Filter Keyword to...

Category: IT Professionals

Results Per Page :
Virtualization of storage helps to provide location independence by abstracting the physical location of the data. This course describes how storage is virtualized for high availability and configuration...
[READ MORE]
Virtualization of storage helps to provide location independence by abstracting the physical location of the data. This course describes how storage is virtualized for high availability and configuration flexibility and the benefits of server virtualization in the data center. You will learn how RAID groups and LUNs virtualize storage for high availability and configuration flexibility. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 640-916: Introducing Cisco Data Center Technologies.
Virtualization of storage helps to provide location independence by abstracting the physical location of the data. This course describes how storage is virtualized for high availability and configuration flexibility and the benefits of server virtualization in the data center. You will learn how RAID groups and LUNs virtualize storage for high availability and configuration flexibility. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 640-916: Introducing Cisco Data Center Technologies.
[READ LESS]
Produced by: SkillSoft
Managing network devices for a service provider involves a great many protocols. These protocols include SNMP, SYSLOG, and NetFlow. Knowing how each of these protocols plays into the facilitation of network...
[READ MORE]
Managing network devices for a service provider involves a great many protocols. These protocols include SNMP, SYSLOG, and NetFlow. Knowing how each of these protocols plays into the facilitation of network administration is important because each fulfills a different requirement. This course covers technologies used in the management and discovery of networks. This course is one of a series in the Skillsoft learning path that covers the objectives for the Cisco exam Building Cisco Service Provider Next-Generation Networks Part 1 exam (640-875 SPNGN1). This exam counts toward the CCNA Service Provider certification.
Managing network devices for a service provider involves a great many protocols. These protocols include SNMP, SYSLOG, and NetFlow. Knowing how each of these protocols plays into the facilitation of network administration is important because each fulfills a different requirement. This course covers technologies used in the management and discovery of networks. This course is one of a series in the Skillsoft learning path that covers the objectives for the Cisco exam Building Cisco Service Provider Next-Generation Networks Part 1 exam (640-875 SPNGN1). This exam counts toward the CCNA Service Provider certification.
[READ LESS]
Produced by: SkillSoft
Cisco Email Security Appliance (ESA) protects the email infrastructure and employees who use email at work by filtering unsolicited and malicious email before it reaches the user. It provides...
[READ MORE]
Cisco Email Security Appliance (ESA) protects the email infrastructure and employees who use email at work by filtering unsolicited and malicious email before it reaches the user. It provides high-availability email protection against the constant, dynamic, and rapidly changing threats affecting email today. This course is one in a series in the Skillsoft learning path that covers the objectives of the Implementing Cisco Threat Control Solutions (SITCS) 1.5 exam, 300-210.
Cisco Email Security Appliance (ESA) protects the email infrastructure and employees who use email at work by filtering unsolicited and malicious email before it reaches the user. It provides high-availability email protection against the constant, dynamic, and rapidly changing threats affecting email today. This course is one in a series in the Skillsoft learning path that covers the objectives of the Implementing Cisco Threat Control Solutions (SITCS) 1.5 exam, 300-210.
[READ LESS]
Produced by: SkillSoft
This course explores security related issues of network architectures. It will discuss security issues relating to today's networks and emerging technologies. The course will also cover identity management...
[READ MORE]
This course explores security related issues of network architectures. It will discuss security issues relating to today's networks and emerging technologies. The course will also cover identity management features. This course explores modular network architecture and security issues in modern networks. It also examines identity management using 802.1X as well as the BYOD Challenge. Finally the Cisco TrustSec initiative is explored.
This course explores security related issues of network architectures. It will discuss security issues relating to today's networks and emerging technologies. The course will also cover identity management features. This course explores modular network architecture and security issues in modern networks. It also examines identity management using 802.1X as well as the BYOD Challenge. Finally the Cisco TrustSec initiative is explored.
[READ LESS]
Produced by: SkillSoft
It is easy to simply focus on protecting the endpoints and the servers, however the control, management, and data planes of infrastructure devices are huge points of vulnerability that are often overlooked....
