Vi ste ovdje
Overview/Description
This course consists of two parts. The first part explains how to secure Cisco routers using recommended practices. The second part explains the benefits of routing protocol authentication and shows how to configure routing authentication for different routing protocols. It is important to be aware that router security is critical to network security. This course lists recommended steps for securing a Cisco router. This course then focuses on configuring authentication for the routing protocols: EIGRP, OSPF, and BGP. You can prevent your router from receiving false route...
Overview/Description
Many IP routing challenges can be solved using route redistribution. Having a method to manipulate the redistribution process increases your options and flexibility. There is no one type of route filter that is appropriate for every situation. Therefore, the more techniques that you have at your disposal, the better your chances of solving connectivity challenges. To ensure that the network operates efficiently, you often need to control the redistribution process. By implementing filtering mechanisms, you can influence which information is redistributed between...
Overview/Description
The use of BGP as a routing protocol requires that an administrator understand how to correctly configure BGP for scalable internetworking. After completing this course, you will be able to establish single-homed IPv6 Internet connectivity and configure and verify BGP configuration when connecting an enterprise network to ISP networks.
Target Audience
Anyone wishing to obtain real-world routing knowledge, and those that are considering CCNP and CCIP certification. This learning path's discussion of routing could also benefit early CCIE Routing and Switching...
Overview/Description
OSPF is a link-state protocol based on the open standard. At a high level, OSPF operation consists of three main elements: neighbor discovery, link-state information exchange, and best-path calculation. To calculate the best path, OSPF utilizes SPF or Dijkstra’s algorithm. The input information for the SPF calculation is link state information, which is exchanged between routers through several different OSPF message types. These message types help improve convergence and scalability in multiarea OSPF deployments. OSPF also supports several different network types, which...
Overview/Description
Understanding the purpose of some of the commonly used Layer1 and Layer 2 technologies, as well as network protocols, is central to understanding how hosts communicate with one another. LANs have rapidly evolved into support systems that are critical to communications within an organization and it is important to understand how these systems operate. In this course you will learn about data transport methods, packet flows, and packet management for IPv4 and IPv6. You will also learn about Layer 2 technologies such as the Point-to-Point Protocol (PPP) and Frame Relay and...
Overview/Description
Many networking technologies work at layer 3 to help you deploy and manage scalable, efficient, intelligent, and secure networks including ARP, VLSM, DHCP, IPv6 addressing, MPLS, and routing. In this course, you will be able to explain the role of ARP and how to use VLSM options to allocate more than one subnet mask within a network and to subnet an already subnetted network address. You will learn how DHCP is used to reduce the administrative overhead of manually configuring IPv4 addresses and be able to describe IPv6 address types and ICMPv6 operations. Also covered...
Overview/Description
An IP Security (IPsec) VPN uses the Internet to connect branch offices, remote employees, and business partners to the resources of your company, and VPNs are an integral part of any security architecture. Providing confidentiality, integrity, and endpoint authentication, VPNs are ubiquitous and provide data loss prevention mechanisms for data that is in transit at multiple levels. In this course, you will learn about the benefits of VPN implementation and configuration. GRE is a tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP...
Overview/Description
The need for comprehensive remote access security policies is driven by mobility and consumer trends; configuring remote management access in a secure fashion is of paramount importance to ensure the integrity of networking devices. In this course, you will learn about the AAA security architecture and how to use management access AAA features to secure local and remote access to the network. You will also learn strategies to protect the management plane by limiting access to it, and limiting access to its individual features. How you can use access control lists (ACLs)...
Overview/Description
In order to operate and ensure availability of a network, it is critical to have visibility and awareness into what is occurring on the network at any given time. Network telemetry offers extensive and useful detection capabilities that can be coupled with dedicated analysis systems to collect, trend, and correlate observed activity. Baseline network telemetry is both inexpensive and relatively simple to implement. After completing this course you will be able to describe and deploy baseline forms of telemetry recommended for network infrastructure devices, including NTP...
Overview/Description
Your company should have a scalable and flexible network, and you can achieve that goal by having a hierarchical, layered design. Today, switches are not only Layer 2 devices, many of them are capable of performing Layer 3 features. With some Cisco switches, you can reallocate system resources in order for the switch to optimize support for specific features. This reallocation is done through changing of the SDM template. For example, if you want to implement IPv6 addressing on an access layer switch, you will need to change the SDM template. Cisco Discovery Protocol is...