SlideShare a Scribd company logo
1 of 64
Download to read offline
#CNSF2011
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   1
• Solution Overview

                                                           • Deployment Scenarios

                                                           • Feature Highlights

                                                           • Q&A

                                                           • Wrap Up




© 2010 Cisco and/or its affiliates. All rights reserved.                            Cisco Confidential   2
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   3
                                                                                    3
Policy
                                           Corporate Border                                Platform                Infrastructure
                                               Applications                              as a Service               as a Service
                                                                         Software                                                        X
                                                and Data                                                                            as a Service
                                                                        as a Service




                                           Corporate Office




                                             Branch Office

                                                                                                                                                   Home Office
                                                              Airport

                                                                                Mobile                                              Coffee
© 2010 Cisco and/or its affiliates. All rights reserved.
                                                                                User     Attackers      Partners        Customers   Shop                         Cisco Confidential   4
Personal   Business
© 2010 Cisco and/or its affiliates. All rights reserved.                         Cisco Confidential   5
Limited
                                                                                                      Predominantly PC-based
                                                                                                           Client Support




                                                                                                             Manual
                                                                                                         Numerous “clicks”
                                                                                                      Non-persistent Connection




                                              No Security or Visibility                    Security
                                                                                                           Rarely-On
                                                                                   Intranet            Only connected if / when
                                                                                                        absolutely necessary
                                                                          Corporate File
                                                                               Sharing
© 2010 Cisco and/or its affiliates. All rights reserved.                                                                          Cisco Confidential   6
Limited Clients
                                                                                            Predominantly PC-based
                                                                                                 Client Support




                           –            Data Loss Prevention           Acceptable Use   ü    Limited Security
                                                                                            URL-filtering client unable
                           –            Threat Prevention              Access Control       to address key use cases




                                            Access                        No Access
                                                                                                 No Access
                                                                        Intranet             Not integrated, requires
                                                                                              separate VPN client
                                                               Corporate File
                                                                    Sharing
© 2010 Cisco and/or its affiliates. All rights reserved.                                                                  Cisco Confidential   7
Choice
                                                                                                                            Diverse Endpoint
                                                                                                                           Support for Greater
                                                                                                                               Flexibility




                                 ü            Data Loss Prevention                                 Acceptable Use   ü          Security

                                 ü            Threat Prevention                                    Access Control   ü     Rich, Granular Security
                                                                                                                        Integrated Into the network




                                                                     Access Granted                                          Experience
                                                                                                                         Always-on Intelligent
                                                                                      Intranet                          Connection for Seamless
                                                                                                                            Experience and
                                                                                  Corporate File                             Performance
                                                                                       Sharing

© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                              Cisco Confidential   8
Network and Security Follows User—It Just Works

                                                                   Corporate     Mobile               Home
        Broad Mobile Support                                        Office       User                 Office
        § Fixed and semi-fixed platforms
        § Mobile platforms


        Persistent Connectivity
        § Always-on connectivity                                     Wired                            Wi-Fi

        § Optimal gateway selection                                            Cellular/Wi-Fi
        § Automatic hotspot negotiation
        § Seamless connection hand-offs


       Next-Gen Unified Security                                                                Secure,
       § User/device identity                                                                   Consistent
       § Posture validation including Managed vs Un Managed                                     Access
         Assets
       § Integrated web security for always-on security (hybrid)
       § Clientless and desktop virtualization
                                                                     Voice—Video—Apps—Data
© 2010 Cisco and/or its affiliates. All rights reserved.                                                       Cisco Confidential   9
Anyone                                         Anything




                                       Anywhere                                       Anytime


                                                           Securely, Reliably, Seamlessly

© 2010 Cisco and/or its affiliates. All rights reserved.                                         Cisco Confidential   10
Inside the Corp Environment                             Outside the Corp Environment
                                                  802.1X, TrustSec,                                 Always-On Integrated
                                                      MACsec                                         Security and Policy
                                                                       SECURITY
                                                                      and POLICY
                                                                                    Customers        Coffee Shop       Home Office


                                  Local Data Center




                                                                              Software         Platform       Infrastructure         X
                                                                                                                                as a Service
                                     Corporate Office                        as a Service    as a Service      as a Service




                                          Branch Office

                                                                             Airport        Mobile User      Attackers          Partners

                                                                       CORP DMZ
© 2010 Cisco and/or its affiliates. All rights reserved.
                                                                        BORDER                                                                 Cisco Confidential   11
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   12
Internet                                     Trusted Network



