service Back On Track Danish Rail uses Cisco Unified Communications to sharpen its customer focus and revitalise its call centre operation EXECUTIVE SUMMARY Customer
Cisco IT Data Center and Operations Control Center Tour
Cisco IT Data Center and Operations Control Center Tour Inside the Build Room Page 1 of 8 5. Inside the Build Room Introduction Figure 1. Inside the Build Room Ian: The purpose of the Build room is for
Per-Port, Per-VLAN Quality of Service. Trunk-Port Security. 802.1x Private VLAN Assignment. 802.1x Private Guest VLAN
PRODUCT BULLETIN NO. 2782 INTRODUCING CISCO CATALYST 4948-10GE SWITCH 10 Gigabit Ethernet Switching for High-Performance, Rack-Optimized Server Switching Cisco Systems announces the Cisco Catalyst 4948-10GE,
CISCO IOS IP SERVICE LEVEL AGREEMENT
DATA SHEET CISCO IOS IP SERVICE LEVEL AGREEMENT Network services have changed dramatically in recent years, most notably due to the addition of voice, video, and other mission-critical delay- and performance-sensitive
Cisco Network Planning Solution 2.0.2 Documentation Guide and Supplemental License Agreement
Cisco Network Planning Solution 2.0.2 Documentation Guide and Supplemental License Agreement June 2007 This documentation guide contains the End User Supplemental License Agreement for Cisco Systems Network
PUBLIC KEY INFRASTRUCTURE CERTIFICATE REVOCATION LIST VERSUS ONLINE CERTIFICATE STATUS PROTOCOL
WHITE PAPER PUBLIC KEY INFRASTRUCTURE CERTIFICATE REVOCATION LIST VERSUS ONLINE CERTIFICATE STATUS PROTOCOL CERTIFICATE REVOCATION CHECKING ON CISCO IOS SOFTWARE Introduction The support for x.509 digital
CISCO CATALYST OPERATING SYSTEM SOFTWARE RELEASE 8.4 FOR CISCO CATALYST 6500 SERIES SWITCHES
PRODUCT BULLETIN NO. 2679 CISCO CATALYST OPERATING SYSTEM SOFTWARE RELEASE 8.4 FOR CISCO CATALYST 6500 SERIES SWITCHES The Cisco Catalyst Operating System (Catalyst OS) Software Release 8.4 for the supervisor
End-of-Sale and End-of-Life Announcement for Select Cisco Catalyst 2950G and Catalyst 2950T Series Switches
Product Bulletin No. EOL1094 End-of-Sale and End-of-Life Announcement for Select Cisco Catalyst 2950G and Catalyst 2950T Series Switches Cisco Systems announces the end-of-sale and end-of-life dates for
E-Seminar. Financial Management Internet Business Solution Seminar
E-Seminar Financial Management Internet Business Solution Seminar Financial Management Internet Business Solution Seminar 3 Welcome 4 Objectives 5 Financial Management 6 Financial Management Defined 7
THE BUSINESS CASE FOR MANAGED SERVICES IN SMALL AND MEDIUM-SIZED BUSINESSES
WHITE PAPER THE BUSINESS CASE FOR MANAGED SERVICES IN SMALL AND MEDIUM-SIZED BUSINESSES IP-based managed services help businesses reap benefits by consistently reducing IT costs while increasing employee
Cisco Unified IP Phone 7971G-GE
Data Sheet Cisco Unified IP Phone 7971G-GE Cisco Unified IP phones continue to lead the competition with integrated business functions and converged communications features beyond today's conventional
Cisco Blended Agent: Bringing Call Blending Capability to Your Enterprise
DATA SHEET Cisco Blended Agent: Bringing Call Blending Capability to Your Enterprise Cisco ICM software has traditionally enabled companies to distribute inbound service volume to a variety of termination
Cisco 2-Port OC-3/STM-1 Packet-over-SONET Port Adapter
Data Sheet Cisco 2-Port OC-3/STM-1 Packet-over-SONET Port Adapter To meet the continual need for increased router features and performance, Cisco Systems introduces its newest packetover-sonet (POS) port
