Cisco Architecture for Voice, Video, and Integrated Data (AVVID) and SAFE are Cisco- comprehensive strategies that help organizations successfully and securely develop and implement end-to-end network designs.
The approaching convergence of the telephone services, videoconferencing, IP data networks, software-based services, and a never-ending supply of new technologies introduces many opportunities for both disaster and success. AVVID provides a standards-based network architecture and a comprehensive set of best practices, which allows businesses to develop business and technology strategies that scale to meet the changing demands of e-business. AVVID provides end-to-end networking solutions that help organizations plan rapid deployment of emerging technologies and new Internet-based solutions.
The AVVID end-to-end networking solution includes network client devices, network infrastructure from network platforms to intelligent network services, Internet middleware tools, systems integrator responsibilities, and Internet business solutions. The AVVID strategy addresses the three primary concerns of network deployment: performance, scalability, and availability.
These documents and related links are available free, without a CCO ID from the Cisco web site. To find the current list of documents, either go to the following web site or go to http://www.cisco.com and do a search on AVVID: http://www.cisco.com/warp/public/779/largeent/avvid/cisco_avvid.html.
Tip? |
For the exams and for your own development in the industry, go to the site and at least download the white paper on the AVVID architecture and become familiar with it. This white paper provides a detailed overview that you can use to supplement all the chapters in this book. |
Cisco’s strategy for secure networks (SAFE) started with the original “SAFE: A Security Blueprint for Enterprise Networks,” a 66-page plan to provide best-practice information to those involved in designing and implementing secure networks. SAFE represents a defense-in-depth approach to network security design, focusing on the expected threats and the best ways to mitigate those threats, rather than a single set of rules to follow. The result is a “layered approach” to security design and implementation, intended to prevent a failure of one security system from compromising the organization network resources.
Since its introduction, the SAFE program has expanded to include many other blueprints, including “SAFE Extending the Security Blueprint to Small, Midsize, and Remote-User Networks,” and a growing number of SAFE documents on topics such as wireless, IP telephony, IPSec VPN, Nimda attack mitigation, and Code-Red attack mitigation. These white papers are available free, without a CCO ID from the Cisco web site. To find the current list of documents, either go to following web site or go to http://www.cisco.com and do a search on SAFE: http://www.cisco.com/warp/public/779/largeent/issues/security/safe.html.
Tip? |
For the exams and for your own development in the industry, go to the site and download at least the original “SAFE: A Security Blueprint for Enterprise Networks” and become familiar with it. This provides a detailed overview you can use to supplement all the chapters in this book. At a minimum, review the foundation material in Appendix B. |