04.03.2014 Views

IPT Attack Mitigation - Interop

IPT Attack Mitigation - Interop

IPT Attack Mitigation - Interop

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Attack</strong> <strong>Mitigation</strong> Roles<br />

for Building and Distribution Segments<br />

Host Virus Scanning<br />

HIPS for Local <strong>Attack</strong> <strong>Mitigation</strong><br />

VLANs<br />

L2/L3 Harden<br />

Secure Control/Bearer Channels<br />

PEAP Authentication<br />

WEP Enhancements/TKIP<br />

Dynamic Key Generation<br />

Access<br />

Distribution<br />

Voice and Data VLANs<br />

L2/L3-Mapping Hardening<br />

L2 QoS-Trust<br />

To Core<br />

VLANs<br />

RFC 2827 & Inter-Subnet Filtering<br />

QoS – Rate Limit Outbound Traffic<br />

Secure Voice N+I<br />

© 2004, Cisco Systems, Inc. All rights reserved.<br />

17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!