| 21. | - The TCP/IP and OSI Networking Models
- By
Wendell Odom
- Nov 21, 2011
- This chapter explains the terminology and concepts behind TCP/IP. It also explains the terminology behind the OSI networking model in comparison to TCP/IP.
|
| 22. | - CCNP: Troubleshooting OSPF
- By
Anthony Sequeira
- Nov 14, 2011
- In this article, Anthony Sequeira discusses basic troubleshooting steps for the complex, link-state routing protocol Open Shortest Path First (OSPF).
|
| 23. | - CCNA Voice 640-461: Understanding the Cisco IP Phone Concepts and Registration
- By
Jeremy Cioara, Michael Valentine
- Oct 27, 2011
- This chapter walks you through the key concepts and technologies used to build a Cisco VoIP network while working towards your CCNA Voice certification.
|
| 24. | - CCDA DESGN 640-864: Designing Remote Connectivity
- By
Sean Wilkins
- Oct 6, 2011
- This chapter discusses wide-area network technologies and design and includes sections covering Identifying WAN Technology Considerations, Designing the Enterprise WAN, and Designing the Enterprise Branch.
|
| 25. | - Implementing Cisco Unified Communications Manager: Digit Manipulation (CCNP Voice)
- By
Dennis Samuel Hartmann, Joshua Samuel Finke
- Oct 1, 2011
- This chapter describes digit manipulation tools that allow a CUCM administrator to implement flexibility and transparency in the dial plan of a company.
|
| 26. | - CCNA SEC: Router Hardening
- By
Anthony Sequeira
- Sep 14, 2011
- This article discusses various means of making sure your routers are set up with maximum security, including manually hardening the router and router hardening with Cisco SDM.
|
| 27. | - To Route or Not to Route: A Day in the Life of a Router
- By
Keith Barker
- Aug 31, 2011
- A lot goes into the decision process regarding routing, and it happens long before a packet arrives at the router for its turn to be forwarded. In this article, the author takes a close look at a day in the life of the router.
|
| 28. | - What Happens in the VLAN Stays in the VLAN
- By
Keith Barker
- Aug 31, 2011
- This article discusses discover the secrets of the VLAN and why it is a critical tool in todays networks.
|
| 29. | - Working with Protocol Analyzers and Related Certifications
- By
Ed Tittel
- Aug 30, 2011
- Ed Tittel, creator of the Exam Cram series, discusses the current network protocol analyzers that any real expert needs to know. Who exactly counts as an "expert?" Ed also sorts out which of the many available certifications are really useful in identifying true masters of protocol analysis.
|
| 30. | - CCNP Security VPN Cert Guide: Configuring Policies, Inheritance, and Attributes
- By
Howard Hooper
- Aug 24, 2011
- This chapter looks at the methods available for policy assignment in real-life scenarios and reviews how these policy methods work together if more than one is assigned to a user through the inheritance mode.
|
| 31. | - CCNP: Troubleshooting EIGRP
- By
Anthony Sequeira
- Aug 3, 2011
- In this article, we will examine the art of Troubleshooting EIGRP, a key topic for CCNP certification. This article will begin by reviewing key information we should keep in mind about the protocol or its proper implementation and troubleshooting, and then specific scenarios will be illustrated. The article will also provide specific command guidance and usage.
|
| 32. | - Flexible Netflow Concepts and Configuration
- By
Sean Wilkins
- Jul 22, 2011
- This article takes a look at the typical uses for the Flexible Netflow feature, how it works and how it can be configured into a complete solution.
|
| 33. | - Cisco Network Infrastructure Security: Control Plane Policing Concepts and Configuration
- By
Sean Wilkins
- Jul 21, 2011
- This article takes a looks at control plane policing, examining what it is, how it works and how it can be configured to secure this equipment.
|
| 34. | - SNMP Concepts and Configuration
- By
Sean Wilkins
- Jul 20, 2011
- This article takes a look at some of the basic SNMP concepts, examining how it works and how it can be configured to perform basic functions.
|
| 35. | - CCNP Security IPS 642-627 Official Cert Guide: Network IPS Traffic Analysis Methods, Evasion Possibilities, and Anti-evasive Countermeasures
- By
David Burns, Odunayo Adesina
- Jul 18, 2011
- This chapter covers the various methods used for traffic analysis using a network IPS sensor, the various evasion techniques used by attackers to bypass detection & filtering while understanding the benefits and limitations of each method to assess the risk of evasion, and the various countermeasures, tools, and choosing the best approach based on the methods used by attackers.
|
| 36. | - Routing Protocol Authentication Concepts and Configuration
- By
Sean Wilkins
- Jul 13, 2011
- This article takes a look at the available routing protocol authentication options for the most often used routing protocols: EIGRP, OSPF, RIP and BGP.
|
| 37. | - Spanning Tree Protocol Concepts and Configuration
- By
Sean Wilkins
- Jul 13, 2011
- This article takes a look at some of the basic STP concepts and reviews the configuration required to deploy STP on a switch.
|
| 38. | - Securing the Management Plane of a Cisco Network Device
- By
Sean Wilkins
- Jul 11, 2011
- This article takes a look at a couple of the different features that can be used to secure the management plane of a Cisco network device (or devices) and reviews the basic configuration of these features.
|
| 39. | - Unicast Reverse Path Forwarding Concepts and Configuration
- By
Sean Wilkins
- Jul 8, 2011
- This article goes over the Unicast Reverse Path Forwarding (Unicast RPF) feature and how it can be configured to deal with an IP source address spoofing attack.
|
| 40. | - Basic NAT Concepts and Configuration
- By
Sean Wilkins
- Jul 6, 2011
- This article looks at some of the basic concepts that are used when configuring NAT and reviews the configuration steps required to get NAT working.
|