• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Internal/Conf Generic Template
 

Internal/Conf Generic Template

on

  • 436 views

 

Statistics

Views

Total Views
436
Views on SlideShare
436
Embed Views
0

Actions

Likes
0
Downloads
1
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Internal/Conf Generic Template Internal/Conf Generic Template Document Transcript

    • OverviewCisco Advanced Services for Network Security.The challenges of keeping your network infrastructure secure have never been greater or more important to yourbusiness. To help ensure your business is protected, security must be an intrinsic part of the network, implementedthroughout your environment to address a range of network security threats.To meet those challenges, Cisco® Advanced Services for Network Securityoffers expert advice on how to mitigate network security threats and meet yourorganization’s productivity and total cost of ownership (TCO) goals. Uniquefrom Cisco Systems® is a complete service offering in which security isintegral to the network.The Cisco Advanced Services team is made up of industry experts in networksecurity with experience running security operations for many global Fortune500 companies. In addition, Cisco Advanced Services consultants holdexpert-level CCIE® and CISSP certifications and have direct experience inplanning, designing, implementing, and optimizing large network securityinfrastructures.With the help of practical experience, knowledge of the latest network security technology, and specialized tools, theCisco Advanced Services engineering team can build an in-depth knowledge of your business objectives and securityenvironment to assist you in managing the evolving information security threat. When you do business with the largest corporations in the world, especially when you’re connecting an Internet-based system to their network, security and reliability are critical. Cisco was an easy choice. When you’re building a company like ours from the ground up and our reputation and our product suite is dependent upon enabling interconnectivity and maintaining a healthy, robust network, it makes sense to go with the industry leader. − Kirt A. Scott, Vice President and Chief Technology Officer for FuelQuest, Inc. © 2002 Cisco Systems, Inc. All right reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com Page 1 of 13
    • Security Services to Support the Network LifecycleCisco Advanced Services for Network Security offers security services to support the complete life cycle of your network.Offering expert advice on how to meet your company’s security guidelines and policy, Cisco engineers can help yousuccessfully plan, design, and manage the integration of network- and host-based intrusion detection sensors, firewall devices,and security technologies such as IP Security (IPSec) VPNs into your network infrastructure.Plan: Network Security Assessments and PlanningCisco assessment and planning services range from developing an overview of your organization’s operational approach tosecurity, to assessing the security of networked applications, systems, and devices. By assessing all aspects of your networkedbusiness environment, Cisco can help determine your organization’s ability to detect, defend against, and respond to networkattacks.Security Posture AssessmentAs the first step in planning network security, Cisco can provide you with a comprehensive evaluation of your organization’snetwork security posture. The Security Posture Assessment (SPA) provides a snapshot of the security state of your network byconducting a thorough assessment of your network devices, servers, desktops, and databases. Cisco experts analyze theeffectiveness of your network security in reference to recognized industry best practices, allowing you to identify the relativestrengths and weaknesses of your environment and document specific vulnerabilities that could threaten your business.Because network security involves all aspects of your business, Cisco engineers assess security from a variety of perspectivesincluding your internal, external, dialup, and wireless networks, providing recommendations on how to improve overall networksecurity. By taking a comprehensive approach using specialized tools by security experts with extensive field experience, Ciscocan identify which vulnerabilities may be used to gain unauthorized access to networks, systems, and information. (Table 1)Internal AssessmentWith so much attention devoted to threats and incidents by remote hackers abusing the Internet, the security of your internaltrusted network may be overlooked. The internal assessment is a controlled network-attack simulation used to gauge theexposure present on internal systems, applications, and network devices. The assessment identifies the steps needed to thwartintentional attacks or unintentional mistakes from trusted insiders to better secure valuable information assets.The Internal SPA takes a comprehensive approach to gaining unauthorized access to internal resources. Going beyond automateddetection of vulnerabilities, Cisco engineers simulate a real intruder’s attack in a controlled, safe manner to manually confirmvulnerabilities, providing a more structured approach to identifying vulnerabilities that may go undetected. This secondaryexploitation may include attempting to exploit trusted relationships between hosts, exploiting password weakness, or gainingadministrative access to systems.External AssessmentThe goal of an external assessment is to quantify the security risk associated with Internet-connected systems. To effectivelyidentify vulnerabilities that allow untrusted, outside networks to gain access to internal, trusted networks and systems, Cisco © 2002 Cisco Systems, Inc. All right reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com Page 2 of 13
