ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Cisco Intelligent WAN (IWAN) (Networking Technology)

دانلود کتاب سیسکو هوشمند WAN (IWAN) (فناوری شبکه)

Cisco Intelligent WAN (IWAN) (Networking Technology)

مشخصات کتاب

Cisco Intelligent WAN (IWAN) (Networking Technology)

ویرایش:  
نویسندگان: , , , ,   
سری:  
ISBN (شابک) : 1587144638, 9781587144639 
ناشر: Cisco Systems 
سال نشر: 2016 
تعداد صفحات: 880
[878] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 6 Mb 

قیمت کتاب (تومان) : 49,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 1


در صورت تبدیل فایل کتاب Cisco Intelligent WAN (IWAN) (Networking Technology) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب سیسکو هوشمند WAN (IWAN) (فناوری شبکه) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب سیسکو هوشمند WAN (IWAN) (فناوری شبکه)

راهنمای کامل Cisco(R) IWAN: ویژگی‌ها، مزایا، برنامه‌ریزی و استقرار با استفاده از سیسکو هوشمند WAN (IWAN)، کسب‌وکارها می‌توانند تجربه، امنیت و قابلیت اطمینان بی‌خطری را در هر اتصالی به دفاتر شعبه ارائه دهند. Cisco IWAN طراحی WAN را ساده می کند، پاسخگویی شبکه را بهبود می بخشد و استقرار سرویس های جدید را تسریع می بخشد. اکنون، یک راهنمای تک منبع معتبر برای Cisco IWAN وجود دارد: تنها چیزی که برای درک آن، طراحی و استقرار آن برای حداکثر ارزش نیاز دارید. در Cisco Intelligent WAN (IWAN)، کارشناسان پیشرو سیسکو تمام فناوری‌ها و اجزای کلیدی IWAN را پوشش می‌دهند و به مسائلی از دید و تهیه تا عیب‌یابی و بهینه‌سازی رسیدگی می‌کنند. آنها راهنمایی های عملی گسترده ای را در مورد مهاجرت به IWAN از زیرساخت WAN موجود شما ارائه می دهند. این راهنما برای همه متخصصان باتجربه شبکه که از WAN ها پشتیبانی می کنند، راه حل های Cisco IWAN را به کار می برند، یا از فناوری های مرتبط مانند DMVPN یا PfR استفاده می کنند، ضروری است. استقرار اتصال WAN هیبریدی برای افزایش ظرفیت WAN و بهبود عملکرد برنامه، پوشش DMVPN در انتقال WAN برای ساده کردن عملیات، به دست آوردن استقلال حمل و نقل و بهبود مقیاس پذیری VPN. قابلیت مشاهده بهبود تحویل برنامه و کارایی WAN از طریق مرکز مانیتور PfR، سایت‌های ترانزیت و شعبه، کلاس‌های ترافیک و کانال‌ها افزودن دید در سطح برنامه و نظارت بر هر برنامه به روترهای IWAN غلبه بر تأخیر و ناکارآمدی پهنای باند که عملکرد برنامه را محدود می‌کند از Cisco WAAS برای سفارشی‌سازی استفاده کنید. بهینه‌سازی‌ها، شتاب‌دهی برنامه‌ها و مجازی‌سازی هر مکان به آرامی Cisco WAAS را در زیرساخت شبکه شعبه ادغام کنید. اطمینان از پاسخگویی و تجربه مناسب برنامه WAN بهبود عملکرد برنامه SaaS با دسترسی مستقیم به اینترنت (DIA) انجام وظایف قبل از مهاجرت و آماده کردن WAN فعلی برای IWAN فناوری های فعلی نقطه به نقطه و چند نقطه را به IWAN منتقل کنید


