Chapters & Articles

All Articles

Showing 101-120 of 148

Sort by Date | Title

Page: < Prev 4 5 6 7 8 Next >

101.
Securing Overlay Transport Virtualization (OTV) with Cisco TrustSec (CTS)
By Ron Fuller
Apr 25, 2013
Ron Fuller shows just how easy it is to take advantage of MACSEC and AES128 bit encryption on your Cisco Nexus 7000 series switches.
102.
Securing Wireless Networks
By Jim Doherty, Neil Anderson, MAGGIORA & DOHERTY
Jul 2, 2008
This chapter discusses wireless security, including a checklist for securing Wi-Fi.
103.
Security
By Simone Arena, Francisco Sedano Crippa, Nicolas Darchis, Sudha Katgeri
Sep 24, 2022

This sample chapter from Understanding and Troubleshooting Cisco Catalyst 9800 Series Wireless Controllers covers the security aspects of the Catalyst 9800 controller. The biggest aspect revolves around AAA, which is either locally handled by the controller or delegated to an external RADIUS or TACACS server.

104.
Security Through Network Fundamentals
By Brett Hall, Nik Smith
Dec 5, 2020

In this sample chapter from Practical Cisco Unified Communications Security, you will explore the dependencies that Unified Communications (UC) systems have on a network while also highlighting the security features that can be implemented to provide additional security to the UC environment.

105.
Segment Routing for Service Provider and Enterprise Networks
Dec 27, 2024
106.
Service Design and Building the IT Service Portfolio
By Justin Mann
Apr 6, 2018

In this sample chapter from IT as a Service (ITaaS) Framework, The: Transform to an End-to-End Services Organization and Operate IT like a Competitive Business, examine the purpose, goals, and value potential of a Service portfolio. You’ll also explore how to design specific elements of the Service portfolio and review various guidelines, best practices, and lessons learned for the successful design of IT Services across the enterprise.

107.
Setting Up and Maintaining a Distributed ISE Deployment
By Jamey Heary, Aaron Woland
Oct 3, 2017

In this sample chapter from Cisco ISE for BYOD and Secure Unified Access, 2nd Edition, explore the configuration steps required to deploy ISE in a distributed design. Content also covers the basics of using a load balancer.

108.
Sharing the Context
By Chad Mitchell, Jamie Sanbower, Vivek Santuka, Aaron Woland
Jul 9, 2019

In this sample chapter from Integrated Security Technologies and Solutions - Volume II: Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization, you will learn about the many different ways of sharing context out of Cisco Identify Services Engine (ISE) to other security solutions, about Rapid Threat Containment, and about the Platform Exchange Grid (pxGrid). Because ISE is positioned to know exactly who and what is on the network at any given time, as well as assign different levels of access and context assignments with security group tags, it is the perfect security tool to be at the center of a security ecosystem.

109.
Software-Defined Networking Security and Network Programmability
By Omar Santos
Apr 17, 2024

In this sample chapter from CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide, 2nd Edition, you will learn about Software-Defined Networking (SDN) and SDN Security, as well as an overview of network programmability and how networks are being managed using modern application programming interfaces (APIs) and other functions. This chapter covers SCOR 350-701 exam objectives 1.7-1.8.

110.
Software-Defined Networking Security and Network Programmability
By Omar Santos
Jun 10, 2020

In this sample chapter from CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide, Omar Santos reviews exam objectives related to software-defined networking and network programmability.

111.
Solving Congestion with Storage I/O Performance Monitoring
By Paresh Gupta, Edward Mazurek
Apr 17, 2024

This sample chapter from Detecting, Troubleshooting, and Preventing Congestion in Storage Networks explains the use of storage I/O performance monitoring for handling network congestion problems and includes practical case studies.

112.
STP
By Cisco Networking Academy
Dec 1, 2017

Network redundancy is a key to maintaining network reliability. In this sample chapter from Scaling Networks v6 Companion Guide, explore potential redundancy problems, symptoms, and protocols to manage them.

113.
The Art of Network Architecture: Applying Modularity
By Denise Donohue, J. Kronik
May 12, 2014
This chapter focuses on why we use specific design patterns to implement modularity, discussing specifically why we should use hierarchical design to create a modular network design, why we should use overlay networks to create virtualization, and the results of virtualization as a mechanism to provide modularity.
114.
The Basic Uses of TCP/IP Route Maps
By Jeff Doyle, Jennifer Carroll
Dec 9, 2005
Route maps are similar to access lists; they both have criteria for matching the details of certain packets and an action of permitting or denying those packets. This chapter explains the basics of Route Maps. Included are sample exercises to help you practice administration and use of Route Maps.
115.
The Meraki Admin Experience
By Arun Paul, Jeffry Handal, Medi Jaafari, Mike Woolley
Aug 5, 2024

The Cisco Meraki platform can now be used to manage all digital cloud operations in one single integration. In this sample chapter from Cisco Meraki Fundamentals: Cloud-Managed Operations, you will learn how the Dashboard can help administrators monitor and proactively address potential issues in their day-to-day workflow.

116.
Today's Networks and the Drivers for Change
By Jason Gooley, Roddie Hasan, Srilatha Vemula
Sep 21, 2020

In this sample chapter from Cisco Software-Defined Access, you will find a high-level overview of how the networks of today are causing challenges for organizations and their operations staff,

117.
Troubleshooting Methods for Cisco IP Networks
By Amir Ranjbar
Jan 14, 2015
This chapter from Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide: (CCNP TSHOOT 300-135) defines troubleshooting and troubleshooting principles. Next, six different troubleshooting approaches are described. The third section of this chapter presents a troubleshooting example based on each of the six troubleshooting approaches.
118.
Understanding ACI Hardware and Topologies
By Ammar Ahmadi
Jan 4, 2023

ACI is designed to allow small and large enterprises and service providers to build massively scalable data centers using a relatively small number of very flexible topologies. In this sample chapter from CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide, the author team details the topologies with which an ACI fabric can be built or extended.

119.
Using APIs
By Constantin Mohorea
Feb 10, 2022

When API load increases due to growth of user requests and application data, hardware requirements increase as well. In this sample chapter from Cisco DevNet Professional DEVCOR 350-901 Study Guide, you will explore application optimization through HTTP caching, HTTP condition requests, caching controls, and HTTP data compression.

120.
Using Data from Your Network
By Ivo Pinto
Nov 20, 2021

In this sample chapter from Network Automation Made Easy, you will learn data preparation and visualization techniques to derive value from data collected on enterprise networks.

Page: < Prev 4 5 6 7 8 Next >