建立和維護對服務提供商網絡的信任.pdf

編號:138975 PDF 58頁 2.29MB 下載積分:VIP專享
下載報告請您先登錄!

建立和維護對服務提供商網絡的信任.pdf

1、#CiscoLive#CiscoLiveRakesh Kandula,Technical Marketing EngineerBRKSPG-2868Building&Maintaining Trust in Service Provider Networks 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public3BRKSPG-2868About MeTechnical Marketing Engineer Cisco15+Years in CiscoCurrent Focus AreasTrustworthy Sys

2、temsPlatform Security ChipsSecure BootPost Quantum SecurityDDoS Solutions,etc.Outdoor enthusiast&marathoner who loves trail ultrasAgenda 2023 Cisco and/or its affiliates.All rights reserved.Cisco PublicTrustworthy Platforms OverviewIOS-XR Operational SecurityQuantum Safe SecurityConclusionBRKSPG-286

3、84 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveEnter your personal notes hereCisco Webex App 5Questions?Use Cisco Webex App to chat with the speaker after the sessionFind this session in the Cisco Live Mobile AppClick“Join the Discussion”Install the Webex App or go dir

4、ectly to the Webex spaceEnter messages/questions in the Webex spaceHowWebex spaces will be moderated by the speaker until June 9,2023.12345https:/ 2023 Cisco and/or its affiliates.All rights reserved.Cisco PublicBRKSPG-2868 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveT

5、hreat Landscape For Service Provider NetworksBRKSPG-28686Untrusted Remote LocationsGlobal ScaleSupport Critical InfrastructureLoss of RevenueBrand Reputation LossImpact to SLAsLegal ImplicationsImpact of Attacks on Service ProvidersDeployment Challenges For Service ProvidersTrustworthy Platforms Ove

6、rview 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveCiscos Trustworthy Platforms OverviewBRKSPG-28688TrustworthyTrust Begins in HardwareTrust Anchor Module with anti-counterfeit designEnabling Trust in the Network OSHardware Anchored Cisco Secure Boot,Chip GuardMaintaini

7、ng Trust at RuntimeRun-time Defenses,Config Encryption,DDoS Protection Visualize and Report on TrustTrust Dossier&Crosswork Trust Insights 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive9Enabling Trust in Hardware Ciscos TAm*ChipBRKSPG-2868PKPKKEKKEKdbCiscodbxCiscoRevoked

8、 KeysValid KeysMicroloaderPK,KEKUEFI DB/DBxImprint DBCerts Repo(SUDI,AIK etc.)On-Chip Secure storageTAmTAmUEFI Secure Boot specificationUEFI Compliant Key Storage/ManagementProvides Chip Guard functionalityProvides unique device identityStores additional keys,certs,flags,etc.Anchor for Secure boot*T

9、rust Anchor ModuleIOS-XR Operational Security 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveIOS-XR Operational Security FeaturesBRKSPG-286811Data ProtectionData-at-rest protection&data sanitizationOwnership Ownership CertificateCertificateOwnership EstablishementOwnershi

10、p Vouchers&MASA ServiceConsent Based Security FeaturesAdditional consent for critical security featuresCounterfeit ProtectionSUDI Authentication For Hardware IntegrityBRANDBRAND 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveIOS-XR Operational Security FeaturesBRKSPG-2868

11、12Data ProtectionData-at-rest protection&data sanitizationOwnership Ownership CertificateCertificateOwnership EstablishementOwnership Vouchers&MASA ServiceConsent Based Security FeaturesAdditional consent for critical security featuresCounterfeit ProtectionSUDI Authentication For Hardware IntegrityB

12、RANDBRAND 2023 Cisco and/or its affiliates.All rights reserved.Cisco PublicBRKSPG-286813Config Encryption For RoutersProvides data-at-rest protectionEncrypts disk partition holding configuration data12Encryption key protected by TAm3Zeroization CLI for RMA scenarios4 2023 Cisco and/or its affiliates

13、.All rights reserved.Cisco Public#CiscoLive14Data Protection and the missing elementBRKSPG-2868Data In TransitData At RestData In UseAnd 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive15Data Protection and the missing elementBRKSPG-2868Data In TransitData At RestData In U