    • engineers can simulate hostile activities typical of malicious attackers attempting to compromise perimeter devices and Internetsecurity controls.Cisco experts begin by conducting a remote vulnerability scan of the organization’s Internet presence using specialized,automated tools with capabilities that extend well beyond standard commercial tools. After researching and confirmingregistration of Internet devices, Cisco experts scan for services that are externally visible. Because most services have inherentand well-known vulnerabilities, Cisco engineers work to determine if the services offered are potentially vulnerable and attemptto manually confirm vulnerabilities that may lead to security compromises.Wireless AssessmentThe wireless assessment provides an evaluation of the security posture of an organization’s wireless network to identify risks andexposures associated with a wireless deployment. Cisco experts analyze the wireless technology architecture and configurationsto identify authorized and unauthorized access points and recommend solutions to strengthen the security of the wirelessinfrastructure.Cisco experts begin by surveying the customer premises to discover and map all available access points. By comparing the datagathered during the site survey against a list of authorized devices, Cisco is able to identify possible rogue devices. After aninventory of access points is completed, Cisco engineers review and compare the wireless network architecture and configurationto industry best practices, documenting known vulnerabilities and threats.Moving outside customer buildings, engineers use sophisticated wireless antennas to attempt to find wireless network trafficleaking from buildings. If necessary, engineers will move into controlled areas of the building to continue seeking wireless LANtraffic. When traffic is discovered, engineers determine the level of encryption and authentication used, looking for networkattributes such as network addresses in an attempt to gain access to the LAN.Dialup AssessmentThe goal of the dialup assessment is to determine the security risks associated with remote-access services. Dial services canprovide an attacker an easy backdoor into a customer’s network, bypassing otherwise effective security measures such asfirewalls. Cisco engineers attempt to gain unauthorized access to the remote-access servers after identifying server software andthe authentication methods used. Manually attempting to bypass the access server, Cisco engineers try to determine where thecompromised device is connected to the network and, if possible, exploit further access.Security Posture Assessment Analysis and DocumentationThe Cisco engineers provide extensive analysis of the simulated attacks including management metrics and graphs that quantifythe security posture of the organization’s network. The SPA report also provides extensive technical details including analysis ofeach IP address, an explanation of methods used to compromise network devices and systems, and a description of the likelihoodof an attacker to use that same approach. The report then prioritizes the discovered vulnerabilities and recommends actions tocorrect the security risks, detailing remediation steps that can be taken to prevent future exploitation. © 2002 Cisco Systems, Inc. All right reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com Page 3 of 13
    • Table 1: Security Posture Assessment Features and BenefitsCapabilities and Methodology BenefitsCapabilities Mitigate network security threats • Internal assessment • Provide a cost-effective and unbiased assessment of information security – Perform an automated scan of ports to determine potential risk vulnerabilities • Identify critical security threats that – Simulate a controlled network attack to assess system, pose a risk to networks, systems, and application, and network device vulnerabilities information – Perform secondary exploitation to confirm identified • Support an organization’s need to vulnerabilities evaluate the effectiveness of existing security policy and procedures • External assessment • Assist in improving the security state – Conduct a remote scan of the organization’s Internet of the network by recommending presence actions to mitigate identified vulnerabilities – Simulate hostile activities in an attempt to compromise perimeter devices – Detail unauthorized device, server, and information access • Dialup assessment – Attempt to gain unauthorized access to the remote-access servers – Determine the authentication methods used and manually attempts to bypass them • Wireless assessment – Identify access points on the wireless network that may pose a security risk – Provide risk analysis and documents exposures within the wireless network – Document recommended configuration changes to minimize riskMethodology • Baseline testing of target network devices, systems, and services • External penetration testing, remote exploitation, and onsite internal simulated attacks to exploit vulnerabilities • Data and intelligence gathering to assess security threats to devices, systems, and information Deliverables—A SPA management and technical report providing analysis, documentation, and prioritization of vulnerabilities including recommendations for remediation; onsite executive presentation of findings and recommendations © 2002 Cisco Systems, Inc. All right reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com Page 4 of 13
