Security Architecture
Cisco integrated security

Integrated security describes the security functionality that is provided on a networking device, for example on a router, switch, or wireless access point. As traffic passes through a networking device, it must be scanned and analyzed, then allowed to continue, partitioned, or rejected. This requires that the integrated security device possess intelligence, performance, and scalability.

  • Cisco IBNS combines several Cisco products to offer authentication, access control, and user policies to secure network connectivity and resources. IBNS enables greater security, as well as cost-effective management of changes throughout the business.
  • The Cisco Perimeter Security solution provides several levels of perimeter security that can be deployed throughout the network as defined by the security policy. The Cisco Perimeter Security solution is highly flexible, and can be tailored to specific business needs.

Identity Based Networking Services
IBNS is an integrated solution combining several Cisco products that offer authentication, access control, and user policies to secure network connectivity and resources . IBNS enables greater security and also allows management of changes throughout the organization.

IBNS and 802.1x are supported on all Cisco Catalyst switches, including Catalyst 6500, 4500, 3550, and 2950 switches, Cisco ACS Server as well as Cisco Aironet Access Points.

Cisco Perimeter Security
A solid perimeter security solution enables communications across it as defined by the security policy, yet protects network resources from breaches or attacks. It controls multiple network entry and exit points. It also increases user assurance by implementing multiple layers of security.

Perhaps the most familiar type of perimeter is a firewall . PIX Security Appliances provide security services including stateful inspection firewalling, standards-based IPsec VPN, intrusion protection, as well as many other features. Cisco IOS Firewall functionality provides advanced access control, logging, and address translation.


Web Links