SlideShare une entreprise Scribd logo
1  sur  46
Télécharger pour lire hors ligne
Cisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 1
Cisco Stealthwatch
Jason Maynard
Consulting Systems Engineer Cybersecurity
CCIE, CC[N|I|D]P, SFCE, C|EH, RCSS, GICSP, GPEN
#FE80CC1E
http://cs.co/Jason_Maynard_YouTube_Channel
Cisco
Connect
Cisco Confidential 2© 2016 Cisco and/or its affiliates. All rights reserved.
Today’s Agenda
• Finding The Needle
• Cisco Stealthwatch Whiteboard
• Encrypted Analytics
• Flow Analysis
Finding the Needle……..
1010101110100101011001010100101000011101010101111001010100101001010001010100000100101010100100010
010101010010101110101001010100001010100101001010001010101001000101110101001010101010001010101001
1010101110100101011001010100101000011101010101111001010100101001010001010100000100101010100100010
010101010010101110101001010100001010100101001010001010101001000101110101001010101010001010101001
101010111010010101100101010010100001101010101111001010100101001010001010100000100101010100100010
010101010010101110101001010100001010100101001010001010101001000101110101001010101010001010101001
1010101110100101011001010100101000011101010101111001010100101001010001010100000100101010100100010
010101010010101110101001010100001010100101001010001010101001000101110101001010101010001010101001
1010101110100101011001010100101000011101010101111001010100101001010001010100000100101010100100010
010101010010101110101001010100001010100101001010001010101001000101110101001010101010001010101001
1010101110100101011001010100101000011101010101111001010100101001010001010100000100101010100100010
010101010010101110101001010100001010100101001010001010101001000101110101001010101010001010101001
101010111010010101100101010010100001101010101111001010100101001010001010100000100101010100100010
010101010010101110101001010100001010100101001010001010101001000101110101001010101010001010101001
1010101110100101011001010100101000011101010101111001010100101001010001010100000100101010100100010
010101010010101110101001010100001010100101001010001010101001000101110101001010101010001010101001
1010101110100101011001010100101000011101010101111001010100101001010001010100000100101010100100010
010101010010101110101001010100001010100101001010001010101001000101110101001010101010001010101001
1010101110100101011001010100101000011101010101111001010100101001010001010100000100101010100100010
010101010010101110101001010100001010100101001010001010101001000101110101001010101010001010101001
101010111010010101100101010010100001101010101111001010100101001010001010100000100101010100100010
010101010010101110101001010100001010100101001010001010101001000101110101001010101010001010101001
1010101110100101011001010100101000011101010101111001010100101001010001010100000100101010100100010
010101010010101110101001010100001010100101001010001010101001000101110101001010101010001010101001
010101010010101110101001010100001010100101001010001010101001000101110101001010101010001010101001
1010101110100101011001010100101000011101010101111001010100101001010001010100000100101010100100010
010101010010101110101001010100001010100101001010001010101001000101110101001010101010001010101001
101010111010010101100101010010100001101010101111001010100101001010001010100000100101010100100010
Data Hoarding
Exfiltration
SMB Probe
C2C
0 Day
PCI ALERT
OT Alert
Worm Propagation
DDOS Attempt
Recon
HIPAA Alert
Exfiltration
Exfiltratio
Malware
C2C
Bad GEO
APT
Worm P
SMB Pro
Cisco Stealthwatch Whiteboard
Overview Stealthwatch
Visibility
Detection
Incident Response
Router
Firewall
Core /
Distribution
Switch
Access
Access
Access
PC
PC
Internet
Overview Stealthwatch
Visibility
Detection
Incident Response
Router
Firewall
Core /
Distribution
Switch
Access
Access
Access
PC
PC
Internet
N
S
W E
Netflow
Physical, Virtual, Cloud
sFlow, jFlow
cFlow, qFlow
IPFIX……
Network Security Compliance
