Wireless Network Security Why wireless?


Monitoring, Anomalies, & Mitigation



Download 4,03 Mb.
bet3/4
Sana26.06.2022
Hajmi4,03 Mb.
#706282
1   2   3   4
Bog'liq
wirelessSec cisco

Monitoring, Anomalies, & Mitigation

  • Discover Layer 3 devices on network
    • Entire network can be mapped
    • Find MAC addresses, end-points, topology
  • Monitors wired and wireless devices
    • Unified monitoring provides complete picture
  • Anomalies can be correlated
    • Complete view of anomalies (e.g. host names, MAC addresses, IP addresses, ports, etc.)
  • Mitigation responses triggered using rules
    • Rules can be further customized to extend MARS

Agenda

  • The Cisco Unified Wireless Networks
    • Cisco Security Agent (CSA)
    • Cisco NAC Appliance
    • Cisco Firewall
    • Cisco IPS
    • CS-MARS
  • Common wireless threats
    • How Cisco Wireless Security protects against them

Rogue Access Points

  • Rogue Access Points refer to unauthorized access points setup in a corporate network
  • Two varieties:
    • Added for intentionally malicious behavior
    • Added by an employee not following policy
  • Either case needs to be prevented

Rogue Access Points - Protection

  • Cisco Wireless Unified Network security can:
    • Detect Rogue AP’s
    • Determine if they are on the network
    • Quarantine and report
  • CS-MARS notification and reporting
  • Locate rogue AP’s

Cisco Rogue AP Mapping

Group Quiz

For each of the business challenges below, which component(s) of CUWN protect against them

  • Mitigate network misuse, hacking and malware from WLAN clients by inspecting traffic flows
  • Identify who is on the network and enforce granular policies to prevent exposure to viruses and “malware”
  • Streamline user experience, consolidate accounting, and improve password management
  • Standardize on wireless client connection policies while protecting them from suspect content and potential hackers
  • Supporting and maintaining a diverse range of security products, correlating events and delivering concise reporting
  • Offer secure, controlled access to network services for non employees and contractors

  • Download 4,03 Mb.

    Do'stlaringiz bilan baham:
1   2   3   4




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©www.hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish