舉報

會員
Implementing Cisco Networking Solutions
最新章節:
Summary
ThisbookistargetedatnetworkdesignersandITengineerswhoareinvolvedindesigning,configuring,andoperatingenterprisenetworks,andareintakingdecisionstomakethenecessarynetworkchangestomeetnewerbusinessneedssuchasevaluatingnewtechnologychoices,enterprisegrowth,andaddingnewservicesonthenetwork.Thereaderisexpectedtohaveageneralunderstandingofthefundamentalsofnetworking,includingtheOSIstackandIPaddressing.
最新章節
- Summary
- Software issues
- Hardware issues
- Troubleshooting device level issues
- Troubleshooting the management plane
- Troubleshooting performance issues
品牌:中圖公司
上架時間:2021-07-08 09:20:00
出版社:Packt Publishing
本書數字版權由中圖公司提供,并由其授權上海閱文信息技術有限公司制作發行
- Summary 更新時間:2021-07-08 10:03:26
- Software issues
- Hardware issues
- Troubleshooting device level issues
- Troubleshooting the management plane
- Troubleshooting performance issues
- Troubleshooting forwarding plane issues
- Troubleshooting routing issues
- Troubleshooting the first hop connectivity
- Troubleshooting layer 2 issues
- Troubleshooting user connectivity
- Troubleshooting the network
- The debug commands
- The traceroute command
- The ping command
- IOS commands
- Network troubleshooting commands
- Application baseline
- The network baseline
- Establishing the normal and detecting deviations
- A framework for structured troubleshooting
- Basic Troubleshooting Skills and Techniques
- Summary
- Implementing the network management strategy
- Cisco Prime Infrastructure
- Management network
- IP Service Level Assurance (IP-SLA)
- Role-based user access
- Controlling device access using RADIUS
- Network Time Protocol (NTP)
- Syslog
- SNMP polling
- SNMP traps
- Simple Network Management Protocol (SNMP)
- Network operations systems components
- The importance of metrics
- Tools and technologies
- Processes
- People
- Pillars of network management
- Network management planning
- Frameworks related to network management
- A Systematic Approach to Network Management
- Summary
- QoS in a hybrid model with service provider WAN
- The egress policy
- The ingress policy
- Implementing configurations
- Assessing hardware and assigning classes to queues
- Assigning bandwidths
- Defining traffic types
- Defining the trust boundary
- QoS design for an enterprise
- Modular QoS command-line interface
- Weighted random early detection (WRED)
- Random early detection
- Tail drop
- Congestion avoidance
- Class-based weighted fair queueing (CBWFQ)
- Low latency queueing (LLQ)
- Scheduling
- Queuing
- Congestion management
- Packet marking
- Packet classification
- Markdown
- Shaping
- Policing
- Traffic conditioning
- QoS tools
- The differentiated services model
- The integrated services model
- QoS models
- Jitter
- Latency
- Packet loss
- Network impact on traffic
- The need for QoS
- Understanding and Configuring Quality of Service
- Summary
- Network behavioral analysis
- Securing data in transit
- DNS-based security
- Securing the endpoints
- Advanced Malware Protection (AMP)
- Web security
- Email services
- Securing services
- Firewalls
- Securing the network perimeter
- Security beyond the network devices
- Management plane security
- Protocol security
- Control plane policing
- Dynamic ARP Inspection (DAI)
- DHCP snooping
- STP security
- Layer 2 control plane security
- Disabling interface services
- Disabling unused global services
- Disable unused services
- Control plane security
- Preventing denial of service attacks
- Access control lists
- Controlling user to user traffic
- Rate limiting and storm control
- Controlling user traffic
- ICMP attacks
- IP options and source routing
- Limiting punting to CPU
- IP source guard
- Unicast RPF
- ARP spoofing
- Preventing spoofed attacks
- Port security and MAC limiting
- Network access control (NAC)
- Password protection on wireless networks
- Controlling network access
- Data plane security
- Securing network infrastructure
- Elements of enterprise security
- Security landscape
- Understanding and Configuring Network Security
- Summary
- Providing remote access to the DC
- Planning a disaster recovery
- Server load balancers
- Virtualization
- NIC teaming
- Server redundancy
- Firewall redundancy
- Firewall design
- Network design
- Designing a sample DC
- Network Address Translation
- Connecting the DC to the internet
- Scaling the firewall
- Firewall security context
- Enabling threat detection
- Applying connection limits and TCP normalization
- Application inspection
- Protecting from IP fragments
- Basic access control
- Firewall inspection
- Introduction to firewalls
