How This Book Is Organized


Based on the various functions, the books is divided into the following four parts:

  • Basic network administration

  • Network management systems

  • Security

  • Documentation tools

Each chapter focuses on a function and its related tools. Although the chapters follow a logical sequence, you can also read the chapters in any order.

Chapters 1 through 11 cover the following topics:

  • Chapter 1, "Cisco Device Installation" This chapter discusses the various methods of accessing and configuring devices, followed by methods for storing the configuration files. The discussion also provides some practical tips on simplifying the tasks of network administration.

  • Chapter 2 "Basic Network Connectivity" This chapter discusses the most common tools used to test and monitor network connectivity. The tools discussed are ping, traceroute, whois, nslookup, dig, netstat, and nbtstat.

  • Chapter 3, "Access Control" This chapter discusses the AAA technology framework for securing Cisco networks. Based on the protocols used by AAA, this chapter covers Linux- and MS-Windows based tools for implementing TACACS+ and RADIUS Servers. The configuration of Cisco IOS devices, Catalyst switches, PIX Firewalls, and VPN 3000 concentrators for AAA is also covered.

  • Chapter 4, "Using Syslog" This chapter discusses the syslog protocol and its relevance in the Cisco networking world. In addition to Linux- and MS-Windows based syslog servers, this chapter also covers configuring Cisco IOS devices, Catalyst switches, PIX Firewalls, and VPN 3000 concentrators for syslog.

  • Chapter 5, "Monitoring Network Availability" This chapter discusses the need, methods, and tools for network monitoring using Linux- and MS-Windows based tools.

  • Chapter 6, "Network Performance Monitoring" This chapter discusses the tools for monitoring network performance parameters such as throughput, latency, CPU utilization, and memory utilization. Both Linux- and MS-Windows based tools are covered.

  • Chapter 7, "Network Security Testing" This chapter introduces you to the tools and methodologies of network security testing using network scanners, vulnerability scanners, and sniffers.

  • Chapter 8, "Router and Switch Security" This chapter discusses tools for hardening Cisco routers and switches against security vulnerabilities and common attacks.

  • Chapter 9, "Intrusion Detection System (IDS)" This chapter covers the nuances of deploying intrusion detection systems (IDS) in a Cisco network. The chapter also discusses the use of IDS sensors that are built into Cisco IOS devices and PIX Firewalls.

  • Chapter 10, "Virtual Private Networks (VPN)" This chapter introduces the IPSec protocol and its role in providing VPN service. Furthermore, the chapter focuses on the interoperability of Cisco devices with IPSec using preshared keys.

  • Chapter 11, "Documentation Tools: Network Diagrams" This chapter covers one of the most fundamental aspects of the networking profession the network diagram. The discussion covers the need for network diagrams and the tools used to fulfill that need.



Network Administrators Survival Guide
Network Administrators Survival Guide
ISBN: 1587052113
EAN: 2147483647
Year: 2006
Pages: 106

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net