舉報

會員
Implementing Cisco Networking Solutions
最新章節(jié):
Summary
ThisbookistargetedatnetworkdesignersandITengineerswhoareinvolvedindesigning,configuring,andoperatingenterprisenetworks,andareintakingdecisionstomakethenecessarynetworkchangestomeetnewerbusinessneedssuchasevaluatingnewtechnologychoices,enterprisegrowth,andaddingnewservicesonthenetwork.Thereaderisexpectedtohaveageneralunderstandingofthefundamentalsofnetworking,includingtheOSIstackandIPaddressing.
目錄(348章)
倒序
- coverpage
- Title Page
- Copyright
- Implementing Cisco Networking Solutions
- Credits
- About the Author
- About the Reviewer
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Dedication
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Downloading the example code
- Downloading the color images of this book
- Errata
- Piracy
- Questions
- Network Building Essentials
- Introduction to networks
- The OSI model and the TCP/IP stack
- Basic OSI reference model
- Layer 1 - The physical layer
- Layer 2 - The data link layer
- Layer 3 - The network layer
- Layer 4 - The transport layer
- Layer 5 - The session layer
- Layer 6 - The presentation layer
- Layer 7 - The application layer
- The TCP/IP model
- Internet Protocol (IP)
- Transmission Control Protocol (TCP)
- User Datagram Protocol (UDP)
- IP version 6
- Building a network
- Purpose of networks
- Network lifecycle
- Advantages of network lifecycle approach
- Prepare phase
- Plan phase
- Design phase
- Implement phase
- Operate phase
- Optimize phase
- Summary
- Networks for Digital Enterprises
- The impact of technology on business
- Digitization as the key enabler
- A digital-ready infrastructure
- Enabling technologies
- Input/output systems
- IoT systems
- Network
- Software-defined networking
- Network function virtualization
- Network programmability
- Processing centres
- Edge computing
- Cloud computing
- Analytics
- Network as the cornerstone
- Network enabling new experiences
- Network providing new Insights
- Facets of a digital infrastructure
- Functionality
- Resiliency
- Modularity
- Flexibility
- Scalability
- Security
- Agility
- Manageability
- Visibility and analytics
- Cisco Digital Network Architecture
- Summary
- Components of the Enterprise Network
- Networking devices and their functions
- Switches
- Wireless Access Points
- Routers
- Firewalls
- Introduction to Cisco IOS
- IOS command modes
- Configuration files
- Places in the network
- Campus network
- Wide Area Network (WAN)
- Data center
- Internet edge
- Interdependency between the various components
- Summary
- Understanding and Configuring Campus Network Technologies
- Campus network technologies
- Layer 2 technologies
- Ethernet
- Ethernet switch and MAC-based forwarding
- Virtual LANs
- Access ports and trunk ports
- Spanning Tree Protocols
- Link aggregation
- Address Resolution Protocol (ARP)
- Configuring layer 2 protocols
- Layer 3 technologies
- IP addressing
- IPv4 addresses
- Routable and private addresses
- Sample addressing
- Configuring IP addresses
- A note about WAN addresses
- Secondary addresses
- First Hop Redundancy Protocols (FHRP)
- HSRP
- VRRP
- GLBP
- Routing protocols
- Routing table
- Static routing
- Dynamic routing
- Distance vector routing
- Link-state routing
- External routing
- Route redistribution
- Routing table segmentation
- Campus LAN design considerations
- Topology choices
- Ring and star topologies
- Physical versus logical topology
- Naming convention
- Layer 2 versus layer 3 boundaries
- Sizing the campus network
- Stacking switches
- A sample network
- Summary
- Understanding and Configuring Wireless Access Technologies
- Benefits of wireless networks
- Wireless fundamentals
- An RF signal
- Signal strength
- Modulation
- Signal to Noise Ratio (SNR)
- Frequency bands
- Channels
- MIMO
- Channel bonding
- Antenna characteristics
- Wireless standards
- IEEE 802.11
- IEEE 802.11a
- IEEE 802.11b
- IEEE 802.11g
- IEEE 802.11n
- IEEE 802.11ac
- Mixed mode operation/interoperability
- Configuring the WLAN
- Cisco mobility express
- Wireless LAN controller and CAPWAP
- Configuring AP using Cisco Mobility Express
- Configuration using the WLC
- WLC redundancy
- HA stateful switchover
- Configuring the WLC deployment
- FlexConnect mode
- Configuring the APs in FlexConnect mode
- Summary
- Understanding and Configuring WAN Technologies
- Considerations for a WAN design
- WAN technology choices
- Configuring WAN serial links
- Serial links with PPP/HDLC encapsulation
- FR encapsulation
- Multilink PPP
- Configuring overlay P2P links
- Virtual private networks
- Layer 2 VPNs
- Layer 3 VPNs
- VRF-Lite
- Remote access VPNs
- Managed versus unmanaged services
- Connecting to the internet
- Routing at the internet edge
- Static routing
- BGP
- Encrypting and securing the WAN
- Optimizing the WAN
- Summary
- Understanding and Configuring Data Center Technologies
- Functions of a data center