                                                                                                                                         News            Email
                                                                                           User Identity
                                                                   facebook.com

                                                                       User
                                                                     SSL VPN         ASA        WCCP
                                                                                                            Cisco Web
                                                                   Authenticates
                                                                  Tunnel All Traffic                        Security Appliance


                                                                                                 Corporate AD



                                          Untrusted Network                                                                      Social Networking   Enterprise SaaS



                                                           AnyConnect                                  ASA à WSA
                                                •     Always-on VPN (admin                  •    Authentication handoff (SSO)
                                                      configurable)
                                                                                            •    Identity and location aware
                                                •     Optimal head end auto-detect               policy enforcement
                                                •     Transparent auth (certificate)        •    Location-aware reporting


© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                                               Cisco Confidential   13
ASA Config
route inside 0.0.0.0 0.0.0.0 192.168.1.2 tunneled
route inside 10.10.10.0 255.0.0.0 192.168.1.2




                                       IOS Config
                       ip wccp 80 redirect-list redirect-acl

                       interface eth0
                              ip wccp 80 redirect in

© 2010 Cisco and/or its affiliates. All rights reserved.       Cisco Confidential   14
ASA Config
          route inside 0.0.0.0 0.0.0.0 192.168.1.2 tunneled
          route inside 10.10.10.0 255.0.0.0 192.168.1.2

          wccp 80 redirect-list redirect-acl
          wcpp iterface inside 80 redirect in

© 2010 Cisco and/or its affiliates. All rights reserved.      Cisco Confidential   15
ASA-1 Config
                  route inside 0.0.0.0 0.0.0.0 192.168.1.2 tunneled
                  route inside 10.10.10.0 255.0.0.0 192.168.1.2




                                       IOS Config
                         ip wccp 80 redirect-list redirect-acl

                         interface eth0
                                ip wccp 80 redirect in


© 2010 Cisco and/or its affiliates. All rights reserved.              Cisco Confidential   16
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   17
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   18
Trusted Network
                                                                                         Internet



                                                                  facebook.com


                                                                                   IPSec / SSL VPN
                                                                                     Internal Data          ASA




                                                    Untrusted Network


                                                                    AnyConnect                                    ScanSafe
                                                           •   Always-on VPN (admin                  •   Web 2.0 Content Control
                                                               configurable)
                                                                                                     •   Dynamic Web Classification
                                                           •   Optimal head end auto-detect
                                                                                                     •   Search Ahead
                                                           •   Transparent auth (certificate)
                                                                                                     •   Outbreak Intelligence
                                                                                                     •   Real-time Content Analysis
© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                   Cisco Confidential   19
Web Security with ScanSafe




                                                                          ScanSafe



                                                           Internet bound web
                                                             communications




                                                                                               Internal
                                                                                            communications


                                                                        AnyConnect Secure
                                                                          Mobility Client




© 2010 Cisco and/or its affiliates. All rights reserved.                                                     Cisco Confidential   20
Web Security with ScanSafe




                                                                          ScanSafe



                                                           Internet bound web
                                                             communications




                                                                                               Internal
                                                                                            communications


                                                                        AnyConnect Secure
                                                                          Mobility Client




© 2010 Cisco and/or its affiliates. All rights reserved.                                                     Cisco Confidential   21
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   22
Web Security                 Cloud Web
                                           AnyConnect         ASA Firewall
                                                                                       Appliance                    Security
                                    § Trusted Network      § AnyConnect Secure     § Remote Specific           § Web 2.0 Content
                                      Detection              Mobility Head End       Policy                      Control
                                    § Session                Support               § Application Controls      § Dynamic Web
                                      Persistence          § Optimized WSA                                       Classification
                                                                                   § SaaS Access
                                    § Optimal Gateway        Traffic handoff         Control                   § HTTP/s Scanning
                                      Selection            § Simplified            § Multi-layer malware       § Search Ahead
                                    § Always-on VPN          Management              defense
                                                                                                               § Outbreak
                                    § Enhanced Device      § Enterprise firewall   § URL filtering &             Intelligence
                                      Support              § Remote Access           Dynamic
                                                                                     Categorization            § Real-Time Content
                                    § IPSec IKEv2            Head End
                                                                                                                 Analysis
                                    § Network Access       § BotNet Filter         § Data Security
                                      Manager                                      § Application Visibility
                                    § Telemetry                                      and Control

                                    § SCEP Enrollment
                                                                                           § Acceptable Use / Control
                                                                                           § Malware Defense

