General Networking

All General Networking Articles

Showing 41-60 of 329

Sort by Date | Title

Page: < Prev 1 2 3 4 5 Next >

41.
CCNP Routing Studies: Basic Open Shortest Path First
By Henry Benjamin
May 24, 2002
Understanding basic Open Shortest Path First routing principles not only applies to the CCNP certification but to all Cisco-based certifications. This chapter focuses on a number of objectives falling under the CCNP routing principles.
42.
CCNP TSHOOT Certification Guide: Understanding the Basics of QoS
By Kevin Wallace
Apr 27, 2010
Kevin Wallace discusses basic quality of service (QoS) mechanisms on Cisco routers, which are important to understand when troubleshooting VoIP issues.
43.
CCNP Wireless IUWMS Quick Reference: Implementing Location-Based Services
By Jerome Henry
Jul 20, 2010
This chapter describes the location-tracking techniques used in providing location-based services — unique events tied to the physical location of an 802.11 device.
44.
Choosing an Optimal Location for Your Data Center
By Douglas Alger
Sep 30, 2005
When a company buys new land, it is important to consider the property's suitability to house a server environment. Failing to do so often means having to spend more on Data Center infrastructure, either to add what's missing or to overcome shortcomings on the site. The most desirable type of location is one that supports the Data Center's mission to safeguard server equipment and accommodate growth and change. This chapter will help you assess your server site for suitability.
45.
Cisco 802.11 Wireless Networking: Installing and Configuring Access Points
By Toby Velte, Anthony Velte
Dec 1, 2005
The largest hurdle toward getting your wireless LAN (WLAN) up and running is the configuration of your access points (APs) and wireless clients. This chapter examines how to install and configure the AP.
46.
Cisco AAA Identity Management Security: Getting Familiar with ACS 5.1
By Brandon J. Carroll, Premdeep Banga, Vivek Santuka
Feb 2, 2011
ACS 5.1 has a completely different user interface from ACS 4.2. Throughout the course of this chapter you will become familiar with the GUI and know where different functions are located.
47.
Cisco ASA Access Lists Concepts and Configuration
By Sean Wilkins
Jun 27, 2013
Sean Wilkins review Cisco’s Adaptive Security Appliance (ASA) implementation of access control lists (ACL or access list). He also covers ASA access list types, what they control, and a basic review of what the configuration syntax is to use them.
48.
Cisco ASA Authentication, Authorization, and Accounting Network Security Services
By Jazib Frahim, Omar Santos
Jan 28, 2010
This chapter provides an explanation of the configuration and troubleshooting of Cisco ASA-supported authentication, authorization, and accounting network security services.
49.
Cisco ASA Basic Internet Protocol Inspection
By Sean Wilkins
Jun 27, 2013
In this article, Sean Wilkins covers some of the common Internet protocol inspection features that can be enabled (or are enabled by default) on the Cisco ASA.
50.
Cisco ASA Filtering Botnet Traffic
By Sean Wilkins
Oct 31, 2013
One of the methods that can be used on the Cisco Adaptive Security Appliance (ASA) platform to avoid becoming a target of the bots subtype of malware attacks is to deploy its Botnet Traffic Filter. Sean Wilkins takes a look at how the Botnet Traffic Filter can be used to manually or automatically block these attacks from happening.
51.
Cisco ASA High Availability Concepts and Configurations
By Sean Wilkins
Dec 24, 2013
Sean Wilkins takes a look at a few of the failover capabilities in the Cisco Adaptive Security Appliance (ASA) product line and shows you how they can be configured to provide high availability.
52.
Cisco ASA Security Contexts
By Omar Santos, Jazib Frahim
Dec 16, 2005
The virtual firewall methodology enables a physical firewall to be partitioned into multiple standalone firewalls. Each standalone firewall acts and behaves as an independent entity with its own configuration, interfaces, security policies, routing table, and administrators. In Cisco ASA, these virtual firewalls are known as security contexts. This chapter covers security contexts in detail.
53.
Cisco ASA Voice and Video Protocol Inspection
By Sean Wilkins
Oct 29, 2013
Sean Wilkins takes a look at some of the inspection methods that are provided within the Cisco Adaptive Security Appliance (ASA) line and how they are used to improve the functionality of video and voice networks even when security is a high priority.
54.
Cisco Data Center Virtualization Server Architectures
By Roger Andersson, Silvano Gai, Tommi Salli
Jul 1, 2010
This chapter examines processor, memory, and I/O subsystems with particular reference to servers built according to the IA-32, often generically called x86 architecture.
55.
Cisco Firewall Configuration Fundamentals
By Alexandre M.S.P. Moraes
Jul 8, 2011
This chapter describes the configuration fundamentals for IOS and ASA-based firewalls, highlighting the similarities between the product families.
56.
Cisco Frame Relay Configurations
By Jonathan Chin
Apr 30, 2004
Jonathan Chin dicussess basic Frame Relay operations on Cisco routers in a router-based Frame Relay network.
57.
Cisco Gateway Load Balance Protocol (GLBP) Configuration Process and Commands
By Sean Wilkins
Oct 9, 2013
Networking consultant Sean Wilkins discusses how a variety of GLBP concepts can be applied to real devices.
58.
Cisco IDS Sensor Deployment Considerations
By Earl Carter
Feb 15, 2002
Correctly deploying your Cisco IDS Sensor is crucial to protecting your network. Earl Carter helps you understand your network topology, as well as the critical components on your network.
59.
Cisco IOS Image Concepts and Configuration
By Sean Wilkins
Jun 28, 2013
Cisco network engineers should know how to correctly perform a router image update/upgrade. This article covers the different image types that exist on most Cisco equipment, Cisco’s image-naming structure, and how to perform image updates/upgrades.
60.
Cisco IOS Image Security
By Sean Wilkins
Jun 28, 2013
This article discusses Cisco IOS image types and provides methods to ensure that the images are complete and have not been modified. It also briefly covers digital signatures that are possible with newer Cisco hardware.

Page: < Prev 1 2 3 4 5 Next >