routeprotocol.com

routeprotocol

  • Network Access Control – MAC Authentication Bypass (MAB)

    MAC Authentication Bypass is an access control technique that enables port-based access control using the MAC address of the endpoint, it is used as a fallback mechanism to 802.1x Process The switch initiates authentication by sending a EAPoL identity request message to the endpoint every 30 seconds by default. After three timeouts the switch will…

  • Network Access Control – 802.1x

    IEEE 802.1x is a standard for port-based network access control. It provides an authentication mechanism for local area networks and wireless area networks. Components 802.1x is made up of the following components: Extensible Authentication Protocol This message format and framework provides an encapsulated transport for authentication parameters EAP Method Different authentication methods can be used…

  • Cisco Identity Services Engine (ISE)

    Cisco Identity Services Engine is a security management platform that provides network access control to users and devices across wired, wireless and VPN connections. It allows for visibility of what is happening inside of the network, such as who is connected (endpoints, users, and devices), applications that are installed and running on endpoints plus more.…

  • Cisco StealthWatch Cloud

    Stealthwatch Cloud provides the visibility and continuous threat detection required to secure on-premises, hybrid, and multicloud environments. StealthWatch cloud can detect threats in real time in the network, or cloud. StealthWatch is a cloud software-as-a-service solution. StealthWatch Cloud is offered in two solutions: Public Cloud Monitoring Public StealthWatch Cloud provides visibility and threat detection in…

  • Cisco StealthWatch Enterprise

    Cisco StealthWatch Enterprise provides real time visibility into activities occuring on the network. This activity monitoring can be extended to the cloud, across the network, into branch locations, in the data centre or on the endpoints. StealthWatch has several components at its core, the Flow Rate Licence, the Flow Collector, Management Console, and Flow Sensor.…

  • Cisco Stealthwatch

    Cisco Stealthwatch is a collector and aggregator of network telemetry data that performs network security analysis and monitoring to automatically detect threats. It is able to detect threats that successfully infiltrate the network and also threats that have originated from inside the network. Stealthwatch can quickly and with high confidence detect threats such as command…

  • Cisco Firepower Management Centre

    The Cisco Firepower Management Centre is a management platform that aggregates and correlates threat events, contextual information, and network device performance data. It can be used to monitor information that Firepower security devices are reporting to reach other and examine the overall activity occurring in the network. The Firepower Management Centre can perform event and…

  • Next Generation Firewalls (NGFW)

    A firewall is a network security device that can monitor incoming and outgoing network traffic. It can allow or block traffic by performing simple packet filtering and stateful inspection based on ports and protocols. A firewall establishes a barrier between trusted internal networks and untrusted outside networks. A next-generation firewall can provide standard firewall functionality…

  • Next-Generation Intrusion Prevention System

    The Instruction Detection System monitors and analyses traffic for protentional network intrusions, logging any possible threats to the network for analysis. A system that does all of this and also blocks the attack is known as an Instruction Prevention System. According to Garner, an Intrusion Prevention System should include the following capabilities: Real time contextual…

  • Cisco E-Mail Security Appliance

    The Cisco E-Mail Security Appliance helps users communicate securely via email and helps organisations combat email threats with a multilayer approach. Cisco E-mail Security Appliance contains a few capabilities to help prevent and combat threats. Global Threat Intelligence Real time threat intelligence is leveraged from Cisco Talos and Cisco AMP Threat Grid Reputation Filtering E-Mail…