© 2010 Cisco and/or its affiliates. All rights reserved.                                                                             Cisco Confidential   23
• Always On VPN extends the
                                                                                                  virtual perimeter to the
                                                                                                  endpoint
                                                                                                § Security Persistence and
                                                            Security Enforcement Array
                               Location-aware
                                                                                                  policy are administratively
                               Captive portal                                                     controlled
                               nearest headend
                               Auth persistence
                                                                                                § If ASA head-end is
                                                                                                  unreachable,
                                                                                                     § fail-open (direct network
                                                                                                       access)
                                                                                                     or
                                                      Security Persistence with Always On VPN        § fail-close (no network
                                                      (Fail Closed or Fail Open)                       access)


© 2010 Cisco and/or its affiliates. All rights reserved.                                                                           Cisco Confidential   24
§ Always-On, Failed Closed          § Connection Status
                                          § No Network Access Available
                                          § Manual URL Entry is not Allowed




© 2010 Cisco and/or its affiliates. All rights reserved.                                            Cisco Confidential   25
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   26
Trusted Network Detection
                                                                                           § Automatically connects or disconnects
                                                                                             under the following conditions:
                                                                                                § In Office
                                                                                                § Out of Office
                                                                                           § Location determination made by
                                                                                             Default Domain Name or DNS server IP
                                                                                                § Other checks likely in future
                                       In Office                           Out of Office   § Certificate authentication for seamless
                                                                                             reconnection
                                                                                           § Administratively controlled policy
                                                                                           § Windows XP, Vista, 7 & Mac OS X




© 2010 Cisco and/or its affiliates. All rights reserved.                                                                               Cisco Confidential   27
Detects Trusted or Untrusted Network Infrastructures for Secure Connectivity

                  § Trusted Network Detection is
                    Configurable VIA the AnyConnect
                    Profile

                  § Trusted Networks can be Defined as
                    DNS Suffixes or DNS Server IP
                    Addresses                                                Corporate Headquarters

                  § DNS Suffixes and DNS Server IP
                    Addresses must be defined on the
                    Client Workstation Dynamically (DHCP)                        DHCP Request

                  § If Both the Trusted DNS Suffix and DNS
                    Server IP Address are Defined, the
                    Entries will be ANDed to Determine the                         Home Office
                    Trusted Network

© 2010 Cisco and/or its affiliates. All rights reserved.                                                    Cisco Confidential   28
ASDM Profile Configuration




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   29
Feature Parameters:
                                                                                          London                            § Suspension Time Threshold (hours)
                                                                                                                   § Performance Improvement Threshold (%)
                                                           Boston                       Time = 33ms               Los Angeles
                                                                                        Time = 35ms
                                                                                        Time = 26ms
                                                             Time = 25ms                                             Time = 28ms
                                                             Time = 23ms                                             Time = 27ms
                                                             Time = 24ms                                             Time = 25ms




                                                                                                         New York



                                                                    Connects to the Most Optimum Head-end
                                                                    HTTPS Request Approximated by Fastest Round Trip Time
© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                         Cisco Confidential   30
ASDM Profile Configuration




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   31
§ Always-On enforces VPN
  connectivity.

§ If AnyConnect fails to connect, its
  endpoint can fail closed, preventing
  network connectivity to and from
  the endpoint.

§ Always-On allows AnyConnect
  users to remediate their Captive
  Port prior to required VPN
  establishment.




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   32
User Experience


                                                           § Captive Portal Remediation Required




© 2010 Cisco and/or its affiliates. All rights reserved.                          Cisco Confidential   33
ASDM Profile Configuration




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   34
Network Follows Users – It Just Works


                                                                                      § VPN session remains connected
                                                                                           § While user migrates between
                                                                                             networks (3G, WiFi, LAN, etc)
                                                                                           § During loss of network
                                                                                             connectivity
                                                                                           § During system hibernation /
                                                                                             standby
                                                                                      § Administratively controlled policy
                                                                                      § Compatible with all auth methods
                                                            Auto-detect and connect
                            Persistent                      Transparent handoff       User does not re-authenticate after
                            Connectivity                                                hibernation/standby
                                                            Session persistence




 © 2010 Cisco and/or its affiliates. All rights reserved.                                                                    Cisco Confidential   35
User Experience: User Indicator


                                                           § Connection State: Reconnecting




© 2010 Cisco and/or its affiliates. All rights reserved.                         Cisco Confidential   36
ASA-WSA Communication
                                                                                                            Across SSL Connection

                                                                                                        User Identity & Tunneled IP
                                                                            News       Email
                                                                      facebook.com

