home *** CD-ROM | disk | FTP | other *** search
/ Cisco Networkers 1998 / Cisco Networkers 1998.iso / pc / talks / nwk06b / nwk06b.im < prev    next >
Encoding:
INI File  |  1998-04-27  |  3.0 KB  |  99 lines

  1. [Language]
  2. 1=English
  3.  
  4. [English]
  5. EML=NWK06b.EML
  6.  
  7. [Settings]
  8. Video=NWK06b.avi
  9.  
  10. [Slides]
  11. PDF=NWK06b.bma
  12. 1=0,Example Scenario
  13. 2=23314,Cisco IOS
  14. 3=170000,PIX
  15. 4=311000,IOS Firewall
  16. 5=479500,Centri Firewall
  17. 6=525400,Security Policy
  18. 7=563000,Lock and Key
  19. 8=603200,Hot Standby Router
  20. 9=624996,Spanning Tree Bridging
  21. 10=669760,Local Director
  22. 11=692800,Distributed Director
  23. 12=709500,Switch Port Security
  24. 13=819084,Switch Access Security
  25. 14=897319,Intranet Protection Costs
  26. 15=953843,Perimeter Protection
  27. 16=1016166,Firewall Protections
  28. 17=1100785,Syn Attack
  29. 18=1172653,IOS Syn Attack Defense
  30. 19=1242714,Syn Attack Defense Detail
  31. 20=1330405,PIX Syn Attack Defense
  32. 21=1373279,Firewall Feature Set
  33. 22=1424770,Extranet Options
  34. 23=1480188,Electronic Commerce
  35. 24=1579500,VPN Requirements
  36. 25=1606845,Private Dial Network
  37. 26=1622641,Entrance to the Enterprise
  38. 27=1662217,Dial Access Protection
  39. 28=1706098,Security Sustainment
  40. 29=1720000,Dynamic Routing Protocols
  41. 30=1733510,Keyed Hashing
  42. 31=1814427,Route Update
  43. 32=1884875,Route Filtering
  44. 33=1962214,Secure Vital Services
  45. 34=2028015,Multi-Level Security
  46. 35=2119000,Session Protection
  47. 36=2237739,Layer Encryption
  48. 37=2268741,NetRanger
  49. 38=2340268,NetSonar
  50. 39=2395142,Security Validation
  51. 40=2411000,Modeling Tools
  52. 41=2453040,Validating Policy
  53. 42=2521014,Conclusions
  54. 43=2548600,Smooth Sailing
  55. 44=2572820,End
  56.  
  57. [Info]
  58. Slides=44
  59. VdkVgwKey=317-7
  60. ContentVersion=3.0
  61. Event=Networkers '98
  62. Company=Cisco Systems, Inc.
  63. Date=04/01/98 4 pm
  64. Title=Cisco Systems, Inc. - Designing Secure Enterprise Network Infrastructures II
  65. Abstract=Level: 2          Length: 2 hrs.          Focus: Design                                                                                               Internet technologies are transforming today's businesses. Organizations face the challenge of adapting their networks to enable such services as Internet commerce, extranets that change and strengthen vendor relationships, and VPN technologies to reduce wide area communication costs. As networks increase in importance, every effort must be made to protect them from malicious or accidental damage or interruption. This session will demonstrate how network security products from Cisco can be used to provide secure, reliable, and manageable security solutions that will help organizations to be successful.  Secure network management, configuration, authentication, denial of service protection, perimeter policy management, and access control are topics of discussion.
  66. Speaker=Chris Lonvick
  67. Duration=43:03
  68.  
  69. [Video]
  70. Tracks=Track1
  71.  
  72. [Audio]
  73. Tracks=Track2
  74.  
  75. [Graphics]
  76. Tracks=Track3
  77.  
  78. [Track1]
  79. Description=Video - average 31.7 kbps, maximum 42.2 kbps
  80. StreamHandle=AVI;nwk06b.avi;vid1
  81. MinBps=10784
  82. MaxBps=42240
  83. AvgBps=31721
  84.  
  85. [Track2]
  86. Description=Audio - 44.7 kbps
  87. StreamHandle=AVI;nwk06b.avi;aud1
  88. MinBps=44704
  89. MaxBps=44704
  90. AvgBps=44704
  91.  
  92. [Track3]
  93. Description=Slides - average 1.7 kbps
  94. StreamHandle=BMA;nwk06b.bma
  95. MinBps=1712
  96. MaxBps=1712
  97. AvgBps=1712
  98.  
  99.