[READ MORE]
It is easy to simply focus on protecting the endpoints and the servers, however the control, management, and data planes of infrastructure devices are huge points of vulnerability that are often overlooked. The Cisco IOS provides control plane security features for networking devices. These security features can protect your network against degradation or failure as well as against data loss or compromise caused by attacks or unintended mistakes by network users. This course covers control plan protection and routing protocol authentication.
It is easy to simply focus on protecting the endpoints and the servers, however the control, management, and data planes of infrastructure devices are huge points of vulnerability that are often overlooked. The Cisco IOS provides control plane security features for networking devices. These security features can protect your network against degradation or failure as well as against data loss or compromise caused by attacks or unintended mistakes by network users. This course covers control plan protection and routing protocol authentication.
[READ LESS]
Produced by: SkillSoft
For years, security was focused primarily on Layer 3 of the OSI model with Layer 2 getting less attention. This 'house of cards' scenario must be prevented in today's modern networks. The data link layer 2 of...
[READ MORE]
For years, security was focused primarily on Layer 3 of the OSI model with Layer 2 getting less attention. This 'house of cards' scenario must be prevented in today's modern networks. The data link layer 2 of the OSI model, provides MAC address based connectivity within a broadcast domain, such as an Ethernet LAN. Network technologies are implemented in stacks, broken into layers. This layer can be protected with a wide array of techniques for securing VLANs and 802.1Q trunks. Various solutions like ACLs, VACLs, and PACLs are explored as well.
For years, security was focused primarily on Layer 3 of the OSI model with Layer 2 getting less attention. This 'house of cards' scenario must be prevented in today's modern networks. The data link layer 2 of the OSI model, provides MAC address based connectivity within a broadcast domain, such as an Ethernet LAN. Network technologies are implemented in stacks, broken into layers. This layer can be protected with a wide array of techniques for securing VLANs and 802.1Q trunks. Various solutions like ACLs, VACLs, and PACLs are explored as well.
[READ LESS]
Produced by: SkillSoft
Learn why not having a security policy is a recipe for failure and how you cannot construct a building or security initiative without a proven architecture. This course describes the components of a...
[READ MORE]
Learn why not having a security policy is a recipe for failure and how you cannot construct a building or security initiative without a proven architecture. This course describes the components of a comprehensive network security policy that can be used to counter threats against IT systems, within the context of a security policy life cycle and introduces the Cisco modular network architecture best practices, designs and configurations.
Learn why not having a security policy is a recipe for failure and how you cannot construct a building or security initiative without a proven architecture. This course describes the components of a comprehensive network security policy that can be used to counter threats against IT systems, within the context of a security policy life cycle and introduces the Cisco modular network architecture best practices, designs and configurations.
[READ LESS]
Produced by: SkillSoft
Every member of a forensics security team has to begin somewhere and this exploration of cryptology is an excellent starting place. VPNs are an integral part of any security architecture. Providing...
[READ MORE]
Every member of a forensics security team has to begin somewhere and this exploration of cryptology is an excellent starting place. VPNs are an integral part of any security architecture. Providing confidentiality, integrity, and endpoint authentication, VPNs are ubiquitous and provide data loss prevention mechanisms for data that is in transit at multiple levels. From SSL VPNs to IPsec VPNs, site-to-site VPNs, or remote-access options, this security control is now embedded in networks and applications and should be available in a transparent and manageable fashion. This course introduces the cryptographic elements of VPNs, including symmetric and asymmetric algorithms, digital signatures.
Every member of a forensics security team has to begin somewhere and this exploration of cryptology is an excellent starting place. VPNs are an integral part of any security architecture. Providing confidentiality, integrity, and endpoint authentication, VPNs are ubiquitous and provide data loss prevention mechanisms for data that is in transit at multiple levels. From SSL VPNs to IPsec VPNs, site-to-site VPNs, or remote-access options, this security control is now embedded in networks and applications and should be available in a transparent and manageable fashion. This course introduces the cryptographic elements of VPNs, including symmetric and asymmetric algorithms, digital signatures.