                                                                 User Authenticates
                                                                                          Adaptive Security Appliance          Web Security Appliance
                                                                    VPN Tunnel
                                                                    Established         VPN Tunnel                                           User & Group
                                                                                       Authentication                                        Authorization


                                                                                                          Active Directory    LDAP,
                                                                                                                NTLMSSP, Basic


                                                                                       ASA          WSA
                                                 1.        AnyConnect Authenticates and Establishes a VPN Tunnel to the ASA
                                                 2.        ASA Extracts Username from Certificate or AAA Server
                                                 3.        ASA Forwards Username and Tunneled IP Address to the WSA
                                                 4.        WSA Verifies Username and Group Membership against Active Directory
                                                 5.        WSA Applies Policies based on Username or Group Membership
© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                                Cisco Confidential   37
ASA to WSA Communication


                                   § ASA & WSA Communication
                                     Network
                                   § Enable Secure Mobility
                                     Solution
                                   § Services Port
                                   § WSA Access Password




 © 2010 Cisco and/or its affiliates. All rights reserved.      Cisco Confidential   38
ASA to WSA Communication
                                                            § Enable Secure Mobility Solution
                                                            § Enable Cisco ASA Integration
                                                            § ASA Hostname or IP Address &
                                                              Service Port & Access Password




 © 2010 Cisco and/or its affiliates. All rights reserved.                                       Cisco Confidential   39
Communication Test


                           § Verify ASA > WSA Communication



                                                              § Verify WSA > ASA Communication




 © 2010 Cisco and/or its affiliates. All rights reserved.                                    Cisco Confidential   40
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   41
Security

                                                                                                         Malware
                                                                                                         Defense


                                                                                                         Data
                                                                                                         Security
                                Secure Mobility                                  Internet
                                                                                              Control

                                                                                                         Acceptable
                                                                                                         Use Controls


                                                                                                         SaaS Access
                                                                                                         Controls



                                                           Centralized Management and Reporting
© 2010 Cisco and/or its affiliates. All rights reserved.                                                                Cisco Confidential   42
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   43
Full Bandwidth

© 2010 Cisco and/or its affiliates. All rights reserved.       Cisco Confidential   44
Allow Business Relevant Video




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   45
Finance   Legal   Marketing

© 2010 Cisco and/or its affiliates. All rights reserved.                       Cisco Confidential   46
Restrict Media




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   47
Finance   Legal   Marketing

© 2010 Cisco and/or its affiliates. All rights reserved.                         Cisco Confidential   48
Override Restrictions




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   49
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   50
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   51
Facebook Control




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   52
PERMISSION




© 2010 Cisco and/or its affiliates. All rights reserved.                Cisco Confidential   53
Override Restrictions




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   54
Regaining Visibility and Control Through Identity


                                                                                                        SaaS
                                             Corporate                                                  Single
                                             Office                   Redirect @ Login                  Sign On



                                             Branch
                                             Office


                                                                                                        SaaS
                                             Home                                                       Single
                                             Office                                                     Sign On


                                         AnyConnect
                                         Secure
                                         Mobility Client               User Directory

                                                                                         No Direct Access

                                                                                                X

                                                   Visibility | Centralized Enforcement | Single Source Revocation
© 2010 Cisco and/or its affiliates. All rights reserved.                                                             Cisco Confidential   55
Seamless Single Sign-on
                                                           No login needed




© 2010 Cisco and/or its affiliates. All rights reserved.                             Cisco Confidential   56
User Accesses Web Site            Connection Proxied



                                                           Redirect to SAML SSO URL         Redirect to SAML SSO URL


                                                           Browser Requests SSO URL



                                                           Javascript POST ACS URL
                                                               + SAML response

                                                             POSTS SAML response            POST proxied to website


                                                           Delivers Web User’s Portal       User Logged Into Service




                                                                             Authenticate
                                                                             (if unknown)



© 2010 Cisco and/or its affiliates. All rights reserved.                                                               Cisco Confidential   57
WSA Mobile User Reports




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   58
Simple investigative tool

                                      Track User activity /             Track a web site
                                      Search by IP ranges




                               ü Know who is going to which web site
                               ü Know who went to a specific web site
                               ü And more…




© 2010 Cisco and/or its affiliates. All rights reserved.                                   Cisco Confidential   59
Web Security with Next Generation Remote Access

                                                                                                                  Choice
                                                                                                                      Diverse Endpoint
                                                                                                                     Support for Greater
                                                                                                                         Flexibility




