Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 25: SECURE NETWOK ACCESS CONTROL (Next-Generation Endpoint…
CHAPTER 25:
SECURE NETWOK ACCESS CONTROL
Cisco SAFE
Places in Network
Branch
Campus
Data Center
Edge
Cloud
WAN
Secure Domains
Management
Security Intelligence
Compliance
Segmentation
Threat Defense
Secure Services
Implementation
Before (Control, Enforce, Harden)
During (Detect, Block, Defend)
After (Scope, Contain, Remediate)
Next-Generation Endpoint Security
Cisco Talos
Threat intelligence organization that detects, analyzes, and protects agains both known and emerging threats of Cisco products.
Cisco Threat Grid
Static/dynamic file analysis in a controlled and monitored sandbox environment against of millons of malware samples.
Cisco Advanced Malware Protection
Malware analysis and protection solution
AMP Cloud
TALOS
Threat Grid
AMP Connectors
AMP for Endpoints
AMP for Networks
AMP for Email
AMP for Web
AMP for Meraki
Cisco Anyconnect
VPN Client and with enhanced built-in modules sucha as HotScan, ISE Posture, Cisco Cloud Web Security.
Cisco Umbrella (former OpenDNS)
Cloud-based service that block DNS requests to malicious Internet destinations.
Cisco Web Security Appliance
All-in-one web gateway that includes protection from hidden malware from both suspicious and ligtimate websites.
Cisco Email Security Appliance
Helps organizations to combat email security threats.
Next-Generation Intrusion Prevention System
System that monitors, analyzes network traffic and block potential intrusion attacks. (Firepower)
Next-Generation Firewall
Device that monitors incoming and outgoing network traffic and allows or blocks traffice by performing filetring and inspection +IPS +AMP
Cisco Firepower Management Center
Administrative nerve center for managing critical Cisco network security solutions. It provides complete and unified management over firewalls, application control, intrusion prevention, URL filtering, and advanced malware protection.
Cisco Stealthwatch
Network traffic security analysis solution that uses enterprise telemetry to detect threats.
Stealthwatch Enterprise
Flow Rate License
Flow Collector
Stealthwatch Management Console
Stealthwatch Cloud
Public Cloud Monitoring
Private Network Monitoring
Cisco Identity Services
Security polocy management platform that provides secura netwrok access to users and devices
802.1x
Components
EAP Method
EAP TLS, EAP tunneled TLS, EAP -GTC, EAP-MSCHAPv2
EAP over LAN
Layer 2 encapsulation for transport of EAP messages
RADIUS Protocol
AAA protocol used by EAP
Extensible Authentication Protocol
Message format that provides encapsulated transport for authentication parameters
Roles
Supplicant
Authenticator
Authentication Server
MAC Authentication Bypass (MAB)
dot1x fallback mechanism, allows one packet to authenticate a device
WebAuth
dot1x fallback where endpoints are sent to a web site for local web portal requesting username/password
FlexAuth
Allows multiple authentications methods concurrently
Cisco TrustSec
Ingress tagging and egress filtering to enforce access control policy
Phase 1:
Ingress classification
Dynamic or Static
Phase 2: Propagation
Inline Tagging or SXP
Phase 3: Egress enforcement
SGACL and SGFW
MACSec
ASIC-based Layer 2 hop-by-hop encryption
Downlink MACSec with MKA
Uplink MACSec with 802.1AE/SAP
IEEE standard for port-based network access control