Chapters & Articles

All Articles

Showing 121-140 of 544

Sort by Date | Title | Popularity

Page: « Prev 5 6 7 8 9 Next »

121.
CCNP Voice Quick Reference: Cisco Unity Connection and Cisco Unified Communication Manager
By Brion Washington
Jul 5, 2011
To assist in preparation for the CCNP Voice CAPPS exam (640-467), this chapter explains how to integrate CUC and CUCM.
122.
CCNP Voice Quick Reference: VoIP Call Legs
By Kevin Wallace, Toby Sauer
Apr 5, 2011
In this chapter from CCNP Voice CVoice 642-437 Quick Reference, you will learn about how VoIP traffic is created. Topics such as codecs and transport layers are examined in more detail.
123.
CCNP Wireless IAUWS Quick Reference: Describing Regulatory Compliance
By William G. Daniel
Jul 21, 2010
William G. Daniel describes common wireless vulnerabilities and industry standards organizations.
124.
CCNP Wireless IUWMS Quick Reference: Implementing Location-Based Services
By Jerome Henry
Jul 20, 2010
This chapter describes the location-tracking techniques used in providing location-based services — unique events tied to the physical location of an 802.11 device.
125.
CCNP Wireless Quick Reference: How to Collect Information for the Wireless Site Survey
By D.J. Henry
Jun 13, 2012
Conducting a wireless site survey is the final step of a carefully planned journey. This chapter helps you prepare for this site survey by listing the pieces of information that you need to collect before meeting your customer and planning the survey itself.
126.
CCNP Wireless: QoS for Wireless Applications
By D. J. Henry
Oct 18, 2012
This chapter introduces the concepts of wireless Quality of Service and their related configuration in preparation for the 642-742 IUWVN exam.
127.
CCNP: Troubleshooting EIGRP
By Anthony Sequeira
Aug 3, 2011
In this article, we will examine the art of Troubleshooting EIGRP, a key topic for CCNP certification. This article will begin by reviewing key information we should keep in mind about the protocol or its proper implementation and troubleshooting, and then specific scenarios will be illustrated. The article will also provide specific command guidance and usage.
128.
CCNP: Troubleshooting OSPF
By Anthony Sequeira
Nov 14, 2011
In this article, Anthony Sequeira discusses basic troubleshooting steps for the complex, link-state routing protocol Open Shortest Path First (OSPF).
129.
CCSP Cisco Secure PIX Firewall Advanced Exam: CiscoWorks Management Center for Firewalls
By Greg Bastien, Earl Carter, Christian Degu
Jan 7, 2005
To help you prepare for the CCSP Cisco Secure PIX Firewall Advanced Exam, this chapter provides information on using CiscoWorks with Firewall MC.
130.
CCSP Cisco Secure VPN Exam: Remote Access Configuration
By John Roland, Mark Newcomb
May 23, 2003
131.
CCSP CSI Exam Certification: SAFE IP Telephony Design
By Ido Dubrawsky, Paul Grey
Dec 30, 2004
This chapter will help you prepare for the CCSP CSI Exam, with a focus on SAFE IP Telephony Design. Sample questions are included to help you study.
132.
CCSP Self-Study: Advanced AAA Security for Cisco Router Networks
By John Roland
May 21, 2004
For CCSP candidates, John Roland discusses Cisco Secure ACS 3.0 for Windows 2000/NT Servers, Cisco Secure ACS for UNIX, and the security services of TACACS+, RADIUS, and Kerberos.
133.
CCSP SNRS Exam Self-Study: Mitigating Layer 2 Attacks
By Christian Degu, Greg Bastien, Sara Nasseh
Jul 7, 2006
This excerpt from the official Cisco SNRS study guide discusses Layer 2 attacks, mitigations, best practices, and functionality within the scope of the CCSP SNRS exam framework.
134.
Certification - A Look into the Future
By Mark S. Wilson
Sep 21, 2001
To stay in touch with their fast-changing world, IT certifications will have to adopt an open-platform approach and require ongoing recertification. This article from Certification Magazine looks at what's to come.
135.
Choosing an Optimal Location for Your Data Center
By Douglas Alger
Sep 30, 2005
When a company buys new land, it is important to consider the property's suitability to house a server environment. Failing to do so often means having to spend more on Data Center infrastructure, either to add what's missing or to overcome shortcomings on the site. The most desirable type of location is one that supports the Data Center's mission to safeguard server equipment and accommodate growth and change. This chapter will help you assess your server site for suitability.
136.
Cisco 802.11 Wireless Networking: Installing and Configuring Access Points
By Toby Velte, Anthony Velte
Dec 1, 2005
The largest hurdle toward getting your wireless LAN (WLAN) up and running is the configuration of your access points (APs) and wireless clients. This chapter examines how to install and configure the AP.
137.
Cisco AAA Identity Management Security: Getting Familiar with ACS 5.1
By Brandon J. Carroll, Premdeep Banga, Vivek Santuka
Feb 2, 2011
ACS 5.1 has a completely different user interface from ACS 4.2. Throughout the course of this chapter you will become familiar with the GUI and know where different functions are located.
138.
Cisco ASA and PIX Firewall Logging
By David Hucaby
Nov 4, 2005
Cisco firewalls and security appliances can be configured to generate an audit trail of messages describing their activities. Firewall logs can be collected and analyzed to determine what types of traffic have been permitted or denied, what users have accessed various resources, and so on. This chapter presents the tasks that are necessary to begin generating and collecting logging messages.
139.
Cisco ASA Authentication, Authorization, and Accounting Network Security Services
By Jazib Frahim, Omar Santos
Jan 28, 2010
This chapter provides an explanation of the configuration and troubleshooting of Cisco ASA-supported authentication, authorization, and accounting network security services.
140.
Cisco ASA Security Contexts
By Omar Santos, Jazib Frahim
Dec 16, 2005
The virtual firewall methodology enables a physical firewall to be partitioned into multiple standalone firewalls. Each standalone firewall acts and behaves as an independent entity with its own configuration, interfaces, security policies, routing table, and administrators. In Cisco ASA, these virtual firewalls are known as security contexts. This chapter covers security contexts in detail.

Page: « Prev 5 6 7 8 9 Next »