101. | - VXLAN/EVPN Forwarding Characteristics
- By
David Jansen, Shyam Kapadia, Lukas Krattiger
- Oct 3, 2017
In this chapter from Building Data Centers with VXLAN BGP EVPN: A Cisco NX-OS Perspective, the author team discusses two different options for handling BUM or multidestination traffic—
leveraging multicast replication in the underlying network and using a multicast-less approach called ingress replication.
|
102. | - IKEv2 Deployments
- By
Graham Bartlett, Amjad Inamdar
- Nov 19, 2016
In this chapter from IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS , authors Graham Bartlett and Amjad Inamdar introduce a number of designs where IKEv2 is used. Each design will use a simple deployment of two routers with the focus on the configuration of IKEv2. Although each scenario uses only two routers, the configuration can scale as required if needed.
|
103. | - Introduction to BGP
- By
Jeff Doyle
- Nov 19, 2016
In this sample chapter from Routing TCP/IP, Volume II: CCIE Professional Development, 2nd Edition, author Jeff Doyle covers the basic operation of BGP, including its message types, how the messages are used, and the format of the messages. You also learn about the various basic attributes BGP can associate with a route and how it uses these attributes to choose a best path. Finally, this chapter shows you how to configure and troubleshoot BGP peering sessions.
|
104. | - Network Access and Layer 2 Multicast
- By
Josh Loveless, Ray Blair
- Nov 19, 2016
In this chapter from IP Multicast, Volume I: Cisco IP Multicast Networking, authors Josh Loveless, Ray Blair, and Arvind Durai take an in-depth look at IP multicast messages at Layer 2 and how they are transported in a Layer 2 domain. This chapter covers the basic elements of multicast functionality in Layer 2 domains as well as design considerations for multicast deployments.
|
105. | - On-Box Automation and Operations Tools
- By
Jason Gooley, Ryan Tischer
- Nov 19, 2016
In this chapter from Programming and Automating Cisco Networks, authors Ryan Tischer and Jason Gooley cover the following on-box automation tools in greater detail; Auto SmartPorts, AutoConf, Auto Security, AutoQoS, Smart Call Home, Tcl Shell, and Embedded Event Manager (EEM)
|
106. | - Remote Site Telephony and Branch Redundancy Options
- By
William Alexander Hannah, Akhil Behl
- Mar 5, 2016
- Hannah and Behl introduce and explain the various options for deploying remote site telephony solutions.
|
107. | - Responding to Real-World Cyber Threats
- By
Joseph Muniz
- Feb 16, 2016
- Are you ready to take on the latest cyber threats? Research shows that many organizations are not, because they're unprepared for what happens when common defenses fail to prevent a breach. Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, explains how to build a security strategy around the assumption that your defenses WILL fail. By implementing this approach, your organization can shorten the time of exposure when you're compromised, limiting losses from a breach. Without this type of visibility, you probably won't know that you're compromised until the damage is already done.
|
108. | - Cisco Programmable Fabric Using VXLAN with BGP EVPN
- By
David Jansen, Lukas Krattiger
- Feb 9, 2016
- David Jansen and Lukas Krattiger, authors of Cisco Programmable Fabric Using VXLAN with BGP EVPN LiveLessons, explain how Cisco's BGP EVPN enhances VXLAN encapsulation with Layer 2 and Layer 3 benefits.
|
109. | - DHCP Snooping: Basic Concepts and Configuration
- By
Mason Harris
- Feb 9, 2016
- Mason Harris, CCIE #5916 and co-author of CCNA Security 210-260 Complete Video Course, provides a streamlined introduction to DHCP snooping, a barrier to denial-of-service and man-in-the-middle attacks on organizational networks.
|
110. | - Why Should You Consider Passing the SCYBER Exam?
- By
Joseph Muniz
- Jan 5, 2016
- Modern organizations rely on specialists to keep cyber criminals at bay. How can you demonstrate that you have the necessary skills to gain a desirable job in a security-related position? Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, explains the value of achieving the Cisco SCYBER certification, which is designed around responding to cyber attacks.
|
111. | - 5 Steps to Building and Operating an Effective Security Operations Center (SOC)
- By
Joseph Muniz
- Dec 21, 2015
- Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, provides a high-level overview of the steps involved in creating a security operations center to protect your organization's valuable data assets.
|
112. | - Video: Cisco TrustSec Deployment, Configuration & Troubleshooting Techniques: TrustSec Functions
- By
Natalie Timms
- Dec 17, 2015
- In this excerpt from Cisco TrustSec LiveLessons: Deployment, Configuration and Troubleshooting Techniques, Natalie Timms discusses the three functions that TrustSec utilizes when enforcing a network access policy.
|
113. | - Video: Cisco TrustSec Inline Propagation
- By
Natalie Timms
- Dec 16, 2015
- In this excerpt from Cisco TrustSec LiveLessons: Deployment, Configuration and Troubleshooting Techniques, Natalie Timms discusses three methods to SGT propagation to enforcement devices within a Cisco TrustSec domain.
|
114. | - Overview of Security Operations Center Technologies
- By
Joseph Muniz, Nadhem AlFardan, Gary McIntyre
- Dec 15, 2015
- This chapter from Security Operations Center: Building, Operating, and Maintaining your SOC focuses on the technology and services associated with most modern SOC environments, including an overview of best practices for data collection, how data is processed so that it can be used for security analysis, vulnerability management, and some operation recommendations.
|
115. | - Video: Cisco TrustSec Deployment, Configuration & Troubleshooting Techniques: Adaptive Security Appliance
- By
Natalie Timms
- Dec 14, 2015
- In this excerpt from Cisco TrustSec LiveLessons: Deployment, Configuration and Troubleshooting Techniques, Natalie Timms discusses TrustSec ASA identity firewalling, ASA configuration, policy enforcement, PAC generation, and security group tags.
|
116. | - CCDE Study Guide: Enterprise Campus Architecture Design
- By
Marwan Al-shawi
- Nov 23, 2015
- In this chapter from CCDE Study Guide, Marwan Al-shawi discusses issues related to enterprise campus architecture design, including hierarchical design models, modularity, access-distribution design model, layer 3 routing design considerations, EIGRP versus link state as a campus IGP, and enterprise campus network virtualization.
|
117. | - Video: Introduction to Cisco TrustSec Deployment, Configuration & Troubleshooting Techniques
- By
Natalie Timms
- Nov 23, 2015
- This excerpt from Cisco TrustSec LiveLessons: Deployment, Configuration and Troubleshooting Techniques introduces this video and what each lesson will cover.
|
118. | - Video: Introduction to IPv6 Fundamentals
- By
Rick Graziani
- Nov 17, 2015
- This excerpt from IPv6 Fundamentals LiveLessons: A Straightforward Approach to Understanding IPv6 introduces this video, discussing what is covered in each lesson.
|
119. | - Video: Introduction to NX-OS Configuration Fundamentals
- By
Ron Fuller, David Jansen, Matthew McPherson
- Nov 13, 2015
- This excerpt from NX-OS Configuration Fundamentals LiveLessons introduces this video course, introducing the trainers and covering topics in the course.
|
120. | - Big Data Analytics and NetFlow
- By
Omar Santos
- Oct 19, 2015
- This chapter from Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security covers an introduction to big data analytics for cyber security, NetFlow and other telemetry sources for big data analytics for cyber security, Open Security Operations Center (OpenSOC), and understanding big data scalability.
|