Identify, analyze, and resolve current and potential network security problems Learn diagnostic commands, common problems and resolutions, best practices, and case studies covering a wide array of Cisco network security troubleshooting scenarios and products Refer to common problems and resolutions in each chapter to identify and solve chronic issues or expedite escalation of problems to the Cisco TAC/HTTS Flip directly to the techniques you need by following the modular chapter organization Isolate the components of a complex network problem in sequence Master the troubleshooting techniques used by TAC/HTTS security support engineers to isolate problems and resolve them on all four security domains: IDS/IPS, AAA, VPNs, and firewalls With the myriad Cisco(R) security products available today, you need access to a comprehensive source of defensive troubleshooting strategies to protect your enterprise network.
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers.
Reveals the methodology you need to resolve complex problems in an IP telephony network Master troubleshooting techniques and methodologies for all parts of a Cisco IP Telephony solution-Cisco CallManager, IP phones, gateways, applications, and more Learn how to investigate and resolve voice quality problems, including delayed audio, choppy or garbled audio, static and noise, one-way or no-way audio, and echo Read about the variety of trouble-shooting tools at your disposal and how and when to use them based on the problem type Discover the potential causes of common problems and how to efficiently troubleshoot them to resolution Learn how to identify and resolve gateway problems by breaking the components into logical groups and following a methodical troubleshooting approach Use best practices recommendations to build a stronger IP telephony deployment and avoid common mistakes IP telephony represents the future of telecommunications: a converged data and voice infrastructure boasting greater flexibility and more cost-effective scalability than traditional telephony.
The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport.
Smart Applications of Artificial Intelligence and Big Data covers a wide range of topics related to AI and big data, including machine learning, deep learning, natural language processing, computer vision, data analytics, and data mining.
The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI Layered approach is designed to help readers with widely diverse backgrounds quickly learn what they need to know Covers the entire PKI project lifecycle, making complex PKI architectures simple to understand and deploy Brings together theory and practice, including on-the-ground implementers' knowledge, insights, best practices, design choices, and troubleshooting details PKI Uncovered brings together all the techniques IT and security professionals need to apply PKI in any environment, no matter how complex or sophisticated.
Network Security first-step Second Edition Tom Thomas and Donald Stoddard Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy Your first step to network security begins here!
IPv6 for Enterprise Networks The practical guide to deploying IPv6 in campus, WAN/branch, data center, and virtualized environments Shannon McFarland, CCIE(R) No.
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACS AAA solutions are very frequently used by customers to provide secure access to devices and networks AAA solutions are difficult and confusing to implement even though they are almost mandatory Helps IT Pros choose the best identity management protocols and designs for their environments Covers AAA on Cisco routers, switches, access points, and firewalls This is the first complete, authoritative, single-source guide to implementing, configuring, and managing Authentication, Authorization and Accounting (AAA) identity management with CiscoSecure Access Control Server (ACS) 4 and 5.
Using Fibre Channel over Ethernet (FCoE) and related technologies, data centers can consolidate data traffic onto a single network switch, simplifying their environments, promoting virtualization, and substantially reducing power and cooling costs.
Fast answers and reliable solutions for all widely-used Cisco router features - all in one time-saving guide Organized for maximum efficiency: describes actual commands and options in the sequence they should be used Helps network pros eliminate time-consuming documentation searches Extensive updates: IPv6, MPLS, AutoQoS, SIP, MGCP, voice troubleshooting, VPNs, security, and more "e;At-a-glance"e; illustrations offer fast answers and easy double-checking Locating reliable Cisco router configuration command information can require extensive, time-consuming research.
A thorough introduction to the ASR 1000 series router Building Service-Aware Networks is the insider's guide to the next-generation Aggregation Services Router (ASR) 1000.
The definitive guide to UCS and the Cisco(R) Data Center Server: planning, architecture, components, deployment, and benefits With its new Unified Computing System (UCS) family of products, Cisco has introduced a fundamentally new vision for data center computing: one that reduces ownership cost, improves agility, and radically simplifies management.
Cisco Firewalls Concepts, design and deployment for Cisco Stateful Firewall solutions "e; In this book, Alexandre proposes a totally different approach to the important subject of firewalls: Instead of just presenting configuration models, he uses a set of carefully crafted examples to illustrate the theory in action.
Cisco LAN Switching Configuration Handbook Second Edition A concise reference for implementing the most frequently used features of the Cisco Catalyst family of switches Steve McQuerry, CCIE(R) No.
This is the only complete, all-in-one guide to deploying, running, and troubleshooting wireless networks with Cisco(R) Wireless LAN Controllers (WLCs) and Lightweight Access Point Protocol (LWAPP)/Control and Provisioning of Wireless Access Points (CAPWAP).
The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport.
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.
The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI Layered approach is designed to help readers with widely diverse backgrounds quickly learn what they need to know Covers the entire PKI project lifecycle, making complex PKI architectures simple to understand and deploy Brings together theory and practice, including on-the-ground implementers' knowledge, insights, best practices, design choices, and troubleshooting details PKI Uncovered brings together all the techniques IT and security professionals need to apply PKI in any environment, no matter how complex or sophisticated.
Cisco IOS XR Fundamentals is a systematic, authoritative guide to configuring routers with Cisco IOS(R) XR, the next-generation flagship Cisco(R) Internet operating system.
IP Telephony Using CallManager Express Lab Portfolio provides a hands-on approach to learning the basic principles of voice over IP (VoIP) to build a voice-enabled network for the small to medium-sized business.
A guide to building and modifying Tcl scripts to automate network administration tasks Streamline Cisco network administration and save time with Tcl scripting Cisco networking professionals are under relentless pressure to accomplish more, faster, and with fewer resources.
As the cellular world and the Internet converge, mobile networks are transitioning from circuit to packet and the Internet Protocol (IP) is now recognized as the fundamental building block for all next-generation communication networks.
IPv6 Security Protection measures for the next Internet Protocol As the world's networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents.
A comprehensive introduction to all facets of MPLS theory and practice Helps networking professionals choose the suitable MPLS application and design for their network Provides MPLS theory and relates to basic IOS configuration examples The Fundamentals Series from Cisco Press launches the basis to readers for understanding the purpose, application, and management of technologies MPLS has emerged as the new networking layer for service providers throughout the world.
Cisco TelePresence(TM) Systems (CTS) create live, face-to-face meeting experiences, providing a breakthrough virtual conferencing and collaboration experience that transcends anything previously achievable by videoconferencing.