Chapters & Articles

All Articles

Showing 361-380 of 854

Sort by Date | Title

361.
External Routing with ACI
By Frank Dagenhardt, Bill Dufresne, Jose Moreno
Jan 9, 2019

In this sample chapter from Deploying ACI: The complete guide to planning, configuring, and managing Application Centric Infrastructure, learn how to enable Layer 3 communication and integrate with routing protocols you may already be using in your environment.

362.
Fiber Optics: Cisco CCENT ICND1 100-101 Complete Video Course
Nov 20, 2013
This video distinguishes between multimode and single mode fiber optics and gets into the science of how light waves are carried within a fiber strand to help you prepare for the ICND1 100-101 exam.
363.
Fiber-Optic Technologies
Apr 23, 2004
Vivek Alwayn discusses in this chapter the increasing demand of optical-fiber and its wide spread applications ranging from global networks to desktop computers.
364.
Fibre Channel Products for SANs
Jun 28, 2002
To build a successful SAN that fulfills all or most of the business requirements of a corporation, each device must be chosen with care and understanding. This sample chapter discusses the most popular Fibre Channel options.
365.
Firesheep, Fireshepherd, and Facebook: Understanding Session Hijacking
Feb 22, 2011
Mike Chapple shows you how web authentication makes session hijacking possible, how Firesheep exploits these vulnerabilities, and the measures that website administrators, web developers, and end users can take to protect against session hijacking attacks.
366.
Firewall Deployment in Routed Mode
By Nazmul Rajib
Sep 24, 2022

You can deploy a Secure Firewall threat defense as a default gateway for your network so that the end users can use the threat defense to communicate with a different subnet or to connect to the Internet. This sample chapter from CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide describes the processes to deploy a threat defense in routed mode.

367.
Five (or Six) Things That Will Make You a DHCP Wizard
Nov 17, 2015
You're probably using the Dynamic Host Configuration Protocol (DHCP) right now, as you read this article. Surprised? Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, explains what you need to know about the use of DHCP in modern communications.
368.
Five Applications to Secure Your Wi-Fi Hotspot Connections
May 13, 2010
Don't risk eavesdroppers capturing your email, passwords, and other sensitive info! Eric Geier reviews five helpful apps that encrypt your wireless traffic.
369.
Five Crucial Commands for Verifying Cisco Switch Network Status and Operational State
Aug 11, 2015
A network engineer needs to be conscious of the state of the network and every device connected to it. But when your network consists of multiple devices connected at a distance, how can you test connections and keep on top of network performance? Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, discusses five basic commands you need to know and use correctly to maintain your Cisco network.
370.
Five Ways to Increase Your Wi-Fi Network's Range
May 15, 2009
Eric Geier shows ways to extend your wireless network, from things you can do without spending a dime to adding additional APs.
371.
Flexible Netflow Concepts and Configuration
Jul 22, 2011
This article takes a look at the typical uses for the Flexible Netflow feature, how it works and how it can be configured into a complete solution.
372.
Frame Relay for ICND Exam
Aug 29, 2003
Wendell Odom tells you what you need to know to ace the Frame Relay portion of the ICND Exam. In this sample chapter, he concentrates on Frame Relay protocols and configuration.
373.
FTD on ASA 5500-X Series Hardware
Jul 3, 2018

In this sample chapter from Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall, Next-Generation Intrusion Prevention System, and Advanced Malware Protection, review the steps required to reimage and troubleshoot any Cisco ASA 5500-X Series hardware.

374.
Functional Deployment Models and Call Flows for Cisco Unified Customer Voice Portal
Jan 3, 2012
This chapter discusses some of Cisco Unified Customer Voice Portal's well-defined and commonly referenced functional deployment models.
375.
Fundamental EIGRP Concepts
Nov 26, 2014
This chapter from CCNP Routing and Switching ROUTE 300-101 Official Cert Guide covers EIGRP fundamentals, EIGRP neighborships, and neighborships over WANs.
376.
Fundamentals of IP for the CCNA INTRO Exam #640-821
Sep 12, 2003
Learn about the core concepts behind OSI Layer 3 and the main Layer 3 protocol used by TCP/IP to help you on the CCNA INTRO Exam.
377.
General Design Considerations for Secure Networks
Jun 18, 2004
378.
Getting Familiar with Cisco Secure Access Control Server
Dec 3, 2004
This chapter covers the basics of the Cisco Secure Access Control Server interface, and familiarizes you with the very simplest of actions in this medium.
379.
Getting Owned: The USB Keystroke Injection Attack
Oct 6, 2010
What do you call a USB-based device that can bypass all AV and autorun policies? Although most would consider it a perfect mischievous attack vector, Hyundai has used it as a tool to build customer loyalty. This leaves Seth Fogie wondering: Are people are planning to maliciously use this technology?
380.
Getting Started with NetDevOps
By Ivo Pinto, Faisal Chaudhry
Dec 24, 2023

In this sample chapter from Automating and Orchestrating Networks with NetDevOps, you will explore main use cases for NetDevOps applications compared with traditional methods. You will gain insights into the decision-making processes, tooling choices, and required skills; and navigate common challenges and lessons learned.