Cisco Advanced Services for Network Security - BradReese.Com

abusivetrainerNetworking and Communications

Nov 20, 2013 (3 years and 8 months ago)

97 views








Overview
Cisco Advanced Services for Network Security.
The challenges of keeping your network infrastructure secure have never been greater or more important to your
business. To help ensure your business is protected, security must be an intrinsic part of the network, implemented
throughout your environment to address a range of network security threats.
To meet those challenges, Cisco® Advanced Services for Network Security
offers expert advice on how to mitigate network security threats and meet your
organization’s productivity and total cost of ownership (TCO) goals. Unique
from Cisco Systems® is a complete service offering in which security is
integral to the network.
The Cisco Advanced Services team is made up of industry experts in network
security with experience running security operations for many global Fortune
500 companies. In addition, Cisco Advanced Services consultants hold
expert-level CCIE® and CISSP certifications and have direct experience in
planning, designing, implementing, and optimizing large network security
infrastructures.
With the help of practical experience, knowledge of the latest network security technology, and specialized tools, the
Cisco Advanced Services engineering team can build an in-depth knowledge of your business objectives and security
environment to assist you in managing the evolving information security threat.

When you do business with the largest corporations in the world, especially when you’re
connecting an Internet-based system to their network, security and reliability are critical.
Cisco was an easy choice. When you’re building a company like ours from the ground up and
our reputation and our product suite is dependent upon enabling interconnectivity and
maintaining a healthy, robust network, it makes sense to go with the industry leader.
− Kirt A. Scott, Vice President and Chief Technology Officer for FuelQuest, Inc.







© 2002 Cisco Systems, Inc. All right reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com
Page 1 of 13


Security Services to Support the Network Lifecycle
Cisco Advanced Services for Network Security offers security services to support the complete life cycle of your network.
Offering expert advice on how to meet your company’s security guidelines and policy, Cisco engineers can help you
successfully plan, design, and manage the integration of network- and host-based intrusion detection sensors, firewall devices,
and security technologies such as IP Security (IPSec) VPNs into your network infrastructure.

Plan: Network Security Assessments and Planning
Cisco assessment and planning services range from developing an overview of your organization’s operational approach to
security, to assessing the security of networked applications, systems, and devices. By assessing all aspects of your networked
business environment, Cisco can help determine your organization’s ability to detect, defend against, and respond to network
attacks.
Security Posture Assessment
As the first step in planning network security, Cisco can provide you with a comprehensive evaluation of your organization’s
network security posture. The Security Posture Assessment (SPA) provides a snapshot of the security state of your network by
conducting a thorough assessment of your network devices, servers, desktops, and databases. Cisco experts analyze the
effectiveness of your network security in reference to recognized industry best practices, allowing you to identify the relative
strengths and weaknesses of your environment and document specific vulnerabilities that could threaten your business.
Because network security involves all aspects of your business, Cisco engineers assess security from a variety of perspectives
including your internal, external, dialup, and wireless networks, providing recommendations on how to improve overall network
security. By taking a comprehensive approach using specialized tools by security experts with extensive field experience, Cisco
can identify which vulnerabilities may be used to gain unauthorized access to networks, systems, and information. (Table 1)
Internal Assessment
With so much attention devoted to threats and incidents by remote hackers abusing the Internet, the security of your internal
trusted network may be overlooked. The internal assessment is a controlled network-attack simulation used to gauge the
exposure present on internal systems, applications, and network devices. The assessment identifies the steps needed to thwart
intentional attacks or unintentional mistakes from trusted insiders to better secure valuable information assets.
The Internal SPA takes a comprehensive approach to gaining unauthorized access to internal resources. Going beyond automated
detection of vulnerabilities, Cisco engineers simulate a real intruder’s attack in a controlled, safe manner to manually confirm
vulnerabilities, providing a more structured approach to identifying vulnerabilities that may go undetected. This secondary
exploitation may include attempting to exploit trusted relationships between hosts, exploiting password weakness, or gaining
administrative access to systems.
External Assessment
The goal of an external assessment is to quantify the security risk associated with Internet-connected systems. To effectively
identify vulnerabilities that allow untrusted, outside networks to gain access to internal, trusted networks and systems, Cisco

© 2002 Cisco Systems, Inc. All right reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com
Page 2 of 13


engineers can simulate hostile activities typical of malicious attackers attempting to compromise perimeter devices and Internet
security controls.