- Evolution of the DC
- Network
- Computers
- Virtualization
- Storage
- Cloud computing
- Management systems
- Design of a DC
- Application hierarchy
- Zoning of the data center
- Types of networks in a DC
- Introduction to firewalls
- Firewall inspection
- Basic access control
- Protecting from IP fragments
- Application inspection
- Applying connection limits and TCP normalization
- Enabling threat detection
- Firewall security context
- Scaling the firewall
- Connecting the DC to the internet
- Network Address Translation
- Designing a sample DC
- Network design
- Firewall design
- Firewall redundancy
- Server redundancy
- NIC teaming
- Virtualization
- Server load balancers
- Planning a disaster recovery
- Providing remote access to the DC
- Summary
- Understanding and Configuring Network Security
- Security landscape
- Elements of enterprise security
- Securing network infrastructure
- Data plane security
- Controlling network access
- Password protection on wireless networks
- Network access control (NAC)
- Port security and MAC limiting
- Preventing spoofed attacks
- ARP spoofing
- Unicast RPF
- IP source guard
- Limiting punting to CPU
- IP options and source routing
- ICMP attacks
- Controlling user traffic
- Rate limiting and storm control
- Controlling user to user traffic
- Access control lists
- Preventing denial of service attacks
- Control plane security
- Disable unused services
- Disabling unused global services
- Disabling interface services
- Layer 2 control plane security
- STP security
- DHCP snooping
- Dynamic ARP Inspection (DAI)
- Control plane policing
- Protocol security
- Management plane security
- Security beyond the network devices
- Securing the network perimeter
- Firewalls
- Securing services
- Email services
- Web security
- Advanced Malware Protection (AMP)
- Securing the endpoints
- DNS-based security
- Securing data in transit
- Network behavioral analysis
- Summary
- Understanding and Configuring Quality of Service
- The need for QoS
- Network impact on traffic
- Packet loss
- Latency
- Jitter
- QoS models
- The integrated services model
- The differentiated services model
- QoS tools
- Traffic conditioning
- Policing
- Shaping
- Markdown
- Packet classification
- Packet marking
- Congestion management
- Queuing
- Scheduling
- Low latency queueing (LLQ)
- Class-based weighted fair queueing (CBWFQ)
- Congestion avoidance
- Tail drop
- Random early detection
- Weighted random early detection (WRED)
- Modular QoS command-line interface
- QoS design for an enterprise
- Defining the trust boundary
- Defining traffic types
- Assigning bandwidths
- Assessing hardware and assigning classes to queues
- Implementing configurations
- The ingress policy
- The egress policy
- QoS in a hybrid model with service provider WAN
- Summary
- A Systematic Approach to Network Management
- Frameworks related to network management
- Network management planning
- Pillars of network management
- People
- Processes
- Tools and technologies
- The importance of metrics
- Network operations systems components
- Simple Network Management Protocol (SNMP)
- SNMP traps
- SNMP polling
- Syslog
- Network Time Protocol (NTP)
- Controlling device access using RADIUS
- Role-based user access
- IP Service Level Assurance (IP-SLA)
- Management network
- Cisco Prime Infrastructure
- Implementing the network management strategy
- Summary
- Basic Troubleshooting Skills and Techniques
- A framework for structured troubleshooting
- Establishing the normal and detecting deviations
- The network baseline
- Application baseline
- Network troubleshooting commands
- IOS commands
- The ping command
- The traceroute command
- The debug commands
- Troubleshooting the network
- Troubleshooting user connectivity
- Troubleshooting layer 2 issues
- Troubleshooting the first hop connectivity
- Troubleshooting routing issues
- Troubleshooting forwarding plane issues
- Troubleshooting performance issues
- Troubleshooting the management plane
- Troubleshooting device level issues
- Hardware issues
- Software issues
- Summary 更新時間:2021-07-08 10:03:26
推薦閱讀
- DevOps for Networking
- Visual Basic程序設計教程
- 微信公眾平臺開發(fā):從零基礎到ThinkPHP5高性能框架實踐
- HTML5入門經典
- C/C++程序員面試指南
- HTML5秘籍(第2版)
- Java高并發(fā)核心編程(卷1):NIO、Netty、Redis、ZooKeeper
- 0 bug:C/C++商用工程之道
- 輕松上手2D游戲開發(fā):Unity入門
- Advanced Python Programming
- Python預測分析與機器學習
- Android 游戲開發(fā)大全(第二版)
- Learning WordPress REST API
- Python數據預處理技術與實踐
- Java 7 Concurrency Cookbook
- Practical Time Series Analysis
- Web程序設計與架構
- Python High Performance(Second Edition)
- C++程序設計基礎(下)
- Cocos2D權威指南
- Mastering PostCSS for Web Design
- Visual C++2013從入門到精通(視頻教學版)
- Splunk Essentials(Second Edition)
- SolidWorks軟件入門與建模技巧
- HTML5技術與移動出版
- Getting Started with Zurb Foundation 4
- Kotlin Blueprints
- 精通ASP.NET 3.5網絡編程之安全策略
- Building Python Real:Time Applications with Storm
- Node.js權威指南