Self-Defending Networks: The Next Generation of Network Security
| Security is one of the fastest-growing areas in the networking and IT industries today. Security is often the top concern of Chief Information Officers (CIOs) and one of the top technology initiatives of many organizations. However, security projects often do not get the focus needed to be approved and deployed. Perhaps, this reticence can be explained by the complexity of security. Cisco has reduced the cost to deploy and manage security by creating a self-defending network. The self-defending network can enable the network to detect and defend itself against certain attacks. This book provides an overview of the attacks that a self-defending network can protect against, introduces the components of a self-defending network, and details how an organization can manage its self-defending network in a centralized and integrated fashion. This book provides an overview of the components of a self-defending network, including distributed denial-of-service (DDoS) mitigation, Adaptive Security Appliances (ASA), Cisco Incident Control Service (Cisco ICS), NAC framework, NAC appliances (Cisco Clean Access), IEEE 802.1x, Cisco Security Agent (CSA), and integrated, centralized management. Management is the glue that enables the components of a self-defending network to integrate and share a common defensive plan to thwart network attacks. The Cisco Security Manager and Cisco Security MARS are the bedrock of the Cisco centralized management strategy. Goals and Methods
The goal of this book is to familiarize you with concepts, benefits, and implementation details of a Cisco self-defending network. This book endeavors to make you more comfortable with the following topics:
This book is not intended to be a one-stop shopping destination or a step-by-step guide to deploy each component of a self-defending network; instead, this book is a first-step to introduce you to the components of the Cisco self-defending network. If this book were a menu item in a restaurant, it would be a sampler platter, not an all-you-can buffet or a complete five-course meal. You can read this book in a day and, in that time, gain the ability to discuss the philosophy and components of a self-defending network at a high-level. This book is heavily focused on device management and centralized management to show how you can manage a self-defending network. Many chapters of this book contain screenshots from beta or alpha software to get this book to market shortly after the products are released. There may be changes in the device manager and centralized management GUIs from alpha/beta software. There may also be changes in the device managers and centralized management GUIs between the versions used in the book and subsequent versions that are released to the market after the publication of this book. Who Should Read This Book?
This book is intended for everyone learning about security and next-generation security networks, including Chief Security Officers (CSOs) and CIOs, network engineers and architects, and engineering students. This book is written to enable quick overview coverage of topics like DDoS, while creating a quick reference to enable deep-dives into specific implementation details, like how to deploy an 802.1x network. How This Book Is Organized
This book is designed to be read as a beginning-to-intermediate overview of Cisco self-defending networks. The chapters cover the following topics:
|