I hadn't thought of that. Great call!
Besides, the original question was how we use Cisco- the same way everyone
else does! Its certainly not "government Cisco equipment" Its all off the
shelf, router route, switches switch. Whats the real question?

-----Original Message-----
From: William E Gragido [mailto:[EMAIL PROTECTED]]
Sent: Friday, September 22, 2000 3:24 PM
To: Ray Mosely; wdwdawd wadwadad; [EMAIL PROTECTED]
Subject: RE: US DOD. How do they do it?


First off, if you were truly working with a Defense Data Communications
Group that needed information on US datacomm prots etc, and they were part
of our Allies you would not need to ask.

> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
> Ray Mosely
> Sent: Friday, September 22, 2000 8:39 AM
> To: wdwdawd wadwadad; [EMAIL PROTECTED]
> Subject: RE: US DOD. How do they do it?
>
>
> To quote from Mission Impossible:
> Who are you?
>
> Ray Mosely, CCNA
>
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
> wdwdawd wadwadad
> Sent: Thursday, September 21, 2000 8:40 PM
> To: [EMAIL PROTECTED]
> Subject: OT: US DOD. How do they do it?
>
>
> Are there any listers with knowledge of Defense
> networks out there.  I am working with a defence type
> organisation (western world; not saddam!) and need
> info on how the US DOD use cisco in their services.
>
> For example do they rely on cisco's implementation of
> IPSEC for non classified traffic or do they just send
> in the clear on a private network.
> Do they utilise public networks.
> Do they utilise THE public network eg VPNS to remote
> sites?
> Do they outsouce portions of there network for
> "connectivity only" and implement their own controlled
> security at higher layers?
>
> I guess the minimum level of security for even
> non-class info would be 3des and classified would be
> sent on a completely seperate hardware (kgxxx)
> encryption based network.
>
> Do they utilise the catalyst range of switches and if
> so how do they maintain high levels of security at
> layer 2.  What stops the cleaner plugging in his
> lappie, dhcp'ing an address and shoot'n some nukes?
>
> Are there any US DOD public web pages on how they use
> cisco technology?
>
> There are many examples of other types of organisation
> (not in the killing industry) that also have a
> requirement for TOP SECRET levels of network security.
>  Are there any public web sites with examples of
> implementations?
>
> Thanks!
>
>
> __________________________________________________
> Do You Yahoo!?
> Send instant messages & get email alerts with Yahoo! Messenger.
> http://im.yahoo.com/
>
> **NOTE: New CCNA/CCDA List has been formed. For more information go to
> http://www.groupstudy.com/list/Associates.html
> _________________________________
> UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
> FAQ, list archives, and subscription info: http://www.groupstudy.com
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>
> **NOTE: New CCNA/CCDA List has been formed. For more information go to
> http://www.groupstudy.com/list/Associates.html
> _________________________________
> UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
> FAQ, list archives, and subscription info: http://www.groupstudy.com
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>

**NOTE: New CCNA/CCDA List has been formed. For more information go to
http://www.groupstudy.com/list/Associates.html
_________________________________
UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
FAQ, list archives, and subscription info: http://www.groupstudy.com
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

**NOTE: New CCNA/CCDA List has been formed. For more information go to
http://www.groupstudy.com/list/Associates.html
_________________________________
UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
FAQ, list archives, and subscription info: http://www.groupstudy.com
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to