Listing 1 - 10 of 22 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Choose an application
Computernetwerken --- routers --- computernetwerken --- Computer architecture. Operating systems --- Cisco
Choose an application
In dit boek worden de diverse onderdelen die een rol spelen bij netwerkconfiguratie besproken. Er wordt onder andere aandacht besteed aan ethernet, bekabeling, IOS en ip-adressering. Het boek Netwerken, deel 2, Switching, routing en draadloos vormt het tweede deel in onze serie Netwerken. Waar het eerste deel een inleiding vormt op netwerkconfiguratie, behandelt dit tweede deel de architectuur en werking van routers en switches in een klein netwerk en introduceert draadloze lokale netwerken (WLAN). Studenten leren hoe routers en switches te configureren en te troubleshooten.Troubleshooten met behulp van best practices voor beveiliging en het oplossen van veel voorkomende problemen met protocollen in zowel IPv4- als IPv6-netwerkenHet Cisco-curriculum in versie 7 omvat drie modules. Deze modules bereiden de student voor op het eerste certificaat, CCNA - Cisco Certified Network Associate 200-301. Het curriculum voor dit examen bestaat bij de Cisco Network Academy met online materiaal, aangevuld met Packet Tracer- en Lab-opdrachten.De serie Netwerken versie 7 volgt deze opzet. In het kader van de Cisco CCNA certificering is het oorspronkelijk Engelstalig lesmateriaal vertaald en bewerkt. (flaptekst)
Computernetwerken --- Netwerk (ict) --- Certificaat --- CCNA --- Cisco --- Router --- Switch --- WiFi --- Netwerken.
Choose an application
It doesn't matter if you are completely new to Cisco ACI or you already have some experience with the technology, this book will guide you through the whole implementation lifecycle and provide you with a comprehensive toolset to become confident in any ACI-related task. In the beginning, it's very important to build strong fundamental knowledge about Cisco ACI components. We'll go through underlay networking based on Nexus 9000 switches and describe the APIC controller cluster acting as the management plane of ACI. By building Access Policies, you'll see how to optimally connect servers, storage, routers, switches, or L4-L7 service devices to ACI. Then we'll properly design and implement Logical Application Policies. You will understand all the fabric forwarding behavior when using different ACI settings and architectures while getting a toolset on how to verify and troubleshoot eventual problems. This book also covers external L2 and L3 connectivity in ACI, more advanced features like integration with virtualization hypervisors and Kubernetes, service chaining of L4-L7 devices using Service Graphs, or practical approach to using REST API automation based on Python and Ansible/Terraform. Cisco ACI: Zero to Hero can additionally be used as a valuable source of theoretical and practical knowledge for all candidates preparing for CCIE DC v3.0 Written or Lab exams. What You'll Learn Understand network evolution and Cisco ACI components Underlay ACI networking based on Nexus 9000 switches, APIC controllers, and Application Policy Model Integrate ACI with virtualization hypervisors and Kubernetes Dynamically and seamlessly include L4-L7 service devices in communication between ACI endpoints Build ACI Anywhere: ACI Multi-Tier, Stretched Fabric, Multi-POD, Multi-Site, and Remote Leaf Utilize ACI REST API with Python, related Cobra SDK, Ansible or Terraform, to develop automation and scripts on top of the ACI platform Who This Book Is For Network engineers, architects, network developers, administrators or NOC technicians.
Choose an application
With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE) , Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.
RADIUS (Computer network protocol) --- Computers --- Access control. --- Cisco Identity Services Engine.
Choose an application
An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world""There's no question that attacks on enterprise networks are increasing in frequency and sophistication...""-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy acro
Computer networks --- Management. --- Security measures. --- Cisco Systems, Inc. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security
Choose an application
An increasing number of companies are designing and implementing Remote Access Networks, which allow users who are not physically connected to a Wide Area Network (WAN) or Local Area Network (LAN) to access the network's servers, applications and databases or to participate in video conferencing and conference calls. The ability for a remote user to function as if they were in the next office dramatically improves overall efficiency while reducing total cost of ownership. Cisco Systems, the world's largest internetworking vendor, is the pioneer of the enabling technologies for Remote Access Ne
Choose an application
This work provides a guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. A collection of detailed "how-to" instructions are presented, which will be of use to all professionals and students who engage with Cisco routers in the field or in the lab. The guide starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs.
Cisco IOS. --- Computer communication networks. --- Computer science. --- Routers (Computer networks). --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Routers (Computer networks) --- Network routers --- Cisco internetwork operating system --- Cisco internetworking operating system --- Computer communication systems. --- Computer Science. --- Computer Communication Networks. --- Routing (Computer network management) --- Equipment and supplies --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Listing 1 - 10 of 22 | << page >> |
Sort by
|