Cisco TrustSec Manual de usuario Pagina 7

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 10
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 6
© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 10
Cisco TrustSec provides switch-port-level encryption based on IEEE 802.1AE (MACsec). Data encryption
supports the Advanced Encryption Standard (AES) cipher using a 128-bit key. Network traffic is encrypted to block
man-in-the-middle attacks, snooping, and other forms of network attacks. Such Layer 2 encryption is implemented
between an endpoint device and an access switch (for Cisco Catalyst 3560-X and 3750-X Series Switches) or
between switch ports (for Cisco Nexus
®
7000 Series Switches). Cisco switches preserve traffic visibility within
each switch to deliver the entire breadth of Cisco networking and security services.
Policy
A converged policy framework is an essential factor to ensure policy consistency and efficiency to a distributed
workforce. With the Cisco Identity Services Engine, Cisco TrustSec helps network and security administrators map
user identity information to user groups based on their role in the organization. The policy intelligently directs
network enforcement devices upon successful user authentication. The Cisco TrustSec policy framework provides
a simple mechanism to provision and monitor policy based on user identity information throughout the network.
This enables distributed enforcement with a central management system.
Solution Components
As Figure 3 shows, the Cisco TrustSec solution includes three product component groups (infrastructure, policy,
and endpoint), as well as Cisco and partner professional services.
Figure 3. Cisco TrustSec Solution Portfolio
Vista de pagina 6
1 2 3 4 5 6 7 8 9 10

Comentarios a estos manuales

Sin comentarios