Top Hosts
Top Apps
Net Perf
APT, Bots
Malware
DDoS
Data EXF
0 Day
PCI
SCADA
HIPAA
Audit
Etc…
Action
Router
(Null Route)
Firewall
(SHUN)
ISE
Quarantine
Overview Stealthwatch
Visibility
Detection
Incident Response
Router
Firewall
Core /
Distribution
Switch
Access
Access
Access
PC
PC
Internet
N
S
W E
Netflow
Physical, Virtual, Cloud
sFlow, jFlow
cFlow, qFlow
IPFIX……
Network Security Compliance
Top Hosts
Top Apps
Net Perf
APT, Bots
Malware
DDoS
Data EXF
0 Day
PCI
SCADA
HIPAA
Audit
Etc…
Action
Router
(Null Route)
Firewall
(SHUN)
ISE
Quarantine
FC
SMC
FS
Older Switch – 2960
- Generates Netflow
- Layer 7 Visibility
- DPI (Applications)
- RTT (Round Trip Time)
- SRT (Server Response Time)
Overview Stealthwatch
Visibility
Detection
Incident Response
Router
Firewall
Core /
Distribution
Switch
Access
Access
Access
PC
PC
Internet
N
S
W E
Netflow
Physical, Virtual, Cloud
sFlow, jFlow
cFlow, qFlow
IPFIX……
Network Security Compliance
Top Hosts
Top Apps
Net Perf
APT, Bots
Malware
DDoS
Data EXF
0 Day
PCI
SCADA
HIPAA
Audit
Etc…
Action
Router
(Null Route)
Firewall
(SHUN)
ISE
Quarantine
FC
SMC
FS
Older Switch – 2960
- Generates Netflow
- Layer 7 Visibility
- DPI (Applications)
- RTT (Round Trip Time)
- SRT (Server Response Time)
Packet
Analyzer 42 TB Rolling Buffer
Overview Stealthwatch
Visibility
Detection
Incident Response
Router
Firewall
Core /
Distribution
Switch
Access
Access
Access
PC
PC
Internet
N
S
W E
Netflow
Physical, Virtual, Cloud
sFlow, jFlow
cFlow, qFlow
IPFIX……
Network Security Compliance
Top Hosts
Top Apps
Net Perf
APT, Bots
Malware
DDoS
Data EXF
0 Day
PCI
SCADA
HIPAA
Audit
Etc…
Action
Router
(Null Route)
Firewall
(SHUN)
ISE
Quarantine
FC
SMC
FS
Older Switch – 2960
- Generates Netflow
- Layer 7 Visibility
- DPI (Applications)
- RTT (Round Trip Time)
- SRT (Server Response Time)
Packet
Analyzer 42 TB Rolling Buffer
Anyconnect
- NVM (IPFix)
- User
- Device
- Application
- Location
- Destination
Endpoint
Concentrator
Overview Stealthwatch
Visibility
Detection
Incident Response
Router
Firewall
Core /
Distribution
Switch
Access
Access
Access
PC
PC
Internet
N
S
W E
Netflow
Physical, Virtual, Cloud
sFlow, jFlow
cFlow, qFlow
IPFIX……
Network Security Compliance
Top Hosts
Top Apps
Net Perf
APT, Bots
Malware
DDoS
Data EXF
0 Day
PCI
SCADA
HIPAA
Audit
Etc…
Action
Router
(Null Route)
Firewall
(SHUN)
ISE
Quarantine
FC
SMC
FS
Older Switch – 2960
- Generates Netflow
- Layer 7 Visibility
- DPI (Applications)
- RTT (Round Trip Time)
- SRT (Server Response Time)
Packet
Analyzer 42 TB Rolling Buffer
Anyconnect
- NVM (IPFix)
- User
- Device
- Application
- Location
- Destination
PxGrid
- ISE provides the following
- User/Device/MAC – EX: 10.1.1.1 = Jason | iPhone | MAC
- SMC Behavioral Change
Endpoint
Concentrator
Overview Stealthwatch
Visibility
Detection
Incident Response
Router
Firewall
Core /
Distribution
Switch
Access
Access
Access
PC
PC
Internet
N
S
W E
Netflow
Physical, Virtual, Cloud
sFlow, jFlow
cFlow, qFlow
IPFIX……
Network Security Compliance
Top Hosts
Top Apps
Net Perf
APT, Bots
Malware
DDoS
Data EXF
0 Day
PCI
SCADA
HIPAA
Audit
Etc…
Action
Router
(Null Route)
Firewall
(SHUN)
ISE
Quarantine
FC
SMC
FS
Older Switch – 2960
- Generates Netflow
- Layer 7 Visibility
- DPI (Applications)
- RTT (Round Trip Time)
- SRT (Server Response Time)
Packet
Analyzer 42 TB Rolling Buffer
Anyconnect
- NVM (IPFix)
- User
- Device
- Application
- Location
- Destination
PxGrid
- ISE provides the following
- User/Device/MAC – EX: 10.1.1.1 = Jason | iPhone | MAC
- SMC Behavioral Change
SIEM
UDP
Director
- Flows sent centrally
- Duplicate as required
Endpoint
Concentrator
Overview Stealthwatch
Visibility
Detection
Incident Response
Router
Firewall
Core /
Distribution
Switch
Access
Access
Access
PC
PC
Internet
N
S
W E
Netflow
Physical, Virtual, Cloud
sFlow, jFlow
cFlow, qFlow
IPFIX……
Network Security Compliance
Top Hosts
Top Apps
