| 61. | - VPNs and VPN Technologies
- By
Andrew Mason
- Jan 4, 2002
- This sample chapter defines virtual private networks (VPNs) and explores
fundamental Internet Protocol Security (IPSec) technologies.
|
| 62. | - Data Center Design Overview
- By
Maurizio Portolani, Mauricio Arregoces
- Dec 31, 2003
- This sample chapter covers types of server farms and Data Centers, Data Center topologies, fully redundant Layer 2 and Layer 3 designs, and fully redundant Layer 2 and Layer 3 designs with services.
|
| 63. | - Examining Cisco AAA Security Technology
- By
Michael Wenstrom
- Feb 22, 2002
- This chapter examines Cisco AAA security technology, including authentication, authorization, and accounting methods, and AAA security servers.
|
| 64. | - Cisco Self-Study: Implementing Cisco IPv6 Networks (IPV6)
- By
Regis Desmeules
- Jun 6, 2003
- Discover the ins and outs of the new IPv6 header format. You will also learn different configuration processes of IPv6 in relation to Cisco.
|
| 65. | - Getting Familiar with Cisco Secure Access Control Server
- Dec 3, 2004
- This chapter covers the basics of the Cisco Secure Access Control Server interface, and familiarizes you with the very simplest of actions in this medium.
|
| 66. | - Cisco Network Topology and Design
- By
Khalid Raza, Mark Turner
- Feb 1, 2002
- Explore design issues related to overall network topology with this sample chapter from Cisco Press.
|
| 67. | - Integrated IS-IS Routing Protocol Concepts
- By
Abe Martey
- May 17, 2002
- This chapter reviews the basic concepts underlying the design of the IS-IS routing protocol and discusses the two-level hierarchy for controlling distribution of routing information within IS-IS areas and between them.
|
| 68. | - Troubleshooting Cisco IP Telephony
- By
Paul Giralt, Addis Hallmark, Anne Smith
- May 2, 2003
|
| 69. | - IPSec Overview Part Five: Security Associations
- By
Andrew Mason
- Feb 22, 2002
- Andrew Mason concludes his five-part series on the Cisco implementation of IPSec with a discussion of IPSec security associations.
|
| 70. | - Configuring IS-IS Protocol
- By
Catherine Paquet, Diane Teare
- Mar 21, 2003
|
| 71. | - Introduction to Cisco Network Design
- By
Cisco Systems, Inc.
- Feb 8, 2002
- This sample chapter from Cisco Press provides an overview of the technologies available today to design networks.
|
| 72. | - Using Multicast Domains
- By
Ivan Pepelnjak, Jeff Apcar, Jim Guichard
- Jun 27, 2003
- Learn how multicast domains allow service providers to offer mVPN services to their customers by using native multicasting techniques in the core. You will see the many advantages of these multicasting techniques and how they can relate to you and your customers.
|
| 73. | - Discovering Site-Specific Requirements for 802.11 Wireless Network Site Surveying and Installation
- By
Bruce Alexander
- Dec 10, 2004
- This chapter outlines the physical logictics of installing a wireless network into a building. Concerns regarding the architecture and layout of the building are addressed, so that you can plan appropriately.
|
| 74. | - Backbone Router Configuration
- By
Catherine Paquet, Diane Teare
- Mar 14, 2003
|
| 75. | - CCSP CSI Exam Certification: SAFE IP Telephony Design
- By
Ido Dubrawsky, Paul Grey
- Dec 30, 2004
- This chapter will help you prepare for the CCSP CSI Exam, with a focus on SAFE IP Telephony Design. Sample questions are included to help you study.
|
| 76. | - Intrusion Detection Systems
- By
Earl Carter
- Feb 15, 2002
- Intrusion Detection Systems (IDSs) are basically burglar alarms for your computer network. Earl Carter shows you that understanding how they operate can enable you to determine if and how you can use an IDS to protect your network.
|
| 77. | - Configuring the Cisco PIX Firewall for CA Site-to-Site
- By
Andrew Mason
- Dec 28, 2001
- This sample chapter explains how to configure Cisco Secure PIX Firewall certificate
authority (CA) support for Internet Protocol Security (IPSec). The chapter shows you each major step of the configuration, including support tasks, IKE, and IPSec.
|
| 78. | - Demographic and Social Trends in the Broadband Home
- By
Rouzbeh Yassini, Roger Brown, Leslie Ellis, Stewart Schley
- Oct 10, 2003
- Who uses broadband, what do they use it for, and how have "always on" connections changed the habits of connected families? This sample chapter examines demographic and social trends of broadband households.
|
| 79. | - Cisco Unity: About Unified Messaging
- By
Todd Stone, Dustin Grant, Jeff Lindborg, Steve Olivier
- Sep 17, 2004
- Unified messaging is a wonderful utility for your users, but it can be a headache for administrators. This chapter discusses the challenges associated with unified messaging as a part of the voice data convergence paradigm for the messaging application layer.
|
| 80. | - Understanding High Availability of IP and MPLS Networks
- By
Iftekhar Hussain
- Jan 14, 2005
- This chapter describes major sources of network failures and provides an overview of techniques that are commonly used to improve availability of IP/MPLS networks. In particular, this chapter outlines mechanisms for reducing network downtime due to control-plane failures.
|