Cisco experts begin by conducting a remote vulnerability scan of the organization’s Internet presence using specialized,
automated tools with capabilities that extend well beyond standard commercial tools. After researching and confirming
registration of Internet devices, Cisco experts scan for services that are externally visible. Because most services have inherent
and well-known vulnerabilities, Cisco engineers work to determine if the services offered are potentially vulnerable and attempt
to manually confirm vulnerabilities that may lead to security compromises.
Wireless Assessment
The wireless assessment provides an evaluation of the security posture of an organization’s wireless network to identify risks and
exposures associated with a wireless deployment. Cisco experts analyze the wireless technology architecture and configurations
to identify authorized and unauthorized access points and recommend solutions to strengthen the security of the wireless
infrastructure.
Cisco experts begin by surveying the customer premises to discover and map all available access points. By comparing the data
gathered during the site survey against a list of authorized devices, Cisco is able to identify possible rogue devices. After an
inventory of access points is completed, Cisco engineers review and compare the wireless network architecture and configuration
to industry best practices, documenting known vulnerabilities and threats.
Moving outside customer buildings, engineers use sophisticated wireless antennas to attempt to find wireless network traffic
leaking from buildings. If necessary, engineers will move into controlled areas of the building to continue seeking wireless LAN
traffic. When traffic is discovered, engineers determine the level of encryption and authentication used, looking for network
attributes such as network addresses in an attempt to gain access to the LAN.
Dialup Assessment
The goal of the dialup assessment is to determine the security risks associated with remote-access services. Dial services can
provide an attacker an easy backdoor into a customer’s network, bypassing otherwise effective security measures such as
firewalls. Cisco engineers attempt to gain unauthorized access to the remote-access servers after identifying server software and
the authentication methods used. Manually attempting to bypass the access server, Cisco engineers try to determine where the
compromised device is connected to the network and, if possible, exploit further access.

Security Posture Assessment Analysis and Documentation
The Cisco engineers provide extensive analysis of the simulated attacks including management metrics and graphs that quantify
the security posture of the organization’s network. The SPA report also provides extensive technical details including analysis of
each IP address, an explanation of methods used to compromise network devices and systems, and a description of the likelihood
of an attacker to use that same approach. The report then prioritizes the discovered vulnerabilities and recommends actions to
correct the security risks, detailing remediation steps that can be taken to prevent future exploitation.





© 2002 Cisco Systems, Inc. All right reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com
Page 3 of 13



Table 1: Security Posture Assessment Features and Benefits
Capabilities and Methodology
Benefits
Capabilities
• Internal assessment
– Perform an automated scan of ports to determine potential
vulnerabilities
– Simulate a controlled network attack to assess system,
application, and network device vulnerabilities
– Perform secondary exploitation to confirm identified
vulnerabilities
• External assessment
– Conduct a remote scan of the organization’s Internet
presence
– Simulate hostile activities in an attempt to compromise
perimeter devices
– Detail unauthorized device, server, and information access
• Dialup assessment
– Attempt to gain unauthorized access to the remote-access
servers
– Determine the authentication methods used and manually
attempts to bypass them
• Wireless assessment
– Identify access points on the wireless network that may pose
a security risk
– Provide risk analysis and documents exposures within the
wireless network
– Document recommended configuration changes to minimize
risk
Methodology
• Baseline testing of target network devices, systems, and services
• External penetration testing, remote exploitation, and onsite internal
simulated attacks to exploit vulnerabilities
• Data and intelligence gathering to assess security threats to devices,
systems, and information
Deliverables—A SPA management and technical report providing analysis,
documentation, and prioritization of vulnerabilities including
recommendations for remediation; onsite executive presentation of findings
and recommendations
Mitigate network security threats
• Provide a cost-effective and unbiased
assessment of information security
risk
• Identify critical security threats that
pose a risk to networks, systems, and
information
• Support an organization’s need to
evaluate the effectiveness of existing
security policy and procedures
• Assist in improving the security state
of the network by recommending
actions to mitigate identified
vulnerabilities