[READ LESS]
Produced by: SkillSoft
You have to 'protect the protectors' at the outset so make certain that all of your infrastructure and security devices are being configured, managed, and operated in a secure manner. Managing the running...
[READ MORE]
You have to 'protect the protectors' at the outset so make certain that all of your infrastructure and security devices are being configured, managed, and operated in a secure manner. Managing the running configuration on IOS devices, and saving the running configuration to the startup configuration is one large aspect of managing IOS devices. But, there are several other vital management tasks including managing operating system images, keeping device clocks in sync, and monitoring the status of network devices. These aspects will be considered in this course.
You have to 'protect the protectors' at the outset so make certain that all of your infrastructure and security devices are being configured, managed, and operated in a secure manner. Managing the running configuration on IOS devices, and saving the running configuration to the startup configuration is one large aspect of managing IOS devices. But, there are several other vital management tasks including managing operating system images, keeping device clocks in sync, and monitoring the status of network devices. These aspects will be considered in this course.
[READ LESS]
Produced by: SkillSoft
The Cisco Adaptive Security Appliance is an industry-leading high-end all-in-one security appliance suitable for any size organization. This course looks at this awesome Cisco product. This course covers the...
[READ MORE]
The Cisco Adaptive Security Appliance is an industry-leading high-end all-in-one security appliance suitable for any size organization. This course looks at this awesome Cisco product. This course covers the Cisco Adaptive Security Appliances (ASA). These are purpose-built solutions that integrate firewall, unified communications security, VPN, IPS, and content security services in a unified platform. The ASA is basically a stateful packet filter with Application Inspection and Control (AIC), combined with a rich set of optional integrated software and hardware features that allow you to expand functionality. The ASA provides intelligent threat defense that stops attacks before they penetrate the network perimeter, controls network and application activity, and delivers secure remote access and site-to-site connectivity. Cisco offers several models of the ASA to meet customer's needs ranging from remote/teleworker to high-end data center models.
The Cisco Adaptive Security Appliance is an industry-leading high-end all-in-one security appliance suitable for any size organization. This course looks at this awesome Cisco product. This course covers the Cisco Adaptive Security Appliances (ASA). These are purpose-built solutions that integrate firewall, unified communications security, VPN, IPS, and content security services in a unified platform. The ASA is basically a stateful packet filter with Application Inspection and Control (AIC), combined with a rich set of optional integrated software and hardware features that allow you to expand functionality. The ASA provides intelligent threat defense that stops attacks before they penetrate the network perimeter, controls network and application activity, and delivers secure remote access and site-to-site connectivity. Cisco offers several models of the ASA to meet customer's needs ranging from remote/teleworker to high-end data center models.
[READ LESS]
Produced by: SkillSoft
Most Layer 2 vulnerabilities can be addressed with some good base configuration practices combined with an accurate DHCP binding of legitimate MAC addresses to IP addresses. More power techniques will be...
[READ MORE]
Most Layer 2 vulnerabilities can be addressed with some good base configuration practices combined with an accurate DHCP binding of legitimate MAC addresses to IP addresses. More power techniques will be discovered in this course. This course will show the learner how to protect MAC address mappings, ARP functions, and more with port security and Private VLANs (PVLANs)
Most Layer 2 vulnerabilities can be addressed with some good base configuration practices combined with an accurate DHCP binding of legitimate MAC addresses to IP addresses. More power techniques will be discovered in this course. This course will show the learner how to protect MAC address mappings, ARP functions, and more with port security and Private VLANs (PVLANs)
[READ LESS]
Produced by: SkillSoft
For most organizations the first line of defense is the firewall system. This term can actually represent different components and this course explores this interesting concept. The term firewall is a...
