Flylib.com
Network Administrators Survival Guide
Network Administrators Survival Guide
ISBN: 1587052113
EAN: 2147483647
Year: 2006
Pages: 106
Authors:
Anand Deveriya
BUY ON AMAZON
Network Administrators Survival Guide
Table of Contents
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
This Book Is Safari Enabled
Icons Used in This Book
Command Syntax Conventions
Introduction
Objectives
Who Should Read This Book
How This Book Is Organized
Part I: Basic Network Administration
Chapter 1. Cisco Device Installation
Introduction
Connecting to Cisco Devices for Configuration
Securing Remote Connections to Cisco Devices Using Secure Shell (SSH)
Configuring Cisco Devices Using GUI Tools
Managing System Files
Summary
Chapter 2. Basic Network Connectivity
Basics of Network Monitoring Tools: ping and traceroute
Case Study: Using ping and traceroute to Isolate a BGP Meltdown Emergency
Advanced Network Connectivity Testing Tools
Summary
Chapter 3. Access Control
Overview of AAA Technology
Using TACACS for AAA
Using RADIUS for AAA
Commercial Products
Summary
Chapter 4. Using Syslog
Overview of Syslog
Deploying Syslog Servers
Configuring Cisco Devices to Use a Syslog Server
Commercial Cisco Products
Summary
Part II: Network Management Systems (NMS)
Chapter 5. Monitoring Network Availability
Network-Monitoring Fundamentals
Deploying a Network-Monitoring System
Adding Redundancy and Security to Network-Monitoring Systems
Commercial Cisco Products
Summary
Chapter 6. Network Performance Monitoring
Performance-Monitoring Overview
Deploying Network Performance-Monitoring Tools
Performance and Scalability Enhancements
Configuring Cisco Devices for Performance Monitoring
Commercial Cisco Offerings
Summary
Part III: Security
Chapter 7. Network Security Testing
Network Security Testing Overview
Bootable CD-ROM-Based Tool Kits
Network Scanners
Packet Analyzers
Summary
Chapter 8. Router and Switch Security
Router and Switch Security Overview
Summary
Chapter 9. Intrusion Detection System (IDS)
IDS Overview
IDS Tools
IDS Sensors Using Common Cisco Devices
Commercial Cisco Products
Summary
Chapter 10. Virtual Private Networks (VPN)
VPN Overview
Linux-Based VPNs
Windows-Based VPNs
Summary
Part IV: Network Documentation
Chapter 11. Documentation Tools: Network Diagrams
Network Diagram Overview
Linux-Based Graphic Design Tools
Windows-Based Graphic Design Tools
What s Next
Summary
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
Network Administrators Survival Guide
ISBN: 1587052113
EAN: 2147483647
Year: 2006
Pages: 106
Authors:
Anand Deveriya
BUY ON AMAZON
SQL Hacks
Hack 28. Avoid Dividing by Zero
Hack 36. Calculate the Distance Between GPS Locations
Hack 55. Import Someone Elses Data
Hack 80. Play Six Degrees of Kevin Bacon
Hack 89. Choose Any Three of Five
The Complete Cisco VPN Configuration Guide
Concentrator Product Information
Network Access Control (NAC) for IPsec and L2TP/IPsec Users
Summary
Summary
ISAKMP/IKE Phase 1 Connections
Postfix: The Definitive Guide
The Postfix Queue
Message Store Formats
Blocking Unsolicited Bulk Email
Postfix and SASL
Testing Your Authentication Configuration
802.11 Wireless Networks: The Definitive Guide, Second Edition
Wired Equivalent Privacy (WEP)
1X: Network Port Authentication
1X on Wireless LANs
Network Requirements
Current Trends in Wireless Networking
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
Key #3: Work Together for Maximum Gain
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
DNS & BIND Cookbook
Registering Name Servers
Limiting NOTIFY Messages
Dynamically Updating a Zone
Introduction
Introduction
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies