万本电子书0元读

万本电子书0元读

顶部广告

Implementing Cisco Networking Solutions电子书

售       价:¥

6人正在读 | 0人评论 9.8

作       者:Harpreet Singh

出  版  社:Packt Publishing

出版时间:2017-09-29

字       数:57.0万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Learn the art of designing, implementing, and managing Cisco's networking solutions on datacenters, wirelessly, security and mobility to set up an Enterprise network. About This Book ? Implement Cisco's networking solutions on datacenters and wirelessly, Cloud, Security, and Mobility ? Leverage Cisco IOS to manage network infrastructures. ? A practical guide that will show how to troubleshoot common issues on the network. Who This Book Is For This book is targeted at network designers and IT engineers who are involved in designing, configuring, and operating enterprise networks, and are in taking decisions to make the necessary network changes to meet newer business needs such as evaluating new technology choices, enterprise growth, and adding new services on the network. The reader is expected to have a general understanding of the fundamentals of networking, including the OSI stack and IP addressing. What You Will Learn ? Understand the network lifecycle approach ? Get to know what makes a good network design ? Design components and technology choices at various places in the network (PINS) ? Work on sample configurations for network devices in the LAN/ WAN/ DC, and the wireless domain ? Get familiar with the configurations and best practices for securing the network ? Explore best practices for network operations In Detail Most enterprises use Cisco networking equipment to design and implement their networks. However, some networks outperform networks in other enterprises in terms of performance and meeting new business demands, because they were designed with a visionary approach. The book starts by describing the various stages in the network lifecycle and covers the plan, build, and operate phases. It covers topics that will help network engineers capture requirements, choose the right technology, design and implement the network, and finally manage and operate the network. It divides the overall network into its constituents depending upon functionality, and describe the technologies used and the design considerations for each functional area. The areas covered include the campus wired network, wireless access network, WAN choices, datacenter technologies, and security technologies. It also discusses the need to identify business-critical applications on the network, and how to prioritize these applications by deploying QoS on the network. Each topic provides the technology choices, and the scenario, involved in choosing each technology, and provides configuration guidelines for configuring and implementing solutions in enterprise networks. Style and approach A step-by-step practical guide that ensures you implement Cisco solutions such as enterprise networks, cloud, and data centers, on small-to-large organizations.
目录展开

Title Page

Copyright

Implementing Cisco Networking Solutions

Credits

About the Author

About the Reviewer

www.PacktPub.com

Why subscribe?

Customer Feedback

Dedication

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Downloading the example code

Downloading the color images of this book

Errata

Piracy

Questions

Network Building Essentials

Introduction to networks

The OSI model and the TCP/IP stack

Basic OSI reference model

Layer 1 - The physical layer

Layer 2 - The data link layer

Layer 3 - The network layer

Layer 4 - The transport layer

Layer 5 - The session layer

Layer 6 - The presentation layer

Layer 7 - The application layer

The TCP/IP model

Internet Protocol (IP)

Transmission Control Protocol (TCP)

User Datagram Protocol (UDP)

IP version 6

Building a network

Purpose of networks

Network lifecycle

Advantages of network lifecycle approach

Prepare phase

Plan phase

Design phase

Implement phase

Operate phase

Optimize phase

Summary

Networks for Digital Enterprises

The impact of technology on business

Digitization as the key enabler

A digital-ready infrastructure

Enabling technologies

Input/output systems

IoT systems

Network

Software-defined networking

Network function virtualization

Network programmability

Processing centres

Edge computing

Cloud computing

Analytics

Network as the cornerstone

Network enabling new experiences

Network providing new Insights

Facets of a digital infrastructure

Functionality

Resiliency

Modularity

Flexibility

Scalability

Security

Agility

Manageability

Visibility and analytics

Cisco Digital Network Architecture

Summary

Components of the Enterprise Network

Networking devices and their functions

Switches

Wireless Access Points

Routers

Firewalls

Introduction to Cisco IOS

IOS command modes

Configuration files

Places in the network

Campus network

Wide Area Network (WAN)

Data center

Internet edge

Interdependency between the various components

Summary

Understanding and Configuring Campus Network Technologies

Campus network technologies

Layer 2 technologies

Ethernet

Ethernet switch and MAC-based forwarding

Virtual LANs

Access ports and trunk ports

Spanning Tree Protocols

Link aggregation

Address Resolution Protocol (ARP)

Configuring layer 2 protocols

Layer 3 technologies

IP addressing

IPv4 addresses

Routable and private addresses

Sample addressing

Configuring IP addresses

A note about WAN addresses

Secondary addresses

First Hop Redundancy Protocols (FHRP)