Net Perf
APT, Bots
Malware
DDoS
Data EXF
0 Day
PCI
SCADA
HIPAA
Audit
Etc…
Action
Router
(Null Route)
Firewall
(SHUN)
ISE
Quarantine
FC
SMC
FS
Older Switch – 2960
- Generates Netflow
- Layer 7 Visibility
- DPI (Applications)
- RTT (Round Trip Time)
- SRT (Server Response Time)
Packet
Analyzer 42 TB Rolling Buffer
Anyconnect
- NVM (IPFix)
- User
- Device
- Application
- Location
- Destination
PxGrid
- ISE provides the following
- User/Device/MAC – EX: 10.1.1.1 = Jason | iPhone | MAC
- SMC Behavioral Change
SIEM
UDP
Director
- Flows sent centrally
- Duplicate as required
Cloud
Host1
Host2
- Stealthwatch Cloud (Public/Private)
- Agentless,
- EX: AWS - VPC Flow Logs
- Other feed sources
Endpoint
Concentrator
Overview Stealthwatch
Visibility
Detection
Incident Response
Router
Firewall
Core /
Distribution
Switch
Access
Access
Access
PC
PC
Internet
N
S
W E
Netflow
Physical, Virtual, Cloud
sFlow, jFlow
cFlow, qFlow
IPFIX……
Network Security Compliance
Top Hosts
Top Apps
Net Perf
APT, Bots
Malware
DDoS
Data EXF
0 Day
PCI
SCADA
HIPAA
Audit
Etc…
Action
Router
(Null Route)
Firewall
(SHUN)
ISE
Quarantine
FC
SMC
FS
Older Switch – 2960
- Generates Netflow
- Layer 7 Visibility
- DPI (Applications)
- RTT (Round Trip Time)
- SRT (Server Response Time)
Packet
Analyzer 42 TB Rolling Buffer
Anyconnect
- NVM (IPFix)
- User
- Device
- Application
- Location
- Destination
PxGrid
- ISE provides the following
- User/Device/MAC – EX: 10.1.1.1 = Jason | iPhone | MAC
- SMC Behavioral Change
SIEM
UDP
Director
- Flows sent centrally
- Duplicate as required
Cloud
Host1
Host2
- Stealthwatch Cloud (Public/Private)
- Agentless,
- EX: AWS - VPC Flow Logs
- Other feed sources
Web Proxy
Proxy Logs
- Provides
URL Insight
Endpoint
Concentrator
Overview Stealthwatch
Visibility
Detection
Incident Response
Router
Firewall
Core /
Distribution
Switch
Access
Access
Access
PC
PC
Internet
N
S
W E
Netflow
Physical, Virtual, Cloud
sFlow, jFlow
cFlow, qFlow
IPFIX……
Network Security Compliance
Top Hosts
Top Apps
Net Perf
APT, Bots
Malware
DDoS
Data EXF
0 Day
PCI
SCADA
HIPAA
Audit
Etc…
Action
Router
(Null Route)
Firewall
(SHUN)
ISE
Quarantine
FC
SMC
FS
Older Switch – 2960
- Generates Netflow
- Layer 7 Visibility
- DPI (Applications)
- RTT (Round Trip Time)
- SRT (Server Response Time)
Packet
Analyzer 42 TB Rolling Buffer
Anyconnect
- NVM (IPFix)
- User
- Device
- Application
- Location
- Destination
PxGrid
- ISE provides the following
- User/Device/MAC – EX: 10.1.1.1 = Jason | iPhone | MAC
- SMC Behavioral Change
SIEM
UDP
Director
- Flows sent centrally
- Duplicate as required
Cloud
Host1
Host2
- Stealthwatch Cloud (Public/Private)
- Agentless,
- EX: AWS - VPC Flow Logs
- Other feed sources
Web Proxy
Netflow and Proxy = Telemetry
Extended Visibility & Behavioral Analytics
Advanced Threat Detection
Encrypted Traffic Analysis
Endpoint
ConcentratorProxy Logs
- Provides
URL Insight
Encrypted Traffic Analytics
Overview of ETA
(Encrypted Traffic Analysis)
Gartner predicts that by 2019, 80 percent of web traffic will be encrypted.
100
Overview of ETA
(Encrypted Traffic Analysis)
Overview of ETA
(Encrypted Traffic Analysis)
Overview of ETA
(Enhanced Netflow)
Encrypted Traffic Analytics focuses on identifying malware communications in encrypted traffic through
passive monitoring, the extraction of relevant data elements and supervised machine learning with cloud
based global visibility.
Sequence of Packet Lengths and Times (SPLT): SPLT conveys the length (number of bytes) of each packet’s application payload for the first
several packets of a flow, along with the inter arrival times of those packets. SPLT can be represented as an array of packet sizes (in bytes)
along with an array of times (in ms) representing the time since the previous packet was observed.
Byte distribution: The byte distribution represents the probability that a specific byte value appears in the payload of a packet within a flow. The
