1. | - Around the Globe in the Race Against IPv4 Address Depletion
- By
Jeff Doyle, Linda Leung
- May 19, 2009
- Linda Leung interviews Jeff Doyle about what he sees as the future for IPv6.
|
2. | - Cisco NX-OS and Cisco Nexus Switching: Unified Fabric
- By
Ron Fuller, David Jansen, Matthew McPherson
- Apr 26, 2013
- This chapter shows the basic Nexus 5x00 and Nexus 7000 configurations necessary to provide a Unified access method for LAN data traffic and SAN storage traffic.
|
3. | - Developing Network Security Strategies
- By
Priscilla Oppenheimer
- Oct 4, 2010
- To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
|
4. | - Network Security First-Step: Firewalls
- By
Donald Stoddard, Thomas M. Thomas
- Feb 8, 2012
- This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
|
5. | - Networking First-Step: How to Build a Local (Network) Roadway
- By
Wendell Odom
- Jun 4, 2004
- Wendell Odom covers networking basics such as how they work, what they're made of, and the benefits of using a structured cabling system.
|
6. | - On the Job with a Network Manager
- By
Alexander Clemm
- Jan 12, 2007
- Alexander Clemm presents a number of scenarios to give an impression of the types of activities that are performed by people who run networks for a living. He also provides an overview of some of the tools network managers have at their disposal to help them do their jobs.
|
7. | - Securing Overlay Transport Virtualization (OTV) with Cisco TrustSec (CTS)
- By
Ron Fuller
- Apr 25, 2013
- Ron Fuller shows just how easy it is to take advantage of MACSEC and AES128 bit encryption on your Cisco Nexus 7000 series switches.
|
8. | - The Art of Network Architecture: Applying Modularity
- By
Denise Donohue, J. Kronik
- May 12, 2014
- This chapter focuses on why we use specific design patterns to implement modularity, discussing specifically why we should use hierarchical design to create a modular network design, why we should use overlay networks to create virtualization, and the results of virtualization as a mechanism to provide modularity.
|
9. | - The Basic Uses of TCP/IP Route Maps
- By
Jeff Doyle, Jennifer Carroll
- Dec 9, 2005
- Route maps are similar to access lists; they both have criteria for matching the details of certain packets and an action of permitting or denying those packets. This chapter explains the basics of Route Maps. Included are sample exercises to help you practice administration and use of Route Maps.
|
10. | - Why IT Pros Need to Learn About IPv6 Security Now: An Interview with Scott Hogg and Eric Vyncke
- By
Linda Leung, Scott Hogg, Eric Vyncke
- Jul 4, 2009
- Linda Leung talks with Scott Hogg and Eric Vyncke about IPv6 transition and security issues.
|
11. | - ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
- By
Brad Bowers
- Jan 9, 2012
- Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.
|