Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover 
Cisco®
About the Authors About the Technical Reviewer Title Page Copyright Page Dedication At a Glance Contents  Acknowledgments Introduction Who Should Read This Book What This Book Covers How to Read This Book Part I: Cisco Overview
Chapter 1: Cisco and the Internet Internetworking Cisco’s Position in the Computer Industry The Internet Landscape Internetworking’s Five Major Device Types Basic Internetwork Topologies Internetwork Players Internetworking Protocols Routing vs. Switching Other Internetworking Trends Cisco’s Offerings Competition Who Wants to Be a Millionaire? Cisco Solutions Cisco Innovation Chapter 2: Networking Primer Bits and Bytes How Computers Understand Data OSI Reference Model The Seven-Layer Stack OSI Implementation by Layer Network Technologies Ethernet Gigabit, 10 Gigabit, 40 Gigabit, and 100 Gigabit Ethernet Wireless WAN Technologies Dial-in Technologies WAN Trunk Technologies TCP/IP TCP/IP Messaging The Transport Layer IP Addressing The IP Address Format IP Address Classes Private Addressing Subnetting IP Version 6 Putting It All Together Chapter 3: Cisco Certifications Certifications Overview Career Certifications and Paths Entry Level Associate Professional Expert Architect Specialist Certification Tracks Routing and Switching Design Network Security Wireless Voice Service Provider Service Provider Operations Technician Certifications CCT Routing & Switching CCT Data Center CCT TelePresence Specialist Certifications Collaboration Certifications Data Center Certifications Operating System Software (Cisco IOS XR Specialist) Security Certifications Video Certifications Where to Get Help Websites Classes
Part II: Cisco Internetworking Tools
Chapter 4: Routing Overview How Routers Work Routing for Efficiency Routers and the Internet Optical Routers IOS: The Internetwork Operating System Router Security Router Administrative Security Router Network Security Router Passwords Chapter 5: Routing Platforms Router Hardware Router Memory Router Ports and Modules Cisco Router Models Essential Files Communicating with IOS Meet IOS 12.4T (A.K.A. the “OLD” IOS) IP Mobility Meet IOS Release 15 (A.K.A. the “New” IOS) Meet NX-OS Meet IOS XR Using IOS Commands Overview of Router Modes The Configuration File’s Central Role Chapter 6: Configuring Routing Communicating with a Router The Console Port The Auxiliary Port SSH/Telnet The HTTP Server User Interface Essential Router Commands Password Recovery Recovering Enable Passwords Recovering Passwords from Older Cisco Routers Step-by-Step Router Configuration Setup Mode Giving a Router an Identity Examining Device Status Cisco Discovery Protocol Changes in IOS from Release 12.4 to Release 15 Using Applications to Help Configure Routers Cisco Configuration Professional What’s Next Chapter 7: Switches Network Topologies The Importance of Network Domains Cabling Defines Network Speed and Distance Cisco Switches How an Individual Switch Works Switched Networking Basics Designing Switched Internetworks VLANs SmartOperations Cisco’s Switched Network Products Configuring and Managing Cisco Switches Cisco Network Assistant Features Installation Views Interaction Communities Using CNA Chapter 8: Security Overview Overview of Network Security Traffic-Based Security User-Based Security Authentication, Authorization, and Accounting Overview of the AAA Model How AAA Works Dynamic Access Lists Lock-and-Key Using a Local User Database Best Practices Reviewing Logs Securing Protocols Physical Security Keep Current on Your Devices Chapter 9: Access Control Cisco SecureX Architecture Overview Cisco SecureX Framework Identity Management Cisco TrustSec Cisco Secure Access Control Server (ACS) Cisco Network Admission Control (NAC) Identity Services Engine (ISE) The Access Lists Network Address Translation Virtual Private Networks What Composes a VPN? Cisco’s Solution Digging a Tunnel Summary Chapter 10: Security Appliances Firewalls Firewall Basics How Firewalls Work The IOS Firewall Feature Set ASA Firewall OS’s Adaptive Security Algorithm ASA OS 9 Adaptive Security Appliances Access Routers Overview Models Cisco Cloud Web Security How Cisco Cloud Web Security Works Example of Cisco Cloud Web Security Cisco Security Manager Integrated Services Router The Right Tool for the Right Job Models Specialized Modules Firewall Services Module and ASA Service Modules Cisco Wireless Service Module (WiSM2) Intrusion Prevention System Summary Chapter 11: Cisco Unified Wireless Introduction to Wireless Networking The Roots of Wireless Networking Benefits WLANs How They Work Architecture Technologies Cisco Wireless Networking Philosophy Cisco’s Offerings Access Point Configuration Site Survey AP Placement Interference Initial Autonomous AP Settings Security Antenna Placement Summary
Part III: Cisco Business Solutions
Chapter 12: Cisco VoIP VoIP Introduction to VoIP Building VoIP Networks H.323 SIP SCCP Implementation Cisco Unified Communications Cisco Unified Communications Manager Cisco Business Edition IP Phones Cisco Unified Communications Gateways TelePresence Collaborations Summary Chapter 13: Data Center and Virtualization Storage Area Networks Storage Needs Fibre Channel Other SAN Protocols Designing and Building a SAN Cisco MDS Switches and Directors Technologies Hardware Software Private Cloud Cisco Unified Computing System Cisco Intelligent Automation for Cloud Chapter 14: Cisco Content Networking and Video Solutions Content Delivery Networks Meet the CDN Cisco’s Solution ACNS Wide Area Application Engine Cisco Wide Area File System Caching Web Cache Communication Protocol Freshness Content Engine Caching Video Video Entertainment Video Collaboration Video Intelligence
Part IV: Designing Cisco Networks
Chapter 15: Routing Protocols Overview of Routing Protocols Routing Protocol Basics Routing Protocol Architectures How Routing Protocols Are Implemented Overview of Cisco Routing Protocols Cisco’s Interior Gateway Routing Protocol Configuring RIP 2 Configuring Open Shortest Path First Border Gateway Protocol Multiprotocol Label Switching Cisco’s Routing Protocol Strategy Chapter 16: Network Management Overview of Network Management The Evolution of Management Tools Network Management Tools Today Trends in Enterprise System Management SNMP Is IP’s Common Management Platform What Is SNMP? SNMP Polling and Managed Objects The MIB Polling Groups and Data Aggregation SNMP Commands Thresholds Events and Traps RMON: Hardware Probes for Switched Networks NetFlow: Software Traffic Flow-Recording Cisco’s SNMP and RMON Implementations Cisco Prime Infrastructure Cisco Network Assistant Features Installation Views Interaction Communities Using CNA Summary Chapter 17: Network Design Process Internetwork Design Basics Internetworking Basics Reviewed The Three-Layer Hierarchical Design Model Design Methods Designing to Fit Needs Understanding Existing Internetworks Characterizing Networks Cisco Network Designs Logical Network Design Campus Network Designs Chapter 18: Troubleshooting Cisco Networks The Mechanics of Network Troubleshooting Network Troubleshooting Methods Troubleshooting Host IP Configuration Isolating Connectivity Problems Troubleshooting WAN Links Client-Server VPNs Troubleshooting Cisco Hardware Inspecting Devices The Reboot Test Troubleshooting Network Configurations Wireless Networks Troubleshooting Network Performance
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion