Wednesday, November 26, 2008

Sample Chapters from Cisco Press

Title: Selecting MPLS VPN Services

Chapter: Implementing Quality of Service
Author: Chris Lewis and Steve Pickavance
Published: February 13, 2006
ISBN: 1587051915

A guide to using and defining MPLS VPN services

  • Analyze strengths and weaknesses of TDM and Layer 2 WAN services
  • Understand the primary business and technical issues when evaluating IP/MPLS VPN offerings
  • Describe the IP addressing, routing, load balancing, convergence, and services capabilities of the IP VPN
  • Develop enterprise quality of service (QoS) policies and implementation guidelines
  • Achieve scalable support for multicast services
  • Learn the benefits and drawbacks of various security and encryption mechanisms
  • Ensure proper use of services and plan for future growth with monitoring and reporting services
  • Provide remote access, Internet access, and extranet connectivity to the VPN supported intranet·Provide a clear and concise set of steps to plan and execute a network migration from existing ATM/Frame Relay/leased line networks to an IP VPN.......



Title: CCIE Security Exam Certification Guide (CCIE Self-Study)

Chapter: Operating Systems and Cisco Security Applications
Author: Henry Benjamin
Published: April 7, 2003
ISBN: 1587200651

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and SNMP
  • Cisco IOS(r) Software specifics, including password security, password recovery, and standard and extended access lists
  • Encryption technologies and security protocols, including TACACS+, RADIUS, and Kerberos Windows and UNIX operating system security issues
  • Cisco security applications, including Cisco PIX(r) Firewall, VPN, IDS, and Cisco Policy Manager
  • Basic security methods and the evolution of new secure networks including packet filtering, proxies, and NAT/PAT
  • Network security policies, vulnerabilities, and protection techniques.......



Title: CCNP Practical Studies: Troubleshooting (CCNP Self-Study)

Chapter: Shooting Trouble with IP
Author: Donna HarringtonPublished: April 4, 2003
ISBN: 1587200570

Gain hands-on experience of CCNP Troubleshooting topics with lab scenarios aligned to the CIT course.

Whether you are seeking practical knowledge to enhance your preparation for the CCNP Troubleshooting exam or you are looking for hands-on experience, CCNP Practical Studies: Troubleshooting (CCNP Self-Study) has what you need to take your skills to the next level.

  • Real-word practice labs for all topics included in the CCNP Troubleshooting exam complement theoretical study materials
  • Guides show you how to set up a test lab
  • Lab scenarios enable readers to test their ability to independently complete a lab
  • Comprehensive appendix lists Cisco equipment resellers




Title: CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide (CCSP Self-Study)

Chapter: Getting Started with the Cisco PIX Firewall
Author: Christian Degu and Greg Bastien
Published: April 2, 2003
ISBN: 1587200678

Official self-study test preparation guide for the Cisco 9E0-111 and 642-521 CSPFA exams.

Coverage of the CSPFA topics enables you to identify and fill your knowledge gaps before the exam date. You'll learn about:

  • The comprehensive line of Cisco PIX Firewall products and the technology and features central to each one
  • Transport protocols, Network Address Translation (NAT), and Port Address Translation (PAT)
  • Using access control lists and URL filtering
  • Use and configuration of group objects
  • Attack guards and intrusion detection
  • Concepts that support failover as well as configuration information
  • Enabling a secure virtual private network (VPN)
  • Using Cisco PIX Device Manager to configure a firewall and to create VPNs



Title: CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study)

Chapter: Configuring Cisco VPN 3000 for Remote Access Using Preshared Keys
Author: John Roland and Mark Newcomb
Published: April 2, 2003
ISBN: 1587200708

Official self-study test preparation guide for the Cisco 9E0-121 and 642-511 CSVPN exams.

