SlideShare a Scribd company logo
1 of 22
Download to read offline
1© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Protegendo a nova geração
de redes de acesso
Flávio Corrêa
Consulting Systems Engineer - Mobility
Fernando Zamai
Consulting Systems Engineer - Security
2© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Evolução das redes de acesso
Cisco Wi-Fi
Cisco LAN
Autonomous
Access Point
Controller
Coordinated
Access Points
with RRM
1,2, and 3
Spatial
Stream
802.11n with
CleanAir
Unified
Policy and
Network
Management
Stateful
Switchover &
Application
Visibility and
Control
802.11ac
Wave 1 &
High-Density
ExperienceConnected
Mobile
Experiences
802.11ac Wave
2 & Multigigabit
Ethernet &
Hyperlocation
Self-Learning -
RRM
Self-Protecting -
CleanAir
Self-Healing
– SSO
Self-Optimizing–
HDX
1997 2012 2016
Cisco Unified
Access™
3© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1000!
14B!
500B!
Conexões Internet!
+55%!
Tráfego Internet!
hoje é WiFi!
50B!
4© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Evolução do casos de uso de mobilidade
BYOD!
Company !
Purchased!
Basic
Communications!
Transforming!
Work!
Mobile
Transactions!
Networking!
5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Autenticação! Criptografia! Rogue APs! Ataques OTA!
6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
7© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
8© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Access Point
“Rogue”
9© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
11© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Visibilidade! Localização!
CleanAir!
WIDS/WIPS!
AVC / NetFlow!
Interferências!
Clients!
Rogue Aps!
Attackers!
Rede como Sensor!
12© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
13© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
14© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
ISE
Cisco Identity Services Engine
Controle de acesso avançado com compartilhamento de contexto em tempo real.
Wired
Wireless
VPN
Dynamic Segmentation Options:
VLANs, DACLs, or TrustSec
Política de Acesso, Segmentação e Contexto é
fundamental no combate ao Cybercrime.
Quem é você? à Paulo
Qual Dispositivo? à iPad Pessoal ou Corporativo (BYOD)
Onde? à Torre A, 2o andar
Quando? à 16:30, 16 de Setembro
Como? à Wired, Wireless, ou VPN
15© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Controle de Acesso Avançado
Fingerprint
MAC Vendor, Dhcp / CDP, Nmap
Dispositivo
=
Access Point
Ubiquiti
NEGADO
16© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Provisionar
BYOD - Provisionamento
[Nome / senha]
•  Usuário é autorizado?
•  Dispositivo é autorizado?
Provisionar
fzamai
C1:5C:00:00:20:15
OU = BYOD Access
ü 
ü 
fzamai
C1:5C:00:00:20:15
OU = BYOD Access
WiFi
17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configurar
Rede
BYOD – Acesso Seguro e Transparente
•  Certificado válido?
•  Usuário válido?
•  Grupo BYOD?
•  Dispositivo válido?
•  MAC Cert / Dispositivo?
Autorizar
Acesso
BYOD
Vlan = 10
ACL = Net_Only
TAG = BYOD
ü 
Certificado
fzamai
C1:5C:00:00:20:15
OU = BYOD Access
18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Confidential
19© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Confidential
USABILIDADE
20© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Rastreabilidade
WWW
10.1.1.20 → www.cisco.com
10.1.1.20
Usuário?
Fzamai
IPAD
BYOD
21© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network
as Sensor
Network as
Enforcer
Protegendo a nova geração de redes

More Related Content

What's hot

Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionSquareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionAlan Quayle
 
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...Cisco Canada
 
Safe Net Final 3 25 11
Safe Net Final 3 25 11Safe Net Final 3 25 11
Safe Net Final 3 25 11dfrenchie00731
 
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Xirrus
 
Cloud managed secure wi fi
Cloud managed secure wi fiCloud managed secure wi fi
Cloud managed secure wi figruzabb
 
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Xirrus
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...Cisco Canada
 
Cisco aironet 1815 series access points
Cisco aironet 1815 series access pointsCisco aironet 1815 series access points
Cisco aironet 1815 series access pointsIT Tech
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Ajeet Singh
 
Eficiencia y productividad
Eficiencia y productividadEficiencia y productividad
Eficiencia y productividadschangan1
 
Meraki cloud managed products
Meraki cloud managed productsMeraki cloud managed products
Meraki cloud managed productsAtanas Gergiminov
 
ICPDAS - IIoT solution
ICPDAS - IIoT solutionICPDAS - IIoT solution
ICPDAS - IIoT solutionICPDAS
 