    • Design: Build in Scalable, Adaptable, and Easy-to-Use Security SolutionsAfter you have assessed the security state of the network, Cisco can work with you to develop a strongsecurity design. Cisco design methodology considers all aspects of network security and its integrationwith the core network infrastructure. Using an in-depth, system-wide approach based on industry standards, Cisco experts canhelp you develop a multilayer defense against directed attacks from hackers or an indiscriminate attack from viruses and worms.Cisco design assistance can improve your competitive edge by enabling you to offer the secure application services yourcustomers need today. By taking an architectural approach, our security infrastructure is built to last and can evolve over time tosupport the deployment of new business applications.By specifying a common set of security solutions, policies, and practices that can be replicated across your organization, Ciscocan help reduce your network operating costs by saving time and money on network security administration, lowering yournetwork’s total cost of ownership.Network Security Design ReviewCisco can work with you to develop a strong security design from both an operational and technical perspective. Cisco securityconsultants can assist you in defining the policies, standards, and procedures that form the foundation of secure e-business, andthen work to develop a security architecture and design that supports your corporate security strategy.Cisco network security architects conduct a collaborative review of your organization’s business strategy and related securitygoals, requirements, and standards. Cisco engineers then provide an in-depth analysis of your network security architecture todetermine its effectiveness for meeting business and IT strategies. Based on analysis of the network information gathered, Ciscoengineers provide a detailed review of network vulnerabilities (Table 2).After evaluating your existing network for vulnerabilities, Cisco engineers can identify and prioritize security requirements fornetwork solutions including intrusion detection, remote access, host protection, perimeter control, and VPNs. Cisco canrecommend improvements to your network design including network topology, device placement, and connectivity. Taking intoconsideration all the aspects of network security such as scalability, performance, and manageability, Cisco can recommendprotocol, policy, and feature improvements for individual security components. © 2002 Cisco Systems, Inc. All right reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com Page 5 of 13
    • Table 2: Network Security Design Review Features and Benefits Capabilities and Methodology Benefits Capabilities Mitigate network security threats • Review network security business goals, objectives, and requirements • Identify security vulnerabilities and deviations from corporate security • Review the existing network security architecture and design policy and industry best practices • Identify and analyze architecture and design vulnerabilities • Help increase the effectiveness of network security to provide a • Provide a detailed analysis of network security components including: multilayer defense against security threats – Perimeter devices • Improve reliability, maintainability, – Remote-access devices and performance of the network security design – Intrusion detection systems Improve productivity – Firewalls • Reduce the time needed for – Routers and switches expensive, time-consuming, network redesign – Extranet connections – Security management systems Reduce total cost of ownership • Recommend improvements to topology, components, functions, and • Use existing security capabilities of features the network infrastructure • Develop sample configurations for firewalls, intrusion detection • Lower operating costs and systems, routers, switches, VPNs, access-control servers, wireless minimize network disruptions by devices, and security management tools ensuring consistent deployment of security policy • Specify hardware and software requirements including network security management tools • Provide recommendations for the ongoing management and maintenance of the security solution Methodology • Conduct a design workshop to gather data and initiate the design review • Analyze existing network security architecture against organizational strategy and requirements • Provide a preliminary and final gap analysis based on industry best practices • Deliver an impact analysis of new security requirements on the network infrastructure Deliverable—A Network Security Design Review document that identifies existing network vulnerabilities; recommends improvements to the overall security design, components, and functions; and provides network diagrams and sample configurations © 2002 Cisco Systems, Inc. All right reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com Page 6 of 13
