| 121. | - CCNP Voice Quick Reference: Cisco Unity Connection and Cisco Unified Communication Manager
- By
Brion Washington
- Jul 5, 2011
- To assist in preparation for the CCNP Voice CAPPS exam (640-467), this chapter explains how to integrate CUC and CUCM.
|
| 122. | - CCNP Voice Quick Reference: VoIP Call Legs
- By
Kevin Wallace, Toby Sauer
- Apr 5, 2011
- In this chapter from CCNP Voice CVoice 642-437 Quick Reference, you will learn about how VoIP traffic is created. Topics such as codecs and transport layers are examined in more detail.
|
| 123. | - CCNP Wireless IAUWS Quick Reference: Describing Regulatory Compliance
- By
William G. Daniel
- Jul 21, 2010
- William G. Daniel describes common wireless vulnerabilities and industry standards organizations.
|
| 124. | - CCNP Wireless IUWMS Quick Reference: Implementing Location-Based Services
- By
Jerome Henry
- Jul 20, 2010
- This chapter describes the location-tracking techniques used in providing location-based services — unique events tied to the physical location of an 802.11 device.
|
| 125. | - CCNP Wireless Quick Reference: How to Collect Information for the Wireless Site Survey
- By
D.J. Henry
- Jun 13, 2012
- Conducting a wireless site survey is the final step of a carefully planned journey. This chapter helps you prepare for this site survey by listing the pieces of information that you need to collect before meeting your customer and planning the survey itself.
|
| 126. | - CCNP Wireless: QoS for Wireless Applications
- By
D. J. Henry
- Oct 18, 2012
- This chapter introduces the concepts of wireless Quality of Service and their related configuration in preparation for the 642-742 IUWVN exam.
|
| 127. | - CCNP: Troubleshooting EIGRP
- By
Anthony Sequeira
- Aug 3, 2011
- In this article, we will examine the art of Troubleshooting EIGRP, a key topic for CCNP certification. This article will begin by reviewing key information we should keep in mind about the protocol or its proper implementation and troubleshooting, and then specific scenarios will be illustrated. The article will also provide specific command guidance and usage.
|
| 128. | - CCNP: Troubleshooting OSPF
- By
Anthony Sequeira
- Nov 14, 2011
- In this article, Anthony Sequeira discusses basic troubleshooting steps for the complex, link-state routing protocol Open Shortest Path First (OSPF).
|
| 129. | - CCSP Cisco Secure PIX Firewall Advanced Exam: CiscoWorks Management Center for Firewalls
- By
Greg Bastien, Earl Carter, Christian Degu
- Jan 7, 2005
- To help you prepare for the CCSP Cisco Secure PIX Firewall Advanced Exam, this chapter provides information on using CiscoWorks with Firewall MC.
|
| 130. | - CCSP Cisco Secure VPN Exam: Remote Access Configuration
- By
John Roland, Mark Newcomb
- May 23, 2003
|
| 131. | - CCSP CSI Exam Certification: SAFE IP Telephony Design
- By
Ido Dubrawsky, Paul Grey
- Dec 30, 2004
- This chapter will help you prepare for the CCSP CSI Exam, with a focus on SAFE IP Telephony Design. Sample questions are included to help you study.
|
| 132. | - CCSP Self-Study: Advanced AAA Security for Cisco Router Networks
- By
John Roland
- May 21, 2004
- For CCSP candidates, John Roland discusses Cisco Secure ACS 3.0 for Windows 2000/NT Servers, Cisco Secure ACS for UNIX, and the security services of TACACS+, RADIUS, and Kerberos.
|
| 133. | - CCSP SNRS Exam Self-Study: Mitigating Layer 2 Attacks
- By
Christian Degu, Greg Bastien, Sara Nasseh
- Jul 7, 2006
- This excerpt from the official Cisco SNRS study guide discusses Layer 2 attacks, mitigations, best practices, and functionality within the scope of the CCSP SNRS exam framework.
|
| 134. | - Certification - A Look into the Future
- By
Mark S. Wilson
- Sep 21, 2001
- To stay in touch with their fast-changing world, IT certifications will have to adopt an open-platform approach and require ongoing recertification. This article from Certification Magazine looks at what's to come.
|
| 135. | - Choosing an Optimal Location for Your Data Center
- By
Douglas Alger
- Sep 30, 2005
- When a company buys new land, it is important to consider the property's suitability to house a server environment. Failing to do so often means having to spend more on Data Center infrastructure, either to add what's missing or to overcome shortcomings on the site. The most desirable type of location is one that supports the Data Center's mission to safeguard server equipment and accommodate growth and change. This chapter will help you assess your server site for suitability.
|
| 136. | - Cisco 802.11 Wireless Networking: Installing and Configuring Access Points
- By
Toby Velte, Anthony Velte
- Dec 1, 2005
- The largest hurdle toward getting your wireless LAN (WLAN) up and running is the configuration of your access points (APs) and wireless clients. This chapter examines how to install and configure the AP.
|
| 137. | - Cisco AAA Identity Management Security: Getting Familiar with ACS 5.1
- By
Brandon J. Carroll, Premdeep Banga, Vivek Santuka
- Feb 2, 2011
- ACS 5.1 has a completely different user interface from ACS 4.2. Throughout the course of this chapter you will become familiar with the GUI and know where different functions are located.
|
| 138. | - Cisco ASA and PIX Firewall Logging
- By
David Hucaby
- Nov 4, 2005
- Cisco firewalls and security appliances can be configured to generate an audit trail of messages describing their activities. Firewall logs can be collected and analyzed to determine what types of traffic have been permitted or denied, what users have accessed various resources, and so on. This chapter presents the tasks that are necessary to begin generating and collecting logging messages.
|
| 139. | - Cisco ASA Authentication, Authorization, and Accounting Network Security Services
- By
Jazib Frahim, Omar Santos
- Jan 28, 2010
- This chapter provides an explanation of the configuration and troubleshooting of Cisco ASA-supported authentication, authorization, and accounting network security services.
|
| 140. | - Cisco ASA Security Contexts
- By
Omar Santos, Jazib Frahim
- Dec 16, 2005
- The virtual firewall methodology enables a physical firewall to be partitioned into multiple standalone firewalls. Each standalone firewall acts and behaves as an independent entity with its own configuration, interfaces, security policies, routing table, and administrators. In Cisco ASA, these virtual firewalls are known as security contexts. This chapter covers security contexts in detail.
|