[READ MORE]
For most organizations the first line of defense is the firewall system. This term can actually represent different components and this course explores this interesting concept. The term firewall is a metaphor for protecting separate zones or domains. In a network, a firewall is intended to control what passes from one security zone to another. If a system is compromised in one zone, firewalls help to contain the attack to within that zone. Also, within a network, firewalls also have the function of preventing the undesirable access in the first place. This course explores the fundamentals of firewall technologies.
For most organizations the first line of defense is the firewall system. This term can actually represent different components and this course explores this interesting concept. The term firewall is a metaphor for protecting separate zones or domains. In a network, a firewall is intended to control what passes from one security zone to another. If a system is compromised in one zone, firewalls help to contain the attack to within that zone. Also, within a network, firewalls also have the function of preventing the undesirable access in the first place. This course explores the fundamentals of firewall technologies.
[READ LESS]
Produced by: SkillSoft
In a global society, there has got to be scalable and secure way to conduct financial transactions, contracts, and agreements over untrusted networks. Here is an answer. A huge challenge with both asymmetric...
[READ MORE]
In a global society, there has got to be scalable and secure way to conduct financial transactions, contracts, and agreements over untrusted networks. Here is an answer. A huge challenge with both asymmetric encryption and digital certificates is the secure distribution of public keys. This is where public key infrastructure comes into play.
In a global society, there has got to be scalable and secure way to conduct financial transactions, contracts, and agreements over untrusted networks. Here is an answer. A huge challenge with both asymmetric encryption and digital certificates is the secure distribution of public keys. This is where public key infrastructure comes into play.
[READ LESS]
Produced by: SkillSoft
How can you control what an entity can do unless they are identified? Once identified, then what actions can be performed? In addition, when did they start, finish, and what was the duration? Answer these...
[READ MORE]
How can you control what an entity can do unless they are identified? Once identified, then what actions can be performed? In addition, when did they start, finish, and what was the duration? Answer these vital questions with AAA services. AAA is short for authentication, authorization, and accounting. Authentication is determining identity. Authorization is defining what actions that individual or groups of identities can perform. Accounting is about tracking what individual identities have done. This course compares local and centralized AAA, examines authentication services, compares ACS to ISE, and more.
How can you control what an entity can do unless they are identified? Once identified, then what actions can be performed? In addition, when did they start, finish, and what was the duration? Answer these vital questions with AAA services. AAA is short for authentication, authorization, and accounting. Authentication is determining identity. Authorization is defining what actions that individual or groups of identities can perform. Accounting is about tracking what individual identities have done. This course compares local and centralized AAA, examines authentication services, compares ACS to ISE, and more.
[READ LESS]
Produced by: SkillSoft
Like routers, both Layer 2 and Layer 3 switches have their own security requirements. Switch access is a common entry point for crackers who are intent on gaining illegal access to a corporate network. An...
[READ MORE]
Like routers, both Layer 2 and Layer 3 switches have their own security requirements. Switch access is a common entry point for crackers who are intent on gaining illegal access to a corporate network. An attacker can then introduce rogue access points and protocol analyzers and launch all types of attacks from within the network. Attackers can also spoof the MAC and IP addresses of critical servers and do significant damage. In this course, you will examine various Layer 2 attacks and strategies to mitigate them.
Like routers, both Layer 2 and Layer 3 switches have their own security requirements. Switch access is a common entry point for crackers who are intent on gaining illegal access to a corporate network. An attacker can then introduce rogue access points and protocol analyzers and launch all types of attacks from within the network. Attackers can also spoof the MAC and IP addresses of critical servers and do significant damage. In this course, you will examine various Layer 2 attacks and strategies to mitigate them.
[READ LESS]
Produced by: SkillSoft
Put your finger on the pulse on the existing critical state of security threats and technology defense solutions. This course describes a variety of attack vectors and threat categories prevalent in the...
[READ MORE]
Put your finger on the pulse on the existing critical state of security threats and technology defense solutions. This course describes a variety of attack vectors and threat categories prevalent in the corporate landscape today. Also, an examination of threat countermeasure technologies including firewalls, IPS, VPNs, content security, and endpoint protection. This course is one of a series in the Skillsoft learning path that covers the objectives for the Cisco exam Implementing Cisco Network Security (IINS) exam (210-260 IINS). This exam counts toward the CCNA Security certification.
Put your finger on the pulse on the existing critical state of security threats and technology defense solutions. This course describes a variety of attack vectors and threat categories prevalent in the corporate landscape today. Also, an examination of threat countermeasure technologies including firewalls, IPS, VPNs, content security, and endpoint protection. This course is one of a series in the Skillsoft learning path that covers the objectives for the Cisco exam Implementing Cisco Network Security (IINS) exam (210-260 IINS). This exam counts toward the CCNA Security certification.
[READ LESS]
Produced by: SkillSoft
Dynamic routing protocols play an important role in the enterprise networks of today. There are several different protocols available, with each having its advantages and limitations. Protocols can be...
[READ MORE]
Dynamic routing protocols play an important role in the enterprise networks of today. There are several different protocols available, with each having its advantages and limitations. Protocols can be described and compared in regard to where they operate and how they operate. Three important characteristics that also influence routing protocol selection are convergence, support for summarization, and the ability to scale in larger environments. You can establish routing protocols over a variety of different network technologies. It is important to consider the limitations of a specific solution and how it affects routing protocol deployments and operation. To connect remote locations with the headquarters, you no longer need to use only traditional VPN solutions such as leased lines or Frame Relay connections. Newer technologies, such as MPLS VPNs and DMVPNs, are now widespread because they offer more flexibility at lower cost compared to traditional solutions. You should be aware of these new VPN types because they also influence deployments and the configuration of routing protocols. This course begins with an overview of routing protocols that focuses on characteristics that describe their differences. It describes how limitations of different underlying technologies affect routing protocols, followed by a closer look at how Layer 2 and Layer 3 VPNs affect routing protocols. DMVPN is also introduced as a scalable VPN solution to complete this course.
Dynamic routing protocols play an important role in the enterprise networks of today. There are several different protocols available, with each having its advantages and limitations. Protocols can be described and compared in regard to where they operate and how they operate. Three important characteristics that also influence routing protocol selection are convergence, support for summarization, and the ability to scale in larger environments. You can establish routing protocols over a variety of different network technologies. It is important to consider the limitations of a specific solution and how it affects routing protocol deployments and operation. To connect remote locations with the headquarters, you no longer need to use only traditional VPN solutions such as leased lines or Frame Relay connections. Newer technologies, such as MPLS VPNs and DMVPNs, are now widespread because they offer more flexibility at lower cost compared to traditional solutions. You should be aware of these new VPN types because they also influence deployments and the configuration of routing protocols. This course begins with an overview of routing protocols that focuses on characteristics that describe their differences. It describes how limitations of different underlying technologies affect routing protocols, followed by a closer look at how Layer 2 and Layer 3 VPNs affect routing protocols. DMVPN is also introduced as a scalable VPN solution to complete this course.
[READ LESS]
Produced by: SkillSoft
BGP can be used to perform PBR. To manipulate the best paths that are chosen by BGP, you need to understand the different attributes that BGP uses and how BGP selects the best path that is based on these...
[READ MORE]
BGP can be used to perform PBR. To manipulate the best paths that are chosen by BGP, you need to understand the different attributes that BGP uses and how BGP selects the best path that is based on these attributes. Where multiple paths exist between your network and ISP, you need to filter certain information during the exchange of BGP updates to influence the route selection or to enforce an administrative policy. To meet this requirement, you must use filters. The primary filtering tools include route maps and prefix lists. Also, an AS path list is a useful tool for influencing inbound BGP traffic. When BGP filtering is configured, it is important that you understand how you can force information propagation. The global Internet routing infrastructure is largely built using BGP. The IPv6 Internet continues to use BGP, which has undergone modifications to support it. This extended BGP protocol, called MP-BGP, is capable of carrying a rich set of routing protocols, including IPv4 and IPv6, over a transport protocol, such as IPv4 or IPv6. This course describes the configuration of BGP path selection process using BGP attributes. How to configure various BGP filtering mechanisms to control routing updates is also explained. Lastly how to configure BGP in an IPv6 environment is detailed.
