Chapters & Articles

All Articles

Showing 461-480 of 854

Sort by Date | Title

461.
Introduction to the Cisco Gateway Load Balance Protocol (GLBP)
Oct 9, 2013
In this article, networking consultant Sean Wilkins introduces Gateway Load Balancing Protocol (GLBP) and how it operates, along with the main concepts that should be known before attempting to configure it.
462.
Introduction to the Cisco Virtual Router Redundancy Protocol (VRRP)
Sep 25, 2013
In this article, networking consultant Sean Wilkins looks at the Virtual Router Redundancy Protocol (VRRP), describing how it operates and the main concepts that should be known before attempting to configure it.
463.
Introduction to The Hot Standby Router Protocol (HSRP)
Sep 23, 2013
In this article, networking consultant Sean Wilkins introduces HSRP and how it operates, along with the main concepts that should be known before attempting to configure it.
464.
Introduction: A License to Design
By Martin James Duggan
Mar 5, 2023

Design methodology isn’t just focused on technology; an architect or designer also needs to focus on business priorities to bring true value to a solution. Martin J. Duggan, author of CCDE v3 Practice Labs: Preparing for the Cisco Certified Design Expert Lab Exam, explores what you can expect in the CCDE v3 Practice Exam.

465.
Intrusion Detection Systems
Feb 15, 2002
Intrusion Detection Systems (IDSs) are basically burglar alarms for your computer network. Earl Carter shows you that understanding how they operate can enable you to determine if and how you can use an IDS to protect your network.
466.
Intrusion Detection: Cisco IDS Overview
Dec 28, 2001
Cisco Secure IDS is a network-based intrusion detection system that uses a signature database to trigger intrusion alarms.
467.
Intrusion Prevention: Signatures and Actions
May 26, 2006
Attack signatures have been around for long enough that the definition should be universally understood, but that's not the case. Simply put, an IPS signature is any distinctive characteristic that identifies something. Using this definition, all IPS products use signatures of some kind, regardless of what the product descriptions claim. To find something and stop it, you must be able to identify it, and for you to identify it, it must display a distinct characteristic. This chapter introduces you to the concept of signatures.
468.
IoT and Security Standards and Best Practices
By Rik Irons-Mclean, Anthony Sabella, Marcelo Yannuzzi
Jan 14, 2019

In this sample chapter from Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT, the author team raises awareness of what should be considered when planning to secure an IoT system and highlights some of the more robust standards and best practices used today that can help.

469.
IP Access List Security for CCNA Exam #640-607
Apr 19, 2002
Wendell Odom reviews the characteristics and limitations of the distance vector routing protocol RIP as part of the preparation for the CCNA exam #640-607.
470.
IP Network Traffic Plane Security Concepts
Jun 18, 2008
This chapter introduces the concepts of defense in depth and breadth as applied to IP traffic plane security.
471.
IP Routing in the LAN
By Wendell Odom
Feb 13, 2020

In this sample chapter from CCNA 200-301 Official Cert Guide, Volume 1, Wendell Odom discusses the configuration and verification steps related to three methods of routing between VLANs with three major sections: VLAN Routing with Router 802.1Q Trunks, VLAN Routing with Layer 3 Switch SVIs, and VLAN Routing with Layer 3 Switch Routed Ports.

472.
IP Routing on Cisco IOS, IOS XE, and IOS XR: How a Router Works
Jan 2, 2015
This chapter from IP Routing on Cisco IOS, IOS XE, and IOS XR: An Essential Guide to Understanding and Implementing IP Routing Protocols explains how a router performs IP routing and IP packet forwarding between different network segments.
473.
IP Routing Use Cases
Sep 22, 2009
This chapter discusses the capabilities of the Cisco ASR 1000 series router family and then reviews how those strengths can be used to address relevant problems.
474.
IP Telephony Development Tools
May 28, 2004
Kevin Brown describes how the power and flexibility of IP Telephony systems can enhancing the way a company does business.
475.
IPSec Authentication and Authorization Models
Oct 21, 2005
This chapter covers IPSec features and mechanisms that are primarily targeted at the authentication of remote access users. You'll learn about XAUTH, which provides extended authentication for IPSec telecommuters by using authentication schemes such as RADIUS. MODECFG uses a push model to push attributes to the IPSec client.
476.
IPSec Overview Part Five: Security Associations
Feb 22, 2002
Andrew Mason concludes his five-part series on the Cisco implementation of IPSec with a discussion of IPSec security associations.
477.
IPSec Overview Part Four: Internet Key Exchange (IKE)
Feb 22, 2002
In part 4 of his five-part series on the Cisco implementation of IPSec, Andrew Mason describes the Internet Key Exchange (IKE).
478.
IPSec Overview Part One: General IPSec Standards
Feb 22, 2002
In part 1 of a five-part series on the Cisco implementation of IPSec, Andrew Mason delves into the components that make up the IPSec protocol suite.
479.
IPSec Overview Part Three: Cryptographic Technologies
Feb 22, 2002
In part 3 of his five-part series on the Cisco implementation of IPSec, Andrew Mason describes the cryptographic component technologies used in IPSec.
480.
IPSec Overview Part Two: Modes and Transforms
Feb 22, 2002
In part 2 of his five-part series on the Cisco implementation of IPSec, Andrew Mason describes tunnel and transport modes and briefly explains transforms.