© 2002 Cisco Systems, Inc. All right reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com
Page 4 of 13


Design: Build in Scalable, Adaptable, and Easy-to-Use Security Solutions
After you have assessed the security state of the network, Cisco can work with you to develop a strong
security design. Cisco design methodology considers all aspects of network security and its integration
with the core network infrastructure. Using an in-depth, system-wide approach based on industry standards, Cisco experts can
help you develop a multilayer defense against directed attacks from hackers or an indiscriminate attack from viruses and worms.
Cisco design assistance can improve your competitive edge by enabling you to offer the secure application services your
customers need today. By taking an architectural approach, our security infrastructure is built to last and can evolve over time to
support the deployment of new business applications.
By specifying a common set of security solutions, policies, and practices that can be replicated across your organization, Cisco
can help reduce your network operating costs by saving time and money on network security administration, lowering your
network’s total cost of ownership.

Network Security Design Review
Cisco can work with you to develop a strong security design from both an operational and technical perspective. Cisco security
consultants can assist you in defining the policies, standards, and procedures that form the foundation of secure e-business, and
then work to develop a security architecture and design that supports your corporate security strategy.
Cisco network security architects conduct a collaborative review of your organization’s business strategy and related security
goals, requirements, and standards. Cisco engineers then provide an in-depth analysis of your network security architecture to
determine its effectiveness for meeting business and IT strategies. Based on analysis of the network information gathered, Cisco
engineers provide a detailed review of network vulnerabilities (Table 2).
After evaluating your existing network for vulnerabilities, Cisco engineers can identify and prioritize security requirements for
network solutions including intrusion detection, remote access, host protection, perimeter control, and VPNs. Cisco can
recommend improvements to your network design including network topology, device placement, and connectivity. Taking into
consideration all the aspects of network security such as scalability, performance, and manageability, Cisco can recommend
protocol, policy, and feature improvements for individual security components.











© 2002 Cisco Systems, Inc. All right reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com
Page 5 of 13




Table 2: Network Security Design Review Features and Benefits
Capabilities and Methodology
Benefits
Capabilities
• Review network security business goals, objectives, and requirements
• Review the existing network security architecture and design
• Identify and analyze architecture and design vulnerabilities
• Provide a detailed analysis of network security components including:
– Perimeter devices
– Remote-access devices
– Intrusion detection systems
– Firewalls
– Routers and switches
– Extranet connections
– Security management systems
• Recommend improvements to topology, components, functions, and
features
• Develop sample configurations for firewalls, intrusion detection
systems, routers, switches, VPNs, access-control servers, wireless
devices, and security management tools
• Specify hardware and software requirements including network security
management tools
• Provide recommendations for the ongoing management and
maintenance of the security solution
Methodology
• Conduct a design workshop to gather data and initiate the design
review
• Analyze existing network security architecture against organizational
strategy and requirements
• Provide a preliminary and final gap analysis based on industry best
practices
• Deliver an impact analysis of new security requirements on the network
infrastructure
Deliverable—A Network Security Design Review document that identifies
existing network vulnerabilities; recommends improvements to the overall
security design, components, and functions; and provides network diagrams
and sample configurations

Mitigate network security threats
• Identify security vulnerabilities and
deviations from corporate security
policy and industry best practices
• Help increase the effectiveness of
network security to provide a
multilayer defense against security
threats
• Improve reliability, maintainability,
and performance of the network
security design
Improve productivity
• Reduce the time needed for
expensive, time-consuming,
network redesign
Reduce total cost of ownership
• Use existing security capabilities of
the network infrastructure

Lower operating costs and
minimize network disruptions by
ensuring consistent deployment of
security policy


© 2002 Cisco Systems, Inc. All right reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com
Page 6 of 13