byte distribution of a flow can be calculated using an array of counters. The major data types associated with byte distribution are full byte
distribution, byte entropy and the mean/standard deviation of the bytes. For example, using one counter per byte value, an HTTP GET request,
“HTTP/1.1.”, can be calculated by incrementing the corresponding counter once for the “H,” then incrementing another counter twice for the two
consecutive “T” s and so on. Although the byte distribution is maintained as an array of counters, it can easily be turned into a proper distribution
by normalizing by the total number of bytes.
Initial Data Packet (IDP): IDP is used to obtain packet data from the first packet of a flow. It allows extraction of interesting data such as an
HTTP URL, DNS hostname/address and other data elements. The TLS handshake is composed of several messages that contain interesting,
unencrypted metadata used to extract data elements such as cipher suites, TLS versions and the client’s public key length.
Enhanced Netflow
Overview of ETA
(Example of good vs. bad)
Client to Server
Server to Client
Overview of ETA
(Example of good vs. bad)
Overview of ETA
(Example of good vs. bad)
Overview of ETA
(Cognitive – Machine Learning and Statistical Analysis)
Overview of ETA
(Stealthwatch Insight Dashboard with Cognitive)
The Security Insight
dashboard on the
Stealthwatch Management
Console (SMC) provides a
view of affected users
identified by Cognitive
Analytics by risk type. An
expanded Cognitive
Analytics dashboard
provides detailed
information regarding the
top risk escalations and
relative threat exposure
Overview of ETA
(Malicious Encrypted Traffic)
Upon discovery, a malicious encrypted flow can be blocked or quarantined by Stealthwatch.
Policy-driven remediation actions via pxGrid using Cisco Identity Services Engine (ISE) with
Cisco TrustSec® and Software-Defined Access (SD Access) simplify and accelerate
network security operations
Overview of ETA
(Cryptographic Compliance)
Encrypted Traffic Analytics
also identifies encryption
quality instantly from every
network conversation
providing the visibility to
ensure enterprise
compliance with
cryptographic protocols. It
delivers the knowledge of
what is being encrypted
and what is not being
encrypted on your network
so you can confidently
claim that your digital
business is protected. This
cryptographic assessment
is displayed in Stealthwatch
and can be exported via
APIs to third-party tools for
monitoring and auditing of
encryption compliance
Flow Analysis
Stealthwatch Analyzing Flows
Flow Analysis Process
• Flow Analysis Scenarios (Malware)
Flow Analysis Scenarios
Malware – Malware running on the network – Help!!!
We see the following
• Suspicious Internal Hosts for
today
• Worm Propagation for the last
14 days
• Worm Propagation for today.
Lets drill into this some more
Flow Analysis Scenarios
Malware – Malware running on the network – Help!!!
Zooming in here we can see the IP address of the hosts.
• Purple – hosts are a source of infections
• Green – hosts are exhibited the same behavior of the purple
hosts
• Blue – hosts that are being scanned
We can double click the host to view the “Host Snapshot”. We
can then perform the same analysis as we did in previous
examples. Nowhere to hide!
Flow Analysis Scenarios
Malware – Malware running on the network – Help!!!
We get the identity – Start Active Time, End
Active Time, Username, MAC Address, Device
Type, Domain Name, Switch Port the host is
connected. If you have ISE you could also
quarantine the host with a single click.
We can see that the host is
scanning ports on 5900 (VNC
Port).
Flow Analysis Scenarios
Malware – Malware running on the network – Help!!!
Moving to the “Alarms”. Here we can
acknowledge the alarm after we have