Coverage of the CSVPN topics enables you to identify and fill your knowledge gaps before the exam date. You'll learn about:

  • Configuring Cisco VPN 3000 concentrators and VPN 3002 Hardware Clients for remote access Enabling secure VPNs using IPSec technologies
  • Peer authentication using preshared keys and digital certificates
  • Using Network Address Translation (NAT) and Port Address Translation (PAT) over VPNs
  • Administering and monitoring VPN concentrators in remote-access and LAN-to-LAN networks Utilizing IPSec protocols and features
  • Configuring VPN Client personal firewall support through the VPN concentrator
  • Integrated unit and interactive user authentication through the Cisco VPN 3002 Hardware Client



Title: CCNP BSCI Exam Certification Guide (CCNP Self-Study)

Chapter: Using OSPF Across Multiple Areas
Author: Clare Gough
Published: February 11, 2003
ISBN: 1587200783

The official self-study test preparation guide for the Cisco BSCI exam #640-901

Coverage of the CCNP/CCDP/CCIP BSCI exam topics enables you to identify and fill your knowledge gaps before the exam date. You'll learn about:

  • Key routing information including classful and classless routing protocols, distance vector and link-state protocol operation, and the fields of the routing table
  • Extending IP addresses using VLSMs and route summarization and configuring the IP helper address to manage broadcasts
  • Configuring OSPF in a single area and interconnecting multiple OSPF areas
  • Configuring and managing integrated IS-IS, ISO addressing, and Level 1 and 2 area design in IS-IS
  • Configuring EIGRP, how EIGRP supports the use of VLSM and route summarization, and how EIGRP operates in an NBMA environment
  • Configuring and implementing BGP in a scalable network, including how BGP policy-based routing works within an autonomous system, configuring route reflectors, and BGP synchronization
  • Optimizing routing update operation by controlling routing update traffic, configuring route redistribution, and configuring policy-based routing



Title: DWDM Network Designs and Engineering Solutions

Chapter: WDM Network Design -1
Author: Ashwin Gumaste and Tony Antony
Published: December 13, 2002
ISBN: 1587050749

A comprehensive book on DWDM network design and implementation solutions

Design Software Included

  • Study various optical communication principles as well as communication methodologies in an optical fiber
  • Design and evaluate optical components in a DWDM network
  • Learn about the effects of noise in signal propagation, especially from OSNR and BER perspectives
  • Design optical amplifier-based links
  • Learn how to design optical links based on power budget
  • Design optical links based on OSNR
  • Design a real DWDM network with impairment due to OSNR, dispersion, and gain tilt
  • Classify and design DWDM networks based on size and performance
  • Understand and design nodal architectures for different classification of DWDM networks
  • Comprehend different protocols for transport of data over the DWDM layer
  • Learn how to test and measure different parameters in DWDM networks and optical systems



Title: Network Security Principles and Practices (CCIE Professional Development)

Chapter: Secure LAN Switching
Author: Saadat Malik
Published: November 15, 2002
ISBN: 1587050250

Expert solutions for securing network infrastructures and VPNs

  • Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments
  • Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts
  • Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec
  • Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques
  • Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against themControl network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols
  • Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks
  • Identify and resolve common implementation failures by evaluating real-world troubleshooting scenarios



Title: IP Addressing Fundamentals

Chapter: Variable-Length Subnet Masks
Author: Mark Sportack
Published: October 31, 2002
ISBN: 1587050676

The reader-friendly explanation of how the IP address space works and how it is used

  • A reader-friendly introduction to the complex and confusing topic of IP addressing
  • Thorough and understandable explanations of the binary mathematics behind IP addressing
  • Complete coverage of the IPv4 address space without distractions of routing or transport protocols
  • Detailed explanations of subnetting and supernetting, Variable Length Subnet Masks (VLSMs), CIDR, NAT, portable address spaces, and IPv6
  • Strategies for managing an address space for enterprise WANs, data centers, and ISPs
  • Numerous examples and an easy-to-read style of writing that imparts a profound understanding of IP addressing



Title: E-Support: How Cisco Systems Saves Millions While Improving Customer Support

Chapter: Site Architecture
Author: Andrew Connan and Vince Russell
Published: August 26, 2002
ISBN: 158720052X

Cisco's(r) e-support system, known as TAC Web, has benefits for both Cisco and its customers:

  • Customers save time because they don't have to wait on hold
  • Customers are empowered, finding solutions to many of their problems
  • Cisco Systems saves hundreds of millions of dollars in customer-support costs
  • TAC Web content solves over 150,000 customer issues per month that would otherwise have gone to phone-based support






    CLICK HERE TO DOWNLOAD.........



0 Comments:

Post a Comment