BRKSEC-2007 Deploying IOS Security
BRKSEC-2007 Deploying IOS Security
BRKSEC-2007
Agenda
Borderless Networks Overview
Drivers for Integrated Security
Integrated Threat Control
Design Considerations
Deployment Models
Real World Use Cases
Case Study
Summary
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
The Transformation:
The World Is Our New Workspace
Any Device
Attack on the
infrastructure
Attack on HQ
Router/DMZ
Attacks on branch
servers QFP
Internet
Head Quarter
Web surfing
Branch Office
Malicious Branch
Client Activities Voice
attacks
Wireless attacks
Branch Office
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Requirement of Integrated Security Solution
IOS Security
Securing the Branch Office and HQ
Branch Office
Secure Internet
Network
Foundation access to branch,
Protection without the need for
Attack on the
infrastructure
additional devices
Application
Firewall
•Campus Edge
Control worms and
Attacks on •DC Edge
viruses right at the
branch servers QFP
•DMZ
remote site, conserve
Malicious IPS FPM Internet
Head Quarter WAN bandwidth
Branch
Protect the router
011111101010101
Client
Activities
itself from hacking
Regulate and DoS attacks
Content surfing Voice Wireless
Filtering Security Security Wireless
Voice attacks
attacks
Branch Office
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Agenda
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
All-in-One Security for the WAN
Only Cisco® Security Routers
Deliver All of This
Role-Based
GET VPN DMVPN Easy VPN AnyConnect Cisco NetFlow IP SLA
Access
Configuration
professional
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Integrated Threat Control
Network Foundation Protection (NFP)
Zone based Firewall
Application Intelligence Control
Intrusion Prevention System
Content Filtering Solution
Flexible Packet Matching (FPM)
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Network Foundation Protection (NFP) Network
Foundation
Protection
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Cisco IOS AutoSecure Network
Foundation
Protection
One Touch Automated Router Lockdown
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Cisco IOS Firewall
Overview
Stateful firewall: Full Layer 3 through 7 deep
packet inspection Selected List of
Flexible embedded application layer gateway Recognized Protocols
(ALG): Dynamic protocol and application engines HTTP, HTTPS, and JAVA
for seamless granular control
E-mail: POP, SMTP, ESMTP,
Application inspection and control (AIC): IMAP
Visibility into both control and data channels to help
ensure protocol and application conformance P2P and IM (AIM, MSN, and
Yahoo!)
Virtual firewall: Separation between virtual
contexts, addressing overlapping IP addresses FTP, TFTP, and Telnet
Transparent (Layer 2) firewall: Deploy in existing Voice: H.323, SIP, and SCCP
network without changing the statically defined IP Database: Oracle, SQL, and
addresses MYSQL
Intuitive GUI management: Easy policy setup and Citrix: ICA and CitrixImaClient
refinement with CCP and CSM
Multimedia: Apple and RealAudio
Resiliency: High availability for users and
applications with stateful firewall failover IPSec VPN: GDOI and ISAKMP
Interfaces: Most WAN and LAN interfaces Microsoft: MSSQL and NetBIOS
Tunneling: L2TP and PPTP
Presentation_ID
BRKSEC-2007_c1 © 2006 Cisco Systems, Inc.©All
2010 Cisco
rights and/or its affiliates.
reserved. All rights reserved.
Cisco Confidential Cisco Public 12
Zone based Policy Firewall (ZBPF) Use Cases
Branch Firewall:
Split Tunnel – Branch/Remote HQ Firewall :
Office/Store/Clinic •Campus Internet Edge
•DC Internet Edge
Virtual Firewall --virtual contexts (VRFs) •DMZ
within a branch
Direct Internet Connection – Small Office,
Managed Service
Internal Firewall – International or untrusted
locations or segments, often for PCI
compliance requirements
Transparent or routed environments
Wireless to wired segments
Protect key resources (e.g. servers)
International financial branches
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Zone-Based Firewall
(aka Zone-Based Policy Firewall) Advanced
Firewall
Supported Features
Allows grouping of physical and Stateful Inspection
virtual interfaces into zones Application Inspection: IM, POP,
IMAP, SMTP/ESMTP, HTTP
Firewall policies are applied to traffic Content filtering
traversing zones Per-policy parameter
Simple to add or remove interfaces Transparent firewall
and integrate into firewall policy VRF-aware firewall (Virtual
Firewall)
User-Based ZBF
Private-DMZ
Policy DMZ
DMZ-Private
Public-DMZ
Policy
Policy
Private-Public
Policy
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Cisco IOS Zone-Based Policy Firewall
Configuration (Command Line Interface (CLI)
class-map type inspect match-any services
match protocol tcp Define Services Inspected by
Policy
!
