Looking for a security product

Hi,
I'm looking for a SINGLE security product in order to do:
- Network Admission Control
- Limit the bandwidth for some users or some groups of users
- Block peer-to-peer traffic
Can someone suggest?
Thank you.
Best regards.
Massimiliano.

Massimiliano,
ISR routers can do the job for you. Here is the link for NAC support on ISR:
http://www.cisco.com/en/US/docs/security/nac/appliance/support_guide/license.html#wp54131
Zone-Based FW has the capacity to filter peer-to-peer traffic on the ISR.
QoS functionality should provide you the ability for bw limit.
Thanks,
Mynul

Similar Messages

  • I am looking for the adobe product that will read pdf attachments to emails

    I am looking for an adobe product that will read pdf attachments to emails

    Adobe Reader : http://get.adobe.com/reader

  • HT1620 Where do I look for the security key when I download an item.  Your website says your key is 0xD0261077

    Where do I look for the security key when I download an item.  Your website says your key is 0xD0261077?

    Your question is somewhat terse, and I might infer you're conflating the PGP key used for Apple security-related email communications with cryptographic hashes (message digests) used to verify the integrity and the origin of files, and with digitally-signed binaries.  While these areas are somewhat related, details vary.  (If you're already familiar with this stuff, my apologies.)
    The Apple PGP key is used to sign (verify) messages from the security folks at Apple, and can be to encrypt messages sent to the Apple security folks.  See this Apple Security PGP web page for details on using the PGP key for message verification and for message encryption.
    File downloads are implemented differently, and will generally involve a particular cryptographic hash or message digest (and not necessarily a PGP key), and what might be used used varies by the particular website and the download involved, with some sites using the older and insecure MD5, and with others increasingly using some variation of the less-insecure SHA cryptographic hash.  Depending on the scheme used, these can protect against corruptions, or can also be used to sign the binaries.  The system that Apple is encouraging developers to use is called Developer ID.
    Shell commands used and useful here include md5 and various openssl commands for the sha hashes/digests.
    If you have a particular public web site or file download, post a pointer and I'll have a look.

  • Look for a similar product

    We purchased the following wireless Access Point for my client. It will not work because it is made to clip into a drop ceiling. It will not look good because the cables will dangle if we keep it any where else.
    Cisco Aironet 2 dBi Diversity Omnidirectional Ceiling Mount Antenna (AIR-ANT5959)
    http://www.cisco.com/en/US/products/hw/wireless/ps469/prod_installation_guide09186a008007f904.html
    My project manager said maybe we can look for something more traditional. "rabit ears" as he put it. Any assistance will be appreciated.
    Thank you,

    how about either AIR-ANT1728, AIR-ANT4941, AIR-ANT2422DW-R from http://www.cisco.com/en/US/products/hw/wireless/ps469/products_data_sheet09186a008022b11b.html
    there is also 3rd party such as Tessco
    http://www.tessco.com/products/displayProducts.do?groupId=591&subgroupId=60

  • Looking for a Specific product

    Hello,
    I am looking for a specific Desktop PC. Similar to M73 ThinkCenter in size, but needs to have 3-4x HDMI inputs. This computer will run digital menus for restaurants/coffeeshops 24/7. The M73 has display ports but we are looking to move away from having to buy display ports to just plugging directly into the computer through HDMI.
    Thanks in advance for the info.

    ..... a computer.
    In all seriousness, an HTPC would be the easiest, but there's also Rokus, here's the first one I grabbed.
    http://www.bestbuy.com/site/Roku+-+2+XS+Wireless+Digital+Media+Player/2825032.p?id=1218355858277&sku...
    Now, personally I have no experience with them, but do know they're quite popular.
    If you like my post, or solution to your issue/question, go ahead and click on the little star by my name and/or accept the post as the Solution. It makes me happy.
    I'm NOT an employee of Best Buy, or Geek Squad, though I did work as an Agent for a year 5 years ago. None of my posts are to be taken as the official stance that Best Buy will take on your situation. My advice is just that, advice.
    Unfortunately, that's the bad luck of any electronic, there's going to be bad Apples... wait that's a horrible pun.

