Cisco Router Configuration Handbook

Author: David Hucaby,Steve McQuerry,Andrew Whitaker

Publisher: Pearson Education

ISBN: 9781587141188

Category: Computers

Page: 672

View: 1021

DOWNLOAD NOW »

Fast answers and reliable solutions for all widely-used Cisco router features - all in one time-saving guide Organized for maximum efficiency: describes actual commands and options in the sequence they should be used Helps network pros eliminate time-consuming documentation searches Extensive updates: IPv6, MPLS, AutoQoS, SIP, MGCP, voice troubleshooting, VPNs, security, and more "At-a-glance" illustrations offer fast answers and easy double-checking Locating reliable Cisco router configuration command information can require extensive, time-consuming research. Cisco Router Configuration Handbook, 2/e, is the solution: a day-to-day reference to the most widely used Cisco router features and configurations. Straight from Cisco experts, it covers every facet of router configuration, including fundamentals, network protocols, packet processing, voice/telephony, security, and more. This book is organized for maximum efficiency. Related features are covered together, and features and options are covered in the sequence in which they are typically used. Shaded tabs mark each section for quick reference. Information on each feature, technology, or protocol is presented in a concise one- or two-page format, with sections presenting quick facts, configuration information, and step-by-step examples, including both required and optional commands. Simply put, this book brings together all the Cisco routing configuration information most network professionals will ever need - and organizes it more efficiently than any other resource.
Release

42 Rules for Growing Enterprise Revenue (2nd Edition)

Author: Lilia Shirman

Publisher: Happy About

ISBN: 1607730006

Category: Corporations

Page: 130

View: 5245

DOWNLOAD NOW »

Marketing, sales, and business development executives face constant pressure to boost revenue. This book is a brainstorming tool meant to provoke discussion and creativity within executive teams who are looking to boost their top line numbers. '42 Rules for Growing Enterprise Revenue' is based on two concepts: No effective effort to grow a company is ever contained within a single function There is no silver bullet -- you have to keep trying new things and making bets So, this isn't a marketing or sales book; it doesn't focus on a single idea or framework. Instead, it discusses many different ways that companies have succeeded in boosting sales. This collection of practical ideas about the strategies that raise sales combines Lilia Shirman's observations from almost 20 years of experience in marketing, business development, strategic alliance management and operations with stories and lessons from other technology business leaders. The rules cover a broad spectrum of concepts, including: Laying the foundation for growth New market entry Sales enablement Solutions Industry specialization Demonstrating value Some rules are reminders of the things you know you "should do" but never implemented. Others might spark new ideas, or inspire different approaches to old ones. A few are warnings about the roadblocks you'll want to avoid. All are practical, concise, and actionable.
Release

Mastering Python Networking

Your one-stop solution to using Python for network automation, DevOps, and Test-Driven Development, 2nd Edition

Author: Eric Chou

Publisher: Packt Publishing Ltd

ISBN: 1789130263

Category: Computers

Page: 466

View: 1405

DOWNLOAD NOW »

Master the art of using Python for a diverse range of network engineering tasks Key Features Explore the power of Python libraries to tackle difficult network problems efficiently and effectively Use Python for network device automation, DevOps, and software-defined networking Become an expert in implementing advanced network-related tasks with Python Book Description Networks in your infrastructure set the foundation for how your application can be deployed, maintained, and serviced. Python is the ideal language for network engineers to explore tools that were previously available to systems engineers and application developers. In this second edition of Mastering Python Networking, you’ll embark on a Python-based journey to transition from traditional network engineers to network developers ready for the next-generation of networks. This book begins by reviewing the basics of Python and teaches you how Python can interact with both legacy and API-enabled network devices. As you make your way through the chapters, you will then learn to leverage high-level Python packages and frameworks to perform network engineering tasks for automation, monitoring, management, and enhanced security. In the concluding chapters, you will use Jenkins for continuous network integration as well as testing tools to verify your network. By the end of this book, you will be able to perform all networking tasks with ease using Python. What you will learn Use Python libraries to interact with your network Integrate Ansible 2.5 using Python to control Cisco, Juniper, and Arista eAPI network devices Leverage existing frameworks to construct high-level APIs Learn how to build virtual networks in the AWS Cloud Understand how Jenkins can be used to automatically deploy changes in your network Use PyTest and Unittest for Test-Driven Network Development Who this book is for Mastering Python Networking is for network engineers and programmers who want to use Python for networking. Basic familiarity with Python programming and networking-related concepts such as Transmission Control Protocol/Internet Protocol (TCP/IP) will be useful.
Release

Cisco ISE for BYOD and Secure Unified Access

Author: Aaron Woland,Jamey Heary

Publisher: Cisco Press

ISBN: 9781587144738

Category: Computers

Page: 912

View: 6301

DOWNLOAD NOW »

Fully updated: The complete guide to Cisco Identity Services Engine solutions Using Cisco Secure Access Architecture and Cisco Identity Services Engine, you can secure and gain control of access to your networks in a Bring Your Own Device (BYOD) world. This second edition of Cisco ISE for BYOD and Secure Unified Accesscontains more than eight brand-new chapters as well as extensively updated coverage of all the previous topics in the first edition book to reflect the latest technologies, features, and best practices of the ISE solution. It begins by reviewing today''s business case for identity solutions. Next, you walk through ISE foundational topics and ISE design. Then you explore how to build an access security policy using the building blocks of ISE. Next are the in-depth and advanced ISE configuration sections, followed by the troubleshooting and monitoring chapters. Finally, we go in depth on the new TACACS+ device administration solution that is new to ISE and to this second edition. With this book, you will gain an understanding of ISE configuration, such as identifying users, devices, and security posture; learn about Cisco Secure Access solutions; and master advanced techniques for securing access to networks, from dynamic segmentation to guest access and everything in between. Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors offer in-depth coverage of the complete lifecycle for all relevant ISE solutions, making this book a cornerstone resource whether you''re an architect, engineer, operator, or IT manager. � Review evolving security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT � Understand Cisco Secure Access, the Identity Services Engine (ISE), and the building blocks of complete solutions � Design an ISE-enabled network, plan/distribute ISE functions, and prepare for rollout � Build context-aware security policies for network access, devices, accounting, and audit � Configure device profiles, visibility, endpoint posture assessments, and guest services � Implement secure guest lifecycle management, from WebAuth to sponsored guest access � Configure ISE, network access devices, and supplicants, step by step � Apply best practices to avoid the pitfalls of BYOD secure access � Set up efficient distributed ISE deployments � Provide remote access VPNs with ASA and Cisco ISE � Simplify administration with self-service onboarding and registration � Deploy security group access with Cisco TrustSec � Prepare for high availability and disaster scenarios � Implement passive identities via ISE-PIC and EZ Connect � Implement TACACS+ using ISE � Monitor, maintain, and troubleshoot ISE and your entire Secure Access system � Administer device AAA with Cisco IOS, WLC, and Nexus
Release