policy-map type inspect firewall-policy
class type inspect services Configure Firewall Action for
inspect
Traffic
!
zone security private
zone security public Define Zones
!
zone-pair security private-public source private destination public
service-policy type inspect firewall-policy Establish Zone Pair, Apply
! Policy
interface fastethernet 0/0
zone-member security private
!
Assign Interfaces to Zones
interface fastethernet 0/1
zone-member security public
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Cisco IOS Zone-Based Firewall—
Rule Table (CCP) Advanced
Firewall
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
User-Group Firewall
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Principles and Operation
Server Farm Authentication Server
IP Phone
Network
Internet Cloud
Engineering
HR & Accounts
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Implementation details
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Transparent Firewall
Introduces ―stealth firewall‖ capability
No IP address associated with firewall (nothing to attack)
No need to renumber or break up IP subnets
IOS Router is bridging between the two ―halves‖ of the network
Use Case: Firewall Between Wireless and Wired LANs
Both ―wired‖ and wireless segments are in same subnet 192.168.1.0/24
VLAN 1 is the ―private‖ protected network.
Wireless is not allowed to access wired LAN
192.168.1.4
192.168.1.3
Wireless
Fa 0/0
Internet
VLAN 1
Transparent
192.168.1.2 Firewall
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Transparent Firewall Configuration
(Command Line Interface (CLI)
Classification: Security Zone Policy:
interface VLAN2
Security Policy: description public interface
bridge configuration
bridge 1 route ip
zone security wireless
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
IOS Firewall for IPv6
Current Status of IPv6 Firewall
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Cisco IOS Zone based Firewall July - 15.1(2)T
IPv6 Support
Extend IPv6 classification capability to include Zone Based FW.
Global Parameter Map and Default parameter-map support.
Unified MIB support for IPv6
Intra-zone traffic support for IPv6
Conditional debugging support for ZBFW IPv6
Log summarization support for ZBFW IPv6
IPv4 FTP engine is changed to dual stack and is capable of
processing control stream packets in CEF path itself.
0111111010101010000111000100111110010001000100100010001001
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Cisco IOS Intrusion Prevention (IPS) IPS
Distributed Defense Against Worms and Viruses
Cisco IOS IPS stops attacks at the entry point, conserves WAN bandwidth,
and protects the router and remote network from DoS attacks
Integrated form factor makes it cost-effective and viable to deploy IPS in
Small and Medium Business and Enterprise branch/telecommuter sites
Supports 2000+ signatures sharing the same signature database available
with Cisco IPS sensors
Allows custom signature sets and actions to react quickly to new threats
Protect router
and local network Stop attacks
from DoS attacks before they fill
Branch Office up the WAN
http://www.cisco.com/go/iosips