  • Looking for iPhone Security App Similar to Droid's Lookout Mobile Security

    I'm a droid user, and because of the iPhone's one button and lack of customization I will most likely always be one. My sister however (even though she loves the droid) kept getting phones that after a few months stopped working. We aren't too sure why, I've never had a problem, but she always does.
    Anyway we decided she should switch to iPhone and she is loving it. However I know my sister and she loses her phone constantly. On Droid the Lookout App allows you to locate your phone, back up your phone, 'scream' (in which your phone flashes it's LED and emits an increasingly louder siren to help you find it), lock (making it unuseable if stolen) and a 'wipe' feature that wipes out all your information from the phone if it lands in hands you can't retrieve from.
    Now I saw on here that there is already phone backup provided by Apple and a few of these features already but I'm mainly looking for an app (or apps) that can perform the screaming, locating, phone lock and phone wipe feature.
    Does anything like this exist? I know a lot of people seem to feel that what LookOut provides isn't needed on the iPhone but I just would feel safer if we could get these features on her new phone.

    http://www.apple.com/iphone/features/find-my-iphone.html

  • Looking for Imac (mid2011) Product link

    Looking for Imac (mid2011) link. I bought/built my iMac through the apple store in Aug 2012. I wanted to go in and PDF the specs the way it showed when i built it and the picture displays of the hook ups and etc but i cannot find the page anymore as it only goes to the newest iMac. Did anyone save those pictures or have a link to a site where i can view them?

    Have you looked at the user guide for the mid-2011 iMac?
    http://manuals.info.apple.com/en_US/imac_mid2011_ug.pdf
    That shows all the ports and features quite clearly.
    Regards.

  • I need to know what to look for on the toolbar when I am looking for a "secure site icon" such as the locked padlock on Internet Explorer

    We are unable to identify when we are on a secure site as we can when using Internet Explorer.

    Firefox 3 stil has the padlock in the right corner of the Status Bar (View > Status Bar).<br />
    Firefox 4 won't have the Status Bar anymore, so there you only have the site favicon on the location bar showing the domain if there is a secure connection and the website is identified.<br />
    Be aware that the presence of a padlock is no guarantee that you are connected to the expected website and that is the main reason for removal of the padlock.
    See also [http://www.dria.org/wordpress/archives/2008/05/06/635/ dria.org » Blog Archive » Firefox 3: Site Identification button]

  • Looking for a Microsoft products compatibility matix and AD functional levels.

    I need to upgrade the AD Forest Functional level from Windows 2003 to Windows 2008 R2. A products compatibility matrix would be a big help.
    Both domain controllers are Windows 2008 R2.
    Forest Functional Level - Windows 3003.
    Domain Functional Level - Windows 2008 R2
    We have an old SharePoint Services 2.0 server and I need to know if changing the Forest Level will break the SharePoint site.
    Additionally, we have MSSQL 2005 and 2008.
    Any help is greatly appreciated.
    Dave 

    Hello,
    for Sharepoint please see
    http://social.msdn.microsoft.com/Forums/office/en-US/f8933979-f993-4325-b931-31be023df1d5/is-sharepoint-portal-server-2003-supported-with-active-directory-domain-services-2012?forum=sharepointadminlegacy and if that doesn't help please ask in the same forum.
    This is more about Sharepoint then AD.
    MS SQL is not related with FFL/DFL. To be sure ask the SQL server guys in
    http://social.technet.microsoft.com/Forums/sqlserver/en-us/home?category=sqlserver
    Best regards
    Meinolf Weber
    MVP, MCP, MCTS
    Microsoft MVP - Directory Services
    My Blog: http://blogs.msmvps.com/MWeber
    Disclaimer: This posting is provided AS IS with no warranties or guarantees and confers no rights.
    Twitter:  

  • Looking for SAP security certification - Please guide me !!!

