{"id":3906,"date":"2011-07-14T21:06:04","date_gmt":"2011-07-14T19:06:04","guid":{"rendered":"http:\/\/security-planet.de\/?p=3906"},"modified":"2011-07-14T21:06:04","modified_gmt":"2011-07-14T19:06:04","slug":"cisco-networkers-2011-tag-4","status":"publish","type":"post","link":"https:\/\/cyber-fi.net\/index.php\/2011\/07\/14\/cisco-networkers-2011-tag-4\/","title":{"rendered":"Cisco Networkers 2011, Tag 4"},"content":{"rendered":"<p>Auch heute standen wieder drei Sessions auf dem Programm. In &#8220;You Spent Millions on Network Security But Still Got Hacked !!!!&#8221; wurden Case-Studies pr\u00e4sentiert, in denen trotz umfangreicher Sicherheitsmechanismen doch Security-Probleme auftauchen konnten. &#8220;Deploying and Troubleshooting WCCP for WAN Acceleration, Security and Content Delivery&#8221; war sehr interessant, da die verschiedenen WCCP-Implementierungs-Modelle sehr umfangreich beleuchtet wurden. Nicht so gut war &#8220;Cisco Trustsec and Security Group Tagging&#8221;. Das Thema ist zwar sehr interessant, aber leider sehr schlecht vorgetragen.<\/p>\n<p>Weiterhin steht am Mittwoch abend immer der Customer Appreciation Event an. Nach einer gut 10min\u00fctigen Fahrt mit dem Shuttle-Bus kamen wir im M-Resort an, wo schon die B\u00fchne f\u00fcr die Live-Musik und diverse St\u00e4nde f\u00fcr Essen und Getr\u00e4nke aufgebaut waren:<br \/>\n<a href=\"https:\/\/blog.iwen.de\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-1.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/security-planet.de\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-1-1024x265.jpg\" alt=\"\" title=\"nw2011-m-resort-1\" width=\"600\" height=\"154\" class=\"alignnone size-large wp-image-3908\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-1-1024x265.jpg 1024w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-1-300x78.jpg 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-1-768x199.jpg 768w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><br \/>\nNat\u00fcrlich hat jeder Teilnehmer wieder einen Hut bekommen:<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.iwen.de\/wp-content\/uploads\/2011\/07\/nw2011-hat.jpg\" alt=\"\" title=\"nw2011-hat\" width=\"250\" height=\"171\" class=\"alignnone size-full wp-image-3910\" \/><br \/>\nDiese blinkenden H\u00fcte und die Leuchtst\u00e4be haben an diesem \u00e4u\u00dferst angenehmen Abend f\u00fcr eine schummerige Stimmung gesorgt. Insgesamt ein sehr gelungener Abend:<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.iwen.de\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-3.jpg\" alt=\"\" title=\"nw2011-m-resort-3\" width=\"600\" height=\"385\" class=\"alignnone size-full wp-image-3913\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-3.jpg 600w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-3-300x193.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.iwen.de\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-4.jpg\" alt=\"\" title=\"nw2011-m-resort-4\" width=\"600\" height=\"307\" class=\"alignnone size-full wp-image-3914\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-4.jpg 600w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-4-300x154.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.iwen.de\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-5.jpg\" alt=\"\" title=\"nw2011-m-resort-5\" width=\"600\" height=\"321\" class=\"alignnone size-full wp-image-3915\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-5.jpg 600w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-5-300x161.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><br \/>\n<a href=\"https:\/\/blog.iwen.de\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-2.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/security-planet.de\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-2-1024x231.jpg\" alt=\"\" title=\"nw2011-m-resort-2\" width=\"600\" height=\"134\" class=\"alignnone size-large wp-image-3909\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-2-1024x231.jpg 1024w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-2-300x68.jpg 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2011\/07\/nw2011-m-resort-2-768x173.jpg 768w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Auch heute standen wieder drei Sessions auf dem Programm. In &#8220;You Spent Millions on Network Security But Still Got Hacked !!!!&#8221; wurden Case-Studies pr\u00e4sentiert, in denen trotz umfangreicher Sicherheitsmechanismen doch Security-Probleme auftauchen konnten. &#8220;Deploying and Troubleshooting WCCP for WAN Acceleration, Security and Content Delivery&#8221; war sehr interessant, da die verschiedenen WCCP-Implementierungs-Modelle sehr umfangreich beleuchtet wurden. <\/p>\n<div class=\"read-more-text\"><a href=\"https:\/\/cyber-fi.net\/index.php\/2011\/07\/14\/cisco-networkers-2011-tag-4\/\" class=\"read-more\">continue reading<\/a><\/div>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[5],"tags":[147,427],"class_list":["post-3906","post","type-post","status-publish","format-standard","hentry","category-cisco","tag-cisco-live","tag-networkers"],"_links":{"self":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/3906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/comments?post=3906"}],"version-history":[{"count":0,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/3906\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/media?parent=3906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/categories?post=3906"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/tags?post=3906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}