BGP can be used to perform PBR. To manipulate the best paths that are chosen by BGP, you need to understand the different attributes that BGP uses and how BGP selects the best path that is based on these attributes. Where multiple paths exist between your network and ISP, you need to filter certain information during the exchange of BGP updates to influence the route selection or to enforce an administrative policy. To meet this requirement, you must use filters. The primary filtering tools include route maps and prefix lists. Also, an AS path list is a useful tool for influencing inbound BGP traffic. When BGP filtering is configured, it is important that you understand how you can force information propagation. The global Internet routing infrastructure is largely built using BGP. The IPv6 Internet continues to use BGP, which has undergone modifications to support it. This extended BGP protocol, called MP-BGP, is capable of carrying a rich set of routing protocols, including IPv4 and IPv6, over a transport protocol, such as IPv4 or IPv6. This course describes the configuration of BGP path selection process using BGP attributes. How to configure various BGP filtering mechanisms to control routing updates is also explained. Lastly how to configure BGP in an IPv6 environment is detailed.
[READ LESS]
Produced by: SkillSoft
Originally created to route for IPv4, IPX, and AppleTalk, EIGRP was easily extended to advertise IPv6 routes. Although EIGRP for IPv6 shares much of the characteristics of the EIGRP for IPv4, it also has some...
[READ MORE]
Originally created to route for IPv4, IPX, and AppleTalk, EIGRP was easily extended to advertise IPv6 routes. Although EIGRP for IPv6 shares much of the characteristics of the EIGRP for IPv4, it also has some unique specifics. One of the major differences between IPv4 and IPv6 EIGRP versions is the fact that you must explicitly enable EIGRP for IPv6 on each IPv6 enabled interface. Even though basic EIGRP configuration is pretty simple, configuring additional parameters can increase configuration complexity. Some parameters are configured in global configuration mode, other under specific interfaces. When you enable EIGRP configuration for IPv6, things can become overwhelming. You must use similar, slightly different commands and configuration procedures, to enable EIGRP for IPv6. Cisco introduced a new way of configuring EIGRP, which is called named EIGRP. It enables you to gather all EIGRP configurations in one place, using unified configuration commands for all underlying network protocols. This course begins with explaining how to configure basic EIGRP for IPv6 and optimize it with route summarization. Configuring named EIGRP completes the course.
Originally created to route for IPv4, IPX, and AppleTalk, EIGRP was easily extended to advertise IPv6 routes. Although EIGRP for IPv6 shares much of the characteristics of the EIGRP for IPv4, it also has some unique specifics. One of the major differences between IPv4 and IPv6 EIGRP versions is the fact that you must explicitly enable EIGRP for IPv6 on each IPv6 enabled interface. Even though basic EIGRP configuration is pretty simple, configuring additional parameters can increase configuration complexity. Some parameters are configured in global configuration mode, other under specific interfaces. When you enable EIGRP configuration for IPv6, things can become overwhelming. You must use similar, slightly different commands and configuration procedures, to enable EIGRP for IPv6. Cisco introduced a new way of configuring EIGRP, which is called named EIGRP. It enables you to gather all EIGRP configurations in one place, using unified configuration commands for all underlying network protocols. This course begins with explaining how to configure basic EIGRP for IPv6 and optimize it with route summarization. Configuring named EIGRP completes the course.
[READ LESS]
Produced by: SkillSoft
Open OSPF is a widely used IGP in IPv4, IPv6, and dual-stack (IPv4/IPv6) environments. The OSPF upgrade to support IPv6 generated a number of significant changes to how the protocol behaves. Understanding the...