                                                                                                                  Security
                                            Data Loss Prevention                                 Acceptable Use
                                                                                                                   Rich, Granular Security
                                                                                                                          Integrated
                                            Threat Prevention                                    Access Control       into the network




                                                                                                                  Experience
                                                                   Access Granted
                                                                                                                    Always-on Intelligent
                                                                                                                   Connection for Seamless
                                                                                    Intranet
                                                                                                                       Experience and
                                                                                                                        Performance
                                                                                Corporate File
                                                                                     Sharing

© 2010 Cisco and/or its affiliates. All rights reserved.                                                                              Cisco Confidential   60
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   61
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   62
A pessimist sees the
difficulty in every
opportunity; an optimist
sees the opportunity in
every difficulty.
            Winston Churchill
Thank you.

More Related Content

What's hot

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
Virtual private network
Virtual private network Virtual private network
Virtual private network Parth Akbari
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetVuz Dở Hơi
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud securityZscaler
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus networkAalap Tripathy
 
Presentation on Vowifi
Presentation on VowifiPresentation on Vowifi
Presentation on Vowifisrishti jain
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersNetProtocol Xpert
 
Presentation fortinet securing the cloud
Presentation   fortinet securing the cloudPresentation   fortinet securing the cloud
Presentation fortinet securing the cloudxKinAnx
 
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.comEigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.comRishabh Dangwal
 
1. Cybercrime Response Policy_Gibum Kim.pdf
1. Cybercrime Response Policy_Gibum Kim.pdf1. Cybercrime Response Policy_Gibum Kim.pdf
1. Cybercrime Response Policy_Gibum Kim.pdfSIPLLEMDIKLAT
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IPMichael Lamont
 
Tunnel vs VPN on Mikrotik
Tunnel vs VPN on MikrotikTunnel vs VPN on Mikrotik
Tunnel vs VPN on MikrotikGLC Networks
 
Module 10: CDB Subscribers
Module 10: CDB SubscribersModule 10: CDB Subscribers
Module 10: CDB SubscribersTail-f Systems
 

What's hot (20)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
CCNP Security-VPN
CCNP Security-VPNCCNP Security-VPN
CCNP Security-VPN
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - Ethernet
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud security
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus network
 
Presentation on Vowifi
Presentation on VowifiPresentation on Vowifi
Presentation on Vowifi
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & Answers
 
Presentation fortinet securing the cloud
Presentation   fortinet securing the cloudPresentation   fortinet securing the cloud
Presentation fortinet securing the cloud
 
Wlan security
Wlan securityWlan security
Wlan security
 
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.comEigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
 
Vpn
VpnVpn
Vpn
 
1. Cybercrime Response Policy_Gibum Kim.pdf
1. Cybercrime Response Policy_Gibum Kim.pdf1. Cybercrime Response Policy_Gibum Kim.pdf
1. Cybercrime Response Policy_Gibum Kim.pdf
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Tunnel vs VPN on Mikrotik
Tunnel vs VPN on MikrotikTunnel vs VPN on Mikrotik
Tunnel vs VPN on Mikrotik
 
OSPF v3
OSPF v3OSPF v3
OSPF v3
 
Module 10: CDB Subscribers
Module 10: CDB SubscribersModule 10: CDB Subscribers
Module 10: CDB Subscribers
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 

Viewers also liked

TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect Robb Boyd
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusRassul Ismailov
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinJoe Sarno
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Haris Khan
 
Implementing Cisco AAA
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAAdkaya
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn securityJack Melson
 
Fortinet UTM - les Fonctionnalités avancéese
Fortinet UTM - les Fonctionnalités avancéeseFortinet UTM - les Fonctionnalités avancéese
Fortinet UTM - les Fonctionnalités avancéeseAlphorm
 

Viewers also liked (9)

Fortinet
FortinetFortinet
Fortinet
 
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6
 
Implementing Cisco AAA
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAA
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn security
 
Fortinet UTM - les Fonctionnalités avancéese
Fortinet UTM - les Fonctionnalités avancéeseFortinet UTM - les Fonctionnalités avancéese
Fortinet UTM - les Fonctionnalités avancéese
 

Similar to Cisco Next-Generation Network Access Solution Overview

Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011Cisco Collaboration
 
Enabling the Borderless Organization
Enabling the Borderless OrganizationEnabling the Borderless Organization
Enabling the Borderless OrganizationCisco Canada
 
Bridging the wired wireless
Bridging the wired wirelessBridging the wired wireless
Bridging the wired wirelessInterop
 
