Imate žicu za učenje?

Overview/Description Security is an important part of any network and should be extended to the routing protocol by implementing neighbor authentication. Without this authentication, unauthorized or deliberately malicious routing updates can compromise the security of network traffic. EIGRP neighbor authentication can be configured in such a way that routers can participate in routing based on predefined passwords. EIGRP is a scalable routing protocol, which ensures that as a network grows larger, it operates efficiently and adjusts rapidly to changes. It is important as a Cisco...
  Overview/Description Open Shortest Path First (OSPF) is one of the most commonly used IP routing protocols in today's networks. It is an open standard that is used by both enterprise and service provider networks. OSPF has several functions and five packet types to enable all OSPF information flow between routers. OSPF areas may be made up of different types of network links and it is vital that you know which ones are being used in order to properly configure OSPF. It is equally important to note that OSPF pays special attention to different network types, such as point-to-...
  Overview/Description Configuring Open Shortest Path First (OSPF) in today's networks is an important skill to have as a network administrator. You will need to understand the primary configuration commands for single-area and multiarea OSPF designs, and the commands used to verify configurations. OSPF presents some design limitations, but offers up solutions for each. Scalability, improved CPU and memory utilization, and the ability to mix small routers with large routers are all benefits of using proper route summarization techniques which is a key feature of OSPF. An OSPF...
Overview/Description Routing updates compete with user data for bandwidth and router resources, yet routing updates are critical because they carry the information that routers need to make sound routing decisions. To ensure that a network operates efficiently, you must know how to control and tune routing updates. Since there is no one type of route filter that is appropriate for every situation, the more techniques that you have at your disposal, the better your chance of having a smooth, well-run network. Simple routing protocols work well for simple networks, but as networks grow and...
Overview/Description Policy-based routing allows administrators to route traffic along specific paths according to their needs and gives you greater flexibility in determining traffic patterns and best routes. Sometimes, simple destination-based routing is not sufficient, so in these cases you may route packets based on source address, protocol type, or application type so that they can optimally shape traffic patterns. As an administrator, understanding the collection of tools, or set of commands, that are used to manipulate the routing protocol forwarding table, and bypass the default...
Overview/Description The Internet has become a vital resource in many organizations, and the Border Gateway Protocol (BGP) is an alternative to using default routes to control path selections. Before the connection of an enterprise network to an Internet service provider (ISP) can be implemented, planning needs to be completed. To plan for connectivity to an ISP properly, the network designer must take into account certain details. This course provides the knowledge required to implement enterprise-to-ISP connectivity. This includes an understanding of the types of session origination points...
Overview/Description The use of BGP as a routing protocol within the enterprise network requires that an administrator understand how to properly configure BGP for scalable internetworking. BGP is used in performing policy-based routing and in order to manipulate the best paths chosen by BGP, a network administrator must understand the different attributes that BGP uses and how BGP selects the best path based on these attributes. This course covers BGP configuration and verification when connecting an enterprise network to ISP networks. The BGP path selection process and attributes, their...
Overview/Description This course is intended to assist network architects and security practitioners with the appropriate placement of services into Network Security Zones. The Cisco modular network architecture best practices, designs, and configurations are introduced, and the necessary information to help network and security engineers succeed in designing, implementing, and operating secure network infrastructures based on Cisco products and technologies are covered. The course also describes the Cisco SecureX architecture and Cisco TrustSec, which are context-aware security solutions....
Overview/Description The control plane in an OSI Layer 3 device provides traffic-routing functions by building the device routing and forwarding tables, and often involves cooperation with nearby devices using dynamic routing protocols. These interactions must be controlled by authenticating the associations between devices, discarding malicious routing information, and protecting the resources of each device against excessive use. In this course you will examine various defenses in Cisco IOS Software that protect the control plane. You will also learn strategies for protecting routing...
Overview/Description In order to operate and ensure availability of a network, it is critical to have visibility and awareness into what is occurring on the network at any given time. Network telemetry offers extensive and useful detection capabilities that can be coupled with dedicated analysis systems to collect, trend, and correlate observed activity. Baseline network telemetry is both inexpensive and relatively simple to implement. This course highlights the baseline forms of telemetry recommended for network infrastructure devices, including NTP, logging, and NetFlow on Cisco IOS...

Koraci do učenja

1Prijavi se

Prijavite se, a ako nemate korisničko ime, registrirajte se.

2Pronađi i upiši program

Pronađite edukacijske programe u Katalogu i Certifikaciji, ili koristite polje za pretragu.

3Uči

Upisani programi dostupni su u meniju Korisnik, Moji tečajevi.

»Detaljne upute

Trebate pomoć?