[READ MORE]
Open OSPF is a widely used IGP in IPv4, IPv6, and dual-stack (IPv4/IPv6) environments. The OSPF upgrade to support IPv6 generated a number of significant changes to how the protocol behaves. Understanding the differences between OSPFv2 and OSPFv3 is required for the successful deployment and operation of an IPv6 network using OSPF for routing. This lesson describes OSPFv3, the IPv6-capable version of the OSPF routing protocol, including its operations, configuration, and commands. This course describes how to implement OSPFv3 in a dual-stack (IPv4/IPv6) environment and configure external route summarization and load balancing in OSPFv3. The limitations and where you need to be careful when configuring OSPFv3 is also covered.
Open OSPF is a widely used IGP in IPv4, IPv6, and dual-stack (IPv4/IPv6) environments. The OSPF upgrade to support IPv6 generated a number of significant changes to how the protocol behaves. Understanding the differences between OSPFv2 and OSPFv3 is required for the successful deployment and operation of an IPv6 network using OSPF for routing. This lesson describes OSPFv3, the IPv6-capable version of the OSPF routing protocol, including its operations, configuration, and commands. This course describes how to implement OSPFv3 in a dual-stack (IPv4/IPv6) environment and configure external route summarization and load balancing in OSPFv3. The limitations and where you need to be careful when configuring OSPFv3 is also covered.
[READ LESS]
Produced by: SkillSoft
Simple routing protocols work well for simple networks, but as networks grow and become more complex, it may be necessary to change the routing protocols. Often, the transition between routing protocols takes...
[READ MORE]
Simple routing protocols work well for simple networks, but as networks grow and become more complex, it may be necessary to change the routing protocols. Often, the transition between routing protocols takes place gradually, so there are multiple routing protocols that are operating in the network for variable lengths of time. This course describes how these problems can be resolved by redistribution from one routing protocol to another. You will also learn how Cisco routers make route selections when multiple protocols are active in the network.
Simple routing protocols work well for simple networks, but as networks grow and become more complex, it may be necessary to change the routing protocols. Often, the transition between routing protocols takes place gradually, so there are multiple routing protocols that are operating in the network for variable lengths of time. This course describes how these problems can be resolved by redistribution from one routing protocol to another. You will also learn how Cisco routers make route selections when multiple protocols are active in the network.
[READ LESS]
Produced by: SkillSoft
Once EIGRP neighbor relationships are established, the exchange of routing information begins. EIGRP uses Update packets to exchange this information. All the routing information received from neighbors is...
[READ MORE]
Once EIGRP neighbor relationships are established, the exchange of routing information begins. EIGRP uses Update packets to exchange this information. All the routing information received from neighbors is stored in an EIGRP topology table. EIGRP uses DUAL to calculate best routes to remote networks. In order for a route to be inserted into the routing table, it must satisfy the feasibility condition, which is used to prevent loops in the EIGRP networks. The route with the lowest metric to the destination becomes a candidate to be inserted into the routing table. If any routes remain, they must satisfy the feasibility condition to become a backup route to the destination network, should the primary route become unavailable. To calculate the cost for each destination network, EIGRP uses a sophisticated metric, which is by default, composed of bandwidth and delay. When EIGRP is deployed in larger networks, you need to optimize the default EIGRP behavior to achieve desired scalability. By implementing EIGRP stub configuration, you can limit EIGRP query range, making EIGRP more scalable with fewer complications. By using summarization, you can reduces the size of the routing tables and optimize the exchange of routing information between the routers. To utilize available redundant links, EIGRP by default supports load balancing across multiple links. To improve network utilization, you can also configure EIGRP to utilize unequal-cost load balancing. This course explains how EIGRP chooses the best path through the network and also how to configure stub routing, route summarization, and load balancing with EIGRP.
