Listening to the Network: Utilizing Telemetry to Detect and Classify Network Traffic
Network visibility is a key element of any successful security strategy; network operations and security personnel must have the capability to detect and classify network traffic to defend against denial-of-service (DoS) attacks, the DoS-like side effects of network worms, and other forms of undesirable activity. This session reviews various forms of network telemetry available today, then moves to the use of detection and analysis systems to detect and classify network traffic in an operational setting, with examples drawn from real-life network scenarios including DoS attacks and worm outbreaks. This session is designed for service provider network engineers; it also provides insight into service provider security for network and security professionals in enterprise environments.
Call Admission Control Design for the Enterprise Wide Area Network
This session describes the main Call Admission Control (CAC) mechanisms and explains how they apply to the enterprise WAN. The session encompasses enterprise networks deploying Cisco IP Communications, including voice and video telephony solutions based on Cisco Unified Communications Manager and H.323. The session discusses static and dynamic CAC mechanisms, focusing on Cisco Unified Communications Manager locations, H.323 with gatekeeper, and the Resource Reservation Protocol (RSVP). In particular, the session shows how to combine RSVP with a QoS approach based on differentiated services and how to deploy scalable RSVP in an enterprise network. It also shows how to integrate Cisco Unified Communications Manager with the via-zone gatekeeper and the Cisco multiservice IP-to-IP gateway using RSVP. Finally, the session reviews the different WAN topologies and Layer 2 technologies typically deployed in the enterprise, including how to combine the mechanisms mentioned above to provide an end-to-end CAC solution for each topology.
Understanding and Preventing Layer 2 Attacks
This session focuses on the network security issues surrounding Layer 2, the data link layer. Because many network attacks originate inside the corporate firewall, exploring this soft underbelly of data networking is critical for any secure network design. Issues covered include Address Resolution Protocol (ARP) spoofing, MAC flooding, VLAN hopping, Dynamic Host Configuration Protocol (DHCP) attacks, and Spanning Tree Protocol concerns. Common myths about Ethernet switch security are addressed and specific security lockdown recommendations are provided. Attack mitigation options presented include the new DHCP snooping and Dynamic ARP Inspection (DAI) functionality. Attendees can expect to learn Layer 2 design considerations from a security perspective and mitigation techniques for Layer 2 attacks. This session is for network designers, administrators, and engineers in all areas of data networking.
Advanced NetFlow Deployment
This advanced session focuses on the latest Net Flow developments: new features, the latest studies about sampling, NetFlow version 9, and its standardization at the IETF. The new Flexible NetFlow feature is covered in detail. Technical details of the new features are addressed with configuration examples, show commands, tricks, and best practice advice. Scenarios such as Net Flow for security and NetFlow for capacity planning are covered. A few implementation details of the different Cisco platforms are provided, with a little bit of troubleshooting. This session is for enterprise, service provider, and NREN experts engaged in designing, maintaining, and troubleshooting security, capacity planning, and accounting solutions. Attendees should be familiar with network management basics and should already have some understanding of
NetFlow, perhaps by already having taken the introductory session.
Familiar with Wi-Max Technology
-WiMAX technology overview
-WiMAX Radio solutions
-WiMAX Core solutions and Services
Troubleshooting Open Shortest Path First (OSPF) can be sometimes complex, but with a few key techniques the troubleshooting life can be made simple. This session discusses those techniques in detail and provides some real examples along with troubleshooting steps. This session includes a review of the Link State Advertisement (LSA) types and troubleshooting commands. Common issues, such as failure to build adjacencies, adjacencies stuck in various states, and SPF running constantly, are also discussed.
Design and Deployment of 802.11 Wireless LANs with Centralized Controllers in the Enterprise
The new 802.11n standard will offer several advantages over previous wireless LAN technologies. The most notable advantages are substantially improved reliability and greater application data throughput. However, before deciding whether to deploy 802.11n wireless solutions, organizations need answers to several questions: What do 802.11n technologies do differently from previous wireless solutions? What is the state of the standardization effort for 802.11n? Will 802.11n be backward-compatible with currently deployed wireless clients and access points? What factors should be considered to determine when it makes sense to deploy 802.11n?