Network Security Design Development
The Network Security Design Development service can assist in developing a strategy, plan, and design for integrating a new
security solution into the core network infrastructure. Cisco consultants and architects can review an organization’s security
goals and then provide an in-depth analysis of the technical, procedural, and resource requirements for a customized security
deployment that meets these goals.
With this service, Cisco experts can help you minimize errors associated with deploying a new security solution. Organizations
can avoid potentially costly mistakes or delays by drawing on Cisco expertise across a broad set of network security technologies
including intrusion detection, firewalls, remote access, and VPNs. (Table 3)
After gaining an understanding of your security solution goals and requirements, Cisco experts help develop a strategy and
design for the security solution including detailed network diagrams and sample configurations that allow for easy integration
into the organization’s environment.
Table 3: Network Security Design Development Features and Benefits
Capabilities and Methodology
Benefits
Capabilities
• Analyze network security solution goals, objectives, and requirements
• Jointly develop a strategy, plan, and design for a corporate-wide
approach to network security
• Evaluate the existing network architecture to identify architecture,
design, and implementation vulnerabilities
• Jointly define the architectural, topological, and functional
requirements for a new security solution deployment
• Optimize the solution design for scalability, redundancy, and
performance
• Jointly develop a detailed design including sample configurations for
network security components including:
• Perimeter devices
• Remote-access devices
• Intrusion detection systems
• Firewalls
• Routers and switches
• Extranet connections
• Security management systems
• Provide detailed network diagrams and sample configurations for
protocols, policies, and features
• Specify hardware and software requirements including network
security management tools
• Provide recommendations for the ongoing management and
maintenance of the security solution
Mitigate network security threats
• Identify security vulnerabilities and
deviations from corporate security
policy and industry best practices
• Develop a customized network
security design that provides
multilayer defense against security
threats
Improve productivity
• Shorten implementation and
migration times for new applications
and technology

Help avoid problems during design,
implementation, and deployment

Reduce total cost of ownership
• Help prevent costly redesigns to
support new security requirements

Prepare for future integration and
deployment initiatives



© 2002 Cisco Systems, Inc. All right reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com
Page 7 of 13


Capabilities and Methodology
Benefits
Methodology
• Conduct a design workshop to gather data and initiate the
development of the security design
• Analyze existing network security architecture against organizational
strategy and requirements

Develop network security strategy and design recommendations that
meet customized IT and security requirements

Deliverable—A Network Security Design Development document that
outlines the overall strategy and plan for the new solution and defines the
security design topology, components, and functions including network
diagrams and sample configurations






Implement: Effectively Integrate Security into the Network Infrastructure
When your security solution design is set, Cisco Advanced Services engineers can support your team through
implementation and deployment activities. The sound security design principles and assistance provided during the
planning and design phases are made available during the implementation phase, strengthening your team’s ability to meet
aggressive deployment schedules while helping to minimizing costly disruptions to the existing network infrastructure.
Network Security Implementation Plan Review
If you are planning a new security deployment and would like assistance with your organization’s implementation plan, Cisco
can help you develop it further. Beginning with a thorough understanding of the objectives and scope of your deployment
project, Cisco can provide a review of your plan that analyzes the technical requirements, procedures, and resources needed to
deploy, integrate, and manage the security solution (Table 4).
Cisco alerts you to problems you may encounter in the implementation and makes recommendations for hardware and software
changes that can help to ease the process of network staging, migration, and integration into the core network infrastructure.
Cisco assists you with testing and installation plans, making recommendations for what to test and working with staff engineers
to validate test results and help ensure acceptance criteria are met.









© 2002 Cisco Systems, Inc. All right reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com
Page 8 of 13



Table 4: Network Security Implementation Plan Review Features and Benefits
Capabilities and Methodology
Benefits
Capabilities
• Develop an understanding of the objectives, scope, and constraints of
the deployment
• Review and analyze implementation plans, including the technical and
procedural requirements for solution deployment, integration, and
management
• Review implementation action plans including tasks, milestones,
resources, and schedule
• Analyze the network staging, test, and installation plans, including
topology, configurations, test scripts, and acceptance criteria
• Analyze and recommend hardware and software changes
• Analyze hardware and configuration changes on an ongoing basis and
notify network and security staff
Methodology
• Conduct a collaborative planning session to understand requirements,
identify interdependencies, and define project scope, roles, and
responsibilities
• Review and make recommendations on implementation, action, network
staging, test, and installation plans
• Analyze network changes on an ongoing basis and notify network and
security staff
Deliverable—An Implementation Plan Review document that provides
recommendations for the successful implementation and management of the
security solution
Mitigate network security threats
• Assist in planning the most strategic
and effective placement and
configuration for the security
solution
Improve productivity
• Strengthen staff ability to meet
deployment schedules
• Minimize costly disruption to the
existing network infrastructure
during deployment
• Minimize expensive rework of the
network infrastructure to support the
new security solution

