621. | - An Overview of the syslog Protocol
- Dec 1, 2005
- This chapter presents an overview of the syslog protocol and shows you how to deploy an end-to-end syslog system. You'll learn about the syslog architecture as well as the issues in deploying syslog servers in Linux and Windows OSs with a focus on their relevance in a Cisco environment.
|
622. | - Cisco 802.11 Wireless Networking: Installing and Configuring Access Points
- Dec 1, 2005
- The largest hurdle toward getting your wireless LAN (WLAN) up and running is the configuration of your access points (APs) and wireless clients. This chapter examines how to install and configure the AP.
|
623. | - Corporate Governance, Business Continuity Planning, and Disaster Recovery
- Dec 1, 2005
- To protect business stakeholders, corporate governance focuses a sharp eye on all measures and systems within the organization to ensure compliance with laws, regulations, and standards. Michelle Johnston Sollicito points out the many required aspects of a proper business continuity plan and shows you where to look for holes in your process.
|
624. | - CCNP Self-Study: Understanding and Configuring Multilayer Switching
- Nov 11, 2005
- This chapter provides you with details, architecture, and methods of multilayer switching on Catalyst switches. An understanding of multilayer switching is necessary for network designers, administrators, and operators for deployment and troubleshooting purposes.
|
625. | - Cisco ASA and PIX Firewall Logging
- By
David Hucaby
- Nov 4, 2005
- Cisco firewalls and security appliances can be configured to generate an audit trail of messages describing their activities. Firewall logs can be collected and analyzed to determine what types of traffic have been permitted or denied, what users have accessed various resources, and so on. This chapter presents the tasks that are necessary to begin generating and collecting logging messages.
|
626. | - CCIE Self-Study: Security Protocols
- Oct 28, 2005
- This chapter covers some of today's most widely used technologies that enable network administrators to ensure that sensitive data is secure from unauthorized sources. Standards such as IP Security (IPSec) and encryption standards are covered, as are all the fundamental foundation topics you need to understand to master the topics covered in the CCIE Security written exam.
|
627. | - IPSec Authentication and Authorization Models
- Oct 21, 2005
- This chapter covers IPSec features and mechanisms that are primarily targeted at the authentication of remote access users. You'll learn about XAUTH, which provides extended authentication for IPSec telecommuters by using authentication schemes such as RADIUS. MODECFG uses a push model to push attributes to the IPSec client.
|
628. | - Deploying Cisco CallManager and Unity Devices
- Oct 14, 2005
- This chapter covers all the required tasks needed to add phones and gateways to a Cisco CallManager system. Four methods to add phones to the system are discussed: manual registration, Auto-registration, BAT, and TAPS.
|
629. | - ADS Technologies NAS Kit Puts Network Attached Storage In Reach of Ordinary Users
- Oct 6, 2005
- Can a mere mortal -- a software guy, even -- accomplish Network Attached Storage on the cheap? The happy answer is, "Sure thing!" Blake Watson walks you through the process with the ADS Technologies NAS Drive Kit.
|
630. | - Analyzing MPLS VPN Security
- Oct 6, 2005
- VPN users have certain expectations and requirements for their VPN service. In a nutshell, they want their service to be both private and secure. In other words, they want their VPN to be as secure as with dedicated circuits while gaining the scalability benefits of a shared infrastructure. Both concepts, of privacy and security, are not black and white, and need to be defined for a real world implementation. This chapter introduces you to VPN MPLS security requirements.
|
631. | - Two-Factor Authentication in Windows
- Oct 6, 2005
- Simple passwords aren't good enough any more, as the flood of stories about phishing, fraud, and compromised accounts by the millions demonstrate. The Next Big Thing in computer security is two-factor authentication and, like it or not, you're probably going to be dealing with it in the next year or so. But two-factor authentication is a concept, not a product, and how it's implemented is critical to its success.
|
632. | - Choosing an Optimal Location for Your Data Center
- Sep 30, 2005
- When a company buys new land, it is important to consider the property's suitability to house a server environment. Failing to do so often means having to spend more on Data Center infrastructure, either to add what's missing or to overcome shortcomings on the site. The most desirable type of location is one that supports the Data Center's mission to safeguard server equipment and accommodate growth and change. This chapter will help you assess your server site for suitability.
|
633. | - Which Routing Protocol Should My Network Use?
- Sep 30, 2005
- One of the toughest questions facing network engineers is which routing protocol to use. Each has its strengths, and each works better with some network designs than with others. This chapter will help you decide which routing protocol is best for your particular network.
|
634. | - Introducing Cisco Unified Communications System Fundamentals
- Sep 16, 2005
- This chapter introduces the Cisco unified communications system. To administer Cisco Unity and Cisco PA efficiently and effectively, it is important to have an understanding of the environment they inhabit and operate within. Understanding how calls route through the systems and what you can do with them as they travel is crucial to your ability to administer a Cisco unified communications system.
|
635. | - Improve Your Network's Security Using Network Admission Control
- Aug 26, 2005
- Is there a place for security focused on the good guys in networking? There is, and one of the latest additions to this area of security is called Network Admission Control (NAC). Sean Convery introduces NAC, a security measure built around the idea that asking specific questions of an organization's end hosts can improve the overall security of a network by improving the compliance of end systems to a given admission policy.
|
636. | - Deploying Secure Internet Connectivity with Cisco ASA and PIX Firewalls
- Aug 5, 2005
- This chapter provides you with the necessary information to use the ASDM Startup Wizard to perform the initial configuration of your network. It provides a step-by-step procedure explaining how to use the ASDM Startup Wizard to set up the initial configuration for your ASA/PIX Security Appliance.
|
637. | - Understanding Cisco Security Agent Components and Installation
- Jul 29, 2005
- In this chapter, you will continue to gain an understanding of the CSA architecture through an exploration of the agent software components, protocol communication, and installation.
|
638. | - Interexchange Carrier MPLS Network Design Study
- Jul 22, 2005
- USCom is a fictitious nationwide data and long-distance voice service provider in the U.S. This chapter discusses the current USCom MPLS network design, its evolution, and how USCom characteristics and objectives influenced the corresponding design decisions that were made in order to illustrate how design decisions should stem from the characteristics of your company.
|
639. | - Cisco CallManager Express VoIP Call Processing Features
- Jul 15, 2005
- In this chapter, you'll read about some of the more popular Cisco CME phone and call processing features. You will see examples of how these features can be configured and combined to provide a rich and flexible set of functions. You will also see how to configure call transfer and forwarding functions in a variety of network scenarios.
|
640. | - Mobile IP Technology and Applications
- Jul 8, 2005
- This chapter highlights the major concepts of IOS Mobile IP configuration in a simple lab topology. It presents in detail the most important concepts in IOS Mobile IP configuration. We start out by using six routers to examine each component individually. Several alternatives requiring fewer routers are presented at the end of the chapter.
|