14、seData Sanitization 2023 Cisco and/or its affiliates.All rights reserved.Cisco PublicBRKSPG-286816Data SanitizationSetup de-commissioning process for data-bearing componentsUse IOS-XRs factory reset feature12Statement of Volatility available on Trust portal guide3Data sanitization must be part of yo

15、ur organizations data security policies 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveIOS-XR Operational Security FeaturesBRKSPG-286817Data ProtectionData-at-rest protection&data sanitizationOwnership Ownership CertificateCertificateOwnership EstablishementOwnership Vouc

16、hers&MASA ServiceConsent Based Security FeaturesAdditional consent for critical security featuresCounterfeit ProtectionSUDI Authentication For Hardware IntegrityBRANDBRAND 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveWhat is Ownership Establishment?BRKSPG-286818Transpor

17、t AuthorityCustomerPhysical World ExamplePurchases a carCar delivered to customerChassis S/N+Receives registration cardCustomer Ownership EstablishedInitiate registration requestCustomer SSN,etc.Car DealerOwner identity verified 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#Cisco

18、LiveWhat is Ownership Establishment?BRKSPG-286819CustomerNetworking World ExamplePurchases a routerRouter S/N+Validate ownershipReceives ownership voucherCustomer Ownership EstablishedInitiate Ownership Voucher requestOwner CertificateRouter delivered to customerInstall ownership voucher on the rout

19、erTransport AuthorityMASA ServiceMASA ServicebecomesRouter S/NOwner CertificateOwnership VoucherChassis S/NSSN/user identityRegistration CardbecomesbecomesbecomesMASA-Manufacturer Authorized Signing Authority 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveBRKSPG-286820Own

20、ership Voucher(O.V)(RFC 8366)Reference:https:/tools.ietf.org/html/rfc8366Yang model for O.V.Ownership Voucher is an artifact coming from the manufacturer(MASA*)of the router being bootstrapped into the network.*MASA Manufacturer Authorized Signing AuthorityJSON artifact modeled as shown in YANG and

21、signed using a CMS structure.The primary purpose of an Ownership Voucher is to securely convey a customer provided certificate,the Pinned-Domain-Cert”(PDC)to the router being onboarded.Pinned-domain-cert(PDC):The owner cert is rooted to the chain of trust leading to the pinned-domain cert.This means

22、 PDC can be the root cert for OC or an intermediate cert for OC or the same as OC(self-signed).2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveHow To Establish Ownership?Automated MASA Service WorkflowBRKSPG-286821MASA BackendCustomer premisesZTP OR Management ServerAudit

23、log123,56789HSM4MASA-Manufacturer Authorized Signing AuthorityServer using MASA APIsMASA ServiceValidate the S/N&log the requestSign the OVsProvision OVs on RoutersMASA DemoWhy Establish Ownership?2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveOwnership Establishment Use

24、casesBRKSPG-286824Application SigningOnboard Key Package for Signed AppsSecure Zero Touch Provisioning(SZTP)RFC8572 compliant secure zero touch provisioning of routersConsent Based Security FeaturesAdditional consent for critical security features 2023 Cisco and/or its affiliates.All rights reserved

25、.Cisco Public#CiscoLiveOwnership Establishment Use casesBRKSPG-286825Application SigningOnboard Key Package for Signed AppsSecure Zero Touch Provisioning(SZTP)RFC8572 compliant secure zero touch provisioning of routersConsent Based Security FeaturesAdditional consent for critical security features 2

26、023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive26Application Signing Use case Step#1BRKSPG-2868Factory-shipped Initial StateCisco Public KeyCustomer Private KeyCustomer Public KeyOwnership Established StateManagement ServerCustomer PremisesOwnership Voucher RequestOwnershi

27、p Voucher1.The router has only Ciscos public key2.This key can verify only Cisco signed artefacts3.Customer signed artefacts cannot be verified at this stage 1.The router now has Ciscos&customer public keys2.The customer key will be used to verify signed artefacts from customers like signed apps3.Mu

