81. | - On-Box Automation and Operations Tools
- By
Jason Gooley
- Nov 19, 2016
In this chapter from Programming and Automating Cisco Networks, authors Ryan Tischer and Jason Gooley cover the following on-box automation tools in greater detail; Auto SmartPorts, AutoConf, Auto Security, AutoQoS, Smart Call Home, Tcl Shell, and Embedded Event Manager (EEM)
|
82. | - Open Shortest Path First Version 3 (OSPFv3)
- By
Brad Edgeworth, Jason Gooley, David Hucaby, Ramiro Garza Rios
- Dec 24, 2023
In this sample chapter from CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide, 2nd Edition, you will learn OSPFv3 routing protocol, configuration, and IPv4 support. OSPF Version 3 (OSPFv3), which is the latest version of the OSPF protocol, includes support for both the IPv4 and IPv6 address families. This book covers topics from the Cisco Enterprise Core v1.1 (ENCOR 350-401) exam.
|
83. | - Overview of Security Operations Center Technologies
- Dec 15, 2015
- This chapter from Security Operations Center: Building, Operating, and Maintaining your SOC focuses on the technology and services associated with most modern SOC environments, including an overview of best practices for data collection, how data is processed so that it can be used for security analysis, vulnerability management, and some operation recommendations.
|
84. | - Physical and Logical Infrastructure Requirements
- By
Jerome Henry, David Hucaby
- Apr 17, 2024
In this sample chapter from CCNP Enterprise Wireless Design ENWLSD 300-425 and Implementation ENWLSI 300-430 Official Cert Guide, 2nd Edition, the authors cover physical and logical infrastructure requirements including powering an access point with Power over Ethernet (PoE) and the communication flow of CAPWAP control and data channels. This chapter covers ENWLSD exam topics 2.1-2.2.
|
85. | - Physical and Logical Infrastructure Requirements
- By
Robert Barton, Jerome Henry, David Hucaby
- Oct 3, 2020
In this sample chapter from CCNP Enterprise Wireless Design ENWLSD 300-425 and Implementation ENWLSI 300-430 Official Cert Guide: Designing & Implementing Cisco Enterprise Wireless Networks, you will learn how to determine physical infrastructure requirements including AP power, cabling, switch port capacity, mounting, and grounding. You will also learn how to determine logical infrastructure requirements such as WLC/AP licensing requirements based on the type of wireless architecture.
|
86. | - Planning and Designing 802.11 Wireless Technologies
- May 16, 2012
- On top of normal networking issues, WLAN adds a couple of new challenges, such as Layer 1 (radio frequency [RF]) issues; a set of L2 protocols, such as IEEE 802.11; and the need for agencies to regulate the use of this shared medium, as the authors explain in this excerpt from their book, CCIE Wireless Exam (350-050) Quick Reference.
|
87. | - Port Channels and vPCs
- By
Somit Maloo, Iskren Nikolov
- Nov 9, 2022
Port Channel technology allows multiple links between two participating devices to be used to forward traffic by using a load-balancing algorithm. vPC (virtual port channel) technology allows multiple devices to form a port channel. In this sample chapter from Cisco Data Center Fundamentals, the authors discuss Ethernet port channels, including port channel modes, port channel compatibility requirements, and port channel load balancing.
|
88. | - Preventive Maintenance and Troubleshooting
- By
Cisco Networking Academy
- Mar 28, 2020
In this sample chapter from IT Essentials Companion Guide v7 for Cisco Networking Academy, you will learn about the many benefits of conducting preventive maintenance for both hardware and software.
|
89. | - pyATS Triggers and Verifications
- By
John Capobianco, Dan Wade
- Aug 5, 2024
The pyATS library (Genie) provides the Genie Harness to execute network tests with dynamic and robust capabilities. The Genie Harness can be daunting for new users of the pyATS library (Genie), as there are many configuration options and parameters. By the end of the chapter, you'll understand the powerful capabilities of Genie Harness and how to write and execute triggers and verifications.
|
90. | - Python Functions, Classes, and Modules
- By
Jason Gooley, Adrian Iliesiu, Chris Jackson, Ashutosh Malegaonkar
- Nov 9, 2022
Building Python functions allows for the creation of reusable code and is the first step toward writing object-oriented code. In this sample chapter from Cisco Certified DevNet Associate DEVASC 200-901 Official Cert Guide, you will review working with and building Python functions. It also introduces how Python modules can extend the capabilities of Python and make your job of coding much easier.
|
91. | - QoS Design Principles and Best Practices
- Jan 1, 2018
In this sample chapter from Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide: CCDP ARCH 300-320, 4th Edition, the authors cover some best practice QoS design principles and QoS strategy models that are used to implement the numerous QoS tools we have at our disposal. Remember that usually, more than one solution fits the given QoS requirements, so simplifying the models leveraged can significantly accelerate and ensure proper QoS deployment.
|
92. | - Remote Site Telephony and Branch Redundancy Options
- Mar 5, 2016
- Hannah and Behl introduce and explain the various options for deploying remote site telephony solutions.
|
93. | - Responding to a Breach
- By
Aamir Lakhani, Joseph Muniz
- Jan 8, 2019
In this sample chapter from Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, you will explore the basic concepts for proper incident response procedure to understand why organizations commonly fail at the process when responding to a breach. The authors also share techniques used by organizations that have a successful incident response plan and provide an overview of industry-proven components required to build an incident response process within your organization.
|
94. | - Responding to Real-World Cyber Threats
- Feb 16, 2016
- Are you ready to take on the latest cyber threats? Research shows that many organizations are not, because they're unprepared for what happens when common defenses fail to prevent a breach. Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, explains how to build a security strategy around the assumption that your defenses WILL fail. By implementing this approach, your organization can shorten the time of exposure when you're compromised, limiting losses from a breach. Without this type of visibility, you probably won't know that you're compromised until the damage is already done.
|
95. | - Role-Based Access Control (RBAC)
- Dec 27, 2024
|
96. | - Route Summarization
- By
Scott Empson
- Feb 11, 2020
In this sample chapter from CCNA 200-301 Portable Command Guide, 5th Edition, you will explore route summarization and requirements.
|
97. | - Routing Concepts
- Jan 1, 2018
This sample chapter from Routing and Switching Essentials v6 Companion Guide, answer the question, “What does a router do with a packet received from one network and destined for another network?” Details of the routing table will be examined, including connected, static, and dynamic routes.
|
98. | - Routing Information Protocol (RIPv2)
- By
Narbik Kocharians
- Feb 5, 2023
The Routing Information Protocol (RIP) is a perfect example of a simple distance vector routing protocol that follows all the standard distance vector designs. In this sample chapter from CCIE Enterprise Infrastructure Foundation, 2nd Edition, you will explore the simplicity of RIP configuration, advanced RIP filtering scenarios, and RIP configuration challenges.
|
99. | - SD-WAN and DMVPN
- By
Dhrumil Prajapati, Jeremy Bowman, Navin Suvarna
- Aug 5, 2024
Learn common design strategies in SD-WAN and DMVPN deployments, and how to design and deploy these two technologies to integrate with other IBN domains, in this sample chapter from Designing Real-World Multi-domain Networks.
|
100. | - Securing IoT
- Oct 3, 2017
In this sample chapter from IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things, readers will review a brief history of operational technology (OT) security, how it has evolved, and some of the common challenges it faces.
|