determined that the issue has been
resolved. EX: Helpdesk took the
previous information and scanned the
machine and cleaned the infections.
Right click the host go to “Workflow” and
click “Acknowledge Selection”
Provide some
detail and hit
“Ok”
Stealthwatch Analyzing Flows
Flow Analysis Process
• Flow Analysis Scenarios (Botnet)
Flow Analysis Scenarios
Botnet – Botnets running on the network – Help!!!
• C&C Server Traffic – Today
• Trend of Infected Hosts – Last
30 Days
• Top Infected Host Today
• Top C&C Servers Today
Flow Analysis Scenarios
Botnet – Botnets running on the network – Help!!!
Lets drill into “Top Infected Hosts”
and click the “Host Snapshot” to
learn more about what took place
and the finer details.
We get the identity – Start Active Time, End Active Time,
Username, MAC Address, Device Type, Domain Name, Switch
Port the host is connected. If you have ISE you could also
quarantine the host with a single click.
Flow Analysis Scenarios
Botnet – Botnets running on the network – Help!!!
This gives us insight into the active
flows and we can drill into the
specifics as needed.
We can see a lot of different
“Security Events” that have taken
place. Some of which may
automatically qualify for next
steps in the investigation . We
could export the details into a
csv file and share it with other
teams. Lets drill into the
infected host “Security Event”
Flow Analysis Scenarios
Botnet – Botnets running on the network – Help!!!
Select the row of interest and click “Quick View this Row”
We now get more
details perhaps the IP
address of the target is
something we want to
blacklist – we can use
other tools to action
this mitigation
technique. Cisco NGFW,
Cisco Endpoint AMP,
etc.
Flow Analysis Scenarios
Botnet – Botnets running on the network – Help!!!
We have completed our investigation it is
now time to acknowledge the alarm and
move onto the next threat that may take
place.
Give it a description and select ok.
Stealthwatch Analyzing Flows
Flow Analysis Process
• Flow Analysis Scenarios (Copyright
Infringement)
Flow Analysis Scenarios
Copyright Infringement– You get an email from a copyright infringement authority telling you to stop this
behavior or legal action will be taken. All you have is a timeline, file name, and external IP Address. We will
use the web GUI for this exercise.
Flow Analysis Scenarios
Copyright Infringement– You get an email from a copyright infringement authority telling you to stop this
behavior or legal action will be taken. All you have is a timeline, file name, and external IP Address. We will
use the web GUI for this exercise.
Here we populate the
information we got from
the copyright authority
and begin our search.
Flow Analysis Scenarios
Copyright Infringement– You get an email from a copyright infringement authority telling you to stop this
behavior or legal action will be taken. All you have is a timeline, file name, and external IP Address. We will
use the web GUI for this exercise.
“Select” the flow of
interest.
I can see the following details – Search Subject, Subject Port, Date and Time, Inside
Host, Inside Port , Outside Host, Outside Port, Application, Total Bytes. Lets pivot into
the “Inside Host”
Flow Analysis Scenarios
Copyright Infringement– You get an email from a copyright infringement authority telling you to stop this
behavior or legal action will be taken. All you have is a timeline, file name, and external IP Address. We will
use the web GUI for this exercise.
I can see everything about the host – I know the
internal IP, natted IP (got that insight in the previous
flow search), host details, Peers, Alarms, Users and
Sessions, Application Traffic both Inbound and
Outbound.
If integrated with
ISE I can
“Quarantine and
unquarantine
instantly from
Stealthwatch.
Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco security integration