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Cisco IOS IPS Use Cases
1 2 3
Protect Branch PCs Move Worm Protection Protect Branch-Office
from Internet Worms to the Network Edge Servers
Use IPS and Firewall on a Apply IPS on Traffic From Apply IPS and Firewall on
Cisco Router for Worm Branch to HQ to Stop Branch Router to Protect
Protection Worms and Attacks From Local Servers at the Branch
Infected Branch PCs From Attacks
Avoid Need for a Separate
Device to Protect Servers
4 5
Satisfy PCI Compliance Transparent (layer 2)
Requirements IPS
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Cisco IOS Intrusion Prevention System (IPS)
Configuration (Command Line Interface (CLI)
Download Cisco IOS IPS Files to your PC Cisco IOS IPS Configuration (Con’t)
http://www.cisco.com/pcgi-bin/tablebuild.pl/ios-v5sigup retired false
IOS-Sxxx-CLI.pkg
realm-cisco.pub.key.txt interface fast Ethernet 0
ip ips ips-policy in
Configure Cisco IOS IPS Crypto Key
mkdir ipstore (Create directory on flash) Load the signatures from TFTP server
Paste the crypto key from copy tftp://192.168.10.4/IOS-S289-CLI.pkg idconf
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Cisco IOS Transparent IPS
Use Case: IPS Between Wireless and Wired LANs IPS
192.168.1.3
Wireless
Fa 0/0
Internet
VLAN 1
Transparent
192.168.1.2 IPS
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Cisco IOS Intrusion Prevention System (IPS)
Configuration (Command Line Interface (CLI)
Download Cisco IOS IPS Files to your PC Cisco IOS IPS Configuration (Con’t)
http://www.cisco.com/pcgi-bin/tablebuild.pl/ios-v5sigup interface VLAN 1
IOS-Sxxx-CLI.pkg description private interface
realm-cisco.pub.key.txt bridge-group 1
ip ips ips-policy out
Configure Cisco IOS IPS Crypto Key
mkdir ips5 (Create directory on flash)
interface VLAN 2
Paste the crypto key from
description private interface
realm-cisco.pub.key.txt
bridge-group 1
ip ips ips-policy in
Cisco IOS IPS Configuration
ip ips config location flash:ips5 retries 1
Load the signatures from TFTP server
ip ips notify SDEE
copy tftp://192.168.10.4/IOS-S289-CLI.pkg idconf
ip ips name ips-policy
Loading IOS-S259-CLI.pkg from 192.168.10.4 :!!!
ip ips signature-category
category all
show ip ips signature count
retired true
Total Compiled Signatures:
category ios_ips basic
338 -Total active compiled signatures
retired false
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Cisco IOS® Content Filtering
A Web Security Solution That Protects Organizations from Known
and New Internet Threats, While Improving Employee Productivity
Internet
Internet
URL Cache
Trend Micro
Rating Server
Categories: Porn,
Violence, Gambling,
Sports,…
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Cisco IOS Content Filtering
Subscription Service Architecture
Cisco IOS URL
Filtering Policy
Deny Gaming
Deny Weapons Cache:
Permit Entertainment www.poker.net
Gaming
Internet
1 3
HTTP Request Match Category 2
www.poker.net Information from Trend
Micro to Cisco IOS URL Request Category
Filtering Policy Information from Trend
Deny www.poker.net: Micro:
Gaming Denied in Policy What Category Does
poker.net Belong To?
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Management and Instrumentation
Instrumentation and
Management CCP
Role Based
NetFlow IP SLA
Access
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Security Management
Security Monitoring
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Cisco IOS IPS Configuration(CCP) IPS
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Cisco IOS® Content Filtering Management:
Cisco® Configuration Professional
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Cisco Security Manager 3.3
Cisco IOS IPS Signature List View
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Instrumentation
Your network management system is only as good as the data you can
get from the devices in the network
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Design Considerations
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Design Considerations
Cisco IOS Firewall Advanced
Firewall
Classic or Zone based Firewall
Zone based Firewall 12.4(4)T or Classic Firewall
All new features would be offered in zone based policy firewall configuration model;
no end-of-life plan for Classic Cisco IOS Firewall but there will be no new features
ASR1000 only supports IOS Zone-based Firewall with Network Security Event Logging
ASR1000 supports 4K zones and 2K zone pairs
Manageability
Provisioning firewall policies: Cisco Security Manager, Cisco Configuration Professional
and Config Engine and CLI
Monitoring firewall activity:
Syslog, snmp, screen-scrapes from "show" commands
Modifying Security policies
CCP supports zone-based Firewall
Interoperate
Cisco IOS Firewall interoperate with other features: NAT, VPN,
Intrusion Prevention System (IPS), WCCP/WAAS, proxy, URL Filtering and QoS
Memory Usage
Single TCP or UDP (layer3/4) session takes 600 bytes of memory
Multi-channel protocol sessions use more than 600 bytes of memory
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Design Consideration
Cisco IOS Zone based Firewall
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Design Consideration Anti-DoS
Parameters
Default
Value
http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_white_
paper0900aecd804e5098.shtml
12.4(11)T and IOS XE have DOS settings that are max out by default
Addressing
Firewall policies can be made much more efficient with a well thought-out IP
address scheme
Performance Consideration
Cisco IOS Firewall Performance Guidelines for ISRs (800-3800)
http://www.cisco.com/en/US/partner/products/ps5855/products_white_
paper0900aecd8061536b.shtml
ASR1000 TCP/ICMP/UDP Inspection Performance (Up to 20Gbps) with select
ALGs (SIP UDP, active FTP, TFTP, DNS, H.323v2, SCCP, RTSP)
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Zone-based Firewall (ZBPF) Performance
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Zone-based Firewall – ASR1000
Real World Performance: HTTP
Max HTTP Throughput - ESP5 Max HTTP Throughput - ESP20
5 25
4.5
4 20
3.5
3 15
Gbps 2.5 Gbps
2 10
1.5
1 5
0.5
0 0
4k 16k 64k 256k 512k Realworld 4k 16k 64k 256k 512k Realworld
12 14
10 12
10
8
8
Gbps 6 Mpps
6
4
4
2 2
0 0
4k 16k 64k 256k 512k Realworld ESP5 ESP10 ESP20
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Design Consideration
Cisco IOS Firewall Voice Features Advanced
Firewall
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Design Consideration
Cisco IOS IPS—12.4(11)T2 and Later Release IOS IPS
Manageability
Provisioning IPS policies:
CLI, Cisco Security Manager, CCP and Config Engine
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Design Consideration
Cisco IOS Intrusion Prevention System (IPS) IOS IPS
Performance Consideration
Performance of router is not effected by adding more
signatures
Memory Usage
Signature compilation process is highly CPU-intensive
while the signatures are being compiled. The number of
signatures that can be loaded on a router is memory-
dependent
Fragmentation
Cisco IOS IPS uses VFR (Virtual Fragmentation
Reassembly) to detect fragmentation attacks
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Design Consideration
IOS IPS and IPS Appliances/Modules IOS IPS
Cisco IOS IPS Cisco IOS IPS Cisco IPS 42xx sensors, IDSM2,
Release 12.4(9)T Release 12.4(11)T SSM-AIP, NM-CIDS modules
Signature Updates & Tuning using SDF using IDCONF using IDCONF
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Agenda
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Real World Use Cases
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Real World Branch Use Cases
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Cisco IOS Firewall Deployment Scenario
Retail Outlet or HealthCare Clinic
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
1. Firewall Configuration Snippet at HQ
Classification: Security Zones:
class class-default !
interface g0/1/1
parameter-map type inspect firewall-policy
description dmz interface
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
1. Cisco IOS Zone-Based Firewall (CCP)
for ISRs
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
1. IPS Configuration Snippet
Download Cisco IOS IPS Files to your PC Cisco IOS IPS Configuration (Con’t)
http://www.cisco.com/pcgi-bin/tablebuild.pl/ios-v5sigup retired false
IOS-Sxxx-CLI.pkg
realm-cisco.pub.key.txt interface fast Ethernet 0
ip ips ips-policy in
Configure Cisco IOS IPS Crypto Key
mkdir ipstore (Create directory on flash) Load the signatures from TFTP server
Paste the crypto key from copy tftp://192.168.10.4/IOS-S289-CLI.pkg idconf
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Cisco IOS Firewall Deployment Scenario
Protecting the Branch Servers Advanced
Firewall
IPsec
Employees Tunnel
192.168.1.x/24
Internet
Branch Office
Router Head Quarter
Wireless Guests
192.168.2.x/24
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
2. Firewall Configuration Snippet
Classification: Security Zone Policy:
class-map type inspect match-all web-dmz zone-pair security zone-policy source public destination dmz
match protocol http
service-policy type inspect firewall-policy
match access-group 199
!