توضیحاتی درمورد کتاب به خارجی

The complete guide to Cisco(R) IWAN: features, benefits, planning, and deployment Using Cisco Intelligent WAN (IWAN), businesses can deliver an uncompromised experience, security, and reliability to branch offices over any connection. Cisco IWAN simplifies WAN design, improves network responsiveness, and accelerates deployment of new services. Now, there\'s an authoritative single-source guide to Cisco IWAN: all you need to understand it, design it, and deploy it for maximum value. In Cisco Intelligent WAN (IWAN), leading Cisco experts cover all key IWAN technologies and components, addressing issues ranging from visibility and provisioning to troubleshooting and optimization. They offer extensive practical guidance on migrating to IWAN from your existing WAN infrastructure. This guide will be indispensable for all experienced network professionals who support WANs, are deploying Cisco IWAN solutions, or use related technologies such as DMVPN or PfR. Deploy Hybrid WAN connectivity to increase WAN capacity and improve application performance Overlay DMVPN on WAN transport to simplify operations, gain transport independence, and improve VPN scalability Secure DMVPN tunnels and IWAN routers Use Application Recognition to support QoS, Performance Routing (PfR), and application visibility Improve application delivery and WAN efficiency via PfR Monitor hub, transit, and branch sites, traffic classes, and channels Add application-level visibility and per-application monitoring to IWAN routers Overcome latency and bandwidth inefficiencies that limit application performance Use Cisco WAAS to customize each location\'s optimizations, application accelerations, and virtualization Smoothly integrate Cisco WAAS into branch office network infrastructure Ensure appropriate WAN application responsiveness and experience Improve SaaS application performance with Direct Internet Access (DIA) Perform pre-migration tasks, and prepare your current WAN for IWAN Migrate current point-to-point and multipoint technologies to IWAN