- Types of networks in a DC
- Zoning of the data center
- Application hierarchy
- Design of a DC
- Management systems
- Cloud computing
- Storage
- Virtualization
- Computers
- Network
- Evolution of the DC
- Functions of a data center
- Understanding and Configuring Data Center Technologies
- Summary
- Optimizing the WAN
- Encrypting and securing the WAN
- BGP
- Static routing
- Routing at the internet edge
- Connecting to the internet
- Managed versus unmanaged services
- Remote access VPNs
- VRF-Lite
- Layer 3 VPNs
- Layer 2 VPNs
- Virtual private networks
- Configuring overlay P2P links
- Multilink PPP
- FR encapsulation
- Serial links with PPP/HDLC encapsulation
- Configuring WAN serial links
- WAN technology choices
- Considerations for a WAN design
- Understanding and Configuring WAN Technologies
- Summary
- Configuring the APs in FlexConnect mode
- FlexConnect mode
- Configuring the WLC deployment
- HA stateful switchover
- WLC redundancy
- Configuration using the WLC
- Configuring AP using Cisco Mobility Express
- Wireless LAN controller and CAPWAP
- Cisco mobility express
- Configuring the WLAN
- Mixed mode operation/interoperability
- IEEE 802.11ac
- IEEE 802.11n
- IEEE 802.11g
- IEEE 802.11b
- IEEE 802.11a
- IEEE 802.11
- Wireless standards
- Antenna characteristics
- Channel bonding
- MIMO
- Channels
- Frequency bands
- Signal to Noise Ratio (SNR)
- Modulation
- Signal strength
- An RF signal
- Wireless fundamentals
- Benefits of wireless networks
- Understanding and Configuring Wireless Access Technologies
- Summary
- A sample network
- Stacking switches
- Sizing the campus network
- Layer 2 versus layer 3 boundaries
- Naming convention
- Physical versus logical topology
- Ring and star topologies
- Topology choices
- Campus LAN design considerations
- Routing table segmentation
- Route redistribution
- External routing
- Link-state routing
- Distance vector routing
- Dynamic routing
- Static routing
- Routing table
- Routing protocols
- GLBP
- VRRP
- HSRP
- First Hop Redundancy Protocols (FHRP)
- Secondary addresses
- A note about WAN addresses
- Configuring IP addresses
- Sample addressing
- Routable and private addresses
- IPv4 addresses
- IP addressing
- Layer 3 technologies
- Configuring layer 2 protocols
- Address Resolution Protocol (ARP)
- Link aggregation
- Spanning Tree Protocols
- Access ports and trunk ports
- Virtual LANs
- Ethernet switch and MAC-based forwarding
- Ethernet
- Layer 2 technologies
- Campus network technologies
- Understanding and Configuring Campus Network Technologies
- Summary
- Interdependency between the various components
- Internet edge
- Data center
- Wide Area Network (WAN)
- Campus network
- Places in the network
- Configuration files
- IOS command modes
- Introduction to Cisco IOS
- Firewalls
- Routers
- Wireless Access Points
- Switches
- Networking devices and their functions
- Components of the Enterprise Network
- Summary
- Cisco Digital Network Architecture
- Visibility and analytics
- Manageability
- Agility
- Security
- Scalability
- Flexibility
- Modularity
- Resiliency
- Functionality
- Facets of a digital infrastructure
- Network providing new Insights
- Network enabling new experiences
- Network as the cornerstone
- Analytics
- Cloud computing
- Edge computing
- Processing centres
- Network programmability
- Network function virtualization
- Software-defined networking
- Network
- IoT systems
- Input/output systems
- Enabling technologies
- A digital-ready infrastructure
- Digitization as the key enabler
- The impact of technology on business
- Networks for Digital Enterprises
- Summary
- Optimize phase
- Operate phase
- Implement phase
- Design phase
- Plan phase
- Prepare phase
- Advantages of network lifecycle approach
- Network lifecycle
- Purpose of networks
- Building a network
- IP version 6
- User Datagram Protocol (UDP)
- Transmission Control Protocol (TCP)
- Internet Protocol (IP)
- The TCP/IP model
- Layer 7 - The application layer
- Layer 6 - The presentation layer
- Layer 5 - The session layer
- Layer 4 - The transport layer
- Layer 3 - The network layer
- Layer 2 - The data link layer
- Layer 1 - The physical layer
- Basic OSI reference model
- The OSI model and the TCP/IP stack
- Introduction to networks
- Network Building Essentials
- Questions
- Piracy
- Errata
- Downloading the color images of this book
- Downloading the example code
- Customer support
- Reader feedback
- Conventions
- Who this book is for
- What you need for this book
- What this book covers
- Preface
- Dedication
- Customer Feedback
- Why subscribe?
