routeprotocol
-
Network Access Control – Web Authentication (WebAuth)
Endpoints that connect to the network may not have 802.1x capabilities, Web Authenticaiton can be used as a fall back similar to MAC Authentication Bypass. Endpoints are presented with a portal requesting a username and password. The username and password submitted through the web portal are sent from the switch (or wireless controller) to a…
-
Network Access Control – MAC Authentication Bypass (MAB)
MAC Authentication Bypass is an access control technique that enables port-based access control using the MAC address of the endpoint, it is used as a fallback mechanism to 802.1x Process The switch initiates authentication by sending a EAPoL identity request message to the endpoint every 30 seconds by default. After three timeouts the switch will…
-
Network Access Control – 802.1x
IEEE 802.1x is a standard for port-based network access control. It provides an authentication mechanism for local area networks and wireless area networks. Components 802.1x is made up of the following components: Extensible Authentication Protocol This message format and framework provides an encapsulated transport for authentication parameters EAP Method Different authentication methods can be used…
-
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine is a security management platform that provides network access control to users and devices across wired, wireless and VPN connections. It allows for visibility of what is happening inside of the network, such as who is connected (endpoints, users, and devices), applications that are installed and running on endpoints plus more.…
-
Cisco StealthWatch Cloud
Stealthwatch Cloud provides the visibility and continuous threat detection required to secure on-premises, hybrid, and multicloud environments. StealthWatch cloud can detect threats in real time in the network, or cloud. StealthWatch is a cloud software-as-a-service solution. StealthWatch Cloud is offered in two solutions: Public Cloud Monitoring Public StealthWatch Cloud provides visibility and threat detection in…
-
Cisco StealthWatch Enterprise
Cisco StealthWatch Enterprise provides real time visibility into activities occuring on the network. This activity monitoring can be extended to the cloud, across the network, into branch locations, in the data centre or on the endpoints. StealthWatch has several components at its core, the Flow Rate Licence, the Flow Collector, Management Console, and Flow Sensor.…
-
Cisco Stealthwatch
Cisco Stealthwatch is a collector and aggregator of network telemetry data that performs network security analysis and monitoring to automatically detect threats. It is able to detect threats that successfully infiltrate the network and also threats that have originated from inside the network. Stealthwatch can quickly and with high confidence detect threats such as command…
-
Cisco Firepower Management Centre
The Cisco Firepower Management Centre is a management platform that aggregates and correlates threat events, contextual information, and network device performance data. It can be used to monitor information that Firepower security devices are reporting to reach other and examine the overall activity occurring in the network. The Firepower Management Centre can perform event and…
-
Next Generation Firewalls (NGFW)
A firewall is a network security device that can monitor incoming and outgoing network traffic. It can allow or block traffic by performing simple packet filtering and stateful inspection based on ports and protocols. A firewall establishes a barrier between trusted internal networks and untrusted outside networks. A next-generation firewall can provide standard firewall functionality…
-
Next-Generation Intrusion Prevention System
The Instruction Detection System monitors and analyses traffic for protentional network intrusions, logging any possible threats to the network for analysis. A system that does all of this and also blocks the attack is known as an Instruction Prevention System. According to Garner, an Intrusion Prevention System should include the following capabilities: Real time contextual…