Integrated security describes the security functionality that is
provided on a networking device, for example on a router, switch, or wireless
access point. As traffic passes through a networking device, it must be scanned
and analyzed, then allowed to continue, partitioned, or rejected. This requires
that the integrated security device possess intelligence, performance, and
scalability.
- Cisco IBNS combines several Cisco products to offer authentication, access
control, and user policies to secure network connectivity and resources. IBNS
enables greater security, as well as cost-effective management of changes
throughout the business.
- The Cisco Perimeter Security solution provides several levels of perimeter
security that can be deployed throughout the network as defined by the security
policy. The Cisco Perimeter Security solution is highly flexible, and can be
tailored to specific business needs.
Identity Based Networking Services
IBNS is an integrated solution
combining several Cisco products that offer authentication, access control, and
user policies to secure network connectivity and resources
. IBNS enables
greater security and also allows management of changes throughout the
organization.
IBNS and 802.1x are supported on all Cisco Catalyst
switches, including Catalyst 6500, 4500, 3550, and 2950 switches, Cisco ACS
Server as well as Cisco Aironet Access Points.
Cisco Perimeter Security
A solid perimeter security solution
enables communications across it as defined by the security policy, yet
protects network resources from breaches or attacks. It controls multiple
network entry and exit points. It also increases user assurance by implementing
multiple layers of security.
Perhaps the most familiar type of perimeter
is a firewall
. PIX
Security Appliances provide security services including stateful inspection
firewalling, standards-based IPsec VPN, intrusion protection, as well as many
other features. Cisco IOS Firewall functionality provides advanced access
control, logging, and address translation.