Enterprise Network Design and Deployment

17
ISE IPS ACS JECRC University Enterprise Network Design and Deployment Sandeep Yadav 1202061074 ASA WSA WLC

Transcript of Enterprise Network Design and Deployment

Page 1: Enterprise Network Design and Deployment

ISE

IPS

ACS

JECRC University

Enterprise Network Design and Deployment

Sandeep Yadav1202061074

ASA

WSA

WLC

Page 2: Enterprise Network Design and Deployment

ISEController

A centralised security solution that automates context-aware access to

network resources and shares contextual dataIdentity Profilingand Posture Netw

ork Resources

Who

What

When

Where

How

Compliant

llISE

Role-Based Policy Access

Guest Access

BYOD Access

Role-Based Access

(Identity Services Engine)

Guest / Users

Page 3: Enterprise Network Design and Deployment

ISE-Sponsor Portal

Page 4: Enterprise Network Design and Deployment

ISE-Guest Self Service

1

2 3

Page 5: Enterprise Network Design and Deployment

Initial Connection using PEAPRedirection to Android MarketTo install provisioning utility

Provisioning Using Cisco Wi-Fi Setup Assistant

Change of AuthorizationFuture Connection using EAP-TLS

Android Device Provisioning

Page 6: Enterprise Network Design and Deployment

WLC (Wireless Lan Controller)

Wireless controllers centrally manage, secure, and configure access points throughout the organization.

WLC

WLC CAPWAP APWireless Client

Page 7: Enterprise Network Design and Deployment

WSA (Web Security Appliance)

WWW

Web Reputation

Web Filtering

Application Visibility

and ControlWebpage Parallel

AVScanning

FileReputation

Data LossPrevention

Advance MalwareProtection

CognitiveThreat Analysis

It combines Advanced Malware Protection (AMP), application visibility and control (AVC), acceptable-use policies, insightful reporting. We can address the challenges of securing and controlling web traffic.

Page 8: Enterprise Network Design and Deployment

ACS (Access Control System)

• It offers central management of access policies for device administration and for wireless and wired 802.1X network access scenarios.

• Receive support for two distinct protocols: RADIUS for network access control and TACACS+ for network device access control

• Use multiple databases concurrently for maximum flexibility in enforcing access policy

Supplicant

IP Phone

Endpoint Device

Catalyst Switch

Wireless Lan Controller

Campus Network

Nexus 7000

Protected Resources

ACS

AD

Page 9: Enterprise Network Design and Deployment

AAA• These AAA services provide a higher degree of scalability than line-level and privileged-EXEC authentication to networking components.• Unauthorized access in campus, dialup, and Internet environments creates the potential for network intruders to gain access to sensitive network equipment services and data • Using a Cisco AAA architecture enables consistent, systematic and scalable access security

Cisco provides two ways of implementing AAA services for Cisco routers, network access servers

• Self-contained AAA• Cisco Secure ACS Solution Engine

Authentication Authorization and Accounting

Page 10: Enterprise Network Design and Deployment

AAA ProtocolsAAA Protocols TACACS+ RADIUS

Layer 3 Protocols

Encryption

Standard Cisco

Entire Body

TCP/IP UDP/IP

Password Only

Open

Page 11: Enterprise Network Design and Deployment

ASA (Adaptive Security Appliance)

• A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.• Firewalls have been a first line of defence in network security• They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.

Internal Network

L3 Switch

L3 Switch

L3 Switch

L3 Switch

InsideOutside

Outside

Active Firewall

Standby Firewall

Failover Link TrunkTrunk

Page 12: Enterprise Network Design and Deployment

Foundational Functionality

Stateful Firewalling VPN Capabilities Policy Enforcement Point for ISE

Stateful Firewalling

TCP Normalization

TCP Intercept

IP Options Inspection

IP Fragmentation

NAT

Routing Access Control List

Page 13: Enterprise Network Design and Deployment

VPN CapabilitiesDiverse Endpoint Support Split Tunneling Capabilities

Mobile and non-mobile devices

Cisco and Non-Cisco devices

Corporate and Sensitive info

Personal and Generic info

Page 14: Enterprise Network Design and Deployment

IPS (Intrusion Prevention System)

Intrusion prevention system is intended to prevent malicious events from occurring by preventing attacks as they are happening. There are a number of different attack types that can be prevented using an IPS including (among others):• Denial of Service• Distributed Denial of Service• Exploits (Various types)• Worms• Viruses

Edge Device

Firewall

DMZ

Inside

IPS 2

IPS 1Web Servers

Application Database

Page 15: Enterprise Network Design and Deployment

Priority 1

Priority 2

Priority 3

Automatically correlates information from intrusion events with network assets to prioritize threat investigation

Protects the Network more effectively

Page 16: Enterprise Network Design and Deployment

Blended Threats and attacks coming through multiple vectors are quickly identified

Protects the Network more effectively

Page 17: Enterprise Network Design and Deployment

Thank You