Contenu connexe

Tendances

Tendances (20)

Cisco Stealtwatch
Cisco StealtwatchCisco Stealtwatch
Cisco Stealtwatch
 
OTV PPT by NETWORKERS HOME
OTV PPT by NETWORKERS HOMEOTV PPT by NETWORKERS HOME
OTV PPT by NETWORKERS HOME
 
Implementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit networkImplementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit network
 
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
 
FastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection toolFastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection tool
 
Bgp tutorial for ISP
Bgp tutorial for ISPBgp tutorial for ISP
Bgp tutorial for ISP
 
Implementing IPv6 Segment Routing in the Linux kernel
Implementing IPv6 Segment Routing in the Linux kernelImplementing IPv6 Segment Routing in the Linux kernel
Implementing IPv6 Segment Routing in the Linux kernel
 
BGP Multihoming Techniques
BGP Multihoming TechniquesBGP Multihoming Techniques
BGP Multihoming Techniques
 
TC Flower Offload
TC Flower OffloadTC Flower Offload
TC Flower Offload
 
TechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISE
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 
Tn 310 vlan-trunking
Tn 310 vlan-trunkingTn 310 vlan-trunking
Tn 310 vlan-trunking
 
LISP + GETVPN as alternative to DMVPN+OSPF+GETVPN
LISP + GETVPN as alternative to DMVPN+OSPF+GETVPNLISP + GETVPN as alternative to DMVPN+OSPF+GETVPN
LISP + GETVPN as alternative to DMVPN+OSPF+GETVPN
 
Segment Routing Technology Deep Dive and Advanced Use Cases
Segment Routing Technology Deep Dive and Advanced Use CasesSegment Routing Technology Deep Dive and Advanced Use Cases
Segment Routing Technology Deep Dive and Advanced Use Cases
 
OpeVPN on Mikrotik
OpeVPN on MikrotikOpeVPN on Mikrotik
OpeVPN on Mikrotik
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
 
Mikrotik Hotspot With Queue Tree BW Management
Mikrotik Hotspot With Queue Tree BW ManagementMikrotik Hotspot With Queue Tree BW Management
Mikrotik Hotspot With Queue Tree BW Management
 
A very good introduction to IPv6
A very good introduction to IPv6A very good introduction to IPv6
A very good introduction to IPv6
 
Mikrotik basic configuration
Mikrotik basic configurationMikrotik basic configuration
Mikrotik basic configuration
 

Similaire à Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco security integration

Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routersConfiguring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
phosika sithisane
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
Lancope, Inc.
 
Splunk app for stream
Splunk app for stream Splunk app for stream
Splunk app for stream
csching
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
ICT PRISTINE
 
breed_python_tx_redacted
breed_python_tx_redactedbreed_python_tx_redacted
breed_python_tx_redacted
Ryan Breed
 
Laporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdf
IGedeArieYogantaraSu
 

Similaire à Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco security integration (20)

SIEM
SIEMSIEM
SIEM
 
Incident Response: SIEM
Incident Response: SIEMIncident Response: SIEM
Incident Response: SIEM
 
CRYPTTECH PRODUCTS
CRYPTTECH PRODUCTSCRYPTTECH PRODUCTS
CRYPTTECH PRODUCTS
 
Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routersConfiguring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
 
Exploring the Final Frontier of Data Center Orchestration: Network Elements -...
Exploring the Final Frontier of Data Center Orchestration: Network Elements -...Exploring the Final Frontier of Data Center Orchestration: Network Elements -...
Exploring the Final Frontier of Data Center Orchestration: Network Elements -...
 
Router Defense - BRUcon 2010
Router Defense - BRUcon 2010Router Defense - BRUcon 2010
Router Defense - BRUcon 2010
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the Network
 
Cisco Automation with Puppet and onePK - PuppetConf 2013
Cisco Automation with Puppet and onePK - PuppetConf 2013Cisco Automation with Puppet and onePK - PuppetConf 2013
Cisco Automation with Puppet and onePK - PuppetConf 2013
 
Splunk app for stream
Splunk app for stream Splunk app for stream
Splunk app for stream
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
NetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseNetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat Defense
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
breed_python_tx_redacted
breed_python_tx_redactedbreed_python_tx_redacted
breed_python_tx_redacted
 
ASCC Network Experience in IPv6
ASCC Network Experience in IPv6ASCC Network Experience in IPv6
ASCC Network Experience in IPv6
 
Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)
Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)
Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)
 
Security defined routing_cybergamut_v1_1
Security defined routing_cybergamut_v1_1Security defined routing_cybergamut_v1_1
Security defined routing_cybergamut_v1_1
 
Laporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdf
 
Crypt tech technical-presales
Crypt tech technical-presalesCrypt tech technical-presales
Crypt tech technical-presales
 

Plus de Cisco Canada

Plus de Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco security integration