| 81. | - Cisco Unified Communications System Fundamentals
- By
Brian Morgan, Moises Gonzalez
- Sep 10, 2004
- This chapter will help you get started in administrating Cisco's Unified Communications System, with an understanding of how the system routes calls and information, as well as an understanding of the utilities available to administrators.
|
| 82. | - Cisco Unified Contact Center Enterprise Platform Deployment
- By
Gary Ford
- Jul 27, 2011
|
| 83. | - Cisco Unified Wireless LAN Security Fundamentals
- By
Jake Woodhams, Robert Marg, Jeff Smith
- Dec 3, 2010
- This chapter discusses the fundamentals of wireless LAN security in the context of the Cisco Unified Wireless Network (CUWN).
|
| 84. | - Cisco Unity: About Unified Messaging
- By
Todd Stone, Dustin Grant, Jeff Lindborg, Steve Olivier
- Sep 17, 2004
- Unified messaging is a wonderful utility for your users, but it can be a headache for administrators. This chapter discusses the challenges associated with unified messaging as a part of the voice data convergence paradigm for the messaging application layer.
|
| 85. | - Cisco WAAS Architecture, Hardware, and Sizing
- By
Joel Christner, Nancy Jin, Zach Seils
- Feb 1, 2010
- This chapter provides an introduction to the Cisco WAAS hardware family, along with an in-depth examination of the hardware and software architecture.
|
| 86. | - Classification and Marking for Cisco DQOS and QOS Exams
- By
Michael J. Cavanaugh, Wendell Odom
- Sep 19, 2003
- Brush up on your skills with this review of exam topics and objectives for the Cisco DQOS and QoS exams.
|
| 87. | - Computer Incident Response and Product Security: Operating an Incident Response Team
- By
Damir Rajnovic
- Dec 17, 2010
- This chapter covers aspects of running an incidence response team (IRT) such as team size, team member profiles, cooperating with other groups, preparing for incidents, and measuring success.
|
| 88. | - Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
- By
Richard Deal
- Jun 9, 2006
- This chapter will focus on using a concentrator to terminate other types of remote access sessions, including PPTP, L2TP over IPsec, and WebVPN. The remainder of this chapter will focus on the configuration of the concentrator to support these types of remote access VPN implementations.
|
| 89. | - Configuration of Frame Mode MPLS
- By
David Hucaby, Steve McQuerry, Andrew Whitaker
- Jul 28, 2010
- This chapter covers the background and configuration of frame mode Multiprotocol Label Switching (MPLS).
|
| 90. | - Configuring IS-IS Protocol
- By
Catherine Paquet, Diane Teare
- Mar 21, 2003
|
| 91. | - Configuring PIX Firewall IPSec Support
- By
Michael Wenstrom
- Feb 22, 2002
- This chapter will teach you how to configure PIX Firewall IPSec using preshared keys for authentication and test and verify PIX Firewall IPSec.
|
| 92. | - Configuring the Catalyst
- By
Kennedy Clark, Kevin Hamilton
- Feb 1, 2002
- This sample chapter from Cisco Press compares differences between the router CLI and the Catalyst 4000/5000/6000 family, describes the command line interface and provides an overview of the menu driven configuration for the other Catalysts.
|
| 93. | - Configuring the Cisco PIX Firewall for CA Site-to-Site
- By
Andrew Mason
- Dec 28, 2001
- This sample chapter explains how to configure Cisco Secure PIX Firewall certificate
authority (CA) support for Internet Protocol Security (IPSec). The chapter shows you each major step of the configuration, including support tasks, IKE, and IPSec.
|
| 94. | - Configuring the Cisco Unified Personal Communicator
- By
Brian Morgan, Shane Lisenbea, Michael Popovich
- Jul 27, 2010
- This chapter covers the client installation, configuration, basic and advanced features, and client-side troubleshooting of the Cisco Unified Personal Communicator.
|
| 95. | - Configuring the PIX Firewall for SSH (Secure Shell)
- By
David W. Chapman
- Feb 15, 2002
- Let author, educator, and security specialist David W. Chapman Jr. demonstrate how easy it is to configure and troubleshoot secure remote access to your PIX Firewall.
|
| 96. | - Connecting Non-802.1X Devices to an Enterprise Network
- By
Eric Geier
- Sep 27, 2011
- Whether you're an administrator or just a user of a Wi-Fi network secured with WPA/WPA2-Enterprise, you can learn from Eric Geier how to get non-802.1X computers and devices onto your network.
|
| 97. | - Content Delivery Networks
- By
Scott Herrmann, Jeremy Laurenson, Matthew Recore
- Oct 18, 2002
- to come
|
| 98. | - Core Elements of the Cisco Self-Defending Network Strategy
- By
Bob Gleichauf
- May 27, 2005
- Can a network really defend itself? The short answer is, "Yes, it can." Network security has evolved from independently deployed products such as firewalls into the realm of system-wide solutions. And Cisco Systems® is at the forefront of the technology development that is making self-defending networks a reality.
|
| 99. | - Corporate Governance, Business Continuity Planning, and Disaster Recovery
- By
Michelle Johnston Sollicito
- Dec 1, 2005
- To protect business stakeholders, corporate governance focuses a sharp eye on all measures and systems within the organization to ensure compliance with laws, regulations, and standards. Michelle Johnston Sollicito points out the many required aspects of a proper business continuity plan and shows you where to look for holes in your process.
|
| 100. | - Cracking Wi-Fi Protected Access (WPA), Part 1
- By
Seth Fogie
- Mar 4, 2005
- In this two-part series, Seth Fogie examines the internals of WPA and demonstrates how this wireless protection method can be cracked with only four packets of data. Part 1 outlines the details of WPA as compared to WEP and builds the foundation for Part 2, in which he describes in detail how WPA-PSK can be cracked.
|