| 41. | - CCNP ISCW Exam Guide: GRE Tunneling over Ipsec
- By
Brian Morgan, Neil Lovering
- Jun 24, 2008
- This chapter talks about the use of GRE in an IPsec environment and how that relates to the CCNP ISCW exam.
|
| 42. | - CCNP ROUTE 642-902 Exam Foundation Learning: Implementing Path Control
- By
Diane Teare
- Aug 5, 2010
- This chapter covers implementing path control, focusing on understanding and implementing path control as well as advanced path control tools.
|
| 43. | - CCNP Routing Studies: Basic Open Shortest Path First
- By
Henry Benjamin
- May 24, 2002
- Understanding basic Open Shortest Path First routing principles not only applies to the CCNP certification but to all Cisco-based certifications. This chapter focuses on a number of objectives falling under the CCNP routing principles.
|
| 44. | - CCNP TSHOOT Certification Guide: Understanding the Basics of QoS
- By
Kevin Wallace
- Apr 27, 2010
- Kevin Wallace discusses basic quality of service (QoS) mechanisms on Cisco routers, which are important to understand when troubleshooting VoIP issues.
|
| 45. | - CCNP Wireless IUWMS Quick Reference: Implementing Location-Based Services
- By
Jerome Henry
- Jul 20, 2010
- This chapter describes the location-tracking techniques used in providing location-based services — unique events tied to the physical location of an 802.11 device.
|
| 46. | - CCSP Cisco Secure PIX Firewall Advanced Exam: CiscoWorks Management Center for Firewalls
- By
Greg Bastien, Earl Carter, Christian Degu
- Jan 7, 2005
- To help you prepare for the CCSP Cisco Secure PIX Firewall Advanced Exam, this chapter provides information on using CiscoWorks with Firewall MC.
|
| 47. | - CCSP Cisco Secure VPN Exam: Remote Access Configuration
- By
John Roland, Mark Newcomb
- May 23, 2003
|
| 48. | - CCSP CSI Exam Certification: SAFE IP Telephony Design
- By
Ido Dubrawsky, Paul Grey
- Dec 30, 2004
- This chapter will help you prepare for the CCSP CSI Exam, with a focus on SAFE IP Telephony Design. Sample questions are included to help you study.
|
| 49. | - CCSP Self-Study: Advanced AAA Security for Cisco Router Networks
- By
John Roland
- May 21, 2004
- For CCSP candidates, John Roland discusses Cisco Secure ACS 3.0 for Windows 2000/NT Servers, Cisco Secure ACS for UNIX, and the security services of TACACS+, RADIUS, and Kerberos.
|
| 50. | - Choosing an Optimal Location for Your Data Center
- By
Douglas Alger
- Sep 30, 2005
- When a company buys new land, it is important to consider the property's suitability to house a server environment. Failing to do so often means having to spend more on Data Center infrastructure, either to add what's missing or to overcome shortcomings on the site. The most desirable type of location is one that supports the Data Center's mission to safeguard server equipment and accommodate growth and change. This chapter will help you assess your server site for suitability.
|
| 51. | - Cisco 802.11 Wireless Networking: Installing and Configuring Access Points
- By
Toby Velte, Anthony Velte
- Dec 1, 2005
- The largest hurdle toward getting your wireless LAN (WLAN) up and running is the configuration of your access points (APs) and wireless clients. This chapter examines how to install and configure the AP.
|
| 52. | - Cisco AAA Identity Management Security: Getting Familiar with ACS 5.1
- By
Brandon J. Carroll, Premdeep Banga, Vivek Santuka
- Feb 2, 2011
- ACS 5.1 has a completely different user interface from ACS 4.2. Throughout the course of this chapter you will become familiar with the GUI and know where different functions are located.
|
| 53. | - Cisco ASA Authentication, Authorization, and Accounting Network Security Services
- By
Jazib Frahim, Omar Santos
- Jan 28, 2010
- This chapter provides an explanation of the configuration and troubleshooting of Cisco ASA-supported authentication, authorization, and accounting network security services.
|
| 54. | - Cisco ASA Security Contexts
- By
Omar Santos, Jazib Frahim
- Dec 16, 2005
- The virtual firewall methodology enables a physical firewall to be partitioned into multiple standalone firewalls. Each standalone firewall acts and behaves as an independent entity with its own configuration, interfaces, security policies, routing table, and administrators. In Cisco ASA, these virtual firewalls are known as security contexts. This chapter covers security contexts in detail.
|
| 55. | - Cisco Asks, Can Security Skills Be Certified?
- By
Yusuf Bhaiji
- Jul 23, 2004
- Yusuf Hussain Bhaiji explores the value of certification in IT Security given its rapidly changing nature and offers suggestions on choosing the right certification program.
|
| 56. | - Cisco CallManager Express VoIP Call Processing Features
- By
Danelle Au, Baldwin Choi, Rajesh Haridas, Christina Hattingh, Ravi Koulagi, Mike Tasker, Lillian Xia
- Jul 15, 2005
- In this chapter, you'll read about some of the more popular Cisco CME phone and call processing features. You will see examples of how these features can be configured and combined to provide a rich and flexible set of functions. You will also see how to configure call transfer and forwarding functions in a variety of network scenarios.
|
| 57. | - Cisco Data Center Virtualization Server Architectures
- By
Roger Andersson, Silvano Gai, Tommi Salli
- Jul 1, 2010
- This chapter examines processor, memory, and I/O subsystems with particular reference to servers built according to the IA-32, often generically called x86 architecture.
|
| 58. | - Cisco Firewall Configuration Fundamentals
- By
Alexandre M.S.P. Moraes
- Jul 8, 2011
- This chapter describes the configuration fundamentals for IOS and ASA-based firewalls, highlighting the similarities between the product families.
|
| 59. | - Cisco Frame Relay Configurations
- By
Jonathan Chin
- Apr 30, 2004
- Jonathan Chin dicussess basic Frame Relay operations on Cisco routers in a router-based Frame Relay network.
|
| 60. | - Cisco IDS Sensor Deployment Considerations
- By
Earl Carter
- Feb 15, 2002
- Correctly deploying your Cisco IDS Sensor is crucial to protecting your network. Earl Carter helps you understand your network topology, as well as the critical components on your network.
|