21. | - Advanced Features
- By
Jalpa Patel, Avinash Shukla, Manuel Velasco
- Aug 1, 2020
In this sample chapter from Implementing Cisco HyperFlex Solutions, you will review the HyperFlex HX Data Platform disaster recovery feature and configuration steps needed to enable replication between two HyperFlex clusters.
|
22. | - Advanced STP Tuning
- By
Bradley Edgeworth, Frankena, Jason Gooley, Ramiro Garza Rios
- Feb 11, 2020
In this sample chapter from CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide, you will review techniques for configuring a switch to be guaranteed as the root bridge or as a backup root bridge for a Layer 2 topology.
|
23. | - An Ideal Programmer
- By
Ed Tittel
- Nov 24, 2010
- Ed Tittel, creator of the Exam Cram series, considers the qualifications that make for the best prospective programming candidates.
|
24. | - An Integrated Certification Plan
- By
Warren E. Wyrostek
- Mar 28, 2008
- Warren Wyrostek discusses why the Master of Integrated Networking could breathe new life into the certification market.
|
25. | - An Overview of Cisco IOS Versions and Naming
- By
Sean Wilkins
- Jun 28, 2013
- This article covers the different Cisco IOS releases and naming structures and aims to give a single location where network engineers can look to figure out what the different releases mean.
|
26. | - An Overview of Cisco IP Communications
- By
Anne Smith, John Alexander, Chris Pearce, Delon Whetten
- Dec 9, 2005
- This chapter provides an overview of Cisco IP Communications, including VoIP and how Cisco IP Communications differs from traditional telephone systems, and how you can use VoIP to achieve savings by routing your telephone calls over the IP WAN.
|
27. | - An Overview of the syslog Protocol
- By
Anand Deveriya
- Dec 1, 2005
- This chapter presents an overview of the syslog protocol and shows you how to deploy an end-to-end syslog system. You'll learn about the syslog architecture as well as the issues in deploying syslog servers in Linux and Windows OSs with a focus on their relevance in a Cisco environment.
|
28. | - Analyzing Business Goals and Constraints of Network Design
- By
Priscilla Oppenheimer
- Aug 6, 2004
- This chapter covers typical network design business goals and constraints and talks about the top-down process for gathering information on goals, and the importance of using systematic methods for network design.
|
29. | - Analyzing MPLS VPN Security
- By
Michael H. Behringer, Monique Morrow
- Oct 6, 2005
- VPN users have certain expectations and requirements for their VPN service. In a nutshell, they want their service to be both private and secure. In other words, they want their VPN to be as secure as with dedicated circuits while gaining the scalability benefits of a shared infrastructure. Both concepts, of privacy and security, are not black and white, and need to be defined for a real world implementation. This chapter introduces you to VPN MPLS security requirements.
|
30. | - Analyzing the Cisco Enterprise Campus Architecture
- By
Balaji Sivasubramanian, Erum Frahim, Richard Froom
- Jul 15, 2010
- This chapter introduces you to the concepts of enterprise campus designs, along with an implementation process that can ensure a successful campus network deployment.
|
31. | - Applying Cisco Troubleshooting Tools
- By
Amir Ranjbar
- Nov 16, 2001
- This sample chapter from CCNP Support Exam Certification Guide introduces some powerful troubleshooting tools that are built into the Cisco IOS.
|
32. | - Applying the Principles of Network Design
- By
J. Kronik, Alvaro Retana, Don Slice
- Feb 1, 2002
- To illustrate three basics of highly scalable networks, this Cisco Press sample chapter "reforms" a network that is experiencing stability problems to make it stable and scalable.
|
33. | - Around the Globe in the Race Against IPv4 Address Depletion
- By
Linda Leung, Jeff Doyle
- May 19, 2009
- Linda Leung interviews Jeff Doyle about what he sees as the future for IPv6.
|
34. | - AT&T/T-Mobile Merger: Let’s Call It What It Is
- By
Leo Wrobel
- Sep 5, 2011
- Anyone who has ever taken a basic economics course knows that fewer players in an industry lead to higher prices and more limited choice, absent regulatory oversight. Noted author and technical futurist Leo Wrobel explains why the AT&T/ T-Mobile merger is a bad idea – for consumers, the market, and even the U.S. Constitution – and how the future of the Internet itself is at stake.
|
35. | - AT&T/T-Mobile Merger: Let's Call It What It Is, Part II
- By
Leo Wrobel
- Sep 14, 2011
- As two of the largest wireless carriers in the U.S. prepare to join forces, Leo A. Wrobel and special guest author Eddie M. Pope, Esq. explain why the U.S. Department of Justice thinks of this collaboration as a threat - and why you should be equally alarmed.
|
36. | - ATM-Based MPLS VPNs
- By
Vivek Alwayn
- Sep 24, 2001
- This chapter covers the following topics: an introduction to ATM-Based MPLS VPNs, MPLS and Tag Switching Terminology, Packet-Based MPLS over ATM, ATM-Based MPLS, Cell Interleaving, VC Merge, Label Virtual Circuits, Label Switch Controllers, Virtual Switch Interface, IP+ATM, Packet-Based MPLS over ATM VPNs, Case Study of a Packet-Based MPLS over ATM VPN, ATM-Based MPLS VPNs, and a Case Study of an ATM-Based MPLS VPN.
|
37. | - Attacking and Defending the Internet with Border Gateway Protocol (BGP)
- By
Carolyn Meinel
- Aug 25, 2008
- Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.
|
38. | - Attacking the Spanning Tree Protocol
- By
Eric Vyncke, Christopher Paggen
- Jun 4, 2008
- Conducting STP attacks is now within the reach of a wide population, thanks to the availability of point-and-shoot attacks tools. Fortunately, simple features widely available on a range of switches, such as BPDU-guard, provide effective measures against spanning-tree–based exploits.
|
39. | - Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World
- By
Jamey Heary, Aaron Woland
- Jun 25, 2013
- This chapter examines the relationship between authentication and authorization and how to build policies for each, describing a few common Authentication Policies and Authorization Policies to help you see how to work with these policy constructs.
|
40. | - Backbone Router Configuration
- By
Catherine Paquet, Diane Teare
- Mar 14, 2003
|