Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Sessions Cisco Start 2017

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

CISCO ST>RT

2017
Simple Secure and Smart

Prepared By:

Chestere Eube Imbong Baring

System Analyst – Collab IT Systems


HIGHLIGHTS

Highlights

SECURITY FIRST
Security First: Cisco Umbrella + Demo (Mr. Jemson Lape)

CONNECTING
Aironet 1815 Series + demo (Ms. Sarah Quinto)

COLLABORATING
BE4000 Series & Workspace + Demo (Ms. Femee Cruz)
o Enterprise – class technology fit and made for medium market &
Medium Businesses
o CISCO Advantage Now – CISCO Start
o New Architecture, design for growing market and demand for
small and Medium businesses (100 to 299 number of employees)
 Enhanced Security: Cisco Umbrealla
o Web security and Open DNS Enginerring Teams
 Improved Connectivity:
o Access point RV 340 Series DUAL WAN GIGABIT
 Greater collaboration: CiSCO spark board as all in one team
collaboration device for all busineness sized and cisco business
edition 4000 for simple and cloud managed communication
solution for medium sized business requirement
 CISCO meraki suite of networking devices to provide 100% cloud
managed IT for wireless, Switching and security.
o

Page 1
SESSIONS

SESSIONS

SESSION #1:
Mr. Gilbert Agaran
IMVI – Systems Engineer
SESSION:
Technology Challenges for small and midsized businesses
 Growing Dependency on Network Infrastructure
 IT budget
 Resource Scarcity
Why?
Simple Secure and Smart
Simple
- Enables to setup, WEB UI managed and monitor the latest
technology for any sized business
Secure –
- Delivering Security first network with best of breed security
portfolio that helps you extend security everywhere to protect
your network.
Smart
- Providing user friendly dashboards to manage multiple
devices at your fingertips for provisioning reporting and
insights on hand

Page 2
SESSIONS

Cisco Solution Diversity


 Built for small business
o Drivers: Simplicity, price
 Meraki Cloud Managed
o Reliable, easy to use
 Enterprise class
Cisco SMB Portfolio
 Layer 2/ Layer 3 (Managed /Stackable portfolio)
 Basic Layer 2
 Routing portfolio (non-modular routers – built in interface card)
CISCO Switching Portfolio
Basic Layer 2
1. 95/110 Series – Unmanaged Switches
2. 200/250 (smart switches)
3. 220 series – smart plus switches
Advanced Layer 2
Small business switching portfolio benefits
Simplified configuration and common management
Standalone configuration with GUI
full CLI for text based Configuration.
CISCO SMB Wireless Positioning
 Standalone 4 AP Cluster PoE Multiple SSID

Page 3
SESSIONS

 300 Series – 8 AP Cluster


 500 series – 16 AP Cluster
Small office / Home office Access Points
 1-10 Employees – WAP 121:
 WAP 131
 WAP 150
 10 -50 employees 0 WAP 321
 WAP 351
LARGE SMBS

 50 -250 employees
 WAP551/561
 WAP571
 WAP571E
 Temp, heat and water resistant
 Up to 16 access point clustered
 Capable of RF analysis (Radio Frequency)
Small business routing
 Routing VPN – secured communication: encrypted
 3G/4G Dongle – for provincial areas
SMB router advantages
 Simplified WEB UI based Management
 Support for Remote Office and Tele Worker VPN
 Wired/Wireless Models
 Loop Balancing
 Dual WAN Support with 3G/4G Failover

Page 4
SESSIONS

 Filtering: Cisco Cloud


Small office
1 -10 Users
LARGER SMBS
 RV110/215W
 RV320
 RV325 – capable of SSL
 2 dual Band
 Web Filtering
o RV320 / RV325
 New Web filtering solution
 Web Filtering System
o Dynamic Web Filtering
o Classification System
CISCO FindIT Management Software:
 Remote connectivity and management of device and can be
deployed anywhere
 Dynamic Updating
 With Dashboard – Communication of SMP
 Fully aware the health of device: CPU Load of Switch, etc.
 Traffic changes in access point in KBPS
 Free for first 10 Devices - Freely Use (for Evaluation)
 12 and up, with license

Page 5
SESSIONS

Port management

 Graphical representation of Switch, Status, Mac Address and


speed duplex and byte sent
 If the system is active or not
 Creation of SSID made simpler
o No need to go to devices
o Create virtually
o Create VLANs
 Can update firmware if outdated. Upgrade firmware
 Features: Topology, Inventory, Floor plan
o Inventory: if end of life (device) , Serial number, model and
version of software
o
 Series 100 to 500 – can be detected by this software
 Concept of Virtualization from Manual/physical configurations to
virtual configurations
 Saves space and time – virtualization
SESSION # 2:
CISCO Umbrella Secure internet gateway / DNS – Layer Security
Mr. Gener Camiling
Cyber Security Specialist

 Protection to internet access


 There will be risks
o Threats
o Ransomware: The reality
 Loss of sensitive proprietary data

Page 6
SESSIONS

 Disruption of service
 Financial losses
 Harm to reputation
 The way we work has changed in internet access
o Critical infrastructure
 Amazon, Rackspace, Windows azure
 Business apps
 Salesforce, office 365
 Roaming laptops
 Branch office
o Users and apps have adopted the cloud
 49% of the workforce is mobile
 82% admit to not using the vpon
 70% increase Saas usage
 70% of branch offices have DIA
o Ransomware is a massive market
o $1B size of the ransomware market – 1B$ and growing
o 2016 – year of ransomware
o 2001 Fake antivirus
o 2005 GP coder
o 2006 Cryzip redplus
o 2007 QiaoZhaz
o 2008 First Commeercial Android Phone
o 2012 Reveton A ransomlock
o 2013 cryptolocker
 Malware attack vectors
o Infection vector – frequently uses the web and email
 If the downloaded file is opened, the protocol is
triggered and the malware can now identify the
computer’s OS and System

Page 7
SESSIONS

o Command and control – takes control of targeted systems


o Encryption of files – files become inaccessible
o Request of ransom – owner/company pay the ransom
(bitcoins) to free the system
o Malware uses dns to callback
o It all starts in DNS – Threats and risks
 Where does umbrella fit?
o Network and endpoint
 Netflow
 Proxy
 Sandbox
 Router/UTM – Branch
o If have DNS layer security
 Blocking coming from Malware c2 callbacks and
phishing
 Infection -> propagation - > callback (command and
control)

Page 8
SESSIONS

Page 9
SESSIONS

Page 10
SESSIONS

Page 11
SESSIONS

Page 12
SESSIONS

Page 13

You might also like