HSRP

VRRP

GLBP

Routing protocols

Routing table

Static routing

Dynamic routing

Distance vector routing

Link-state routing

External routing

Route redistribution

Routing table segmentation

Campus LAN design considerations

Topology choices

Ring and star topologies

Physical versus logical topology

Naming convention

Layer 2 versus layer 3 boundaries

Sizing the campus network

Stacking switches

A sample network

Summary

Understanding and Configuring Wireless Access Technologies

Benefits of wireless networks

Wireless fundamentals

An RF signal

Signal strength

Modulation

Signal to Noise Ratio (SNR)

Frequency bands

Channels

MIMO

Channel bonding

Antenna characteristics

Wireless standards

IEEE 802.11

IEEE 802.11a

IEEE 802.11b

IEEE 802.11g

IEEE 802.11n

IEEE 802.11ac

Mixed mode operation/interoperability

Configuring the WLAN

Cisco mobility express

Wireless LAN controller and CAPWAP

Configuring AP using Cisco Mobility Express

Configuration using the WLC

WLC redundancy

HA stateful switchover

Configuring the WLC deployment

FlexConnect mode

Configuring the APs in FlexConnect mode

Summary

Understanding and Configuring WAN Technologies

Considerations for a WAN design

WAN technology choices

Configuring WAN serial links

Serial links with PPP/HDLC encapsulation

FR encapsulation

Multilink PPP

Configuring overlay P2P links

Virtual private networks

Layer 2 VPNs

Layer 3 VPNs

VRF-Lite

Remote access VPNs

Managed versus unmanaged services

Connecting to the internet

Routing at the internet edge

Static routing

BGP

Encrypting and securing the WAN

Optimizing the WAN

Summary

Understanding and Configuring Data Center Technologies

Functions of a data center

Evolution of the DC

Network

Computers

Virtualization

Storage

Cloud computing

Management systems

Design of a DC

Application hierarchy

Zoning of the data center

Types of networks in a DC

Introduction to firewalls

Firewall inspection

Basic access control

Protecting from IP fragments

Application inspection

Applying connection limits and TCP normalization

Enabling threat detection

Firewall security context

Scaling the firewall

Connecting the DC to the internet

Network Address Translation

Designing a sample DC

Network design

Firewall design

Firewall redundancy

Server redundancy

NIC teaming

Virtualization

Server load balancers

Planning a disaster recovery

Providing remote access to the DC

Summary

Understanding and Configuring Network Security

Security landscape

Elements of enterprise security

Securing network infrastructure

Data plane security

Controlling network access

Password protection on wireless networks

Network access control (NAC)

Port security and MAC limiting

Preventing spoofed attacks

ARP spoofing

Unicast RPF

IP source guard

Limiting punting to CPU

IP options and source routing

ICMP attacks

Controlling user traffic

Rate limiting and storm control

Controlling user to user traffic

Access control lists

Preventing denial of service attacks

Control plane security

Disable unused services

Disabling unused global services

Disabling interface services

Layer 2 control plane security

STP security

DHCP snooping

Dynamic ARP Inspection (DAI)

Control plane policing

Protocol security

Management plane security

Security beyond the network devices

Securing the network perimeter

Firewalls

Securing services

Email services

Web security

Advanced Malware Protection (AMP)

Securing the endpoints

DNS-based security

Securing data in transit

Network behavioral analysis

Summary

Understanding and Configuring Quality of Service

The need for QoS

Network impact on traffic

Packet loss

Latency

Jitter

QoS models

The integrated services model

The differentiated services model

QoS tools

Traffic conditioning

Policing

Shaping

Markdown

Packet classification

Packet marking

Congestion management

Queuing

Scheduling

Low latency queueing (LLQ)

Class-based weighted fair queueing (CBWFQ)

Congestion avoidance

Tail drop

Random early detection

Weighted random early detection (WRED)

Modular QoS command-line interface

QoS design for an enterprise

Defining the trust boundary

Defining traffic types

Assigning bandwidths

Assessing hardware and assigning classes to queues

Implementing configurations

The ingress policy

The egress policy

QoS in a hybrid model with service provider WAN

Summary

A Systematic Approach to Network Management

Frameworks related to network management

Network management planning

Pillars of network management

People

Processes

Tools and technologies

The importance of metrics

Network operations systems components

Simple Network Management Protocol (SNMP)

SNMP traps

SNMP polling

Syslog

Network Time Protocol (NTP)

Controlling device access using RADIUS

Role-based user access

IP Service Level Assurance (IP-SLA)

Management network

Cisco Prime Infrastructure

Implementing the network management strategy

Summary

Basic Troubleshooting Skills and Techniques

A framework for structured troubleshooting

Establishing the normal and detecting deviations

The network baseline

Application baseline

Network troubleshooting commands

IOS commands

The ping command

The traceroute command

The debug commands

Troubleshooting the network

Troubleshooting user connectivity

Troubleshooting layer 2 issues

Troubleshooting the first hop connectivity

Troubleshooting routing issues

Troubleshooting forwarding plane issues

Troubleshooting performance issues

Troubleshooting the management plane

Troubleshooting device level issues

Hardware issues

Software issues

Summary

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部