Ruckus Wireless ZoneDirector 1100 Product Card
Ruckus Wireless ZoneDirector 1100 Product CardRuckus Wireless ZoneDirector 1100 Product Card
Ruckus Wireless ZoneDirector 1100 Product CardPurdicom
 
ZyXEL Success Story: ZyXEL’s Solution Offers a Stable and Reliable Environmen...
ZyXEL Success Story: ZyXEL’s Solution Offers a Stable and Reliable Environmen...ZyXEL Success Story: ZyXEL’s Solution Offers a Stable and Reliable Environmen...
ZyXEL Success Story: ZyXEL’s Solution Offers a Stable and Reliable Environmen...Zyxel Communications Corp.
 

What's hot (20)

Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionSquareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
 
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
 
Safe Net Final 3 25 11
Safe Net Final 3 25 11Safe Net Final 3 25 11
Safe Net Final 3 25 11
 
AlexsanderLima
AlexsanderLimaAlexsanderLima
AlexsanderLima
 
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
 
Cloud managed secure wi fi
Cloud managed secure wi fiCloud managed secure wi fi
Cloud managed secure wi fi
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
 
Cisco aironet 1815 series access points
Cisco aironet 1815 series access pointsCisco aironet 1815 series access points
Cisco aironet 1815 series access points
 
IP-VPN
IP-VPNIP-VPN
IP-VPN
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture
 
Eficiencia y productividad
Eficiencia y productividadEficiencia y productividad
Eficiencia y productividad
 
Meraki cloud managed products
Meraki cloud managed productsMeraki cloud managed products
Meraki cloud managed products
 
ICPDAS - IIoT solution
ICPDAS - IIoT solutionICPDAS - IIoT solution
ICPDAS - IIoT solution
 
Ruckus Wireless ZoneDirector 1100 Product Card
Ruckus Wireless ZoneDirector 1100 Product CardRuckus Wireless ZoneDirector 1100 Product Card
Ruckus Wireless ZoneDirector 1100 Product Card
 
Everspring Homesys 2015
Everspring Homesys 2015Everspring Homesys 2015
Everspring Homesys 2015
 
ZyXEL Success Story: ZyXEL’s Solution Offers a Stable and Reliable Environmen...
ZyXEL Success Story: ZyXEL’s Solution Offers a Stable and Reliable Environmen...ZyXEL Success Story: ZyXEL’s Solution Offers a Stable and Reliable Environmen...
ZyXEL Success Story: ZyXEL’s Solution Offers a Stable and Reliable Environmen...
 
Intelligence Driven Security
Intelligence Driven SecurityIntelligence Driven Security
Intelligence Driven Security
 

Similar to Protegendo a nova geração de redes

SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...Cisco Canada
 
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Canada
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...NetworkCollaborators
 
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...Les Interconnectés
 
[Cisco Connect 2018 - Vietnam] Cisco connect 2018 sanjay - cisco sda v1.0-h...
[Cisco Connect 2018 - Vietnam] Cisco connect 2018   sanjay - cisco sda v1.0-h...[Cisco Connect 2018 - Vietnam] Cisco connect 2018   sanjay - cisco sda v1.0-h...
[Cisco Connect 2018 - Vietnam] Cisco connect 2018 sanjay - cisco sda v1.0-h...Nur Shiqim Chok
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the EnterpriseCisco Canada
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaCisco do Brasil
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessNetworkCollaborators
 
Building The Right Network
Building The Right NetworkBuilding The Right Network
Building The Right NetworkCisco Canada
 
Presentation cisco mobile internet
Presentation   cisco mobile internetPresentation   cisco mobile internet
Presentation cisco mobile internetxKinAnx
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Canada
 
Cisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCristian Garcia G.
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünlericem lale
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Internet of Everything - Edson Celestino.
Internet of Everything - Edson Celestino. Internet of Everything - Edson Celestino.
Internet of Everything - Edson Celestino. E-COMMERCE MX 2015
 
The Momentum of the Olympics
The Momentum of the OlympicsThe Momentum of the Olympics
The Momentum of the OlympicsAvaya Inc.
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronDejan Jeremic
 

Similar to Protegendo a nova geração de redes (20)

SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
 
[Cisco Connect 2018 - Vietnam] Cisco connect 2018 sanjay - cisco sda v1.0-h...
[Cisco Connect 2018 - Vietnam] Cisco connect 2018   sanjay - cisco sda v1.0-h...[Cisco Connect 2018 - Vietnam] Cisco connect 2018   sanjay - cisco sda v1.0-h...
[Cisco Connect 2018 - Vietnam] Cisco connect 2018 sanjay - cisco sda v1.0-h...
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the Enterprise
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined Access
 
Building The Right Network
Building The Right NetworkBuilding The Right Network
Building The Right Network
 
Presentation cisco mobile internet
Presentation   cisco mobile internetPresentation   cisco mobile internet
Presentation cisco mobile internet
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
 
Cisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallenge
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Protegendo sua rede
Protegendo sua redeProtegendo sua rede
Protegendo sua rede
 
Internet of Everything - Edson Celestino.
Internet of Everything - Edson Celestino. Internet of Everything - Edson Celestino.
Internet of Everything - Edson Celestino.
 
The Momentum of the Olympics
The Momentum of the OlympicsThe Momentum of the Olympics
The Momentum of the Olympics
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian Aron
 

More from Cisco do Brasil

Revista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficialRevista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficialCisco do Brasil
 
Revista Cisco Live Ed 24
Revista Cisco Live Ed 24Revista Cisco Live Ed 24
Revista Cisco Live Ed 24Cisco do Brasil
 
Revista Cisco Live Ed 23
Revista Cisco Live Ed 23Revista Cisco Live Ed 23
Revista Cisco Live Ed 23Cisco do Brasil
 
Revista Cisco Live Ed 22
Revista Cisco Live Ed 22Revista Cisco Live Ed 22
Revista Cisco Live Ed 22Cisco do Brasil
 
Revista Cisco Live Ed 21
Revista Cisco Live Ed 21Revista Cisco Live Ed 21
Revista Cisco Live Ed 21Cisco do Brasil
 
Revista cisco live ed 20
Revista cisco live ed 20Revista cisco live ed 20
Revista cisco live ed 20Cisco do Brasil
 
O seu DNS está protegido
O seu DNS está protegidoO seu DNS está protegido
O seu DNS está protegidoCisco do Brasil
 
Cisco Live Magazine ed 19
Cisco Live Magazine ed 19Cisco Live Magazine ed 19
Cisco Live Magazine ed 19Cisco do Brasil
 
Rio 2016 em Números - Cisco
Rio 2016 em Números - CiscoRio 2016 em Números - Cisco
Rio 2016 em Números - CiscoCisco do Brasil
 
Cisco Tetration Analytics
Cisco Tetration AnalyticsCisco Tetration Analytics
Cisco Tetration AnalyticsCisco do Brasil
 
Revista Cisco Live ed 18
Revista Cisco Live ed 18Revista Cisco Live ed 18
Revista Cisco Live ed 18Cisco do Brasil
 
Brazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investmentsBrazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investmentsCisco do Brasil
 
Cloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a criseCloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a criseCisco do Brasil
 
Transforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovaçãoTransforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovaçãoCisco do Brasil
 
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher  uma rede na nuvem ou no local5 perguntas para ajudar você a escolher  uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher uma rede na nuvem ou no localCisco do Brasil
 
5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua rede5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua redeCisco do Brasil
 
5 motivos para atualizar sua rede
5 motivos para atualizar sua rede5 motivos para atualizar sua rede
5 motivos para atualizar sua redeCisco do Brasil
 
5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamento5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamentoCisco do Brasil
 
A transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisasA transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisasCisco do Brasil
 

More from Cisco do Brasil (20)

Revista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficialRevista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficial
 
Revista Cisco Live Ed 24
Revista Cisco Live Ed 24Revista Cisco Live Ed 24
Revista Cisco Live Ed 24
 
Revista Cisco Live Ed 23
Revista Cisco Live Ed 23Revista Cisco Live Ed 23
Revista Cisco Live Ed 23
 
Revista Cisco Live Ed 22
Revista Cisco Live Ed 22Revista Cisco Live Ed 22
Revista Cisco Live Ed 22
 
Revista Cisco Live Ed 21
Revista Cisco Live Ed 21Revista Cisco Live Ed 21
Revista Cisco Live Ed 21
 
Revista cisco live ed 20
Revista cisco live ed 20Revista cisco live ed 20
Revista cisco live ed 20
 
O seu DNS está protegido
O seu DNS está protegidoO seu DNS está protegido
O seu DNS está protegido
 
Cisco Live Magazine ed 19
Cisco Live Magazine ed 19Cisco Live Magazine ed 19
Cisco Live Magazine ed 19
 
