Cisco Press :: Articleshttp%3a%2f%2fwww.ciscopress.com%2farticles%2findex_rss.asp%3fn%3d1cbd305f-d503-49fa-9699-8b2c06c9c520The latest products for the Cisco Press-Articlesen-usArticle :: Cisco Prime Service Cataloghttp://dev.rollprint.com/?page=articles/article.asp?p=2743755<p> In this chapter from <em>CCNA Cloud CLDADM 210-455 Official Cert Guide</em>, Cisco cloud experts Chris Jackson, Hank Preston, and Steve Wasko introduce the Cisco Prime Service Catalog and how it helps manage requests for IT services.</p>Mar 10, 2017Article :: Cisco Unified Communications Manager Deployment Modelshttp://dev.rollprint.com/?page=articles/article.asp?p=2743756<p> In this chapter from <em>Implementing Cisco IP Telephony and Video, Part 1 (CIPTV1) Foundation Learning Guide (CCNP Collaboration Exam 300-070 CIPTV1), 3rd Edition</em>, the author team introduces Cisco Unified Communications Manager (CUCM) and explores different redundancy models.</p>Mar 10, 2017Article :: IKEv2 Deploymentshttp://dev.rollprint.com/?page=articles/article.asp?p=2730337<p>In this chapter from<em> IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS </em>, authors Graham Bartlett and Amjad Inamdar introduce a number of designs where IKEv2 is used. Each design will use a simple deployment of two routers with the focus on the configuration of IKEv2. Although each scenario uses only two routers, the configuration can scale as required if needed.</p>Nov 19, 2016Article :: Implementing OSPF for IPv4http://dev.rollprint.com/?page=articles/article.asp?p=2738303<p>In this sample chapter from<em>CCNA Routing and Switching ICND2 200-105 Official Cert Guide</em>, author Wendell Odom covers implementation details for Open Shortest Path First Version 2 (OSPFv2) —that is, OSPF as used for IPv4. This chapter looks at how to configure and verify a variety of OSPFv2 features</p>Nov 19, 2016Article :: Implementing OSPF for IPv4http://dev.rollprint.com/?page=articles/article.asp?p=2738311<p>In this sample chapter from <em>CCNA Routing and Switching ICND2 200-105 Official Cert Guide Academic Edition</em>,author Wendell Odom covers implementation details for Open Shortest Path First Version 2 (OSPFv2) —that is, OSPF as used for IPv4. This chapter looks at how to configure and verify a variety of OSPFv2 features.</p>Nov 19, 2016Article :: Introduction to and Design of Cisco ASA with FirePOWER Serviceshttp://dev.rollprint.com/?page=articles/article.asp?p=2730336<p>In this chapter from<em> Cisco Next-Generation Security Solutions: All-in-one Cisco ASA Firepower Services, NGIPS, and AMP</em>, authors Omar Santos, Panos Kampanakis, and Aaron Woland provide an introduction to the Cisco ASA with FirePOWER Services solution. It also provides design guidance and best practices for deploying Cisco ASA with FirePOWER Services.</p>Nov 19, 2016Article :: Introduction to BGPhttp://dev.rollprint.com/?page=articles/article.asp?p=2738462<p>In this sample chapter from<em> Routing TCP/IP, Volume II: CCIE Professional Development, 2nd Edition</em>, author Jeff Doyle covers the basic operation of BGP, including its message types, how the messages are used, and the format of the messages. You also learn about the various basic attributes BGP can associate with a route and how it uses these attributes to choose a best path. Finally, this chapter shows you how to configure and troubleshoot BGP peering sessions.</em>Nov 19, 2016Article :: Network Access and Layer 2 Multicasthttp://dev.rollprint.com/?page=articles/article.asp?p=2738463<p>In this chapter from <em>IP Multicast, Volume I: Cisco IP Multicast Networking</em>, authors Josh Loveless, Ray Blair, and Arvind Durai take an in-depth look at IP multicast messages at Layer 2 and how they are transported in a Layer 2 domain. This chapter covers the basic elements of multicast functionality in Layer 2 domains as well as design considerations for multicast deployments.</p>Nov 19, 2016Article :: On-Box Automation and Operations Toolshttp://dev.rollprint.com/?page=articles/article.asp?p=2731925<p>In this chapter from <em>Programming and Automating Cisco Networks</em>, authors Ryan Tischer and Jason Gooley cover the following on-box automation tools in greater detail; Auto SmartPorts, AutoConf, Auto Security, AutoQoS, Smart Call Home, Tcl Shell, and Embedded Event Manager (EEM)</p>Nov 19, 2016Article :: Variable-Length Subnet Maskshttp://dev.rollprint.com/?page=articles/article.asp?p=2738302<p>In this sample chapter from <em>CCENT/CCNA ICND1 100-105 Official Cert Guide</em>, author Wendell Odom introduces variable-length subnet masks (VLSM)Nov 19, 2016Article :: Variable-Length Subnet Maskshttp://dev.rollprint.com/?page=articles/article.asp?p=2731924<p>In this chapter from<em>CCENT/CCNA ICND1 100-105 Official Cert Guide, Academic Edition</em>, author Wendell Odom introduces variable-length subnet masks (VLSM).</p>Nov 19, 2016Article :: Network Design Modelshttp://dev.rollprint.com/?page=articles/article.asp?p=2698000<p>In this sample chapter from <em>CCDA 200-310 Official Cert Guide</em>, authors Anthony Bruno and Steve Jordan cover hierarchical network models, the Cisco Enterprise Architecture model, and high-availability network services.