Network Security Implementation Engineering
To be fully effective, security solutions must be not only strategically planned but also carefully deployed, configured, tuned,
and integrated into the network infrastructure. Cisco Advanced Services for Network Security can help your organization
engineer the implementation of a new security solution (Table 5), enabling your organization to secure its environment more
quickly, allowing for maximum use of your own staff resources.
Cisco offers services to support you through all aspects of implementing a new security solution. Cisco engineers can help your
organization during the critical planning phase to develop a deployment strategy including scope, objectives, and measurements
of success. The service also includes detailed plans for the solution deployment, including installation, configuration,
integration, and management. After the strategy and plans are completed, Cisco engineers can work with your implementation
staff to provide custom installation, configuration, testing, and tuning to help ensure the deployment integrates smoothly into
your production environment.





© 2002 Cisco Systems, Inc. All right reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com
Page 9 of 13


Table 5: Network Security Implementation Engineering Features and Benefits
Capabilities and Methodology
Benefits
Capabilities
• Study the objectives, scope, requirements, resources, and constraints of
the security deployment project
• Jointly develop the implementation plan detailing the technical and
procedure requirements for solution deployment, integration and
management

Jointly develop the solution testing, installation, configuration,
integration, management, and maintenance plans

• Jointly develop the solution deployment action plan including tasks,
milestones, and schedule
• Jointly develop the network staging plan including physical and logical
topology, configurations, test scripts, and acceptance criteria
• Provide custom installation, configuration, testing, tuning, and
integration of the solution
• Provide onsite support during integration with the production network
• Provide practical education with staff on the operation and management
of the solution
Methodology
• Conduct a project planning meeting to set expectations, timeliness, and
milestones and to define deliverables
• Assist staff engineers in performing network site surveys
• Travel on site to perform custom installation, configuration, tuning, and
integration of the security solution
• Provide onsite support during integration with the production network
• Team with customer engineers to perform post-implementation
verification testing and one day of onsite support
Deliverable—Implementation Engineering report that details the completed
installation, configuration, and tuning activities and outlines
recommendations for the ongoing operation and management of the solution
Mitigate network security threats
• More rapidly secure an
organization’s business environment
by sharing the deployment workload
Improve productivity
• Minimize costly mistakes or
deployment delays
• Provide efficient solution
deployment allowing for maximum
use of staff resources
• Gain essential practical education
from experienced Cisco security
engineers
Reduce the total cost of ownership

Optimize the security solution for
ongoing, efficient management and
maintenance








© 2002 Cisco Systems, Inc. All right reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com
Page 10 of 13




Optimize: Continually Identify and Mitigate Risk
After your security solution has been successfully deployed, your network infrastructure will be ready to
support increased demands that may arise from changing business dynamics and growing network
requirements. As network conditions change, Cisco will work with you to perform optimization checks to
help ensure your network security infrastructure continues to meet performance objectives.
Network Security Optimization
The foundation of the Network Security Optimization service (Table 6) is in-depth knowledge of your network and security
infrastructure gained through ongoing collaboration with your network operations staff. As network conditions change, Cisco
engineers can assess the ongoing security performance of your network by collecting and analyzing data for trends and security
exceptions.
If your network security is found to be less than optimal, Cisco can recommend changes to optimize your security design and
implementation. Cisco engineers can evaluate and recommend changes to the load distribution and traffic-handling performance
of your network security devices as well as provide hardware and software recommendations to help prevent security breaches.
If you are planning to introduce a new software configuration to the network, Cisco engineers can analyze the effects of these
changes prior to deployment.
Cisco also offers a network security advisory service to proactively notify you of Cisco security advisories that may affect your
network. If a security alert is issued, Cisco will contact you and work with staff engineers to determine the potential effect to
your network, recommending network modifications to mitigate your security risk.














