Chapters & Articles

All Articles

Showing 81-100 of 843

Sort by Date | Title

Page: < Prev 3 4 5 6 7 Next >

81.
NetFlow for Cybersecurity
Oct 3, 2017

In this sample chapter from CCNA Cyber Ops SECOPS 210-255 Official Cert Guide, readers learn how to configure basic NetFlow in a Cisco device. Content also covers the industry standard IPFIX as well as how NetFlow is used for cybersecurity and incident response.

82.
Securing IoT
Oct 3, 2017

In this sample chapter from IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things, readers will review a brief history of operational technology (OT) security, how it has evolved, and some of the common challenges it faces.

83.
Setting Up and Maintaining a Distributed ISE Deployment
Oct 3, 2017

In this sample chapter from Cisco ISE for BYOD and Secure Unified Access, 2nd Edition, explore the configuration steps required to deploy ISE in a distributed design. Content also covers the basics of using a load balancer.

84.
VXLAN/EVPN Forwarding Characteristics
Oct 3, 2017

In this chapter from Building Data Centers with VXLAN BGP EVPN: A Cisco NX-OS Perspective, the author team discusses two different options for handling BUM or multidestination traffic— leveraging multicast replication in the underlying network and using a multicast-less approach called ingress replication.

85.
Cisco Prime Service Catalog
Mar 10, 2017

In this chapter from CCNA Cloud CLDADM 210-455 Official Cert Guide, Cisco cloud experts Chris Jackson, Hank Preston, and Steve Wasko introduce the Cisco Prime Service Catalog and how it helps manage requests for IT services.

86.
Cisco Unified Communications Manager Deployment Models
Mar 10, 2017

In this chapter from Implementing Cisco IP Telephony and Video, Part 1 (CIPTV1) Foundation Learning Guide (CCNP Collaboration Exam 300-070 CIPTV1), 3rd Edition, the author team introduces Cisco Unified Communications Manager (CUCM) and explores different redundancy models.

87.
IKEv2 Deployments
Nov 19, 2016

In this chapter from IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS , authors Graham Bartlett and Amjad Inamdar introduce a number of designs where IKEv2 is used. Each design will use a simple deployment of two routers with the focus on the configuration of IKEv2. Although each scenario uses only two routers, the configuration can scale as required if needed.

88.
Implementing OSPF for IPv4
Nov 19, 2016

In this sample chapter from CCNA Routing and Switching ICND2 200-105 Official Cert Guide Academic Edition,author Wendell Odom covers implementation details for Open Shortest Path First Version 2 (OSPFv2) —that is, OSPF as used for IPv4. This chapter looks at how to configure and verify a variety of OSPFv2 features.

89.
Implementing OSPF for IPv4
Nov 19, 2016

In this sample chapter fromCCNA Routing and Switching ICND2 200-105 Official Cert Guide, author Wendell Odom covers implementation details for Open Shortest Path First Version 2 (OSPFv2) —that is, OSPF as used for IPv4. This chapter looks at how to configure and verify a variety of OSPFv2 features

90.
Introduction to and Design of Cisco ASA with FirePOWER Services
Nov 19, 2016

In this chapter from Cisco Next-Generation Security Solutions: All-in-one Cisco ASA Firepower Services, NGIPS, and AMP, authors Omar Santos, Panos Kampanakis, and Aaron Woland provide an introduction to the Cisco ASA with FirePOWER Services solution. It also provides design guidance and best practices for deploying Cisco ASA with FirePOWER Services.

91.
Introduction to BGP
Nov 19, 2016

In this sample chapter from Routing TCP/IP, Volume II: CCIE Professional Development, 2nd Edition, author Jeff Doyle covers the basic operation of BGP, including its message types, how the messages are used, and the format of the messages. You also learn about the various basic attributes BGP can associate with a route and how it uses these attributes to choose a best path. Finally, this chapter shows you how to configure and troubleshoot BGP peering sessions.

92.
Network Access and Layer 2 Multicast
Nov 19, 2016

In this chapter from IP Multicast, Volume I: Cisco IP Multicast Networking, authors Josh Loveless, Ray Blair, and Arvind Durai take an in-depth look at IP multicast messages at Layer 2 and how they are transported in a Layer 2 domain. This chapter covers the basic elements of multicast functionality in Layer 2 domains as well as design considerations for multicast deployments.

93.
On-Box Automation and Operations Tools
By Jason Gooley
Nov 19, 2016

In this chapter from Programming and Automating Cisco Networks, authors Ryan Tischer and Jason Gooley cover the following on-box automation tools in greater detail; Auto SmartPorts, AutoConf, Auto Security, AutoQoS, Smart Call Home, Tcl Shell, and Embedded Event Manager (EEM)

94.
Variable-Length Subnet Masks
Nov 19, 2016

In this chapter fromCCENT/CCNA ICND1 100-105 Official Cert Guide, Academic Edition, author Wendell Odom introduces variable-length subnet masks (VLSM).

95.
Variable-Length Subnet Masks
Nov 19, 2016

In this sample chapter from CCENT/CCNA ICND1 100-105 Official Cert Guide, author Wendell Odom introduces variable-length subnet masks (VLSM)

96.
Network Design Models
Sep 28, 2016

In this sample chapter from CCDA 200-310 Official Cert Guide, authors Anthony Bruno and Steve Jordan cover hierarchical network models, the Cisco Enterprise Architecture model, and high-availability network services.

97.
Intercloud Architecture and Technologies
Sep 26, 2016

In this sample chapter from Intercloud: Solving Interoperability and Communication in a Cloud of Clouds, authors Jazib Frahim, Venkata Josyula, Monique Morrow, and Ken Owens explore how cloud providers have set up data centers at many locations to service their customers. For example, Amazon, Google, Microsoft, Salesforce.com, and others have established data centers for hosting cloud application services such as social networking, gaming portals, and business applications. In many of these social networks, the service components run in separate virtual machines that may be hosted in data centers owned by different cloud computing providers. In order to link the services provided by different providers at different locations around the world and to provide quality service to a consumer, it is necessary to build an Intercloud to bring the services together. This chapter details Intercloud architecture mode, Intercloud use cases, and Intercloud deploy.

98.
Enterprise Use Cases for Network Function Virtualization
Jun 13, 2016
Network Function Virtualization (NFV) offers new ways to design, orchestrate, and manage network services. Arvind Durai explores use cases of the adoption of NFV by enterprise architects, to control services in their tenant space.
99.
CSR with OpenStack
Jun 1, 2016
Are you looking at virtualization to solve your horizontal scaling challenge and reduce capital expenditure? Arvind Durai explores OpenStack, the free and open-source cloud computing platform written in Python.
100.
RIP Next Generation (RIPng)
May 27, 2016

Page: < Prev 3 4 5 6 7 Next >