فهرست مطالب

Cover
Title Page
Copyright Page
About the Authors
About the Technical Reviewers
Acknowledgments
Contents
Foreword
Introduction
Part I: Introduction to IWAN
	Chapter 1 Evolution of the WAN
		WAN Connectivity
			Leased Circuits
			Internet
			Multiprotocol Label Switching VPNs (MPLS VPNs)
		Increasing Demands on Enterprise WANs
			Server Virtualization and Consolidation
			Cloud-Based Services
			Collaboration Services
			Bring Your Own Device (BYOD)
			Guest Internet Access
		Quality of Service for the WAN
		Branch Internet Connectivity and Security
			Centralized Internet Access
			Distributed Internet Access
		Cisco Intelligent WAN
			Transport Independence
			Intelligent Path Control
			Application Optimization
			Secure Connectivity
			Zone-Based Firewall
			Cloud Web Security
			Software-Defined Networking (SDN) and Software-Defined WAN (SD-WAN)
		Summary
Part II: Transport Independent Design
	Chapter 2 Transport Independence
		WAN Transport Technologies
			Dial-Up
			Leased Circuits
			Virtual Circuits
			Peer-to-Peer Networks
			Broadband Networks
			Cellular Wireless Networks
			Virtual Private Networks (VPNs)
			Remote Access VPN
			Site-to-Site VPN Tunnels
			Hub-and-Spoke Topology
			Full-Mesh Topology
			Multiprotocol Label Switching (MPLS) VPNs
			Layer 2 VPN (L2VPN)
			Layer 3 VPN (L3VPN)
			MPLS VPNs and Encryption
			Link Oversubscription on Multipoint Topologies
			Dynamic Multipoint VPN (DMVPN)
		Benefits of Transport Independence
			Managing Bandwidth Cost
			Leveraging the Internet
			Intelligent WAN Transport Models
		Summary
	Chapter 3 Dynamic Multipoint VPN
		Generic Routing Encapsulation (GRE) Tunnels
			GRE Tunnel Configuration
			GRE Example Configuration
		Next Hop Resolution Protocol (NHRP)
		Dynamic Multipoint VPN (DMVPN)
			Phase 1: Spoke-to-Hub
			Phase 2: Spoke-to-Spoke
			Phase 3: Hierarchical Tree Spoke-to-Spoke
		DMVPN Configuration
			DMVPN Hub Configuration
			DMVPN Spoke Configuration for DMVPN Phase 1 (Point-to-Point)
			Viewing DMVPN Tunnel Status
			Viewing the NHRP Cache
			DMVPN Configuration for Phase 3 DMVPN (Multipoint)
		Spoke-to-Spoke Communication
			Forming Spoke-to-Spoke Tunnels
			NHRP Route Table Manipulation
			NHRP Route Table Manipulation with Summarization
		Problems with Overlay Networks
			Recursive Routing Problems
			Outbound Interface Selection
			Front-Door Virtual Route Forwarding (FVRF)
			Configuring Front-Door VRF (FVRF)
			FVRF Static Routes
			Verifying Connectivity on an FVRF Interface
			Viewing the VRF Routing Table
		IP NHRP Authentication
		Unique IP NHRP Registration
		DMVPN Failure Detection and High Availability
			NHRP Redundancy
			NHRP Traffic Statistics
			DMVPN Tunnel Health Monitoring
		DMVPN Dual-Hub and Dual-Cloud Designs
		IWAN DMVPN Sample Configurations
		Sample IWAN DMVPN Transport Models
		Backup Connectivity via Cellular Modem
			Enhanced Object Tracking (EOT)
			Embedded Event Manager
		IWAN DMVPN Guidelines
		Troubleshooting Tips
		Summary
		Further Reading
	Chapter 4 Intelligent WAN (IWAN) Routing
		Routing Protocol Overview
		Topology
		WAN Routing Principles
			Multihomed Branch Routing
			Route Summarization
			Traffic Engineering for DMVPN and PfR
		EIGRP for IWAN
			Base Configuration
			Verification of EIGRP Neighbor Adjacencies
			EIGRP Stub Sites on Spokes
			EIGRP Summarization
			EIGRP Traffic Steering
			Complete EIGRP Configuration
			Advanced EIGRP Site Selection
		Border Gateway Protocol (BGP)
			BGP Routing Logic
			Base Configuration
			BGP Neighbor Sessions
			Default Route Advertisement into BGP
			Routes Learned via DMVPN Tunnel Are Always Preferred
			Branch Router Configuration
			Single-Router Branch Sites
			Multiple-Router Branch Sites
			Changing BGP Administrative Distance
			Route Advertisement on DMVPN Hub Routers
			DMVPN Hub LAN Connectivity Health Check
			BGP Route Advertisement on Hub Routers
			BGP Route Filtering
			Redistribution of BGP into OSPF
			Traffic Steering
			Complete BGP Configuration
			Advanced BGP Site Selection
		FVRF Transport Routing
		Multicast Routing
			Multicast Distribution Trees
			Source Trees
			Shared Trees
			Rendezvous Points
			Protocol Independent Multicast (PIM)
			Source Specific Multicast (SSM)
			Multicast Routing Table
			IWAN Multicast Configuration
			Hub-to-Spoke Multicast Stream
			Spoke-to-Spoke Multicast Traffic
			Modify the SPT Threshold
			Modify the Multicast Routing Table
		Summary
		Further Reading
	Chapter 5 Securing DMVPN Tunnels and Routers
		Elements of Secure Transport
		IPsec Fundamentals
			Security Protocols
			Authentication Header
			Encapsulating Security Payload (ESP)
			Key Management
			Security Associations
			ESP Modes
			DMVPN without IPsec
			DMVPN with IPsec in Transport Mode
			DMVPN with IPsec in Tunnel Mode
		IPsec Tunnel Protection
			Pre-shared Key Authentication
			IKEv2 Keyring
			IKEv2 Profile
			IPsec Transform Set
			IPsec Profile
			Encrypting the Tunnel Interface
			IPsec Packet Replay Protection
			Dead Peer Detection
			NAT Keepalives
			Complete Configuration
			Verification of Encryption on IPsec Tunnels
