- Using Static IP Addresses on Your Network
- Sep 14, 2009
- Eric Geier helps you discover ways to convert from dynamic to static addresses on your network.
- Overcoming Transport and Link Capacity Limitations Through WAN Optimization
Joel Christner, Ted Grevers
- Jun 19, 2008
- This chapter examines how WAN optimization capabilities overcome performance barriers created by WAN conditions.
- Structuring and Modularizing the Network with Cisco Enterprise Architecture
- Jun 12, 2008
- This chapter introduces a modular hierarchical approach to network design, the Cisco Enterprise Architecture.
- On the Job with a Network Manager
- Jan 12, 2007
- Alexander Clemm presents a number of scenarios to give an impression of the types of activities that are performed by people who run networks for a living. He also provides an overview of some of the tools network managers have at their disposal to help them do their jobs.
- Backup Basics Part 3: General Tips for a Backup Strategy
- Jul 14, 2006
- Knowing how to configure backup applications and select backup media is half the battle of designing a successful backup strategy. The other half is choosing how and when to back up the specific pieces of data that are stored on your servers, share points, and workstations. In this final article of his series on backup basics for new technicians and administrators, Ryan Faas offers some suggestions to help you make these important decisions.
- Backup Basics Part 2: Demystifying Backup Media
- Jun 30, 2006
- In part two of a three-part series on backup basics, Ryan Faas continues to demystify backup options for new technicians and server/systems administrators. This time, the topic is choosing the media in which to store your backups. Find out the pros and cons of tape, hard drives, and RAID arrays; using network storage; and archiving using CDs or DVDs.
- Backup Basics Part 1: Demystifying Server and Workstation Backup Methods
- Jun 16, 2006
- Understanding the options for backing up servers and workstations is important for any technician or system/server administrator. But for new IT staff, all the details about how backups work and how to configure them can be confusing. In this first article in a three-part series, Ryan Faas demystifies the various types of backups that can be performed on servers and workstations using most backup applications.
- An Overview of the syslog Protocol
- Dec 1, 2005
- This chapter presents an overview of the syslog protocol and shows you how to deploy an end-to-end syslog system. You'll learn about the syslog architecture as well as the issues in deploying syslog servers in Linux and Windows OSs with a focus on their relevance in a Cisco environment.
- Make the Right Call: Cisco's AVVID
- Jun 21, 2002
- Robert Richardson discusses the pros and cons of Cisco's AVVID — what the industry's been talking about all along for pure IP convergence: smart IP phones plugged into an Ethernet network full of conventional switches and routers. Plenty of issues need to be ironed out, though.
- VPNs and VPN Technologies
- Jan 4, 2002
- This sample chapter defines virtual private networks (VPNs) and explores
fundamental Internet Protocol Security (IPSec) technologies.
- Configuring the Cisco PIX Firewall for CA Site-to-Site
- Dec 28, 2001
- This sample chapter explains how to configure Cisco Secure PIX Firewall certificate
authority (CA) support for Internet Protocol Security (IPSec). The chapter shows you each major step of the configuration, including support tasks, IKE, and IPSec.
- Securing the Corporate Network
Andrew Mason, Mark Newcomb
- Dec 21, 2001
- Authenticate your dial-in users using your local database, and make sure your AAA is in place-- that's authentication, authorization, and accounting.