Once EIGRP neighbor relationships are established, the exchange of routing information begins. EIGRP uses Update packets to exchange this information. All the routing information received from neighbors is stored in an EIGRP topology table. EIGRP uses DUAL to calculate best routes to remote networks. In order for a route to be inserted into the routing table, it must satisfy the feasibility condition, which is used to prevent loops in the EIGRP networks. The route with the lowest metric to the destination becomes a candidate to be inserted into the routing table. If any routes remain, they must satisfy the feasibility condition to become a backup route to the destination network, should the primary route become unavailable. To calculate the cost for each destination network, EIGRP uses a sophisticated metric, which is by default, composed of bandwidth and delay. When EIGRP is deployed in larger networks, you need to optimize the default EIGRP behavior to achieve desired scalability. By implementing EIGRP stub configuration, you can limit EIGRP query range, making EIGRP more scalable with fewer complications. By using summarization, you can reduces the size of the routing tables and optimize the exchange of routing information between the routers. To utilize available redundant links, EIGRP by default supports load balancing across multiple links. To improve network utilization, you can also configure EIGRP to utilize unequal-cost load balancing. This course explains how EIGRP chooses the best path through the network and also how to configure stub routing, route summarization, and load balancing with EIGRP.
[READ LESS]
Produced by: SkillSoft
The Internet is a vital resource in many organizations and it requires a single connection or, more frequently, redundant connections to multiple ISPs. With multiple connections, BGP is an alternative to...
[READ MORE]
The Internet is a vital resource in many organizations and it requires a single connection or, more frequently, redundant connections to multiple ISPs. With multiple connections, BGP is an alternative to using default routes to provide dynamic control over path selections. After completing this course you will be able to plan for enterprise internet connectivity and establish single-homed IPv4 internet connectivity.
The Internet is a vital resource in many organizations and it requires a single connection or, more frequently, redundant connections to multiple ISPs. With multiple connections, BGP is an alternative to using default routes to provide dynamic control over path selections. After completing this course you will be able to plan for enterprise internet connectivity and establish single-homed IPv4 internet connectivity.
[READ LESS]
Produced by: SkillSoft
The use of BGP as a routing protocol requires that an administrator understand how to correctly configure BGP for scalable internetworking. After completing this course you will be able to establish...
[READ MORE]
The use of BGP as a routing protocol requires that an administrator understand how to correctly configure BGP for scalable internetworking. After completing this course you will be able to establish single-homed IPv6 internet connectivity and configure and verify BGP configuration when connecting an enterprise network to ISP networks.
The use of BGP as a routing protocol requires that an administrator understand how to correctly configure BGP for scalable internetworking. After completing this course you will be able to establish single-homed IPv6 internet connectivity and configure and verify BGP configuration when connecting an enterprise network to ISP networks.
[READ LESS]
Produced by: SkillSoft
OSPF is a link-state protocol based on the open standard. At a high level, OSPF operation consists of three main elements: neighbor discovery, link-state information exchange, and best-path calculation. To...
[READ MORE]
OSPF is a link-state protocol based on the open standard. At a high level, OSPF operation consists of three main elements: neighbor discovery, link-state information exchange, and best-path calculation. To calculate the best path, OSPF utilizes SPF or Dijkstra's algorithm. The input information for the SPF calculation is link state information, which is exchanged between routers through several different OSPF message types. These message types help improve convergence and scalability in multiarea OSPF deployments. OSPF also supports several different network types, which enables you to configure OSPF over a variety of different underlying network technologies. After completing this course, you will be able to configure basic OSPF.
OSPF is a link-state protocol based on the open standard. At a high level, OSPF operation consists of three main elements: neighbor discovery, link-state information exchange, and best-path calculation. To calculate the best path, OSPF utilizes SPF or Dijkstra's algorithm. The input information for the SPF calculation is link state information, which is exchanged between routers through several different OSPF message types. These message types help improve convergence and scalability in multiarea OSPF deployments. OSPF also supports several different network types, which enables you to configure OSPF over a variety of different underlying network technologies. After completing this course, you will be able to configure basic OSPF.
[READ LESS]
Produced by: SkillSoft