41. | - Designing Networks and Services in the Cloud
- Jul 12, 2013
- This chapter explores the role of the network in enabling the success of business-grade cloud services - moving to the cloud and encouraging the adoption of cloud services by enterprises as well as monetizing those network investments.
|
42. | - An Overview of Cisco IOS Versions and Naming
- Jun 28, 2013
- This article covers the different Cisco IOS releases and naming structures and aims to give a single location where network engineers can look to figure out what the different releases mean.
|
43. | - Cisco IOS Image Concepts and Configuration
- Jun 28, 2013
- Cisco network engineers should know how to correctly perform a router image update/upgrade. This article covers the different image types that exist on most Cisco equipment, Cisco’s image-naming structure, and how to perform image updates/upgrades.
|
44. | - Cisco IOS Image Security
- Jun 28, 2013
- This article discusses Cisco IOS image types and provides methods to ensure that the images are complete and have not been modified. It also briefly covers digital signatures that are possible with newer Cisco hardware.
|
45. | - Cisco ASA Access Lists Concepts and Configuration
- Jun 27, 2013
- Sean Wilkins review Cisco’s Adaptive Security Appliance (ASA) implementation of access control lists (ACL or access list). He also covers ASA access list types, what they control, and a basic review of what the configuration syntax is to use them.
|
46. | - Cisco ASA Basic Internet Protocol Inspection
- Jun 27, 2013
- In this article, Sean Wilkins covers some of the common Internet protocol inspection features that can be enabled (or are enabled by default) on the Cisco ASA.
|
47. | - IPv6 Translation and Tunneling Technologies
- Jun 26, 2013
- With the exhaustion of the IPv4 addressing space quickly approaching, it has become a high priority for organizations to begin their own deployments of IPv6. This can be accomplished in a number of different ways. This article examines specific methods and how they can be used to support an IPv6 deployment.
|
48. | - IPv6 Tunneling Technology Configuration
- Jun 26, 2013
- This article focuses on the basic configuration of available IPv6 tunneling technologies for Cisco networks.
|
49. | - Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World
- Jun 25, 2013
- This chapter examines the relationship between authentication and authorization and how to build policies for each, describing a few common Authentication Policies and Authorization Policies to help you see how to work with these policy constructs.
|
50. | - Wireless is Calling - Will You Answer? Why Wireless Networking is a Promising Career Choice
- By
David Hucaby
- Jun 25, 2013
- David Hucaby shares his thoughts on why wireless engineering is a satisfying career choice, especially with new wireless capabilities rolling out all the time.
|
51. | - The Portable Command Guide: How it Works and Why You Should Build Your Own
- Jun 24, 2013
- Scott Empson discusses how his handwritten "Engineering Journal" became the Portable Command Guide — and why you should turn your technical notes into your own Portable Command Guide.
|
52. | - Cisco NX-OS and Cisco Nexus Switching: Unified Fabric
- Apr 26, 2013
- This chapter shows the basic Nexus 5x00 and Nexus 7000 configurations necessary to provide a Unified access method for LAN data traffic and SAN storage traffic.
|
53. | - Securing Overlay Transport Virtualization (OTV) with Cisco TrustSec (CTS)
- Apr 25, 2013
- Ron Fuller shows just how easy it is to take advantage of MACSEC and AES128 bit encryption on your Cisco Nexus 7000 series switches.
|
54. | - Best Practices for Deploying Secure Cisco IP Telephony Solutions
- Oct 31, 2012
- A brief discussion of why it's important to secure IP Telephony Networks, how to go about it, and the actual deployment thereof.
|
55. | - Creating Your Own VPN
- Oct 23, 2012
- Security expert Eric Geier shows you how to set up a VPN to securely access your PC or network when you’re away, and to secure your Internet connection when using Wi-Fi hotspots.
|
56. | - The Art of the Data Center: Bahnhof - Stockholm, Sweden
- Oct 9, 2012
- Doug Alger takes a fascinating look at one of the most amazing data centers in the world in this chapter from his book The Art of the Data Center.
|
57. | - Eight Cool Things You Probably Don’t Know About Data Centers
- Sep 27, 2012
- Doug Alger, author of The Art of the Data Center, discusses eight cool things most people don’t realize about Data Centers in this InformIT exclusive audio segment.
|
58. | - Cisco IP Telephony Security Framework
- Sep 21, 2012
- This chapter examines the Cisco IP Telephony Security life cycle. It also shows how to develop an IP telephony security policy, evaluate cost versus risk, determine the level of security required for your IP Telephony network, and develop Cisco IP Telephony Security Framework.
|
59. | - Q&A with Cisco Senior Network Consultant Akhil Behl, Author of Securing Cisco IP Telephony Networks
- Sep 18, 2012
- Learn more about Cisco Press author Akhil Behl and the new book Securing Cisco IP Telephony Networks.
|
60. | - Protecting Your Network from the Wi-Fi Protected Setup Security Hole
- Mar 12, 2012
- Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.
|