| 21. | - Applying Cisco Troubleshooting Tools
- By
Amir Ranjbar
- Nov 16, 2001
- This sample chapter from CCNP Support Exam Certification Guide introduces some powerful troubleshooting tools that are built into the Cisco IOS.
|
| 22. | - Applying the Principles of Network Design
- By
Alvaro Retana, Don Slice, Russ White
- Feb 1, 2002
- To illustrate three basics of highly scalable networks, this Cisco Press sample chapter "reforms" a network that is experiencing stability problems to make it stable and scalable.
|
| 23. | - Around the Globe in the Race Against IPv4 Address Depletion
- By
Linda Leung, Jeff Doyle
- May 19, 2009
- Linda Leung interviews Jeff Doyle about what he sees as the future for IPv6.
|
| 24. | - AT&T/T-Mobile Merger: Let’s Call It What It Is
- By
Leo Wrobel
- Sep 5, 2011
- Anyone who has ever taken a basic economics course knows that fewer players in an industry lead to higher prices and more limited choice, absent regulatory oversight. Noted author and technical futurist Leo Wrobel explains why the AT&T/ T-Mobile merger is a bad idea – for consumers, the market, and even the U.S. Constitution – and how the future of the Internet itself is at stake.
|
| 25. | - AT&T/T-Mobile Merger: Let's Call It What It Is, Part II
- By
Leo Wrobel
- Sep 14, 2011
- As two of the largest wireless carriers in the U.S. prepare to join forces, Leo A. Wrobel and special guest author Eddie M. Pope, Esq. explain why the U.S. Department of Justice thinks of this collaboration as a threat - and why you should be equally alarmed.
|
| 26. | - ATM-Based MPLS VPNs
- By
Vivek Alwayn
- Sep 24, 2001
- This chapter covers the following topics: an introduction to ATM-Based MPLS VPNs, MPLS and Tag Switching Terminology, Packet-Based MPLS over ATM, ATM-Based MPLS, Cell Interleaving, VC Merge, Label Virtual Circuits, Label Switch Controllers, Virtual Switch Interface, IP+ATM, Packet-Based MPLS over ATM VPNs, Case Study of a Packet-Based MPLS over ATM VPN, ATM-Based MPLS VPNs, and a Case Study of an ATM-Based MPLS VPN.
|
| 27. | - Attacking and Defending the Internet with Border Gateway Protocol (BGP)
- By
Carolyn Meinel
- Aug 25, 2008
- Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.
|
| 28. | - Attacking the Spanning Tree Protocol
- By
Eric Vyncke, Christopher Paggen
- Jun 4, 2008
- Conducting STP attacks is now within the reach of a wide population, thanks to the availability of point-and-shoot attacks tools. Fortunately, simple features widely available on a range of switches, such as BPDU-guard, provide effective measures against spanning-tree–based exploits.
|
| 29. | - Backbone Router Configuration
- By
Catherine Paquet, Diane Teare
- Mar 14, 2003
|
| 30. | - Backup Basics Part 1: Demystifying Server and Workstation Backup Methods
- By
Ryan Faas
- Jun 16, 2006
- Understanding the options for backing up servers and workstations is important for any technician or system/server administrator. But for new IT staff, all the details about how backups work and how to configure them can be confusing. In this first article in a three-part series, Ryan Faas demystifies the various types of backups that can be performed on servers and workstations using most backup applications.
|
| 31. | - Backup Basics Part 2: Demystifying Backup Media
- By
Ryan Faas
- Jun 30, 2006
- In part two of a three-part series on backup basics, Ryan Faas continues to demystify backup options for new technicians and server/systems administrators. This time, the topic is choosing the media in which to store your backups. Find out the pros and cons of tape, hard drives, and RAID arrays; using network storage; and archiving using CDs or DVDs.
|
| 32. | - Backup Basics Part 3: General Tips for a Backup Strategy
- By
Ryan Faas
- Jul 14, 2006
- Knowing how to configure backup applications and select backup media is half the battle of designing a successful backup strategy. The other half is choosing how and when to back up the specific pieces of data that are stored on your servers, share points, and workstations. In this final article of his series on backup basics for new technicians and administrators, Ryan Faas offers some suggestions to help you make these important decisions.
|
| 33. | - Basic Access List Configuration for Cisco Devices
- By
Sean Wilkins
- Apr 4, 2011
- This article discusses the basic concepts of how ACLs work and shows how a basic ACL is configured.
|
| 34. | - Basic Cisco IOS Software and Catalyst 3550 Series Security
- By
Dmitry Bokotey, Andrew Mason, Raymond Morrow
- Jul 25, 2003
- Become comfortable with basic Cisco IOS Software and Catalyst 3550 security features with an introduction to password management, disabling unnecessary services, setting up secure HTTP and NTP services, and SSH.
|
| 35. | - Basic Intrusion Prevention System (IPS) Concepts and Configuration
- By
Sean Wilkins
- Jun 29, 2011
- This article looks at the current IOS device based network intrusion prevention system (NIPS).
|
| 36. | - Basic IP Connectivity and Troubleshooting in Cisco Express Forwarding
- By
Nakia Stringfield, Stacia McKee, Russ White
- Oct 26, 2007
|
| 37. | - Basic IPsec VPN Topologies and Configurations
- By
James Henry Carmouche
- Sep 29, 2006
- In this chapter, you will review several common deployments of IPsec virtual private networks (VPNs).
|
| 38. | - Basic NAT Concepts and Configuration
- By
Sean Wilkins
- Jul 6, 2011
- This article looks at some of the basic concepts that are used when configuring NAT and reviews the configuration steps required to get NAT working.
|
| 39. | - Best Practices for Deploying Secure Cisco IP Telephony Solutions
- By
Akhil Behl
- Oct 31, 2012
- A brief discussion of why it's important to secure IP Telephony Networks, how to go about it, and the actual deployment thereof.
|
| 40. | - Book Review: "Deploying Wireless WANs" and Interview with Jack Unger
- By
Jack Unger
- Mar 14, 2003
|