Other than semantics, what’s the difference between the two access control list configurations presented below? They both look much the same, in fact, but the key differentiation is one of context! Take a few minutes and read ahead…
ip access-list extended Access-Control
permit tcp host 192.168.100.1 10.0.0.0 0.0.0.255 eq 80
permit udp host 192.168.150.1 10.0.0.0 0.0.0.255 eq 69
deny tcp any 10.0.0.0 0.0.0.255 eq 23
deny ip any any
access-list 150 permit tcp host 192.168.100.1 10.0.0.0 0.0.0.255 eq 80
access-list 150 permit udp host 192.168.150.1 10.0.0.0 0.0.0.255 eq 69
access-list 150 deny tcp any 10.0.0.0 0.0.0.255 eq 23
access-list 150 deny ip any any
Understanding ACLs (access-control lists), or moreover, the difference between standard ACLs, extended ACLs, VLAN ACLs (VACLs), and access-control entries (ACEs) — the individual lines that comprise an ACL — is a challenge in and of itself, but now you read a Cisco Applied Mitigation Bulletin (AMB) and see the terms iACL and tACL: great, another acronym and concept to grasp? You bet!
Read More »
Tags: access control, security
Last week I had the opportunity to attend the Citrix Synergy conference in San Francisco. The conference was buzzing with the latest innovations for desktop virtualization, data center and cloud.
Secure desktop virtualization infrastructure is compelling for government agencies seeking strategies to reduce costs, improve operational efficiency, and provide control and security of centralized desktops and mobile multi-media clients.
Read More »
Tags: citrix, cloud, cyber security, data center, defense, desktop virtualization, government, security, Virtual Desktop Infrastructure
Public Internet connections are convenient but potentially risky if you don’t take a few precautions.
Walk into any coffee shop or hotel lobby and you’ll witness one of the most obvious signs of our times: People of all ages and vocations browsing the web and checking email from their smartphones or laptops. If you get close enough to see what’s on their screens, you might even see some of these road warriors accessing business applications in the cloud, such as a salesperson checking into their customer relationship management (CRM) database or preparing for a meeting in an online collaboration space. But you have to wonder: how secure is that connection?
Before you give your employees the go-ahead to work outside the office, make sure they know how to securely log in to your small business network from Wi-Fi hotspots. Otherwise, any information they transmit could be up for grabs, from their email password to credit card numbers to confidential business data. After all, a public hotspot is essentially a network for unknown and risky computers, and you never know who may be lurking online to capture your critical data.
Read More »
Tags: Hotspot, public internet, remote acc, security, small business, wi-fi
Should we or should we not keep our security protocols and algorithms public? The debate has been going on for quite some time. It might even have taken place in the Roman Empire when Caesar Cipher was used to encrypt Julius Caesar’s messages. It has been the norm for a long time for all new security methods to be published externally in order to receive academic and public scrutiny, in a way so that they prove themselves.
Read More »
Let me tell you about a great opportunity if you’re an executive or professional in the Manufacturing or Industrial sector. Cisco is hosting a special ‘Industrial Intelligence Day’ on the 12th July 2011 at the Mandalay Bay in Las Vegas held in conjunction with Cisco Live.
The event is especially tailored to bring together manufacturing, controls, operations and IT executives and professionals. The theme of the day is ‘Industrial Intelligence’, and will cover the subject of converging industrial automation systems based upon standard IP networks with business applications including voice and video to more responsively and cost-effectively manage industrial operations globally.
The day is packed with information, training, and industry best practices and is sure to be one of the smartest investments you can make in your career—and one of the smartest investments your employer can make in you.
By attending Cisco Industrial Intelligence at Cisco Live, you can:
- Learn how Industrial Intelligence brings production closer to IT and converges industrial automation networks with business systems to improve the efficiency, safety, agility, and utilization of your production assets.
- Receive training in architectures specific to industrial automation from Cisco and alliance partner Rockwell Automation including wireless and wired technology advancements, availability, security, sustainability and energy management.
- Engage Industrial Intelligence and IT Networking thought leaders from our partners and the industrial analyst community via a live panel discussion plus join a community of manufacturing executives and IT and Control professionals deploying and operating Industrial applications and networks.
- Experience and see “hands-on” demonstrations of Industrial Intelligence solutions and technology and interact with experts at the World of Solutions Expo at the largest Cisco user conference, Cisco Live.
Register by June 12th to receive the $100 off Early Bird offer. Click here to register.
Read More »
Tags: aeroscout, automation, Borderless Networks, Cisco, cisco live, ciscolive, collaboration, Common Industrial Protocol, Energy Management, industrial, Industrial Automation, Industrial Intelligence, industrial networking, industrial wireless, innovation, librestream, Manufacturing, mobility, Panduit, partner, Rockwell, security, video, virtualization, wireless