Rio 2016 em Números - Cisco
Rio 2016 em Números - CiscoRio 2016 em Números - Cisco
Rio 2016 em Números - Cisco
 
Cisco Tetration Analytics
Cisco Tetration AnalyticsCisco Tetration Analytics
Cisco Tetration Analytics
 
Revista Cisco Live ed 18
Revista Cisco Live ed 18Revista Cisco Live ed 18
Revista Cisco Live ed 18
 
Brazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investmentsBrazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investments
 
Cloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a criseCloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a crise
 
Vença o jogo da rede
Vença o jogo da redeVença o jogo da rede
Vença o jogo da rede
 
Transforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovaçãoTransforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovação
 
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher  uma rede na nuvem ou no local5 perguntas para ajudar você a escolher  uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
 
5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua rede5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua rede
 
5 motivos para atualizar sua rede
5 motivos para atualizar sua rede5 motivos para atualizar sua rede
5 motivos para atualizar sua rede
 
5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamento5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamento
 
A transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisasA transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisas
 

Recently uploaded

Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 

Recently uploaded (20)

Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 

Protegendo a nova geração de redes

  • 1. 1© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Protegendo a nova geração de redes de acesso Flávio Corrêa Consulting Systems Engineer - Mobility Fernando Zamai Consulting Systems Engineer - Security
  • 2. 2© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Evolução das redes de acesso Cisco Wi-Fi Cisco LAN Autonomous Access Point Controller Coordinated Access Points with RRM 1,2, and 3 Spatial Stream 802.11n with CleanAir Unified Policy and Network Management Stateful Switchover & Application Visibility and Control 802.11ac Wave 1 & High-Density ExperienceConnected Mobile Experiences 802.11ac Wave 2 & Multigigabit Ethernet & Hyperlocation Self-Learning - RRM Self-Protecting - CleanAir Self-Healing – SSO Self-Optimizing– HDX 1997 2012 2016 Cisco Unified Access™
  • 3. 3© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1000! 14B! 500B! Conexões Internet! +55%! Tráfego Internet! hoje é WiFi! 50B!
  • 4. 4© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Evolução do casos de uso de mobilidade BYOD! Company ! Purchased! Basic Communications! Transforming! Work! Mobile Transactions! Networking!
  • 5. 5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Autenticação! Criptografia! Rogue APs! Ataques OTA!
  • 6. 6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 7. 7© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 8. 8© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Access Point “Rogue”
  • 9. 9© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 10. 10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 11. 11© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Visibilidade! Localização! CleanAir! WIDS/WIPS! AVC / NetFlow! Interferências! Clients! Rogue Aps! Attackers! Rede como Sensor!
  • 12. 12© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 13. 13© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 14. 14© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential ISE Cisco Identity Services Engine Controle de acesso avançado com compartilhamento de contexto em tempo real. Wired Wireless VPN Dynamic Segmentation Options: VLANs, DACLs, or TrustSec Política de Acesso, Segmentação e Contexto é fundamental no combate ao Cybercrime. Quem é você? à Paulo Qual Dispositivo? à iPad Pessoal ou Corporativo (BYOD) Onde? à Torre A, 2o andar Quando? à 16:30, 16 de Setembro Como? à Wired, Wireless, ou VPN
  • 15. 15© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Controle de Acesso Avançado Fingerprint MAC Vendor, Dhcp / CDP, Nmap Dispositivo = Access Point Ubiquiti NEGADO
  • 16. 16© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Provisionar BYOD - Provisionamento [Nome / senha] •  Usuário é autorizado? •  Dispositivo é autorizado? Provisionar fzamai C1:5C:00:00:20:15 OU = BYOD Access ü  ü  fzamai C1:5C:00:00:20:15 OU = BYOD Access WiFi
  • 17. 17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configurar Rede BYOD – Acesso Seguro e Transparente •  Certificado válido? •  Usuário válido? •  Grupo BYOD? •  Dispositivo válido? •  MAC Cert / Dispositivo? Autorizar Acesso BYOD Vlan = 10 ACL = Net_Only TAG = BYOD ü  Certificado fzamai C1:5C:00:00:20:15 OU = BYOD Access
  • 18. 18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential
  • 19. 19© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential USABILIDADE
  • 20. 20© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Rastreabilidade WWW 10.1.1.20 → www.cisco.com 10.1.1.20 Usuário? Fzamai IPAD BYOD
  • 21. 21© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network as Sensor Network as Enforcer