    Hello,
    This is Harsha from Bangalore, India.
    I am currently working as a system administrator with CISCO System, Bangalore with an overall experience of 5 years.
    I am interested in taking the SAP security model. Please assist me regarding the same with guidance to a proper career path.

    Thats a very generic and vague question.
    But to sart with, get trained in SAP Security. You might even go for Certification if you have the time and money for that.  And then just float your Resume.
    pk

  • Looking for a Secure Digital or SD card recommendation for MBPro and A540

    I have an old Canon A540 camera that takes Secure Digital cards. The card I bought many years ago is not seen in the SD slot of my MBPro (latest version). If anyone has experience with that camera and the Mac's card slot I would love to know which make they use and if possible the size of the card. My intention is to by a 4 GB card, but any experience would be appreciated.

    Launch Disk Utility and see if it appears there. Any SD card should work.

  • Looking for a software product

    I was in Bestbuy today looking at an IMac and noticed a software program loaded on it that is an all in one multimedia, movie player, pictures etc.
    I'm getting too old and can't remember the name of it except that it begins with a P.
    Anyone know what the name of this program is?
    Thanks

    Most likely Plex.

  • HP printer looking for WEP security...

    ... but my Time Capsule router settings only support several flavors of WPA security.
    Any ideas?
    JD

    To access one of the available WEP modes, you just need to hold down the Option key before making a Wireless Security selection. This will bring up the WEP (Transitional Security Network) option.

  • Help: looking for Serialization suggestions (on strategies and products)

    Hello,
    I'm looking for suggestions on how to tackle a Serialization issue. Suggestions on tools to use, and approaches for "do it yourself" coding are both needed.
    I need to serialize a large evolving codebase with a minimum of rewriting (overriding readObject... for each class is out of the question, likewise embeding metadata comments for all classes is also out of the question). Currently the codebase is using Java's default Object Serialization (to a binary array). This is completely unacceptable for the long term (object versioning and migrations are a nightmare).
    As such I've determined that JSX/JSX2 looks like a feasable solution (the pricing is nice; the mechanism wrappers readObject, writeObject (so a minimum of recoding); they automatically map objects back and forth and don't require Objects to be constrained (with meta data, being a given format (such as beans...))). I was leaning towards Object -> XML because:
    1) it is easy to read and therefore parse / upgrade / version
    2) it would fit into many different types of databases without need of specalized decompositions (just put the whole object in a data cell)
    however, management really wants to go Object -> tables. I am a bit leery about this but I keep hearing "we have no plans to move to any data technology other than RDB". Given those assumptions, it kind of pulls me in another direction. Namely a table serialization would have greatly enhanced performance (one could scan for objects with the highest value of some instance var quite quickly; with the other scheme it would be rather expensive...). So now I'm looking for suggestions on products that serialize Object -> table. The product at www.objectmatter.com looks like it might work well, but the licencing seems expensive. JSX/JSX2 might have Object -> table capability in the future but not now.
    Likewise, loathe as I am to reinvent a complex wheel, I am looking for strategies on rolling my own object -> table mapping code.
    On the one hand I think I might implement the serialization in a way similar to JSX (wrapper readObject...) as this would seem to give a direct route to the relevant instance variables.... On the other hand this would be even more slow than Java's current serialization, and I think I might go a bit blind parsing the binary stream. I could write some "stand-alone" that scans .java or .class files and auto generates a mapping file, then I could use some tool like Castor (however, given the complexities of some of my classes I think they might break Castor). The big problem is that my classes are complex and ugly (inner classes, anon classes...) so I get the feeling developing an algorithm for serializing them will be difficult and error prone. I was thinking of using Reflection and some guesses on getter/setters but now I'm thinking of using Java's security model (basically to turn all instance variables into "public" ones for my serialization routine).