28、ltiple keys can be onboarded using key packagesMASA Service 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive27Application Signing Use case Step#2BRKSPG-2868Cisco Public KeyCustomer Private KeyCustomer Public KeyCustomers Build ServerCustomers Management ServerCustomer Sign

29、ed AppsInstall Signed Apps1.Customers can build their apps in their own environment and sign them with their own private key.2.The signed customer app can then be installed on the router through their management or provisioning servers.3.The same ownership key can be used to sign the apps or custome

30、rs can create different keys for each of their use cases.4.Multiple keys can be onboarded on the router using key packages once the ownership is established.5.Customers can sign their own key packages with the ownership key 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveO

31、wnership Establishment Use casesBRKSPG-286828Application SigningOnboard Key Package for Signed AppsSecure Zero Touch Provisioning(SZTP)RFC8572 compliant secure zero touch provisioning of routersConsent Based Security FeaturesAdditional consent for critical security features 2023 Cisco and/or its aff

32、iliates.All rights reserved.Cisco Public#CiscoLive29CLI Challenge/Response Consent WorkflowBRKSPG-2868Network AdminNetwork Admin1)Enable/Disable a feature5d9474c0309b7ca09a182d888f73b37a8fe1362cccf271b7830882da1791852baeca1737fcbe4b90d3964f9dad9f60363c81b688324d95b4ec7c80382)Generate unique nonce5)V

33、alidate&enable/disable the featureIOSIOS-XRXRSigning Service Customer/Cisco(HSM)3)Send nonce for signing4)Return signed nonceOff-box workflowOn-box workflowCustomers Public Key*Customers Private Key*Applicable for Customer Consent Only 2023 Cisco and/or its affiliates.All rights reserved.Cisco Publi

34、c#CiscoLive30Consent Based Security FeaturesBRKSPG-2868Re-Image ProtectionProvides re-image protection for routers to deter theftsGating Lawful InterceptionAbility to control enable/disable of Lawful InterceptionDisabling Secure ZTPConsent to downgrade the security posture of Zero Touch Provisioning

35、(ZTP)Factory ResetConsent to perform factory reset,manufacturing key restore,etc.And moreRESET 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive31Consent Based Security FeaturesBRKSPG-2868Re-Image ProtectionProvides re-image protection for routers to deter theftsGating Lawf

36、ul InterceptionAbility to control enable/disable of Lawful InterceptionDisabling Secure ZTPConsent to downgrade the security posture of Zero Touch Provisioning(ZTP)Factory ResetConsent to perform factory reset,manufacturing key restore,etc.And moreRESET 2023 Cisco and/or its affiliates.All rights re

37、served.Cisco Public#CiscoLiveRe-Image Protection For RoutersConsent Based Security Features Use case BRKSPG-2868321.Increasing incidents of cell site routers in remote locations being stolen2.The stolen routers are factory reset by booting through USB or PXE boot that erases the older running config

38、 too3.These routers are then sold in illegal markets4.Some incidents involve rogue internal employees too 2023 Cisco and/or its affiliates.All rights reserved.Cisco PublicBRKSPG-2868331.New XR CLI with additional consent to disable USB/PXE boot2.Store the flag in the tamper-resistant on-chip TAm sec

39、ure storage3.Persistent across disk erasure&reload4.BIOS disables USB/PXE boot if flag is enabledWorkflowRe-Image Protection For Routers 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive34Re-Image Protection Consent WorkflowBRKSPG-2868Network AdminNetwork Admin1)Enable/Disa

40、ble Re-Image Protection5d9474c0309b7ca09a182d888f73b37a8fe1362cccf271b7830882da1791852baeca1737fcbe4b90d3964f9dad9f60363c81b688324d95b4ec7c80382)Generate unique nonce5)Validate&enable/disable the protectionIOSIOS-XRXRSigning Service Customer/Cisco(HSM)3)Send nonce for signing4)Return signed nonceOff

41、-box workflowOn-box workflowCustomers Public Key*Customers Private Key*Applicable for Customer Consent Only 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive35Recovery Utility in BIOSBRKSPG-2868BIOSPXEPXECustomer Signing ServiceCustomer Signing Service(HSM)(HSM)Ciscos Signi

