Listing 1 - 10 of 13 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Choose an application
It doesn't matter if you are completely new to Cisco ACI or you already have some experience with the technology, this book will guide you through the whole implementation lifecycle and provide you with a comprehensive toolset to become confident in any ACI-related task. In the beginning, it's very important to build strong fundamental knowledge about Cisco ACI components. We'll go through underlay networking based on Nexus 9000 switches and describe the APIC controller cluster acting as the management plane of ACI. By building Access Policies, you'll see how to optimally connect servers, storage, routers, switches, or L4-L7 service devices to ACI. Then we'll properly design and implement Logical Application Policies. You will understand all the fabric forwarding behavior when using different ACI settings and architectures while getting a toolset on how to verify and troubleshoot eventual problems. This book also covers external L2 and L3 connectivity in ACI, more advanced features like integration with virtualization hypervisors and Kubernetes, service chaining of L4-L7 devices using Service Graphs, or practical approach to using REST API automation based on Python and Ansible/Terraform. Cisco ACI: Zero to Hero can additionally be used as a valuable source of theoretical and practical knowledge for all candidates preparing for CCIE DC v3.0 Written or Lab exams. What You'll Learn Understand network evolution and Cisco ACI components Underlay ACI networking based on Nexus 9000 switches, APIC controllers, and Application Policy Model Integrate ACI with virtualization hypervisors and Kubernetes Dynamically and seamlessly include L4-L7 service devices in communication between ACI endpoints Build ACI Anywhere: ACI Multi-Tier, Stretched Fabric, Multi-POD, Multi-Site, and Remote Leaf Utilize ACI REST API with Python, related Cobra SDK, Ansible or Terraform, to develop automation and scripts on top of the ACI platform Who This Book Is For Network engineers, architects, network developers, administrators or NOC technicians.
Choose an application
With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE) , Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.
RADIUS (Computer network protocol) --- Computers --- Access control. --- Cisco Identity Services Engine.
Choose an application
An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world""There's no question that attacks on enterprise networks are increasing in frequency and sophistication...""-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy acro
Computer networks --- Management. --- Security measures. --- Cisco Systems, Inc. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security
Choose an application
An increasing number of companies are designing and implementing Remote Access Networks, which allow users who are not physically connected to a Wide Area Network (WAN) or Local Area Network (LAN) to access the network's servers, applications and databases or to participate in video conferencing and conference calls. The ability for a remote user to function as if they were in the next office dramatically improves overall efficiency while reducing total cost of ownership. Cisco Systems, the world's largest internetworking vendor, is the pioneer of the enabling technologies for Remote Access Ne
Choose an application
This work provides a guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. A collection of detailed "how-to" instructions are presented, which will be of use to all professionals and students who engage with Cisco routers in the field or in the lab. The guide starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs.
Cisco IOS. --- Computer communication networks. --- Computer science. --- Routers (Computer networks). --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Routers (Computer networks) --- Network routers --- Cisco internetwork operating system --- Cisco internetworking operating system --- Computer communication systems. --- Computer Science. --- Computer Communication Networks. --- Routing (Computer network management) --- Equipment and supplies --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
Cisco Routers for the Small Business provides, in plain English, a no–nonsense approach to setting up all the features of the Cisco IOS for a small business using broadband technologies. This book explains how to use a Cisco router to setup cable modems, DSL and PPPoE, and explains how to configure NAT, Access Control Lists, Firewalls, DMZs and an IPSec VPN between two sites using advanced encryption. The chapters are tutorial-based and provide easy-to-follow, step–by–step instructions for all tasks that small businesses need to perform using a router. Easy–to–implement example configurations are included in the appendices. Written for the small business using common, broadband connections such as cable Internet and DSL. Provides easily–followed, step–by–step instructions for tasks that small businesses need to perform, such as configuring virtual private network (VPN) connections, creating firewalls, securing the router, and more. Contains appendixes with example configurations that are short, to the point, and dead–simple to implement.
Information Technology --- Computer Science (Hardware & Networks) --- Cisco IOS. --- Routers (Computer networks). --- Small business. --- Small business --Computer networks. --- Routers (Computer networks) --- Small business --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Computer networks --- Routing (Computer network management) --- Network routers --- Cisco internetwork operating system --- Cisco internetworking operating system --- Computer science. --- Computer organization. --- Computer Science. --- Computer Systems Organization and Communication Networks. --- Management --- Equipment and supplies --- Data protection. --- Computer network architectures. --- Security. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Organization, Computer --- Electronic digital computers
Choose an application
This easy-to-follow text/reference presents a practical guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. The work starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs. This updated and expanded new edition has been enhanced with a more detailed treatment of each topic, supported by a set of training scenarios to test the readers’ skills. Topics and features: Presents a uniquely accessible style, addressing router users’ everyday configuration needs without requiring a detailed knowledge of the underlying theory Discusses basic configuration, domestic duties, standard and advanced routing, WAN technologies, security, router management, remote connectivity, and practical tips Explains in detail the steps required to configure different protocols on Cisco routers, outlining when it would be necessary to invoke each procedure Includes coverage of MPLS, multicasting, GRE, HSRP, reflexive and timed-access lists, and configuration steps for IPv6 (NEW) Provides an extensive selection of training scenarios, designed to offer hands-on practice in the relevant tasks (NEW) This must-have collection of “how-to” instructions will prove to be an invaluable reference to anyone seeking to learn about Cisco routers configuration, whether they be field network engineers handling Cisco routers, or students working on Cisco routers in their labs. Dr. Mohammed M. Alani is Provost and Associate Professor of Computer Engineering at Al-Khawarizmi International College, Abu Dhabi, UAE. His other publications include the Springer titles Elements of Cloud Computing Security, and Guide to OSI and TCP/IP Models.
Computer science. --- Computer communication systems. --- Electrical engineering. --- Computer Science. --- Computer Communication Networks. --- Communications Engineering, Networks. --- Routers (Computer networks) --- Cisco IOS. --- Network routers --- Cisco internetwork operating system --- Cisco internetworking operating system --- Routing (Computer network management) --- Equipment and supplies --- Telecommunication. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Electric engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Listing 1 - 10 of 13 | << page >> |
Sort by
|