- www.PacktPub.com
- About the Reviewer
- About the Author
- Credits
- Implementing Cisco Networking Solutions
- Copyright
- Title Page
- coverpage
- coverpage
- Title Page
- Copyright
- Implementing Cisco Networking Solutions
- Credits
- About the Author
- About the Reviewer
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Dedication
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Downloading the example code
- Downloading the color images of this book
- Errata
- Piracy
- Questions
- Network Building Essentials
- Introduction to networks
- The OSI model and the TCP/IP stack
- Basic OSI reference model
- Layer 1 - The physical layer
- Layer 2 - The data link layer
- Layer 3 - The network layer
- Layer 4 - The transport layer
- Layer 5 - The session layer
- Layer 6 - The presentation layer
- Layer 7 - The application layer
- The TCP/IP model
- Internet Protocol (IP)
- Transmission Control Protocol (TCP)
- User Datagram Protocol (UDP)
- IP version 6
- Building a network
- Purpose of networks
- Network lifecycle
- Advantages of network lifecycle approach
- Prepare phase
- Plan phase
- Design phase
- Implement phase
- Operate phase
- Optimize phase
- Summary
- Networks for Digital Enterprises
- The impact of technology on business
- Digitization as the key enabler
- A digital-ready infrastructure
- Enabling technologies
- Input/output systems
- IoT systems
- Network
- Software-defined networking
- Network function virtualization
- Network programmability
- Processing centres
- Edge computing
- Cloud computing
- Analytics
- Network as the cornerstone
- Network enabling new experiences
- Network providing new Insights
- Facets of a digital infrastructure
- Functionality
- Resiliency
- Modularity
- Flexibility
- Scalability
- Security
- Agility
- Manageability
- Visibility and analytics
- Cisco Digital Network Architecture
- Summary
- Components of the Enterprise Network
- Networking devices and their functions
- Switches
- Wireless Access Points
- Routers
- Firewalls
- Introduction to Cisco IOS
- IOS command modes
- Configuration files
- Places in the network
- Campus network
- Wide Area Network (WAN)
- Data center
- Internet edge
- Interdependency between the various components
- Summary
- Understanding and Configuring Campus Network Technologies
- Campus network technologies
- Layer 2 technologies
- Ethernet
- Ethernet switch and MAC-based forwarding
- Virtual LANs
- Access ports and trunk ports
- Spanning Tree Protocols
- Link aggregation
- Address Resolution Protocol (ARP)
- Configuring layer 2 protocols
- Layer 3 technologies
- IP addressing
- IPv4 addresses
- Routable and private addresses
- Sample addressing
- Configuring IP addresses
- A note about WAN addresses
- Secondary addresses
- First Hop Redundancy Protocols (FHRP)
- HSRP
- VRRP
- GLBP
- Routing protocols
- Routing table
- Static routing
- Dynamic routing
- Distance vector routing
- Link-state routing
- External routing
- Route redistribution
- Routing table segmentation
- Campus LAN design considerations
- Topology choices
- Ring and star topologies
- Physical versus logical topology
- Naming convention
- Layer 2 versus layer 3 boundaries
- Sizing the campus network
- Stacking switches
- A sample network
- Summary
- Understanding and Configuring Wireless Access Technologies
- Benefits of wireless networks
- Wireless fundamentals
- An RF signal
- Signal strength
- Modulation
- Signal to Noise Ratio (SNR)
- Frequency bands
- Channels
- MIMO
- Channel bonding
- Antenna characteristics
- Wireless standards
- IEEE 802.11
- IEEE 802.11a
- IEEE 802.11b
- IEEE 802.11g
- IEEE 802.11n
- IEEE 802.11ac
- Mixed mode operation/interoperability
- Configuring the WLAN
- Cisco mobility express
- Wireless LAN controller and CAPWAP
- Configuring AP using Cisco Mobility Express
- Configuration using the WLC
- WLC redundancy
- HA stateful switchover
- Configuring the WLC deployment
- FlexConnect mode
- Configuring the APs in FlexConnect mode
- Summary
- Understanding and Configuring WAN Technologies
- Considerations for a WAN design
- WAN technology choices
- Configuring WAN serial links
- Serial links with PPP/HDLC encapsulation
- FR encapsulation
- Multilink PPP
- Configuring overlay P2P links
- Virtual private networks
- Layer 2 VPNs
- Layer 3 VPNs
- VRF-Lite
- Remote access VPNs
- Managed versus unmanaged services