42、ng ServiceCiscos Signing Service(HSM)(HSM)ENABLE USB/PXE BOOTENABLE USB/PXE BOOTCLEAR TAM SECURE OBJECTSCLEAR TAM SECURE OBJECTSCLEAR CUSTOMER KEYSCLEAR CUSTOMER KEYSENABLE USB/PXE BOOTENABLE USB/PXE BOOTCustomer RecoveryCustomer RecoveryRecovery at CiscoRecovery at CiscoCONSENT TOKENCONSENT TOKEN 2

43、023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveIOS-XR Operational Security FeaturesBRKSPG-286836Data ProtectionData-at-rest protection&data sanitizationOwnership Ownership CertificateCertificateOwnership EstablishementOwnership Vouchers&MASA ServiceConsent Based Security F

44、eaturesAdditional consent for critical security featuresCounterfeit ProtectionSUDI Authentication For Hardware IntegrityBRANDBRAND 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive37BRKSPG-2868Secure Unique Device Identity(SUDI)Unique cryptographic key embedded in hardware

45、trust anchor module within every IOS XR RouterSecure Unique Device Identifier(SUDI)Provides 802.1AR Secure Device IdentityImmutable key imbedded in Trust Anchor Module at time of manufactureSigned by Cisco for proof of authenticityIncludes PID and Serial number of deviceCryptographically strong iden

46、tification of remote hardwareEstablishes unique,immutable hardware identity“How do I know this is really my router?”2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveSUDI Workflow For Hardware Integrity ValidationBRKSPG-286838MANAGEMENT SERVERROUTER IN A REMOTE LOCATION121.C

47、ustomer challenges the remote router with a unique nonce to provide its SUDI certificate.2.Router responds back with the SUDI certificate chain signed by the device unique SUDI private key.3.Verify the SUDI response using the verification steps listed on the right.SUDI Verification Steps1.Fetch the

48、Root CA&SUDI sub-CA from *2.Verify the SUDI leaf certificate of the device using the root&Sub-CA certs3.Verify the signature of the SUDI response using the public key extracted from the SUDI leaf cert4.Extract the PID&SN from the certificate after validation*Links to Root CA&Sub-CA3 2023 Cisco and/o

49、r its affiliates.All rights reserved.Cisco Public#CiscoLive39SUDI Based CLI Signature UtilityBRKSPG-2868IOS-XR supports a CLI signature utility based on SUDI private key1.Any IOS-XR CLI output can be signed by SUDI private key using the signature utility2.This is to ensure the output is from a genui

50、ne device and not a replay from meddler-in-the-middle(MITM)attack3.The signature of the signed CLI response can be validated first using the SUDI public key before consuming the CLI output 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive40SUDI Based CLI Signature Utility-E

51、xampleBRKSPG-2868RP/0/RP0/CPU0:Galapagos#show version|utility sign nonce ABCDTue Mar 7 06:31:00.071 UTCcli-output:Cisco IOS XR Software,Version 7.4.1 LNTnCopyright(c)2013-2021 by Cisco Systems,Inc.nnBuild Information:n Built By:ingunawan Built On:Wed Aug 04 08:28:43 UTC 2021n Build Host:iox-lnx-021n

52、 Workspace:/auto/srcarchive17/prod/7.4.1/ncs540l-aarch64/wsn Version:7.4.1n Label:7.4.1nncisco NCS540Lncisco N540X-8Z16G-SYS-A processor with 8GB of memorynGalapagos uptime is 6 weeks,6 days,19 hours,9 minutesnCisco NCS 540 Series Fixed Router 12x1G,4xCu,8x1/10G,ACnn,signature-envelop:nonce:ABCD,sig

53、nature-version:02,sudi-signature:Ugj00 x78n3hXD1nzymEOpUsR143N3Zgz8g15m40eQmrO6yQ0etqGM+10vkSEoz9zTnQ+qicufZyp+Vx4MRLagnFXOoQubAY94CB/85qmrLi1is9phjPJ0uDhK5bpF8bQZtZbQ3PcLOyfx1sG8Gk13I0 xQaWdgbB1daz3setsjHkjvHzFSu2aTtKW+DdZSUOxOaCXgSxazwDbE/v826Lng31JzFfgh9SLQEijp3IfdmKFeRpdK4fOSZN1tXdwlfXRo2YpRPEf9