</p>Sep 28, 2016Article :: Intercloud Architecture and Technologieshttp://dev.rollprint.com/?page=articles/article.asp?p=2697999<p>In this sample chapter from <em>Intercloud: Solving Interoperability and Communication in a Cloud of Clouds</em>, authors Jazib Frahim, Venkata Josyula, Monique Morrow, and Ken Owens explore how cloud providers have set up data centers at many locations to service their customers. For example, Amazon, Google, Microsoft, Salesforce.com, and others have established data centers for hosting cloud application services such as social networking, gaming portals, and business applications. In many of these social networks, the service components run in separate virtual machines that may be hosted in data centers owned by different cloud computing providers. In order to link the services provided by different providers at different locations around the world and to provide quality service to a consumer, it is necessary to build an Intercloud to bring the services together. This chapter details Intercloud architecture mode, Intercloud use cases, and Intercloud deploy.</p> Sep 26, 2016Article :: Enterprise Use Cases for Network Function Virtualizationhttp://dev.rollprint.com/?page=articles/article.asp?p=2520465Network Function Virtualization (NFV) offers new ways to design, orchestrate, and manage network services. Arvind Durai explores use cases of the adoption of NFV by enterprise architects, to control services in their tenant space.Jun 13, 2016Article :: CSR with OpenStackhttp://dev.rollprint.com/?page=articles/article.asp?p=2520464Are you looking at virtualization to solve your horizontal scaling challenge and reduce capital expenditure? Arvind Durai explores OpenStack, the free and open-source cloud computing platform written in Python.Jun 1, 2016Article :: RIP Next Generation (RIPng)http://dev.rollprint.com/?page=articles/article.asp?p=2516731May 27, 2016Article :: Building a Security Strategyhttp://dev.rollprint.com/?page=articles/article.asp?p=2495163Bob Vachon introduces network security-related concepts and summarizes how security policies are implemented using a lifecycle approach. Mar 24, 2016Article :: Remote Site Telephony and Branch Redundancy Optionshttp://dev.rollprint.com/?page=articles/article.asp?p=2492950Hannah and Behl introduce and explain the various options for deploying remote site telephony solutions.Mar 5, 2016Article :: 3 Common Network Security Threatshttp://dev.rollprint.com/?page=articles/article.asp?p=2491768Whether their ultimate intention is harming your organization or stealing its information, attackers are probably already trying to crack your network. Network engineers need to anticipate these attacks and be ready to mitigate them. Security specialist Sean Wilkins points out three attack methods that most networks will experience.Feb 25, 2016Article :: 7 Popular Layer 2 Attackshttp://dev.rollprint.com/?page=articles/article.asp?p=2491767If you're responsible for securing a corporate or private network, you need to be aware of the vulnerabilities that attackers will use. Security expert Sean Wilkins discusses seven common methods that can give attackers access, helping them to control or steal information from your network.Feb 25, 2016Article :: Designing and Deploying Cisco Unified IM and Presencehttp://dev.rollprint.com/?page=articles/article.asp?p=2471644This chapter describes the Cisco Unified Communications IM and Presence (IM&P) architecture and design. Feb 25, 2016Article :: Securing Cisco Device Managementhttp://dev.rollprint.com/?page=articles/article.asp?p=2491484Sean Wilkins, co-author of <a href="http://dev.rollprint.com/?page=store/ccna-routing-and-switching-200-120-network-simulator-9780789752963">CCNA Routing and Switching 200-120 Network Simulator, Academic Edition</a>, discusses available solutions for addressing basic security concerns of Cisco network devices, including important protocols that every security approach should implement.Feb 23, 2016Article :: Responding to Real-World Cyber Threatshttp://dev.rollprint.com/?page=articles/article.asp?p=2481826Are you ready to take on the latest cyber threats? Research shows that many organizations are not, because they're unprepared for what happens when common defenses fail to prevent a breach. Joseph Muniz, co-author of <a href="http://dev.rollprint.com/?page=store/security-operations-center-building-operating-and-maintaining-9780134052014">Security Operations Center: Building, Operating, and Maintaining Your SOC</a>, explains how to build a security strategy around the assumption that your defenses WILL fail. By implementing this approach, your organization can shorten the time of exposure when you're compromised, limiting losses from a breach. Without this type of visibility, you probably won't know that you're compromised until the damage is already done.Feb 16, 2016Article :: Cisco Programmable Fabric Using VXLAN with BGP EVPNhttp://dev.rollprint.com/?page=articles/article.asp?p=2474169David Jansen and Lukas Krattiger, authors of <a href="http://dev.rollprint.com/?page=store/cisco-programmable-fabric-using-vxlan-with-bgp-evpn-9780134272290">Cisco Programmable Fabric Using VXLAN with BGP EVPN LiveLessons</a>, explain how Cisco's BGP EVPN enhances VXLAN encapsulation with Layer 2 and Layer 3 benefits.Feb 9, 2016Article :: DHCP Snooping: Basic Concepts and Configurationhttp://dev.rollprint.com/?page=articles/article.asp?p=2474170Mason Harris, CCIE #5916 and co-author of <a href="http://dev.rollprint.com/?page=store/ccna-security-210-260-complete-video-course-9780134499314">CCNA Security 210-260 Complete Video Course</a>, provides a streamlined introduction to DHCP snooping, a barrier to denial-of-service and man-in-the-middle attacks on organizational networks.Feb 9, 2016