Ibm Integrated Security Solution For Cisco Networks Lab - IBM Tivoli and Cisco User Manual

Building a network access control solution with ibm tivoli and cisco systems
Table of Contents

Advertisement

Uncontrolled zone - Internet
The Internet has become a pivotal component in the banking industry with its
immense flexibility and business opportunities. But it has also become one of the
preferred methods for spreading viruses and malicious code as well as providing
easy access to many unprotected or weakly secured enterprise resources.
Balancing the requirements and threats, ABBC has provided clients, employees,
and partners with controlled access to its resources. Firewalls and intrusion
detection and prevention systems have been deployed to provide adequate
network perimeter security.
Controlled zone - DMZ
ABBC hosts Web access control servers and mail gateways in the DMZ. It is also
a termination point for VPN users before they connect to the primary network.
Controlled intranet
Local employees connected through the LAN are part of this zone. ABBC is
investing in wireless networks and VOIP technology for their users' improved
access capability and flexibility. The corporate WAN also terminates in this zone.
ABBC has a lab network where testing is done before any system is deployed in
a production environment. The IBM Integrated Security Solution for Cisco
Networks has been tested by ABBC. The test simulation is discussed briefly in
4.2.2, "IBM Integrated Security Solution for Cisco Networks lab" on page 80.
Production network
The server resources for the enterprise are deployed in the production network.
With the IBM Integrated Security Solution for Cisco Networks, ABBC has
deployed the compliance and remediation servers in this section of the network.
The network management zone is a separate protected subnet. The segments of
the production network are also given additional protection.

4.2.2 IBM Integrated Security Solution for Cisco Networks lab

Network Admission Control uses the network infrastructure to enforce security
policy compliance on all devices seeking to access the network. NAC can be
delivered in two ways: NAC Framework and NAC Appliance.
NAC Framework
NAC Framework is an architecture-based approach that provides comprehensive
control by assessing all endpoints across all access methods, including LAN,
wireless connectivity, remote access, and WAN. It can be deployed as NAC L2 IP,
NAC L2 802.1x, or NAC L3 IP. It utilizes Cisco routers, switches, VPN
Concentrators, and Adaptive Security Appliances. Cisco Secure ACS is an
integral component of NAC Framework.
80
Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network access control solution

Table of Contents