54、oPEYXI91/b5Bjaz+kCamGintVeqV5XiBxLvpVLtxIymoZtJuDdX/NYe/5UGtjG/wAMcgbN/1JKlBQ=Quantum Safe Security 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive42BRKSPG-2868People are making incremental efforts in developing a Quantum Computer.Once they have one which is sufficiently

55、large and reliable,they could use it to Break Current Encryption!(public key algorithms)2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive43Quantum Computing Impact on CryptographyBRKSPG-2868Secure Session Secure Session(MACsec/IPsec/TLS)AuthenticationKey EstablishmentData E

56、ncryption&IntegrityPublic-privateKey-pairsSharedSession keyBased on mathematically related public-private key-pairsUsed for control plane operationsAuthentication,Key establishmentExample:RSA,DH,ECCAsymmetric CryptographySymmetric CryptographyBased on shared keyUsed for bulk data encryption&integrit

57、yProtection level based on key strength Key size&entropyExample:AES-GCMQuantum-Resistant?Large reliable Quantum computers can break RSA,DH,ECC!Symmetric crypto with large and high-entropy keys is resistant to Quantum computer attacks 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#

58、CiscoLive44Available OptionsBRKSPG-2868Replace current public key algorithms with new onesStill need to vet the algorithms and update the protocolsUse Quantum Mechanics to protect the dataSerious limitationsLong symmetric keys are Quantum SafeIssues with distributing keys and trustSymmetric Cryptogr

59、aphyQuantum Key DistributionPostquantum Cryptography 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive45BRKSPG-2868Quantum-Safe MACsec Symmetric CryptographyPrePre-Shared Key(PSK)Shared Key(PSK)Site 1Site 1Site 2Site 2Manual PSKManual PSKPeer#1Peer#2Quantum-Resistant MACsec

60、LimitationsLimitations Operational Overhead1.Manual configuration of same PSK on both sides2.Manual key rotationKey entropy,length concerns1.MACsec with PSK option is already supported and used by customers.2.There is no need for additional hardware(like QKD)or software upgrade.3.Quantum safe as thi

61、s is based on symmetric cryptography which is Quantum resistant.Pre-Shared Key(PSK)Option 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive47BRKSPG-2868Quantum Key Distribution OptionsSecure Session Secure Session(MACsec/IPsec/TLS)AuthenticationKey EstablishmentData Encrypt

62、ion&IntegrityPublic-privateKey-pairsSharedSession keySecure Session Secure Session(MACsec/IPsec/TLS)AuthenticationKey EstablishmentPublic-privateKey-pairsSoftware OptionExternal QKD Hardware with Ciscos SKIP(Secure Key Import Protocol)Hardware OptionCiscos SKS(Session Key Service)server on a router

63、2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive48BRKSPG-2868Quantum Key Distribution OptionsCiscos Session Key Service(SKS)OptionSKS EngineIOS-XR Router1.SKS engine on the router generates the keys2.No additional hardware required3.The SKS engine must be seeded with the s

64、ame seed on both the peers4.The seed is protected by McEliece cryptosystem which is quantum resistant5.Only key-id is sent on the wire,and the peer derives the key from its local SKS enginePeer-1Peer-2SKS ServerSKS ClientStep#1Generate McEliece Key PairStep#2Generate seed for SKS engineStep#3Export

65、McEliece Public KeyStep#4Encrypt the seed with clients public keyExport Encrypted SeedStep#5Step#6Decrypt&Import the seed to SKS engineReady For Key NegotiationSKS Engine Seeding StepsSKS Engine Seeding Steps 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive49BRKSPG-2868Qua

66、ntum Key Distribution OptionsExternal QKD Hardware With Ciscos Session Key Import Protocol(SKIP)QKD HardwareIOS-XR Router1.Dedicated hardware to generate the session keys and key-ids2.The QKD hardware for a given pair of devices would be in-sync3.Each peer fetches the key&key-id from the QKD hardwar

