Chapters & Articles

All Articles

Showing 21-40 of 854

Sort by Date | Title

Page: < Prev 1 2 3 4 5 Next >

21.
Introduction: A License to Design
By Martin James Duggan
Mar 5, 2023

Design methodology isn’t just focused on technology; an architect or designer also needs to focus on business priorities to bring true value to a solution. Martin J. Duggan, author of CCDE v3 Practice Labs: Preparing for the Cisco Certified Design Expert Lab Exam, explores what you can expect in the CCDE v3 Practice Exam.

22.
Routing Information Protocol (RIPv2)
By Narbik Kocharians
Feb 5, 2023

The Routing Information Protocol (RIP) is a perfect example of a simple distance vector routing protocol that follows all the standard distance vector designs. In this sample chapter from CCIE Enterprise Infrastructure Foundation, 2nd Edition, you will explore the simplicity of RIP configuration, advanced RIP filtering scenarios, and RIP configuration challenges.

23.
Understanding ACI Hardware and Topologies
By Ammar Ahmadi
Jan 4, 2023

ACI is designed to allow small and large enterprises and service providers to build massively scalable data centers using a relatively small number of very flexible topologies. In this sample chapter from CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide, the author team details the topologies with which an ACI fabric can be built or extended.

24.
Workload Optimization
By Matthew Baker, Brandon Beck, Doron Chosnek, Jason McGee, Sean McKeown, Bradley TerEick, Mohit Vaswani
Dec 17, 2022

Workload Optimizer is an analytical decision engine that generates actions that drive the IT environment toward a desired state where workload performance is assured and cost is minimized. In this sample chapter from Cisco Intersight: A Handbook for Intelligent Cloud Operations, you will explore how Workload Optimizer helps applications perform well while simultaneously minimizing cost (in a public cloud) and optimizing resource utilization (on premises) while also complying with workload policies.

25.
Port Channels and vPCs
By Somit Maloo, Iskren Nikolov
Nov 9, 2022

Port Channel technology allows multiple links between two participating devices to be used to forward traffic by using a load-balancing algorithm. vPC (virtual port channel) technology allows multiple devices to form a port channel. In this sample chapter from Cisco Data Center Fundamentals, the authors discuss Ethernet port channels, including port channel modes, port channel compatibility requirements, and port channel load balancing.

26.
Python Functions, Classes, and Modules
By Jason Gooley, Adrian Iliesiu, Chris Jackson, Ashutosh Malegaonkar
Nov 9, 2022

Building Python functions allows for the creation of reusable code and is the first step toward writing object-oriented code. In this sample chapter from Cisco Certified DevNet Associate DEVASC 200-901 Official Cert Guide, you will review working with and building Python functions. It also introduces how Python modules can extend the capabilities of Python and make your job of coding much easier.

27.
Automation
By Stuart Clark, Hazim Dahir, Jason Davis, Quinn Snyder
Sep 24, 2022

This sample chapter from Cisco Certified DevNet Professional DEVCOR 350-901 Official Cert Guide maps to the second part of the Developing Applications Using Cisco Core Platforms and APIs v1.0 (350-901) Exam Blueprint Section 5.0, ''Infrastructure and Automation.''

28.
Firewall Deployment in Routed Mode
By Nazmul Rajib
Sep 24, 2022

You can deploy a Secure Firewall threat defense as a default gateway for your network so that the end users can use the threat defense to communicate with a different subnet or to connect to the Internet. This sample chapter from CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide describes the processes to deploy a threat defense in routed mode.

29.
Security
By Simone Arena, Francisco Sedano Crippa, Nicolas Darchis, Sudha Katgeri
Sep 24, 2022

This sample chapter from Understanding and Troubleshooting Cisco Catalyst 9800 Series Wireless Controllers covers the security aspects of the Catalyst 9800 controller. The biggest aspect revolves around AAA, which is either locally handled by the controller or delegated to an external RADIUS or TACACS server.

30.
Communication Principles
By Cisco Networking Academy
Mar 25, 2022

In this sample chapter from Networking Essentials Companion Guide, you will explore the protocols of network communication and how to troubleshoot problems in your network.

31.
Using APIs
By Constantin Mohorea
Feb 10, 2022

When API load increases due to growth of user requests and application data, hardware requirements increase as well. In this sample chapter from Cisco DevNet Professional DEVCOR 350-901 Study Guide, you will explore application optimization through HTTP caching, HTTP condition requests, caching controls, and HTTP data compression.

32.
Initial Configuration Settings on the Cisco Expressway
By Thomas Arneson, Jason Ball
Jan 25, 2022

In this sample chapter from CCNP Collaboration Cloud and Edge Solutions CLCEI 300-820 Official Cert Guide, you will explore protocol interworking on the Cisco Expressway. It covers both the H.323 and SIP settings and includes interworking on the Expressway. You will also confirm these settings with the verification of registration.

33.
Clocks, Time Error, and Noise
By Shahid Ajmeri, Dennis Hagarty, Anshul Tanwar
Jan 8, 2022

In the world of electronics, the term clock refers to a microchip that generates a clock signal, which is used to regulate the timing and speed of the components on a circuit board. This sample chapter from Synchronizing 5G Mobile Networks explains the different metrics used to quantify time error and how to measure them.

34.
Linux Storage, Security, and Networks
By Khaled Abuelenain, Jeff Doyle, Vinit Jain, Anton Karneliuk
Jan 8, 2022

Many network engineers struggle with concepts such as what mounting a volume means and the relationship between physical and logical volumes. This sample chapter from Network Programmability and Automation Fundamentals covers everything you need to know about storage to effectively manage a Linux-based environment, whether it is your development environment or the underlying Linux system on which a network operating system is based, such as IOS XR and NX-OS.

35.
Using Data from Your Network
By Ivo Pinto
Nov 20, 2021

In this sample chapter from Network Automation Made Easy, you will learn data preparation and visualization techniques to derive value from data collected on enterprise networks.

36.
Web Authentication
By Katherine McNamara, Aaron Woland
Feb 25, 2021

There are a number of reasons that a company may choose to implement a WebAuth strategy. In this sample chapter from CCNP Security Identity Management SISE 300-715 Official Cert Guide, you will learn how to configure Centralized Web Authentication, build CWA authorization rules, and verify Centralized Web Authentication.

37.
VMM Integration
By Sadiq Memon, Joseph Ristaino, Carlo Schmidt
Feb 2, 2021

In this sample chapter from ACI Advanced Monitoring and Troubleshooting, you will learn about Virtual Machine Manager (VMM) and its integration into Cisco Application Centric Infrastructure (ACI).

38.
Challenges in the Security Operations Center (SOC)
By Omar Santos
Jan 11, 2021

In this sample chapter from Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide, you will learn how attackers obtain stealth access and the tricks used to negatively impact detection and forensic technologies.

39.
Network Automation
By Patrick Gargano
Dec 20, 2020

In this sample chapter from 31 Days Before Your CCNP and CCIE Enterprise Core Exam, you will review network configuration management tools such as Puppet, Chef, Ansible, and SaltStack.

40.
Security Through Network Fundamentals
By Brett Hall, Nik Smith
Dec 5, 2020

In this sample chapter from Practical Cisco Unified Communications Security, you will explore the dependencies that Unified Communications (UC) systems have on a network while also highlighting the security features that can be implemented to provide additional security to the UC environment.

Page: < Prev 1 2 3 4 5 Next >