    • Network Security Design DevelopmentThe Network Security Design Development service can assist in developing a strategy, plan, and design for integrating a newsecurity solution into the core network infrastructure. Cisco consultants and architects can review an organization’s securitygoals and then provide an in-depth analysis of the technical, procedural, and resource requirements for a customized securitydeployment that meets these goals.With this service, Cisco experts can help you minimize errors associated with deploying a new security solution. Organizationscan avoid potentially costly mistakes or delays by drawing on Cisco expertise across a broad set of network security technologiesincluding intrusion detection, firewalls, remote access, and VPNs. (Table 3)After gaining an understanding of your security solution goals and requirements, Cisco experts help develop a strategy anddesign for the security solution including detailed network diagrams and sample configurations that allow for easy integrationinto the organization’s environment.Table 3: Network Security Design Development Features and BenefitsCapabilities and Methodology BenefitsCapabilities Mitigate network security threats • Analyze network security solution goals, objectives, and requirements • Identify security vulnerabilities and deviations from corporate security • Jointly develop a strategy, plan, and design for a corporate-wide policy and industry best practices approach to network security • Develop a customized network • Evaluate the existing network architecture to identify architecture, security design that provides design, and implementation vulnerabilities multilayer defense against security threats • Jointly define the architectural, topological, and functional requirements for a new security solution deployment Improve productivity • Optimize the solution design for scalability, redundancy, and • Shorten implementation and performance migration times for new applications • Jointly develop a detailed design including sample configurations for and technology network security components including: • Help avoid problems during design, • Perimeter devices implementation, and deployment • Remote-access devices Reduce total cost of ownership • Intrusion detection systems • Help prevent costly redesigns to support new security requirements • Firewalls • Routers and switches • Prepare for future integration and deployment initiatives • Extranet connections • Security management systems • Provide detailed network diagrams and sample configurations for protocols, policies, and features • Specify hardware and software requirements including network security management tools • Provide recommendations for the ongoing management and maintenance of the security solution © 2002 Cisco Systems, Inc. All right reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com Page 7 of 13
    • Capabilities and Methodology BenefitsMethodology • Conduct a design workshop to gather data and initiate the development of the security design • Analyze existing network security architecture against organizational strategy and requirements • Develop network security strategy and design recommendations that meet customized IT and security requirements Deliverable—A Network Security Design Development document that outlines the overall strategy and plan for the new solution and defines the security design topology, components, and functions including network diagrams and sample configurationsImplement: Effectively Integrate Security into the Network InfrastructureWhen your security solution design is set, Cisco Advanced Services engineers can support your team throughimplementation and deployment activities. The sound security design principles and assistance provided during theplanning and design phases are made available during the implementation phase, strengthening your team’s ability to meetaggressive deployment schedules while helping to minimizing costly disruptions to the existing network infrastructure.Network Security Implementation Plan ReviewIf you are planning a new security deployment and would like assistance with your organization’s implementation plan, Ciscocan help you develop it further. Beginning with a thorough understanding of the objectives and scope of your deploymentproject, Cisco can provide a review of your plan that analyzes the technical requirements, procedures, and resources needed todeploy, integrate, and manage the security solution (Table 4).Cisco alerts you to problems you may encounter in the implementation and makes recommendations for hardware and softwarechanges that can help to ease the process of network staging, migration, and integration into the core network infrastructure.Cisco assists you with testing and installation plans, making recommendations for what to test and working with staff engineersto validate test results and help ensure acceptance criteria are met. © 2002 Cisco Systems, Inc. All right reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com Page 8 of 13
    • Table 4: Network Security Implementation Plan Review Features and BenefitsCapabilities and Methodology BenefitsCapabilities Mitigate network security threats • Develop an understanding of the objectives, scope, and constraints of • Assist in planning the most strategic the deployment and effective placement and • Review and analyze implementation plans, including the technical and configuration for the security procedural requirements for solution deployment, integration, and solution management Improve productivity • Review implementation action plans including tasks, milestones, resources, and schedule • Strengthen staff ability to meet deployment schedules • Analyze the network staging, test, and installation plans, including topology, configurations, test scripts, and acceptance criteria • Minimize costly disruption to the existing network infrastructure • Analyze and recommend hardware and software changes during deployment • Analyze hardware and configuration changes on an ongoing basis and • Minimize expensive rework of the notify network and security staff network infrastructure to support theMethodology new security solution • Conduct a collaborative planning session to understand requirements, identify interdependencies, and define project scope, roles, and responsibilities • Review and make recommendations on implementation, action, network staging, test, and installation plans • Analyze network changes on an ongoing basis and notify network and security staff Deliverable—An Implementation Plan Review document that provides recommendations for the successful implementation and management of the security solutionNetwork Security Implementation EngineeringTo be fully effective, security solutions must be not only strategically planned but also carefully deployed, configured, tuned,and integrated into the network infrastructure. Cisco Advanced Services for Network Security can help your organizationengineer the implementation of a new security solution (Table 5), enabling your organization to secure its environment morequickly, allowing for maximum use of your own staff resources.Cisco offers services to support you through all aspects of implementing a new security solution. Cisco engineers can help yourorganization during the critical planning phase to develop a deployment strategy including scope, objectives, and measurementsof success. The service also includes detailed plans for the solution deployment, including installation, configuration,integration, and management. After the strategy and plans are completed, Cisco engineers can work with your implementationstaff to provide custom installation, configuration, testing, and tuning to help ensure the deployment integrates smoothly intoyour production environment. © 2002 Cisco Systems, Inc. All right reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com Page 9 of 13
    • Table 5: Network Security Implementation Engineering Features and BenefitsCapabilities and Methodology BenefitsCapabilities Mitigate network security threats • Study the objectives, scope, requirements, resources, and constraints of • More rapidly secure an the security deployment project organization’s business environment by sharing the deployment workload • Jointly develop the implementation plan detailing the technical and procedure requirements for solution deployment, integration and Improve productivity management • Minimize costly mistakes or • Jointly develop the solution testing, installation, configuration, deployment delays integration, management, and maintenance plans • Provide efficient solution • Jointly develop the solution deployment action plan including tasks, deployment allowing for maximum milestones, and schedule use of staff resources • Jointly develop the network staging plan including physical and logical • Gain essential practical education topology, configurations, test scripts, and acceptance criteria from experienced Cisco security engineers • Provide custom installation, configuration, testing, tuning, and integration of the solution Reduce the total cost of ownership • Provide onsite support during integration with the production network • Optimize the security solution for ongoing, efficient management and • Provide practical education with staff on the operation and management maintenance of the solutionMethodology • Conduct a project planning meeting to set expectations, timeliness, and milestones and to define deliverables • Assist staff engineers in performing network site surveys • Travel on site to perform custom installation, configuration, tuning, and integration of the security solution • Provide onsite support during integration with the production network • Team with customer engineers to perform post-implementation verification testing and one day of onsite support Deliverable—Implementation Engineering report that details the completed installation, configuration, and tuning activities and outlines recommendations for the ongoing operation and management of the solution © 2002 Cisco Systems, Inc. All right reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com Page 10 of 13
    • Optimize: Continually Identify and Mitigate RiskAfter your security solution has been successfully deployed, your network infrastructure will be ready tosupport increased demands that may arise from changing business dynamics and growing networkrequirements. As network conditions change, Cisco will work with you to perform optimization checks tohelp ensure your network security infrastructure continues to meet performance objectives.Network Security OptimizationThe foundation of the Network Security Optimization service (Table 6) is in-depth knowledge of your network and securityinfrastructure gained through ongoing collaboration with your network operations staff. As network conditions change, Ciscoengineers can assess the ongoing security performance of your network by collecting and analyzing data for trends and securityexceptions.If your network security is found to be less than optimal, Cisco can recommend changes to optimize your security design andimplementation. Cisco engineers can evaluate and recommend changes to the load distribution and traffic-handling performanceof your network security devices as well as provide hardware and software recommendations to help prevent security breaches.If you are planning to introduce a new software configuration to the network, Cisco engineers can analyze the effects of thesechanges prior to deployment.Cisco also offers a network security advisory service to proactively notify you of Cisco security advisories that may affect yournetwork. If a security alert is issued, Cisco will contact you and work with staff engineers to determine the potential effect toyour network, recommending network modifications to mitigate your security risk. © 2002 Cisco Systems, Inc. All right reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com Page 11 of 13