Cisco small business_communicate_by_leah_davis
Cisco small business_communicate_by_leah_davisCisco small business_communicate_by_leah_davis
Cisco small business_communicate_by_leah_davisgkmurase
 
Presentación IronPort Products
Presentación IronPort ProductsPresentación IronPort Products
Presentación IronPort ProductsLogicalis Latam
 
Seguridad en la Nube
Seguridad en la NubeSeguridad en la Nube
Seguridad en la NubeMundo Contact
 
Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceCisco Mobility
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceGen-i
 
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data CenterCloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data CenterCisco Service Provider
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYODGen-i
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYODGen-i
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceGen-i
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012Cisco Public Relations
 
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...HKISPA
 
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service Cisco Canada
 

Similar to Cisco Next-Generation Network Access Solution Overview (20)

Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011
 
Enabling the Borderless Organization
Enabling the Borderless OrganizationEnabling the Borderless Organization
Enabling the Borderless Organization
 
Bridging the wired wireless
Bridging the wired wirelessBridging the wired wireless
Bridging the wired wireless
 
Cisco small business_communicate_by_leah_davis
Cisco small business_communicate_by_leah_davisCisco small business_communicate_by_leah_davis
Cisco small business_communicate_by_leah_davis
 
Presentación IronPort Products
Presentación IronPort ProductsPresentación IronPort Products
Presentación IronPort Products
 
Cisco Localisation Toolkit
Cisco Localisation ToolkitCisco Localisation Toolkit
Cisco Localisation Toolkit
 
Seguridad en la Nube
Seguridad en la NubeSeguridad en la Nube
Seguridad en la Nube
 
Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any Workspace
 
Cisco Telepresence Solution 2012
Cisco Telepresence Solution 2012Cisco Telepresence Solution 2012
Cisco Telepresence Solution 2012
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data CenterCloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
 
Juniper sa-sslvpn
Juniper sa-sslvpnJuniper sa-sslvpn
Juniper sa-sslvpn
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012
 
Mwc wip jam jabber sdk final
Mwc wip jam jabber sdk finalMwc wip jam jabber sdk final
Mwc wip jam jabber sdk final
 
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
 
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service
 

More from Cisco Canada

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco Canada
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic frCisco Canada
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Cisco Canada
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 

More from Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Cisco Next-Generation Network Access Solution Overview