67、e over a TLS connection4.Only key-id is sent on the wire,and the peer fetches the key from the QKD hardwarePeer-1Peer-2Step#2Use Step#3Both peers derive the same keySKIPServerClientFetch from QKD hardwareStep#1Fetch from QKD hardware using 2023 Cisco and/or its affiliates.All rights reserved.Cisco P

68、ublic#CiscoLive50BRKSPG-2868Quantum-Safe MACsecQuantum Key Distribution OptionsSAKs from SKS via SKIP APISAKs from SKS via SKIP APISite 1Site 1Site 2Site 2Peer#1Peer#2Quantum-Resistant MACsec Quantum safe key generation Auto-key management Auto-key refresh,entropy One-time additional manual stepSKIP

69、 APICisco SKSSKIP APICisco SKSCisco SKS Server1.Software-based key source2.No dedicated circuit or distance limitations3.No additional hardware requirement4.No additional cost5.Supported from IOS-XR 7.4.1 releaseSAKs from QKD via SKIP APISAKs from QKD via SKIP APISite 1Site 1Site 2Site 2Peer#1Peer#2

70、Quantum-Resistant MACsec Quantum safe key generation Auto-key management Auto-key refresh,entropySKIP APIQKDQuantum ChannelSKIP APIQKDExternal QKD Hardware1.Hardware-based key source2.Dedicated optical fiber(up to 100km supported)3.QKD hardware per-site/peer4.Very expensive5.Supported from IOS-XR 7.

71、9.1 releaseSAK Security Association KeyConclusion 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public52BRKSPG-2868Key TakeawaysTRUSTWORTHY VENDOROPERATIONAL SECURITYQUANTUM SAFE SECURITY 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive53BRKSPG-2868Session on

72、New DDoS Solution 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive54BRKSPG-2868Interactive Breakout Session on SecurityIBOSPG-2000Lets Talk Security:A Service Providers Perspective06/08/23 11 AM 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveFil

73、l out your session surveys!Attendees who fill out a minimum of four session surveys and the overall event survey will get Cisco Live-branded socks(while supplies last)!55BRKSPG-2868These points help you get on the leaderboard and increase your chances of winning daily and grand prizesAttendees will

74、also earn 100 points in the Cisco Live Challenge for every survey completed.2023 Cisco and/or its affiliates.All rights reserved.Cisco PublicContinue your educationVisit the Cisco Showcase for related demosBook your one-on-oneMeet the Engineer meetingAttend the interactive education with DevNet,Capt

75、ure the Flag,and Walk-in LabsVisit the On-Demand Library for more sessions at www.CiscoL you#CiscoLive 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive58Gamify your Cisco Live experience!Get points Get points for attending this session!for attending this session!Open the Cisco Events App.Click on Cisco Live Challenge in the side menu.Click on View Your Badges at the top.Click the+at the bottom of the screen and scan the QR code:How:123458 2023 Cisco and/or its affiliates.All rights reserved.Cisco PublicBRKSPG-2868#CiscoLive

友情提示

1、下載報告失敗解決辦法
2、PDF文件下載后,可能會被瀏覽器默認打開,此種情況可以點擊瀏覽器菜單,保存網頁到桌面,就可以正常下載了。
3、本站不支持迅雷下載,請使用電腦自帶的IE瀏覽器,或者360瀏覽器、谷歌瀏覽器下載即可。
4、本站報告下載后的文檔和圖紙-無水印,預覽文檔經過壓縮,下載后原文更清晰。

本文(建立和維護對服務提供商網絡的信任.pdf)為本站 (2200) 主動上傳,三個皮匠報告文庫僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對上載內容本身不做任何修改或編輯。 若此文所含內容侵犯了您的版權或隱私,請立即通知三個皮匠報告文庫(點擊聯系客服),我們立即給予刪除!

溫馨提示:如果因為網速或其他原因下載失敗請重新下載,重復下載不扣分。
客服
商務合作
小程序
服務號
折疊
午夜网日韩中文字幕,日韩Av中文字幕久久,亚洲中文字幕在线一区二区,最新中文字幕在线视频网站