Chapters & Articles

All Articles

Showing 101-120 of 148

Sort by Date | Title

Page: < Prev 4 5 6 7 8 Next >

101.
VXLAN/EVPN Forwarding Characteristics
By David Jansen, Shyam Kapadia, Lukas Krattiger
Oct 3, 2017

In this chapter from Building Data Centers with VXLAN BGP EVPN: A Cisco NX-OS Perspective, the author team discusses two different options for handling BUM or multidestination traffic— leveraging multicast replication in the underlying network and using a multicast-less approach called ingress replication.

102.
IKEv2 Deployments
By Graham Bartlett, Amjad Inamdar
Nov 19, 2016

In this chapter from IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS , authors Graham Bartlett and Amjad Inamdar introduce a number of designs where IKEv2 is used. Each design will use a simple deployment of two routers with the focus on the configuration of IKEv2. Although each scenario uses only two routers, the configuration can scale as required if needed.

103.
Introduction to BGP
By Jeff Doyle
Nov 19, 2016

In this sample chapter from Routing TCP/IP, Volume II: CCIE Professional Development, 2nd Edition, author Jeff Doyle covers the basic operation of BGP, including its message types, how the messages are used, and the format of the messages. You also learn about the various basic attributes BGP can associate with a route and how it uses these attributes to choose a best path. Finally, this chapter shows you how to configure and troubleshoot BGP peering sessions.

104.
Network Access and Layer 2 Multicast
By Josh Loveless, Ray Blair
Nov 19, 2016

In this chapter from IP Multicast, Volume I: Cisco IP Multicast Networking, authors Josh Loveless, Ray Blair, and Arvind Durai take an in-depth look at IP multicast messages at Layer 2 and how they are transported in a Layer 2 domain. This chapter covers the basic elements of multicast functionality in Layer 2 domains as well as design considerations for multicast deployments.

105.
On-Box Automation and Operations Tools
By Jason Gooley, Ryan Tischer
Nov 19, 2016

In this chapter from Programming and Automating Cisco Networks, authors Ryan Tischer and Jason Gooley cover the following on-box automation tools in greater detail; Auto SmartPorts, AutoConf, Auto Security, AutoQoS, Smart Call Home, Tcl Shell, and Embedded Event Manager (EEM)

106.
Remote Site Telephony and Branch Redundancy Options
By William Alexander Hannah, Akhil Behl
Mar 5, 2016
Hannah and Behl introduce and explain the various options for deploying remote site telephony solutions.
107.
Responding to Real-World Cyber Threats
By Joseph Muniz
Feb 16, 2016
Are you ready to take on the latest cyber threats? Research shows that many organizations are not, because they're unprepared for what happens when common defenses fail to prevent a breach. Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, explains how to build a security strategy around the assumption that your defenses WILL fail. By implementing this approach, your organization can shorten the time of exposure when you're compromised, limiting losses from a breach. Without this type of visibility, you probably won't know that you're compromised until the damage is already done.
108.
Cisco Programmable Fabric Using VXLAN with BGP EVPN
By David Jansen, Lukas Krattiger
Feb 9, 2016
David Jansen and Lukas Krattiger, authors of Cisco Programmable Fabric Using VXLAN with BGP EVPN LiveLessons, explain how Cisco's BGP EVPN enhances VXLAN encapsulation with Layer 2 and Layer 3 benefits.
109.
DHCP Snooping: Basic Concepts and Configuration
By Mason Harris
Feb 9, 2016
Mason Harris, CCIE #5916 and co-author of CCNA Security 210-260 Complete Video Course, provides a streamlined introduction to DHCP snooping, a barrier to denial-of-service and man-in-the-middle attacks on organizational networks.
110.
Why Should You Consider Passing the SCYBER Exam?
By Joseph Muniz
Jan 5, 2016
Modern organizations rely on specialists to keep cyber criminals at bay. How can you demonstrate that you have the necessary skills to gain a desirable job in a security-related position? Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, explains the value of achieving the Cisco SCYBER certification, which is designed around responding to cyber attacks.
111.
5 Steps to Building and Operating an Effective Security Operations Center (SOC)
By Joseph Muniz
Dec 21, 2015
Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, provides a high-level overview of the steps involved in creating a security operations center to protect your organization's valuable data assets.
112.
Video: Cisco TrustSec Deployment, Configuration & Troubleshooting Techniques: TrustSec Functions
By Natalie Timms
Dec 17, 2015
In this excerpt from Cisco TrustSec LiveLessons: Deployment, Configuration and Troubleshooting Techniques, Natalie Timms discusses the three functions that TrustSec utilizes when enforcing a network access policy.
113.
Video: Cisco TrustSec Inline Propagation
By Natalie Timms
Dec 16, 2015
In this excerpt from Cisco TrustSec LiveLessons: Deployment, Configuration and Troubleshooting Techniques, Natalie Timms discusses three methods to SGT propagation to enforcement devices within a Cisco TrustSec domain.
114.
Overview of Security Operations Center Technologies
By Joseph Muniz, Nadhem AlFardan, Gary McIntyre
Dec 15, 2015
This chapter from Security Operations Center: Building, Operating, and Maintaining your SOC focuses on the technology and services associated with most modern SOC environments, including an overview of best practices for data collection, how data is processed so that it can be used for security analysis, vulnerability management, and some operation recommendations.
115.
Video: Cisco TrustSec Deployment, Configuration & Troubleshooting Techniques: Adaptive Security Appliance
By Natalie Timms
Dec 14, 2015
In this excerpt from Cisco TrustSec LiveLessons: Deployment, Configuration and Troubleshooting Techniques, Natalie Timms discusses TrustSec ASA identity firewalling, ASA configuration, policy enforcement, PAC generation, and security group tags.
116.
CCDE Study Guide: Enterprise Campus Architecture Design
By Marwan Al-shawi
Nov 23, 2015
In this chapter from CCDE Study Guide, Marwan Al-shawi discusses issues related to enterprise campus architecture design, including hierarchical design models, modularity, access-distribution design model, layer 3 routing design considerations, EIGRP versus link state as a campus IGP, and enterprise campus network virtualization.
117.
Video: Introduction to Cisco TrustSec Deployment, Configuration & Troubleshooting Techniques
By Natalie Timms
Nov 23, 2015
This excerpt from Cisco TrustSec LiveLessons: Deployment, Configuration and Troubleshooting Techniques introduces this video and what each lesson will cover.
118.
Video: Introduction to IPv6 Fundamentals
By Rick Graziani
Nov 17, 2015
This excerpt from IPv6 Fundamentals LiveLessons: A Straightforward Approach to Understanding IPv6 introduces this video, discussing what is covered in each lesson.
119.
Video: Introduction to NX-OS Configuration Fundamentals
By Ron Fuller, David Jansen, Matthew McPherson
Nov 13, 2015
This excerpt from NX-OS Configuration Fundamentals LiveLessons introduces this video course, introducing the trainers and covering topics in the course.
120.
Big Data Analytics and NetFlow
By Omar Santos
Oct 19, 2015
This chapter from Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security covers an introduction to big data analytics for cyber security, NetFlow and other telemetry sources for big data analytics for cyber security, Open Security Operations Center (OpenSOC), and understanding big data scalability.

Page: < Prev 4 5 6 7 8 Next >