IBM Tivoli and Cisco manual Less Secure

Models: Tivoli and Cisco

1 516
Download 516 pages 58.69 Kb
Page 82
Image 82

Figure 3-8shows the security zones and their classifications. Organizations could have different topologies and have their own architecture and naming of zones depending on their security policy.

 

 

 

Organizations may

Some organizations

 

 

 

set up specialized

may set up special

Untrusted

Business Partner

 

restricted zones for

networks to

External network

Connections

Trusted Internal

production systems

separate various

like Internet

VPN termination

Network

Which would have

management

 

 

 

Application &

components from

 

 

 

Database systems

production systems.

Uncontrolled

Controlled

Controlled

Restricted

Restricted

Zone

Zone

Zone

Zone

Zone

 

 

 

Production

Management

Internet

DMZ

Intranet

Network

Network

Less Secure

 

 

 

More Secure

Figure 3-8 Security zones

For more about the MASS architecture methodology, refer to the IBM Redbook Enterprise Security Architecture Using IBM Tivoli Security Solutions, SG24-6014.

Enterprise security has to meet many stringent requirements, one of them being compliance. Maintaining and enforcing client compliance can be a tedious process that consumes time and resources because:

￿The number of clients can be large.

￿Clients are physically dispersed and use different access methods to access enterprise resources.

￿Not all clients accessing the network are owned by the enterprise (for example, partners and contractors).

The IBM Integrated Security Solution for Cisco Networks addresses network clients’ compliance to policies that are centrally defined by the enterprise. The solution can enforce client compliance and help remediate compliance violations. Hence it is important to understand network clients, their access methods, and how this solution can effectively meet the end result of client compliance.

Network client machines represent the users of corporate resources. Clients access these resources using various access methods such as LAN, wireless, WAN, and Internet access. Clients using these access methods mostly enter the

64Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Page 82
Image 82
IBM Tivoli and Cisco manual Less Secure