Security Zones:
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
2. IPS Configuration Snippet
a. Download Cisco IOS IPS Files to your PC d. Cisco IOS IPS Configuration (Con’t)
IOS-Sxxx-CLI.pkg
realm-cisco.pub.key.txt interface fast Ethernet 1
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
3. Virtual Firewall and IPS Advanced
Firewall
Cisco IOS Firewall, NAT, and URL-filtering policies are virtual route
forwarding (VRF) aware, providing support for overlapping address
space, which simplifies troubleshooting and operations
Photo Shop
192.168.1.x/24
VRF A
Photo Shop Head
Retail Store Cash Register VRF B Quarter
192.168.2.x/24
VRF C
Internet
Store Router IPsec
Tunnel
Supports
overlapping
Internet Services address space Retail Store
192.168.2.x/24 Head Quarter
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
3. Firewall Configuration Snippet
Classification: Security Policy (Continued):
class-map type inspect retail-hq
policy-map type inspect hq-retail
match protocol ftp
class type inspect hq-retail
match protocol http
inspect
match protocol smtp extended
class-map type inspect hq-retail class class-default
match protocol smtp extended drop log
class-map type inspect photo-hq policy-map type inspect photo-hq
match protocol http class type inspect photo-hq
match protocol rtsp inspect
class-map type inspect hq-photo class class-default
match protocol h323 drop log
Security Policy policy-map type inspect hq-photo-
policy-map type inspect retail-hq class type inspect hq-photo
class type inspect retail-hq inspect
inspect class class-default
class class-default drop log
drop log
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Secure Mobility Solution - Wireless WAN
3G WAN Backup with leased line (Primary WAN)
IPSec Tunnel 3G Network
Branch Office
Split Tunnel IPSec Tunnel
Internet
POS
Local LAN
WCS
POS
Broadband Access
Local LAN Internet
LWAPP Tunnel
Cisco® AAA
802.11n
Integrated
Services Wireless LAN Controller
Internet User Devices Router
SSID A SSID B
Cisco Trusted
IOS Firewall
CCME
Broadband Access
Internet
IPSec Tunnel
AAA
Cisco®
Integrated Head Quarter
Services Toll Fraud
Wireless Net.
Router
Cisco Trusted
IOS Firewall
CCME
Broadband Access
Internet
IPSec Tunnel
AAA
Cisco®
Integrated Head Quarter
Services SP (SIP Toll Fraud
Wireless Net.
Router Trunk)
Cisco NF
Collector
NF V9
IPsec
Safe Tunnel
192.168.1.x/24
QFP
Internet
HQ ASR1000
Branch Office
DMVPN Hub
•If using IOS Syslog for this type of message, it’s rate-limited at one message every 30
seconds. If using HSL, it is rate-limited at one message every 1ms to protect the firewall
from Presentation_ID
malicious attack.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Case Study
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Router Security Case Study
Retail
ISR 2800/3800s -- Deployed IOS Zone based Firewall at 500 stores
Challenges
Customers systems at the branch office got compromised recently,
by a piece of malware that they discovered was a Botnet that
was specially crafted to steal certain types of data. They found
out that this Botnet was used to steal customers CC information
They felt that they spent so money protecting the data center that
they did not pay too much attention to the branch that might
have been why the hackers targeted the branch networks
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Summary
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Summary
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Q and A
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Please Visit the Cisco Booth in the
World of Solutions
See the technology in action
Security
SEC1 – Data Loss Prevention Solutions
and Services
SEC2 – Global Correlation Stops Threats
SEC3 – Cisco Identity-Based Security
Solutions
SEC4 – Cisco Virtual Office Securing
Remote Workers
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Recommended Reading
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Complete Your Online
Session Evaluation
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 79