home *** CD-ROM | disk | FTP | other *** search
/ Cisco Networkers 1998 / Cisco Networkers 1998.iso / pc / talks / nwk06a / nwk06a.im < prev    next >
Encoding:
INI File  |  1998-04-27  |  3.0 KB  |  97 lines

  1. [Language]
  2. 1=English
  3.  
  4. [English]
  5. EML=nwk06A.EML
  6.  
  7. [Settings]
  8. Video=nwk06A.avi
  9.  
  10. [Slides]
  11. PDF=NWK06a.bma
  12. 1=0,Designing Secure Infrastructures
  13. 2=22765,Infrastructure Security
  14. 3=71547,Smooth Sailing
  15. 4=87873,Security Policy Elements
  16. 5=104749,Procedures and Operations
  17. 6=192976,Goals of the Session
  18. 7=297824,Agenda
  19. 8=348530,Router/Switch Protection
  20. 9=376515,Intruder Attack Points
  21. 10=416642,Administrative Interface
  22. 11=427910,Banners
  23. 12=465058,Native Passwords
  24. 13=546865,Password Encryption
  25. 14=587082,Password Encryption Scenario
  26. 15=633986,Enable Secret (5)
  27. 16=695044,Enable Configuration
  28. 17=731001,Password of Caution
  29. 18=825314,Use Good Passwords
  30. 19=877623,Authentication Mechanisms
  31. 20=933001,TACACS+ Authentication
  32. 21=1091853,TACACS+ Continued
  33. 22=1255652,PIX Authentication
  34. 23=1512389,Centri Authentication
  35. 24=1581737,Enable Authentication
  36. 25=1628458,Encrypted Sessions
  37. 26=1760881,One-Time Passwords
  38. 27=1801189,Restrict Telnet Access
  39. 28=1864904,SNMP Access Control
  40. 29=1967378,SNMP
  41. 30=2019816,Identification Protocol
  42. 31=2143994,Resource Attacks
  43. 32=2337336,Finger Attacks
  44. 33=2369263,ARP Control
  45. 34=2426107,Administrator Authorization
  46. 35=2546528,Audit Trail
  47. 36=2692047,PIX Syslog
  48. 37=2799967,Cisco Resource Manager
  49. 38=2857819,Resource Protection
  50. 39=2878980,Spoofing
  51. 40=3016441,ICMP Filtering
  52. 41=3173827,Source Routing
  53. 42=3256398,Next Talk - Secure ENI Part B
  54.  
  55. [Info]
  56. Slides=42
  57. VdkVgwKey=317-6
  58. ContentVersion=3.0
  59. Event=Networkers '98
  60. Company=Cisco Systems, Inc.
  61. Date=04/01/98 4 pm
  62. Title=Cisco Systems, Inc. - Designing Secure Enterprise Network Infrastructures I
  63. Abstract=Level: 2          Length: 2 hrs.          Focus: Design                                                                                               Internet technologies are transforming today's businesses. Organizations face the challenge of adapting their networks to enable such services as Internet commerce, extranets that change and strengthen vendor relationships, and VPN technologies to reduce wide area communication costs. As networks increase in importance, every effort must be made to protect them from malicious or accidental damage or interruption. This session will demonstrate how network security products from Cisco can be used to provide secure, reliable, and manageable security solutions that will help organizations to be successful.  Secure network management, configuration, authentication, denial of service protection, perimeter policy management, and access control are topics of discussion.
  64. Speaker=Chris Lonvick
  65. Duration=54:17
  66.  
  67. [Video]
  68. Tracks=Track1
  69.  
  70. [Audio]
  71. Tracks=Track2
  72.  
  73. [Graphics]
  74. Tracks=Track3
  75.  
  76. [Track1]
  77. Description=Video - average 30.8 kbps, maximum 38.7 kbps
  78. StreamHandle=AVI;nwk06a.avi;vid1
  79. MinBps=10592
  80. MaxBps=38712
  81. AvgBps=30796
  82.  
  83. [Track2]
  84. Description=Audio - 44.7 kbps
  85. StreamHandle=AVI;nwk06a.avi;aud1
  86. MinBps=44704
  87. MaxBps=44704
  88. AvgBps=44704
  89.  
  90. [Track3]
  91. Description=Slides - average 1.2 kbps
  92. StreamHandle=BMA;nwk06a.bma
  93. MinBps=1238
  94. MaxBps=1238
  95. AvgBps=1238
  96.  
  97.