Cisco Technical Expert S.
3 total works
A Cisco troubleshooting methodology. It includes coverage of: how to create, operate and use Cisco Access lists; how to secure a network when access occurs via a Cisco Router; and the TCP/IP Protocol and its use with Cisco routers. There are a number of security discussions too, and these include: public network and private network security threats and how to prevent them; how firewalls and proxy servers can be used as a first line of defence; how to configure Cisco Routers to accept only specific recognized incoming packets; using the Cisco PIX Firewall and the Centri firewall; and how to use the special security features built into Cisco routers.
-- Examples of LAN and WAN error conditions -- contains practical real examples of error conditions and their potential resolution that can be used to solve problems quickly.
-- How to use routers and switches to measure traffic flow -- Shows readers how to measure traffic flow, which provides the information necessary for planning for various network modifications.
-- Monitor SLAs -- will help network administrators monitor the popular Service Level Agreements that major RBOCs, CLECs and ISPs use.
-- Problem solving methodology -- describes potential pitfalls and how to avoid them
-- Shows how to monitor router performance
-- Defines different metrics
-- How to use routers and switches to measure traffic flow -- Shows readers how to measure traffic flow, which provides the information necessary for planning for various network modifications.
-- Monitor SLAs -- will help network administrators monitor the popular Service Level Agreements that major RBOCs, CLECs and ISPs use.
-- Problem solving methodology -- describes potential pitfalls and how to avoid them
-- Shows how to monitor router performance
-- Defines different metrics
-- Contains several hundred practical examples of IOS IP Commands that can be tailored to the users environment
-- Provides the reader with a comprehensive reference and guide to creating and applying access lists.
-- Each chapter provides a consistent format that demystifies IOS and IP Commands:
-- Provides the reader with a comprehensive reference and guide to creating and applying access lists.
-- Each chapter provides a consistent format that demystifies IOS and IP Commands:
A. Problem
B. Network Illustration
C. IOS IP Command Reference (snip it)
D. Explanation
-- Illustrated with the actual commands, as they would appear in the IOS.