Cisco Network Technology

All Cisco Network Technology Articles

Showing 201-220 of 367

Sort by Date | Title

201.
Building Resilient IP Networks: The Access Module
Jun 9, 2006
This chapter focuses on Ethernet switching technology, specifically Layer 2 network resiliency and how it should be built to provide a solid foundation for the Layer 3 network.
202.
Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
Jun 9, 2006
This chapter will focus on using a concentrator to terminate other types of remote access sessions, including PPTP, L2TP over IPsec, and WebVPN. The remainder of this chapter will focus on the configuration of the concentrator to support these types of remote access VPN implementations.
203.
Penetration Testing and Network Defense: Performing Host Reconnaissance
Jun 2, 2006
Malicious hackers also value reconnaissance as the first step in an effective attack. For them, seeing what is on the "other side of the hill" is crucial to knowing what type of attack to launch. Although penetration testers might not always have the luxury of time that a malicious hacker might have, they do recognize the value of reconnaissance. This chapter will help you develop network reconnaissance skills to help you protect your network from intrusion.
204.
Wireless LAN Design
Jun 2, 2006
This chapter discusses wireless LAN (WLAN) technology and describes how it improves mobility. After introducing WLANs as strategic assets to corporate networks, WLAN standards and components are discussed. The security and management of WLANs are explored, followed by design considerations for WLANs.
205.
Intrusion Prevention: Signatures and Actions
May 26, 2006
Attack signatures have been around for long enough that the definition should be universally understood, but that's not the case. Simply put, an IPS signature is any distinctive characteristic that identifies something. Using this definition, all IPS products use signatures of some kind, regardless of what the product descriptions claim. To find something and stop it, you must be able to identify it, and for you to identify it, it must display a distinct characteristic. This chapter introduces you to the concept of signatures.
206.
Home Network Router Security Secrets
Apr 7, 2006
Ever delve inside your home network routers and use the hidden security settings that can lock down a network nice and tight? Most people never do. Andy Walker reveals 10 secrets on how to easily access your router's security settings.
207.
A Student-Hacker Showdown at the Collegiate Cyber Defense Competition
Mar 31, 2006
Students-turned-IT managers faced off against experienced hackers at the Mid-Atlantic Regional Collegiate Cyber Defense Competition. Seth Fogie witnessed this real-world competition and reports on its unexpected twists, turns, and even drama.
208.
Trash Your Pocket PC Synchronization Cable and Go Wireless
Feb 10, 2006
Do you daydream about new ways to be wireless? Kulvir Bhogal shows you how to synchronize your wirelessly-enabled Pocket PC with your PC over your wireless network — with no strings attached!
209.
MPLS Traffic Engineering
Jan 13, 2006
MPLS Traffic Engineering (MPLS TE) is a growing implementation in today's service provider networks. MPLS adoption in service provider networks has increased manifold due to its inherent TE capabilities. This chapter provides you with information on the operation and configuration of MPLS TE on Cisco routers.
210.
CCNP Exam Prep: Traditional Spanning Tree Protocol
By David Hucaby
Dec 22, 2005
This chapter discusses the theory and operation of the STP with an eye toward passing the CCNP BCMSN Exam. More specifically, the original, or traditional, STP is covered, as defined in IEEE 802.1D.
211.
Cisco ASA Security Contexts
Dec 16, 2005
The virtual firewall methodology enables a physical firewall to be partitioned into multiple standalone firewalls. Each standalone firewall acts and behaves as an independent entity with its own configuration, interfaces, security policies, routing table, and administrators. In Cisco ASA, these virtual firewalls are known as security contexts. This chapter covers security contexts in detail.
212.
Cisco IPS Device Manager (IDM)
Dec 16, 2005
The Cisco IPS Device Manager (IDM) is a tool that enables you to configure and manage a single Cisco network sensor. This Java-based web tool provides you with a graphical interface to manipulate the operation of your sensor. This chapter will help you get started with the Cisco IDM.
213.
A Network Administrator's View of Multiservice Networks
Dec 9, 2005
Multiservice networks provide more than one distinct communications service type over the same physical infrastructure. Multiservice implies not only the existence of multiple traffic types within the network, but also the ability of a single network to support all of these applications without compromising quality of service (QoS) for any of them. This chapter covers multiservice networks in detail from the network administrator's viewpoint.
214.
An Overview of Cisco IP Communications
Dec 9, 2005
This chapter provides an overview of Cisco IP Communications, including VoIP and how Cisco IP Communications differs from traditional telephone systems, and how you can use VoIP to achieve savings by routing your telephone calls over the IP WAN.
215.
The Basic Uses of TCP/IP Route Maps
Dec 9, 2005
Route maps are similar to access lists; they both have criteria for matching the details of certain packets and an action of permitting or denying those packets. This chapter explains the basics of Route Maps. Included are sample exercises to help you practice administration and use of Route Maps.
216.
An Overview of the syslog Protocol
Dec 1, 2005
This chapter presents an overview of the syslog protocol and shows you how to deploy an end-to-end syslog system. You'll learn about the syslog architecture as well as the issues in deploying syslog servers in Linux and Windows OSs with a focus on their relevance in a Cisco environment.
217.
Cisco 802.11 Wireless Networking: Installing and Configuring Access Points
Dec 1, 2005
The largest hurdle toward getting your wireless LAN (WLAN) up and running is the configuration of your access points (APs) and wireless clients. This chapter examines how to install and configure the AP.
218.
Corporate Governance, Business Continuity Planning, and Disaster Recovery
Dec 1, 2005
To protect business stakeholders, corporate governance focuses a sharp eye on all measures and systems within the organization to ensure compliance with laws, regulations, and standards. Michelle Johnston Sollicito points out the many required aspects of a proper business continuity plan and shows you where to look for holes in your process.
219.
IPSec Authentication and Authorization Models
Oct 21, 2005
This chapter covers IPSec features and mechanisms that are primarily targeted at the authentication of remote access users. You'll learn about XAUTH, which provides extended authentication for IPSec telecommuters by using authentication schemes such as RADIUS. MODECFG uses a push model to push attributes to the IPSec client.
220.
Deploying Cisco CallManager and Unity Devices
Oct 14, 2005
This chapter covers all the required tasks needed to add phones and gateways to a Cisco CallManager system. Four methods to add phones to the system are discussed: manual registration, Auto-registration, BAT, and TAPS.