© 2002 Cisco Systems, Inc. All right reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com
Page 11 of 13



Table 6: Network Security Optimization Features and Benefits
Capabilities and Methodology
Benefits
Capabilities
• Define criteria for network security optimization including utilization, fault
conditions, error thresholds, and throughput
• Collect and analyze data for trends and exceptions that may impact
network security
• Review network security component placement and configuration for
optimal load distribution and traffic handling
• Provide recommendations for network and security component tuning
including system optimization, filtering, route redistribution, trunk and
port configuration, and protocol, policy, and feature configuration
• Monitor and inspect security logs to trend usage of systems and
suspicious activity
• Deliver impact analysis of new software features and configurations
• Provide hardware and software recommendations to optimize system
and network performance

Identify, analyze, and notify staff of network security advisories

Methodology
• Conduct a planning meeting to set expectations and milestones and to
define deliverables
• Provide ongoing impact analysis of new software versions, features,
and configurations
• Provide ongoing notification and analysis of network security advisories
Deliverable—An Implementation Engineering report that summarizes
strengths and weaknesses found in the network security environment and
recommends design and configuration improvements

Mitigate network security threats
• Provide recommendations to
improve network security efficiency,
reliability, and performance
• Help ensure software and hardware
changes do not degrade network
security
Improve productivity
• Assist staff to proactively identify
and resolve potential network
security risks
• Reduce the time and resources
needed to stay apprised of security
vulnerabilities
Reduce total cost of ownership
• Optimize network security
infrastructure throughput and
efficiency


The Cisco Difference: People, Process, Tools, and Partners
Cisco Advanced Services for Network Security offers certified experts, in-depth technical knowledge, specialized tools and
methodology, and industry-leading security research labs to deliver high quality network security services. Cisco consultants
and engineers can help you minimize the risk to valuable business assets by working with your team to assess, design,
implement, and optimize network security solutions that are critical to managing the evolving information security threat.
Contact your Cisco representative to find out more about how Cisco Advanced Services experts can help you to mitigate network
security threats, improve your organization’s staff productivity, and reduce the total cost of ownership for your network.





© 2002 Cisco Systems, Inc. All right reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com
Page 12 of 13


stems, Inc. All right reserved.
statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com
Page 13 of 13













© 2002 Cisco Sy
Important notices, privacy

Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
European Headquarters
Cisco Systems International
BV
Haarlerbergpark
Haarlerbergweg 13-19
1101 CH Amsterdam
The Netherlands
www-europe.cisco.com
Tel: 31 0 20 357 1000
Fax: 31 0 20 357 1100
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
www.cisco.com
Tel: 408 526-7660
Fax: 408 527-0883

Asia Pacific Headquarters
Cisco Systems, Inc.
Capital Tower
168 Robinson Road
#22-01 to #29-01
Singapore 068912
www.cisco.com
Tel: +65 317 7777
Fax: +65 317 7799

Cisco Systems has more than 200 offices in the following countries and regions. Addresses, phone numbers, and fax numbers are listed on
the Cisco Web site at
www.cisco.com/go/offices
.

Argentina • Australia • Austria • Belgium • Brazil • Bulgaria • Canada • Chile • China PRC • Colombia • Costa Rica • Croatia • Czech Republic
• Denmark • Dubai, UAE • Finland • France • Germany • Greece • Hong Kong SAR • Hungary • India • Indonesia • Ireland • Israel • Italy •
Japan • Korea • Luxembourg • Malaysia • Mexico• The Netherlands • New Zealand • Norway • Peru • Philippines • Poland • Portugal • Puerto
Rico • Romania • Russia • Saudi Arabia • Scotland • Singapore • Slovakia • Slovenia • South Africa • Spain • Sweden • Switzerland • Taiwan •
Thailand • Turkey Ukraine • United Kingdom • United States • Venezuela • Vietnam • Zimbabwe

Copyright 2003 Cisco Systems, Inc. All rights reserved. Cisco, Cisco Systems, and the Cisco Systems logo are registered trademarks or
trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. All other trademarks mentioned in this document
or Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and
any other company. (0301R)

Printed in the USA