    An update:
    Actually Castor didn't look as "full featured" as I originally thought...
    So for now I'm trying to write my own persistance manager. Its along the same lines as the article "Using Reflection to Automatically Map Objects to a Database" (which can be found at URL http://www.ajug.org/meetings/2001/DBMap.html ).
    The cool thing is that I have permission to make my work open source (I think that will help my company and others). My project goals are:
    1) create the persistance manager
    -the manager can be easily extended for any backing DB (within reason); so not just RDB but LDAP.... This will enable the user to easily "plug & play" DB technologies.
    -the manager will have a very simple (and limited) API similar to
    serialization. Basically one will be able to save, delete, and
    retrieve objects without needing predefined DB-Object mapping
    files.
    Likewise the user will be insulated from DB specific details.
    I am going to add a "context" which is basically a level of
    transactionalism (either the backing db supports it or you code it
    into your db wrapper layer).
    There will NOT be much in the way of query support.
    2) hook into existing "bridge" technologies
    -when I get done I want to see if I can get my auto-mapping & my
    persistence manager... to "cooperate" with stuff like Castor,
    Hibernate, OJB, TJDO.... This is a much lower priority but I see
    it as strategic for the long term growth of the project (it will
    enable users to transition from "dumb" auto-maps to "smart" custom
    ones seemlessly
    I'm going to open another thread about this on the forum.

  • Looking for a Darknet/Secure BBS app

    I have been a fan of Haxial KDX for the longest time, but due to the bugs, etc., I would like to move on.  I'm looking for a secure darknet/bbs styled program that supports chat, filesharing, and of basic user management (who can login, who can't, etc..).  I have been asking this question all over the web, and haven't gotten (or found) a single response.  Waste has never worked right for me, by the way.  I would definitely prefer it to be open source, which is why I thought it best to post here.  Please help out, or at least direct me somewhere where I should ask... Thanks.
    As an aside, the guy who wrote KDX and Hotline (Adam?? Hinckley) claimed on the Haxial website that he is willing to sell the project.  I wouldn't mine purchasing and restarting the KDX Project, but I've been unable to get in contact with him.  So...if you are him, or know him, or own the rights to Haxial KDX and all related projects...$$$$$
    Last edited by xen0blade (2010-01-12 13:18:15)

    I've recently become a big fan of OneSwarm - http://oneswarm.cs.washington.edu - I like that it supports remote access.
    But I'm definitely interested to see what this thread brings up!
    Last edited by hAyZe (2010-01-11 20:50:45)

Maybe you are looking for

  • Can no longer leave mail on server

    After 4 hours with ATT and Apple including an Apple call back that never came I have not solved what seemed a simple problem. In the past my phones have left messages that I deleted from my phone on the Att/yahoo server. They no longer do. If I delet

  • Windows 7 / Arch Linux Dual-Boot - win7 keeps changing the boot flag!

    Greetings! Its been a long while since I had to dual-boot with windows on the same machine. I 've installed windows 7 and then arch linux and installed GRUB on my sda1 where the /boot partitions is located at. I've managed to boot into arch successfu

  • Baseline Date field to be grayed out

    Hi , I have requirement wherein i want to gray out (not modifiable ) Baseline date field in f-28 . When u Simulate the document that time the baseline date field is modifialble , i want to make it not modifiable . Before save it is modifiable i want

  • HT4623 What to do if the message "unable to check for update" appear? iPad is connected to the Internet.

    What to do if the message "unable to check for update" appear? iPad is connected to the Internet.

  • Restore from Album 2.0 backup

    Upgraded my machine to Windows 7 and installed PSE 8.  Tried to restore a backup copy from Album 2.0.  Get error message saying it can't convert due to error and to use Album to repair. When the backup copy was made to ext. hard drive, the backup com