    • Table 6: Network Security Optimization Features and BenefitsCapabilities and Methodology BenefitsCapabilities Mitigate network security threats • Define criteria for network security optimization including utilization, fault • Provide recommendations to conditions, error thresholds, and throughput improve network security efficiency, reliability, and performance • Collect and analyze data for trends and exceptions that may impact network security • Help ensure software and hardware changes do not degrade network • Review network security component placement and configuration for security optimal load distribution and traffic handling Improve productivity • Provide recommendations for network and security component tuning including system optimization, filtering, route redistribution, trunk and • Assist staff to proactively identify port configuration, and protocol, policy, and feature configuration and resolve potential network security risks • Monitor and inspect security logs to trend usage of systems and suspicious activity • Reduce the time and resources needed to stay apprised of security • Deliver impact analysis of new software features and configurations vulnerabilities • Provide hardware and software recommendations to optimize system Reduce total cost of ownership and network performance • Optimize network security infrastructure throughput and • Identify, analyze, and notify staff of network security advisories efficiencyMethodology • Conduct a planning meeting to set expectations and milestones and to define deliverables • Provide ongoing impact analysis of new software versions, features, and configurations • Provide ongoing notification and analysis of network security advisories Deliverable—An Implementation Engineering report that summarizes strengths and weaknesses found in the network security environment and recommends design and configuration improvementsThe Cisco Difference: People, Process, Tools, and PartnersCisco Advanced Services for Network Security offers certified experts, in-depth technical knowledge, specialized tools andmethodology, and industry-leading security research labs to deliver high quality network security services. Cisco consultantsand engineers can help you minimize the risk to valuable business assets by working with your team to assess, design,implement, and optimize network security solutions that are critical to managing the evolving information security threat.Contact your Cisco representative to find out more about how Cisco Advanced Services experts can help you to mitigate networksecurity threats, improve your organization’s staff productivity, and reduce the total cost of ownership for your network. © 2002 Cisco Systems, Inc. All right reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com Page 12 of 13
    • Corporate Headquarters European Headquarters Americas Headquarters Asia Pacific HeadquartersCisco Systems, Inc. Cisco Systems International Cisco Systems, Inc. Cisco Systems, Inc.170 West Tasman Drive BV 170 West Tasman Drive Capital TowerSan Jose, CA 95134-1706 Haarlerbergpark San Jose, CA 95134-1706 168 Robinson RoadUSA Haarlerbergweg 13-19 USA #22-01 to #29-01www.cisco.com 1101 CH Amsterdam www.cisco.com Singapore 068912Tel: 408 526-4000 The Netherlands Tel: 408 526-7660 www.cisco.com 800 553-NETS (6387) www-europe.cisco.com Fax: 408 527-0883 Tel: +65 317 7777Fax: 408 526-4100 Tel: 31 0 20 357 1000 Fax: +65 317 7799 Fax: 31 0 20 357 1100 Cisco Systems has more than 200 offices in the following countries and regions. Addresses, phone numbers, and fax numbers are listed on the Cisco Web site at www.cisco.com/go/offices.Argentina • Australia • Austria • Belgium • Brazil • Bulgaria • Canada • Chile • China PRC • Colombia • Costa Rica • Croatia • Czech Republic• Denmark • Dubai, UAE • Finland • France • Germany • Greece • Hong Kong SAR • Hungary • India • Indonesia • Ireland • Israel • Italy •Japan • Korea • Luxembourg • Malaysia • Mexico• The Netherlands • New Zealand • Norway • Peru • Philippines • Poland • Portugal • PuertoRico • Romania • Russia • Saudi Arabia • Scotland • Singapore • Slovakia • Slovenia • South Africa • Spain • Sweden • Switzerland • Taiwan •Thailand • Turkey Ukraine • United Kingdom • United States • Venezuela • Vietnam • ZimbabweCopyright 2003 Cisco Systems, Inc. All rights reserved. Cisco, Cisco Systems, and the Cisco Systems logo are registered trademarks ortrademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. All other trademarks mentioned in this documentor Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and © 2002 Cisco Systems, Inc. All right reserved.any other company. (0301R) Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com Page 13 of 13Printed in the USA