101. | - Securing Overlay Transport Virtualization (OTV) with Cisco TrustSec (CTS)
- By
Ron Fuller
- Apr 25, 2013
- Ron Fuller shows just how easy it is to take advantage of MACSEC and AES128 bit encryption on your Cisco Nexus 7000 series switches.
|
102. | - Securing Wireless Networks
- By
Jim Doherty, Neil Anderson, MAGGIORA & DOHERTY
- Jul 2, 2008
- This chapter discusses wireless security, including a checklist for securing Wi-Fi.
|
103. | - Security
- By
Simone Arena, Francisco Sedano Crippa, Nicolas Darchis, Sudha Katgeri
- Sep 24, 2022
This sample chapter from Understanding and Troubleshooting Cisco Catalyst 9800 Series Wireless Controllers covers the security aspects of the Catalyst 9800 controller. The biggest aspect revolves around AAA, which is either locally handled by the controller or delegated to an external RADIUS or TACACS server.
|
104. | - Security Through Network Fundamentals
- By
Brett Hall, Nik Smith
- Dec 5, 2020
In this sample chapter from Practical Cisco Unified Communications Security, you will explore the dependencies that Unified Communications (UC) systems have on a network while also highlighting the security features that can be implemented to provide additional security to the UC environment.
|
105. | - Segment Routing for Service Provider and Enterprise Networks
- Dec 27, 2024
|
106. | - Service Design and Building the IT Service Portfolio
- By
Justin Mann
- Apr 6, 2018
In this sample chapter from IT as a Service (ITaaS) Framework, The: Transform to an End-to-End Services Organization and Operate IT like a Competitive Business, examine the purpose, goals, and value potential of a Service portfolio. You’ll also explore how to design specific elements of the Service portfolio and review various guidelines, best practices, and lessons learned for the successful design of IT Services across the enterprise.
|
107. | - Setting Up and Maintaining a Distributed ISE Deployment
- By
Jamey Heary, Aaron Woland
- Oct 3, 2017
In this sample chapter from Cisco ISE for BYOD and Secure Unified Access, 2nd Edition, explore the configuration steps required to deploy ISE in a distributed design. Content also covers the basics of using a load balancer.
|
108. | - Sharing the Context
- By
Chad Mitchell, Jamie Sanbower, Vivek Santuka, Aaron Woland
- Jul 9, 2019
In this sample chapter from Integrated Security Technologies and Solutions - Volume II: Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization, you will learn about the many different ways of sharing context out of Cisco Identify Services Engine (ISE) to other security solutions, about Rapid Threat Containment, and about the Platform Exchange Grid (pxGrid). Because ISE is positioned to know exactly who and what is on the network at any given time, as well as assign different levels of access and context assignments with security group tags, it is the perfect security tool to be at the center of a security ecosystem.
|
109. | - Software-Defined Networking Security and Network Programmability
- By
Omar Santos
- Apr 17, 2024
In this sample chapter from CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide, 2nd Edition, you will learn about Software-Defined Networking (SDN) and SDN Security, as well as an overview of network programmability and how networks are being managed using modern application programming interfaces (APIs) and other functions. This chapter covers SCOR 350-701 exam objectives 1.7-1.8.
|
110. | - Software-Defined Networking Security and Network Programmability
- By
Omar Santos
- Jun 10, 2020
In this sample chapter from CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide, Omar Santos reviews exam objectives related to software-defined networking and network programmability.
|
111. | - Solving Congestion with Storage I/O Performance Monitoring
- By
Paresh Gupta, Edward Mazurek
- Apr 17, 2024
This sample chapter from Detecting, Troubleshooting, and Preventing Congestion in Storage Networks explains the use of storage I/O performance monitoring for handling network congestion problems and includes practical case studies.
|
112. | - STP
- By
Cisco Networking Academy
- Dec 1, 2017
Network redundancy is a key to maintaining network reliability. In this sample chapter from Scaling Networks v6 Companion Guide, explore potential redundancy problems, symptoms, and protocols to manage them.
|
113. | - The Art of Network Architecture: Applying Modularity
- By
Denise Donohue, J. Kronik
- May 12, 2014
- This chapter focuses on why we use specific design patterns to implement modularity, discussing specifically why we should use hierarchical design to create a modular network design, why we should use overlay networks to create virtualization, and the results of virtualization as a mechanism to provide modularity.
|
114. | - The Basic Uses of TCP/IP Route Maps
- By
Jeff Doyle, Jennifer Carroll
- Dec 9, 2005
- Route maps are similar to access lists; they both have criteria for matching the details of certain packets and an action of permitting or denying those packets. This chapter explains the basics of Route Maps. Included are sample exercises to help you practice administration and use of Route Maps.
|
115. | - The Meraki Admin Experience
- By
Arun Paul, Jeffry Handal, Medi Jaafari, Mike Woolley
- Aug 5, 2024
The Cisco Meraki platform can now be used to manage all digital cloud operations in one single integration. In this sample chapter from Cisco Meraki Fundamentals: Cloud-Managed Operations, you will learn how the Dashboard can help administrators monitor and proactively address potential issues in their day-to-day workflow.
|
116. | - Today's Networks and the Drivers for Change
- By
Jason Gooley, Roddie Hasan, Srilatha Vemula
- Sep 21, 2020
In this sample chapter from Cisco Software-Defined Access, you will find a high-level overview of how the networks of today are causing challenges for organizations and their operations staff,
|
117. | - Troubleshooting Methods for Cisco IP Networks
- By
Amir Ranjbar
- Jan 14, 2015
- This chapter from Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide: (CCNP TSHOOT 300-135) defines troubleshooting and troubleshooting principles. Next, six different troubleshooting approaches are described. The third section of this chapter presents a troubleshooting example based on each of the six troubleshooting approaches.
|
118. | - Understanding ACI Hardware and Topologies
- By
Ammar Ahmadi
- Jan 4, 2023
ACI is designed to allow small and large enterprises and service providers to build massively scalable data centers using a relatively small number of very flexible topologies. In this sample chapter from CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide, the author team details the topologies with which an ACI fabric can be built or extended.
|
119. | - Using APIs
- By
Constantin Mohorea
- Feb 10, 2022
When API load increases due to growth of user requests and application data, hardware requirements increase as well. In this sample chapter from Cisco DevNet Professional DEVCOR 350-901 Study Guide, you will explore application optimization through HTTP caching, HTTP condition requests, caching controls, and HTTP data compression.
|
120. | - Using Data from Your Network
- By
Ivo Pinto
- Nov 20, 2021
In this sample chapter from Network Automation Made Easy, you will learn data preparation and visualization techniques to derive value from data collected on enterprise networks.
|