To help you make more informed decisions about 802.11n, this session will provide answers to these and other questions. The session also provides details on the state of 802.11n technology today, and discusses the reasons why Cisco Systems® is taking an incremental approach to the new standard. Finally, the session introduces the Cisco® Aironet® 1250 Series Access Point—a modular enterprise-class access point that is Wi-Fi certified to the 802.11n draft 2.0 standard and provides investment protection to support future high-speed WLAN technologies.
Data Center Back-End Infrastructure: Solutions for Disaster Recovery
Business continuance is a key principle in data center network design, where crucial applications and data need to be accessed during and after a failure. In multitier data center design, the application back end refers to the servers, the storage area network (SAN), and the storage subsystems. Each area contributes, with other network and system components, to aid in recovery from different types of disasters whether these disasters are localized, whereby recovery is performed within the primary site, or sitewide disasters requiring a secondary site to continue business. The session introduces the most common methods, for the application backed, in providing disaster recovery. Specific areas of focus are recovery mechanisms provided by the server (application, operating system, server hardware), SAN, and storage subsystems. Cisco technologies are highlighted where they fit in the larger recovery design.
Troubleshooting Cisco Catalyst 6500 Series Switches
This session covers troubleshooting commands and methods for the Cisco Catalyst 6500 Series Switches. The session details the commands and methods required to troubleshoot the platform specifics of IP multicast packet forwarding, IP unicast packet forwarding, and QoS packet processing. This session uses actual troubleshooting engagements to illustrate effective troubleshooting of the Cisco Catalyst 6500 Series. System (hardware) health monitoring and troubleshooting with GOLD is reviewed. This session is for engineers and technicians who work with the Cisco Catalyst 6000/6500 Series or who would like to gain familiarity with advanced troubleshooting and diagnostics of the platform. First-hand experience with the products is expected. Session BRKRST-3131, “Troubleshooting LAN Protocols,” is strongly advised as a prerequisite.
Managing Voice Quality in Converged IP Networks
This session is about managing voice quality issues including jitter, echo, noise, and distortion in converged IP networks. Attendees will learn about the causes of voice quality issues by focusing on network impairments created when IP networks are interfaced with a time-division multiplexing (TDM) network. The main focus is on planning and designing steps to minimize voice quality issues using Network Transmission Loss Planning (NTLP), implementing proper QoS, and special considerations (involving bandwidth planning, Call Admission Control, and QoS) when introducing interactive and streaming video on the converged IP network. The session does not address QoS in depth, but rather focuses on media transport as it pertains to voice and video quality. This session addresses proactive approaches using the management tools offered by Cisco and partners to manage service-level agreements around voice quality in enterprise and service-provider networks. Attendees will learn reactive troubleshooting approaches to identify and classify the issues by analyzing them using the waveform visualization techniques and Cisco IOS commands.
The session does not address QoS in depth, but rather focuses on media transport as it pertains to voice and video quality
MPLS Techtorial - MPLS Basic/LDP, VPN, and TE
Multiprotocol Label Switching (MPLS) is a key technology for delivery of IP services. This session highlights the applications and benefits that MPLS solutions can offer to service providers and subscribers. The intention is to communicate the depth and breadth of Cisco MPLS solutions. In-depth technical discussions take place around MPLS architecture and applications such as LDP Protocol, Layer 2 VPN, Layer 3 VPN and traffic engineering. Basic configuration commands and how to troubleshooting for each component are also summarized. This session is for networking technologists, operators, architectures and managers from service providers and enterprises who want to learn about MPLS protocols, their functionality, and their applicability to real-world environments. Attendees should have knowledge of IP networks and any one of the routing protocols.