			Private Key Infrastructure (PKI)
			IOS Certificate Authority (CA) Server
			DMVPN Hub PKI Trustpoints
			DMVPN Branch PKI Trustpoints
			PKI IPsec Protection Configurations
			Certificate Registration with Out-of-Band Management Tunnel
		IKEv2 Protection
			Basic IOS CA Management
		Securing Routers That Connect to the Internet
			Access Control Lists (ACLs)
			Zone-Based Firewalls (ZBFWs)
			Self
			Default
			ZBFW Configuration
		Control Plane Policing (CoPP)
			IOS Embedded Packet Capture (EPC)
			IOS XE Embedded Packet Capture
			Analyzing and Creating the CoPP Policy
		Device Hardening
		Summary
		Further Reading
Part III: Intelligent Path Control
	Chapter 6 Application Recognition
		What Is Application Recognition?
		What Are the Benefits of Application Recognition?
		NBAR2 Application Recognition
		NBAR2 Application ID, Attributes, and Extracted Fields
			NBAR2 Application ID
			NBAR2 Application Attributes
			NBAR2 Layer 7 Extracted Fields
		NBAR2 Operation and Functions
			Phases of Application Recognition
			First Packet Classification
			Multistage Classification
			Final Classification
			Further Tracking
			NBAR2 Engine and Best-Practice Configuration
			Multipacket Engine
			DNS Engine
			DNS Authoritative Source (DNS-AS) Engine
			DNS Classification by Domain
			Cisco Intelligent WAN (IWAN) Control and Data Bundling Engine
			Behavioral and Statistical Engine
			Layer 3, Layer 4, and Sockets Engine
			Transport Hierarchy
			Subclassification
		Custom Applications and Attributes
			Auto-learn Traffic Analysis Engine
			Traffic Auto-customization
			Manual Application Customization
			HTTP Customization
			SSL Customization
			DNS Customization
			Composite Customization
			Layer 3/Layer 4 Customization
			Byte Offset Customization
			Manual Application Attributes Customization
		NBAR2 State with Regard to Device High Availability
		Encrypted Traffic
		NBAR2 Interoperability with Other Services
		NBAR2 Protocol Discovery
			Enabling NBAR2 Protocol Discovery
			Displaying NBAR2 Protocol Discovery Statistics
			Clearing NBAR2 Protocol Discovery Statistics
		NBAR2 Visibility Dashboard
		NBAR2 Protocol Packs
			Release and Download of NBAR2 Protocol Packs
			NBAR2 Protocol Pack License
			Application Customization
			NBAR2 Protocol Pack Types
			NBAR2 Protocol Pack States
			Identifying the NBAR2 Software Version
			Verifying the Active NBAR2 Protocol Pack
			Loading an NBAR2 Protocol Pack
			NBAR2 Taxonomy File
			Protocol Pack Auto Update
			Protocol Pack Configuration Server
			Protocol Pack Source Server
		Validation and Troubleshooting
			Verify the Software Version
			Check the Device License
			Verifying That NBAR2 Is Enabled
			Verifying the Active NBAR2 Protocol Pack
			Checking That Policies Are Applied Correctly
			Reading Protocol Discovery Statistics
			Granular Traffic Statistics
			Discovering Generic and Unknown Traffic
			Verifying the Number of Flows
		Summary
		Further Reading
	Chapter 7 Introduction to Performance Routing (PfR)
		Performance Routing (PfR)
			Simplified Routing over a Transport-Independent Design
			“Classic” Path Control Used in Routing Protocols
			Path Control with Policy-Based Routing
			Intelligent Path Control—Performance Routing
			Introduction to PfRv3
		Introduction to the IWAN Domain
			IWAN Sites
			Device Components and Roles
			IWAN Peering
			Parent Route Lookups
		Intelligent Path Control Principles
			PfR Policies
			Site Discovery
			Site Prefix Database
			PfR Enterprise Prefixes
			WAN Interface Discovery
			Hub and Transit Sites
			Branch Sites
			Channel
			Smart Probes
			Traffic Class
			Path Selection
			Direction from Central Sites (Hub and Transit) to Spokes
			Direction from Spoke to Central Sites (Hub and Transit)
			Performance Monitoring
			Threshold Crossing Alert (TCA)
			Path Enforcement
		Summary
		Further Reading
	Chapter 8 PfR Provisioning
		IWAN Domain
		Topology
			Overlay Routing
			Advertising Site Local Subnets
			Advertising the Same Subnets
			Traffic Engineering for PfR
			PfR Components
		PfR Configuration
			Master Controller Configuration
			Hub Site MC Configuration
			Transit Site MC Configuration
			Branch Site MC Configuration
			MC Status Verification
			BR Configuration
			Transit BR Configuration
			Branch Site BR Configuration
			BR Status Verification
			NetFlow Exports
			Domain Policies
			Performance Policies
			Load-Balancing Policy
			Path Preference Policies
			Quick Monitor
			Hub Site Master Controller Settings
			Hub, Transit, or Branch Site Specific MC Settings
			Complete Configuration
		Advanced Parameters
			Unreachable Timer
			Smart Probes Ports
			Transit Site Affinity
		Path Selection
			Routing—Candidate Next Hops
			Routing—No Transit Site Preference
			Routing—Site Preference
			PfR Path Preference
			PfR Transit Site Preference
			Using Transit Site Preference and Path Preference
		Summary
		Further Reading
	Chapter 9 PfR Monitoring
		Topology
		Checking the Hub Site
			Check the Routing Table
			Checking the Hub MC
			Checking the Hub BRs
			Verification of Remote MC SAF Peering with the Hub MC