  • 1. #CNSF2011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • 2. • Solution Overview • Deployment Scenarios • Feature Highlights • Q&A • Wrap Up © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 3
  • 4. Policy Corporate Border Platform Infrastructure Applications as a Service as a Service Software X and Data as a Service as a Service Corporate Office Branch Office Home Office Airport Mobile Coffee © 2010 Cisco and/or its affiliates. All rights reserved. User Attackers Partners Customers Shop Cisco Confidential 4
  • 5. Personal Business © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. Limited Predominantly PC-based Client Support Manual Numerous “clicks” Non-persistent Connection No Security or Visibility Security Rarely-On Intranet Only connected if / when absolutely necessary Corporate File Sharing © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. Limited Clients Predominantly PC-based Client Support – Data Loss Prevention Acceptable Use ü Limited Security URL-filtering client unable – Threat Prevention Access Control to address key use cases Access No Access No Access Intranet Not integrated, requires separate VPN client Corporate File Sharing © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. Choice Diverse Endpoint Support for Greater Flexibility ü Data Loss Prevention Acceptable Use ü Security ü Threat Prevention Access Control ü Rich, Granular Security Integrated Into the network Access Granted Experience Always-on Intelligent Intranet Connection for Seamless Experience and Corporate File Performance Sharing © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. Network and Security Follows User—It Just Works Corporate Mobile Home Broad Mobile Support Office User Office § Fixed and semi-fixed platforms § Mobile platforms Persistent Connectivity § Always-on connectivity Wired Wi-Fi § Optimal gateway selection Cellular/Wi-Fi § Automatic hotspot negotiation § Seamless connection hand-offs Next-Gen Unified Security Secure, § User/device identity Consistent § Posture validation including Managed vs Un Managed Access Assets § Integrated web security for always-on security (hybrid) § Clientless and desktop virtualization Voice—Video—Apps—Data © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. Anyone Anything Anywhere Anytime Securely, Reliably, Seamlessly © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. Inside the Corp Environment Outside the Corp Environment 802.1X, TrustSec, Always-On Integrated MACsec Security and Policy SECURITY and POLICY Customers Coffee Shop Home Office Local Data Center Software Platform Infrastructure X as a Service Corporate Office as a Service as a Service as a Service Branch Office Airport Mobile User Attackers Partners CORP DMZ © 2010 Cisco and/or its affiliates. All rights reserved. BORDER Cisco Confidential 11
  • 12. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. Internet Trusted Network News Email User Identity facebook.com User SSL VPN ASA WCCP Cisco Web Authenticates Tunnel All Traffic Security Appliance Corporate AD Untrusted Network Social Networking Enterprise SaaS AnyConnect ASA à WSA • Always-on VPN (admin • Authentication handoff (SSO) configurable) • Identity and location aware • Optimal head end auto-detect policy enforcement • Transparent auth (certificate) • Location-aware reporting © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  • 14. ASA Config route inside 0.0.0.0 0.0.0.0 192.168.1.2 tunneled route inside 10.10.10.0 255.0.0.0 192.168.1.2 IOS Config ip wccp 80 redirect-list redirect-acl interface eth0 ip wccp 80 redirect in © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  • 15. ASA Config route inside 0.0.0.0 0.0.0.0 192.168.1.2 tunneled route inside 10.10.10.0 255.0.0.0 192.168.1.2 wccp 80 redirect-list redirect-acl wcpp iterface inside 80 redirect in © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  • 16. ASA-1 Config route inside 0.0.0.0 0.0.0.0 192.168.1.2 tunneled route inside 10.10.10.0 255.0.0.0 192.168.1.2 IOS Config ip wccp 80 redirect-list redirect-acl interface eth0 ip wccp 80 redirect in © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  • 17. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
  • 18. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. Trusted Network Internet facebook.com IPSec / SSL VPN Internal Data ASA Untrusted Network AnyConnect ScanSafe • Always-on VPN (admin • Web 2.0 Content Control configurable) • Dynamic Web Classification • Optimal head end auto-detect • Search Ahead • Transparent auth (certificate) • Outbreak Intelligence • Real-time Content Analysis © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20. Web Security with ScanSafe ScanSafe Internet bound web communications Internal communications AnyConnect Secure Mobility Client © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  • 21. Web Security with ScanSafe ScanSafe Internet bound web communications Internal communications AnyConnect Secure Mobility Client © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. Web Security Cloud Web AnyConnect ASA Firewall Appliance Security § Trusted Network § AnyConnect Secure § Remote Specific § Web 2.0 Content Detection Mobility Head End Policy Control § Session Support § Application Controls § Dynamic Web Persistence § Optimized WSA Classification § SaaS Access § Optimal Gateway Traffic handoff Control § HTTP/s Scanning Selection § Simplified § Multi-layer malware § Search Ahead § Always-on VPN Management defense § Outbreak § Enhanced Device § Enterprise firewall § URL filtering & Intelligence Support § Remote Access Dynamic Categorization § Real-Time Content § IPSec IKEv2 Head End Analysis § Network Access § BotNet Filter § Data Security Manager § Application Visibility § Telemetry and Control § SCEP Enrollment § Acceptable Use / Control § Malware Defense © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  • 24. • Always On VPN extends the virtual perimeter to the endpoint § Security Persistence and Security Enforcement Array Location-aware policy are administratively Captive portal controlled nearest headend Auth persistence § If ASA head-end is unreachable, § fail-open (direct network access) or Security Persistence with Always On VPN § fail-close (no network (Fail Closed or Fail Open) access) © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
  • 25. § Always-On, Failed Closed § Connection Status § No Network Access Available § Manual URL Entry is not Allowed © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
  • 26. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
  • 27. Trusted Network Detection § Automatically connects or disconnects under the following conditions: § In Office § Out of Office § Location determination made by Default Domain Name or DNS server IP § Other checks likely in future In Office Out of Office § Certificate authentication for seamless reconnection § Administratively controlled policy § Windows XP, Vista, 7 & Mac OS X © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
