Cisco Blogs


Cisco Blog > Government

ISR Gen2 Routers Earn Multiple Government Security Certifications

May 13, 2011 at 3:03 pm PST

Cisco was recently awarded three separate government cryptographic validations in network routing for 12 of its newest Cisco Integrated Services Routers Generation 2 (ISR G2) by the National Institute of Standards and Technology (NIST), pursuant to U.S. Federal Information Processing Standard (FIPS) 140-2.

The new platforms are architected to enable the next phase of branch-office evolution, providing rich mediacollaboration and virtualization to the branch while maximizing operational cost savings.

The newly validated FIPS 140-2 Level 2 Cryptographic validated products include:

For further information on Cisco’s commitment to Government Certifications, please visit our Website or participate in our social networking communities on “Facebook” or “Twitter”.

Tags: , , , ,

Cisco IPv6 Sales and Customer Technical Training Series

May 10, 2011 at 1:35 pm PST

Join Cisco for a technical seminar on planning for IPv6 transition. Along with Cisco technical experts and other customers, you will get an in-depth look at planning and technical considerations based on Cisco’s Preserve, Prepare and Prosper strategy. These workshops can accommodate between 40 and 50 people and will begin the week of May 23rd, 2011 and run through June 28th, 2011.

The topics of these technical sessions are as follows:

  • Project timelines
  • IPv6 planning and considerations
    • Readiness assessment (application and network)
    • What to ask of Service Providers
    • Transition strategies (dual stack, translation, tunneling, etc)
  • Requirements gathering and drivers
  • Migration challenges
  • What Cisco is doing for World IPv6 Day (optional)

These workshops are open to all theaters and segments, featuring:

  • Three hours of combined sales and customer training
  • Between two and four hours of hands on virtual lab training with Cisco’s GOLD lab

Customer-to-customer TelePresence sessions to share best practices (certain locations only)

Training will be hosted in the following cities:

  • Herndon, Virginia
  • New York City, New York

Please REGISTER HERE

For more information, please contact:
Cisco Registration

Tags: , , , , , , ,

Smart Business Architectures and the Case for Borderless Networks

May 3, 2011 at 8:15 am PST

From a talk I did at the Government Solutions Forum on “Smart Business Architectures and the Case for Borderless Networks

 

 

If you would like to follow along with the visuals, they are available on the Prezi site here.

Tags: , , , , , ,

National Town Hall on Cybersecurity

May 2, 2011 at 3:53 pm PST

Cyberspace has emerged as the “fourth commons” after sea, air, and space in the defense world, and a broad variety of private and public networks make up the critical infrastructure that enables governments to provide essential services. The network has become both a platform for innovation and a mission-critical resource for the civilian, defense, and intelligence operations of governments. - Cisco’s Don Proctor, SVP -- Office of the CEO

The growing number of attacks on our cyber networks has become, in President Obama’s words, “one of the most serious economic and national security threats our nation faces.”  Addressing these issues means working across the government, partnering with the private sector, and empowering the general public to create a safe, secure, and resilient cyber environment, and promote cybersecurity knowledge and innovation.

If you are, or want to be part of this effort, please join us at the National Town Hall on Cybersecurity, a provocative on-line discussion, May 24th at 1:00 PM ET.

It’s free, and you can register here.

Tags: , , , , ,

LISP – Locator ID Separation Protocol & IPv6

April 26, 2011 at 5:12 pm PST

Cisco Locator/ID Separation Protocol (LISP) is routing architecture that provides new semantics for IP addressing. The current IP routing and addressing architecture uses a single numbering space, the IP address, to express two pieces of information:

  • Device identity
  • The way the device attaches to the network

The LISP routing architecture design separates the device identity, or endpoint identifier (EID), from its location, or routing locator (RLOC), into two different numbering spaces. Splitting EID and RLOC functions yields several advantages.

Check out this video for a quick review of LISP.

Although LISP was designed to deal with the route scalability problem in the Internet, it turns out is has the capability to help with the transition to IP Version 6 (IPv6), the next-generation Internet protocol.

The transition to IPv6 is an immediate challenge facing Public Sector, and specifically Federal customers today due to Government mandates and impending IPv4 address exhaustion for consumers of Government services.

Because IPv6 is not backward compatible with IPv4, and because its deployment and operation are different from that of IPv4, development and implementation of an IPv6 transition strategy is imperative. Many techniques exist to ease the transition to IPv6, and the network-based IPv6 transition techniques can be divided generally into three categories: dual-stack IPv4 and IPv6, IPv6 tunneling, and IPv6 translation.

Each approach has its features, benefits, and limitations; they are not all equivalent in terms of cost, complexity, or capabilities. Most likely, a combination of these techniques will provide the best solution. The role that the Locator/ID Separation Protocol (LISP) being developed by Cisco and the IETF can play in IPv6 transition strategies is documented in this Whitepaper.

Incorporating LISP into an IPv6 transition strategy can simplify the initial rollout of IPv6 by taking advantage of the LISP mechanisms to encapsulate IPv6 host packets within IPv4 headers (or IPv4 host packets within IPv6 headers). For example, you can build IPv6 islands and connect them with existing IPv4 Internet connectivity.

LISP is a Cisco innovation that is being promoted as an open standard. Cisco participates in standards bodies such as the IETF LISP Working Group to develop the LISP architecture.

For further information, check the Cisco site on LISP.

Tags: , , , , , ,