IS YOUR OLD PHONE SYSTEM HANGING UP YOUR DISTRICT? CISCO K 12 DIRECT LINE SOLUTION FOR IP COMMUNICATIONS
IS YOUR OLD PHONE SYSTEM HANGING UP YOUR DISTRICT? CISCO K 12 DIRECT LINE SOLUTION FOR IP COMMUNICATIONS THEN YOU NEED A DIRECT LINE. now. CISCO IP PHONE SOLUTIONS Cisco IP phones provide better communications,
Cisco Secure Access Control Server Solution Engine
Data Sheet Cisco Secure Access Control Server Solution Engine The Cisco Secure Access Control Server (ACS) provides a comprehensive identity networking solution and secure user experience for Cisco intelligent
IP COMMUNICATIONS FOR THE SMALL OR AUTONOMOUS BRANCH OFFICE
OVERVIEW IP COMMUNICATIONS FOR THE SMALL OR AUTONOMOUS BRANCH OFFICE Deploying data and voice capabilities in a single, integrated routing platform to increase productivity, decrease costs, and lower total
Cisco Unified Contact Center Express Standard 4.5
Data Sheet Cisco Unified Contact Center Express Standard 4.5 Cisco Unified Contact Center Express an integral component of the Cisco IP Communications system offers an integrated, full-featured solution
HIGH-DENSITY PACKET VOICE DIGITAL SIGNAL PROCESSOR MODULE FOR CISCO IP COMMUNICATIONS SOLUTION
DATA SHEET HIGH-DENSITY PACKET VOICE DIGITAL SIGNAL PROCESSOR MODULE FOR CISCO IP COMMUNICATIONS SOLUTION PRODUCT OVERVIEW The High-Density Packet Voice digital signal processor (DSP) (PVDM2) enables Cisco
IP Networking and the Advantages of consolidation
WHITE PAPER Extending the Benefits of Storage Area Networks across IP Networks Introduction The phenomenal growth of Internet business and data-intensive e-business applications over the past few years
CISCO DISTRIBUTED DENIAL OF SERVICE PROTECTION SOLUTION: LEADING DDOS PROTECTION FOR SERVICE PROVIDERS AND THEIR CUSTOMERS
WHITE PAPER CISCO DISTRIBUTED DENIAL OF SERVICE PROTECTION SOLUTION: LEADING DDOS PROTECTION FOR SERVICE PROVIDERS AND THEIR CUSTOMERS Today, service providers and their customers are exposed to a growing
Cisco IP Communicator
Q & A Cisco IP Communicator Q. What is Cisco IP Communicator? A. Cisco IP Communicator is a software-based application that delivers enhanced telephony support through personal computers. This application
Cisco Systems GigaStack Gigabit Interface Converter
Data Sheet Cisco Systems GigaStack Gigabit Interface Converter The Cisco Systems GigaStack Gigabit Interface Converter (GBIC) is a versatile, low-cost, Gigabit Ethernet stacking GBIC that offers high-speed
Combined voice and data solution supports Orange s ongoing success in the UK business market
CUSTOMER CASE STUDY Combined voice and data solution supports Orange s ongoing success in the UK business market Executive Summary CUSTOMER NAME Orange INDUSTRY Telecommunications CHALLENGE To increase
CISCO IP PHONE 7912G. CISCO IP PHONE 7912G FEATURES The Cisco IP Phone 7912G is designed to be easy to use with conveniently placed features.
DATA SHEET CISCO IP PHONE 7912G Cisco IP phones---an integral component of the Cisco IP Communications system---provide superior levels of integrated business features and converged communications---levels
How to Register, Start, and Access a Cisco Online Exam
How to Register, Start, and Access a Cisco Online Exam Lifecycle Services and SMB Exams The process for registering and taking a Cisco online exam is different from the process for registering and taking
Cisco IP Contact Center Express Edition Enhanced
Data Sheet Cisco IP Contact Center Express Edition Enhanced Cisco IP Communications is a comprehensive system of powerful, enterprise-class solutions including IP telephony, unified communications, IP
