Chapter 10. The Small Network Implementation

Terms you'll need to understand:

  • Standalone

  • Branch

Techniques you'll need to master:

  • Matching threats to mitigation techniques

  • Analyzing design alternatives

As you put the pieces of the SAFE Blueprint together, you need to consider the following aspects of each module's design:

  • Assets to be protected

  • Threats to those assets

  • Devices used and their implementation and configuration

  • Threats mitigated

  • Design alternatives

In the case of the small business network, we're talking about a small edge and a small campus. It is worth remembering that this small network might be an entire business in its own right (standalone) or a branch operation of a larger organization (branch). Either way, it must be secured as an entity.

graphics/alert_icon.gif

The SAFE exam description says that you will be tested on the knowledge and skills to implement the principles and axioms in the SAFE SMR Blueprint. Implementing principles and axioms is less about command syntax than it is about which commands to enter and about which devices to put where and why . You should be prepared to answer questions about why a device is used in a certain place in the design instead of another device. In other words, know the alternatives within each module and what each alternative brings to the Blueprint.


For review, Figure 10.1 shows the small business network model in its entirety.

Figure 10.1. The small business/branch network.

graphics/10fig01.gif



CSI Exam Cram 2 (Exam 642-541)
CCSP CSI Exam Cram 2 (Exam Cram 642-541)
ISBN: 0789730243
EAN: 2147483647
Year: 2002
Pages: 177
Authors: Annlee Hines

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net