  • 28. Detects Trusted or Untrusted Network Infrastructures for Secure Connectivity § Trusted Network Detection is Configurable VIA the AnyConnect Profile § Trusted Networks can be Defined as DNS Suffixes or DNS Server IP Addresses Corporate Headquarters § DNS Suffixes and DNS Server IP Addresses must be defined on the Client Workstation Dynamically (DHCP) DHCP Request § If Both the Trusted DNS Suffix and DNS Server IP Address are Defined, the Entries will be ANDed to Determine the Home Office Trusted Network © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
  • 29. ASDM Profile Configuration © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
  • 30. Feature Parameters: London § Suspension Time Threshold (hours) § Performance Improvement Threshold (%) Boston Time = 33ms Los Angeles Time = 35ms Time = 26ms Time = 25ms Time = 28ms Time = 23ms Time = 27ms Time = 24ms Time = 25ms New York Connects to the Most Optimum Head-end HTTPS Request Approximated by Fastest Round Trip Time © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
  • 31. ASDM Profile Configuration © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
  • 32. § Always-On enforces VPN connectivity. § If AnyConnect fails to connect, its endpoint can fail closed, preventing network connectivity to and from the endpoint. § Always-On allows AnyConnect users to remediate their Captive Port prior to required VPN establishment. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
  • 33. User Experience § Captive Portal Remediation Required © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
  • 34. ASDM Profile Configuration © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
  • 35. Network Follows Users – It Just Works § VPN session remains connected § While user migrates between networks (3G, WiFi, LAN, etc) § During loss of network connectivity § During system hibernation / standby § Administratively controlled policy § Compatible with all auth methods Auto-detect and connect Persistent Transparent handoff User does not re-authenticate after Connectivity hibernation/standby Session persistence © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
  • 36. User Experience: User Indicator § Connection State: Reconnecting © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
  • 37. ASA-WSA Communication Across SSL Connection User Identity & Tunneled IP News Email facebook.com User Authenticates Adaptive Security Appliance Web Security Appliance VPN Tunnel Established VPN Tunnel User & Group Authentication Authorization Active Directory LDAP, NTLMSSP, Basic ASA WSA 1. AnyConnect Authenticates and Establishes a VPN Tunnel to the ASA 2. ASA Extracts Username from Certificate or AAA Server 3. ASA Forwards Username and Tunneled IP Address to the WSA 4. WSA Verifies Username and Group Membership against Active Directory 5. WSA Applies Policies based on Username or Group Membership © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
  • 38. ASA to WSA Communication § ASA & WSA Communication Network § Enable Secure Mobility Solution § Services Port § WSA Access Password © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
  • 39. ASA to WSA Communication § Enable Secure Mobility Solution § Enable Cisco ASA Integration § ASA Hostname or IP Address & Service Port & Access Password © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
  • 40. Communication Test § Verify ASA > WSA Communication § Verify WSA > ASA Communication © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
  • 41. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
  • 42. Security Malware Defense Data Security Secure Mobility Internet Control Acceptable Use Controls SaaS Access Controls Centralized Management and Reporting © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
  • 43. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
  • 44. Full Bandwidth © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
  • 45. Allow Business Relevant Video © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
  • 46. Finance Legal Marketing © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
  • 47. Restrict Media © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
  • 48. Finance Legal Marketing © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
  • 49. Override Restrictions © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
  • 50. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
  • 51. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
  • 52. Facebook Control © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
  • 53. PERMISSION © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
  • 54. Override Restrictions © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
  • 55. Regaining Visibility and Control Through Identity SaaS Corporate Single Office Redirect @ Login Sign On Branch Office SaaS Home Single Office Sign On AnyConnect Secure Mobility Client User Directory No Direct Access X Visibility | Centralized Enforcement | Single Source Revocation © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
  • 56. Seamless Single Sign-on No login needed © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
  • 57. User Accesses Web Site Connection Proxied Redirect to SAML SSO URL Redirect to SAML SSO URL Browser Requests SSO URL Javascript POST ACS URL + SAML response POSTS SAML response POST proxied to website Delivers Web User’s Portal User Logged Into Service Authenticate (if unknown) © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
  • 58. WSA Mobile User Reports © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
  • 59. Simple investigative tool Track User activity / Track a web site Search by IP ranges ü Know who is going to which web site ü Know who went to a specific web site ü And more… © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
  • 60. Web Security with Next Generation Remote Access Choice Diverse Endpoint Support for Greater Flexibility Security Data Loss Prevention Acceptable Use Rich, Granular Security Integrated Threat Prevention Access Control into the network Experience Access Granted Always-on Intelligent Connection for Seamless Intranet Experience and Performance Corporate File Sharing © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
  • 61. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
  • 62. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
  • 63. A pessimist sees the difficulty in every opportunity; an optimist sees the opportunity in every difficulty. Winston Churchill

Editor's Notes

  1. Organizations that deliver the experience we just described, are truly borderless - Connecting anyone - employees, partners and customers, to anything, anywhere anytime. Delivering the same productivity, the same access to the information and the same responsiveness. We call it the borderless experience. …securely, reliably, and seamlesslyLet’s take a look [CLICK – Transition] at how Borderless Networks delivers on that vision.