- Connecting to the internet
- Routing at the internet edge
- Static routing
- BGP
- Encrypting and securing the WAN
- Optimizing the WAN
- Summary
- Understanding and Configuring Data Center Technologies
- Functions of a data center
- Evolution of the DC
- Network
- Computers
- Virtualization
- Storage
- Cloud computing
- Management systems
- Design of a DC
- Application hierarchy
- Zoning of the data center
- Types of networks in a DC
- Introduction to firewalls
- Firewall inspection
- Basic access control
- Protecting from IP fragments
- Application inspection
- Applying connection limits and TCP normalization
- Enabling threat detection
- Firewall security context
- Scaling the firewall
- Connecting the DC to the internet
- Network Address Translation
- Designing a sample DC
- Network design
- Firewall design
- Firewall redundancy
- Server redundancy
- NIC teaming
- Virtualization
- Server load balancers
- Planning a disaster recovery
- Providing remote access to the DC
- Summary
- Understanding and Configuring Network Security
- Security landscape
- Elements of enterprise security
- Securing network infrastructure
- Data plane security
- Controlling network access
- Password protection on wireless networks
- Network access control (NAC)
- Port security and MAC limiting
- Preventing spoofed attacks
- ARP spoofing
- Unicast RPF
- IP source guard
- Limiting punting to CPU
- IP options and source routing
- ICMP attacks
- Controlling user traffic
- Rate limiting and storm control
- Controlling user to user traffic
- Access control lists
- Preventing denial of service attacks
- Control plane security
- Disable unused services
- Disabling unused global services
- Disabling interface services
- Layer 2 control plane security
- STP security
- DHCP snooping
- Dynamic ARP Inspection (DAI)
- Control plane policing
- Protocol security
- Management plane security
- Security beyond the network devices
- Securing the network perimeter
- Firewalls
- Securing services
- Email services
- Web security
- Advanced Malware Protection (AMP)
- Securing the endpoints
- DNS-based security
- Securing data in transit
- Network behavioral analysis
- Summary
- Understanding and Configuring Quality of Service
- The need for QoS
- Network impact on traffic
- Packet loss
- Latency
- Jitter
- QoS models
- The integrated services model
- The differentiated services model
- QoS tools
- Traffic conditioning
- Policing
- Shaping
- Markdown
- Packet classification
- Packet marking
- Congestion management
- Queuing
- Scheduling
- Low latency queueing (LLQ)
- Class-based weighted fair queueing (CBWFQ)
- Congestion avoidance
- Tail drop
- Random early detection
- Weighted random early detection (WRED)
- Modular QoS command-line interface
- QoS design for an enterprise
- Defining the trust boundary
- Defining traffic types
- Assigning bandwidths
- Assessing hardware and assigning classes to queues
- Implementing configurations
- The ingress policy
- The egress policy
- QoS in a hybrid model with service provider WAN
- Summary
- A Systematic Approach to Network Management
- Frameworks related to network management
- Network management planning
- Pillars of network management
- People
- Processes
- Tools and technologies
- The importance of metrics
- Network operations systems components
- Simple Network Management Protocol (SNMP)
- SNMP traps
- SNMP polling
- Syslog
- Network Time Protocol (NTP)
- Controlling device access using RADIUS
- Role-based user access
- IP Service Level Assurance (IP-SLA)
- Management network
- Cisco Prime Infrastructure
- Implementing the network management strategy
- Summary
- Basic Troubleshooting Skills and Techniques
- A framework for structured troubleshooting
- Establishing the normal and detecting deviations
- The network baseline
- Application baseline
- Network troubleshooting commands
- IOS commands
- The ping command
- The traceroute command
- The debug commands
- Troubleshooting the network
- Troubleshooting user connectivity
- Troubleshooting layer 2 issues
- Troubleshooting the first hop connectivity
- Troubleshooting routing issues
- Troubleshooting forwarding plane issues
- Troubleshooting performance issues
- Troubleshooting the management plane
- Troubleshooting device level issues
- Hardware issues
- Software issues
- Summary 更新時間:2021-07-08 10:03:26