		Checking the Transit Site
		Check the Branch Site
			Check the Routing Table
			Check Branch MC Status
			Check the Branch BR
		Monitoring Operations
			Routing Table
			Monitor the Site Prefix
			Monitor Traffic Classes
			Monitor Channels
			Transit Site Preference
			With Transit Site Affinity Enabled (by Default)
			With Transit Site Affinity Disabled (Configured)
		Summary
		Further Reading
	Chapter 10 Application Visibility
		Application Visibility Fundamentals
			Overview
			Components
			Flows
			Observation Point
			Flow Direction
			Source/Destination IP Versus Connection
		Performance Metrics
			Application Response Time Metrics
			Media Metrics
			Web Statistics
			HTTP Host
			URI Statistics
		Flexible NetFlow
			Flexible NetFlow Overview
			Configuration Principles
			Create a Flexible NetFlow Flow Record
			Create a Flow Exporter
			Create a Flow Monitor
			Apply a Flow Monitor to the WAN
			Flexible NetFlow for Application Visibility
			Use Case 1: Flow Statistics
			Use Case 2: Application Client/Server Statistics
			Use Case 3: Application Usage
			Monitoring NetFlow Data
			View Raw Data Directly on the Router
			View Reports on NetFlow Collectors
			Flexible NetFlow Summary
		Evolution to Performance Monitor
			Principles
			Performance Monitor Configuration Principles
			Easy Performance Monitor (ezPM)
			Application Statistics Profile
			Application Performance Profile
			Application Experience Profile
			ezPM Configuration Steps
			Monitoring Performance Monitor
		Metrics Export
			Flow Record, NetFlow v9, and IPFIX
			Terminology
			NetFlow Version 9 Packet Header Format (RFC 3954)
			IPFIX Packet Header Format (RFC 7011)
			Monitoring Exports
			Monitoring Performance Collection on Network Management Systems
		Deployment Considerations
			Performance Routing
			Interoperability with WAAS
		Summary
		Further Reading
Part IV: Application Optimization
	Chapter 11 Introduction to Application Optimization
		Application Behavior
			Bandwidth
			Latency
			Application Latency
			Network Latency
		Cisco Wide Area Application Services (WAAS)
			Cisco WAAS Architecture
			Application Optimizers
			Configuration Management System
			Data Redundancy Elimination (DRE) with Scheduler
			Storage
			Network I/O
			Interception and Flow Management
			TCP Optimization
			TCP Windows Scaling
			TCP Initial Window Size Maximization
			Increased Buffering
			Selective Acknowledgment (SACK)
			Binary Increase Congestion (BIC) TCP
		Caching and Compression
			Compression
			Data Redundancy Elimination (DRE)
			Unified Data Store
			Lempel-Ziv (LZ) Compression
			Object Caching
		Application-Specific Acceleration
			Microsoft Exchange Application Optimization
			HTTP Application Optimization
			SharePoint Application Optimization
			SSL Application Optimization
			Citrix Application Optimization
			CIFS Application Optimization
			SMB Application Optimization
			NFS Acceleration
			Akamai Connect
			Transparent Cache
			Akamai Connected Cache
			Dynamic URL HTTP Cache (Over-the-Top Cache)
			Content Prepositioning for Enhanced End-User Experience
		Summary
		Further Reading
	Chapter 12 Cisco Wide Area Application Services (WAAS)
		Cisco WAAS Architecture
			Central Management Subsystem
			Interface Manager
			Monitoring Facilities and Alarms
			Network Interception and Bypass Manager
			Application Traffic Policy Engine
			Disk Encryption
		Cisco WAAS Platforms
			Router-Integrated Network Modules
			Appliances
			WAVE Model 294
			WAVE Model 594
			WAVE Model 694
			WAVE Model 7541
			WAVE Model 7571
			WAVE Model 8541
			Interception Modules
			Virtual WAAS
			ISR-WAAS
			Architecture
			Sizing
			WAAS Performance and Scalability Metrics
		WAAS Design and Performance Metrics
			Device Memory
			Disk Capacity
			Number of Optimized TCP Connections
			WAN Bandwidth and LAN Throughput
			Number of Peers and Fan-out Each
			Central Manager Sizing
			Licensing
		Cisco WAAS Operational Modes
			Transparent Mode
			Directed Mode
		Interception Techniques and Protocols
			Web Cache Communication Protocol
			WCCP Service Groups
			Forwarding and Return Methods
			Load Distribution
			Failure Detection
			Flow Protection
			Scalability
			Redirect Lists
			Service Group Placement
			Egress Methods
			Policy-Based Routing (PBR)
			Inline Interception
			AppNav Overview
			AppNav Cluster Components
			Class Maps
			AppNav Policies
			AppNav Site Versus Application Affinity
			AppNav IOM
			AppNav Controller Deployment Models
			AppNav Controller Interface Modules
			AppNav IOM Interfaces
			Guidelines and Limitations
			AppNav-XE
			Advantages of Using the AppNav-XE Component
			Guidelines and Limitations
		WAAS Interception Network Integration Best Practices
		Summary
		Further Reading
	Chapter 13 Deploying Application Optimizations
		GBI: Saving WAN Bandwidth and Replicating Data
		WAN Optimization Solution
		Deploying Cisco WAAS
			WAAS Data Center Deployment
			GBI Data Centers
			Data Center Device Selection and Placement
			Primary Central Manager
			Initial Primary Central Manager Configuration
			Configuring the Primary Central Manager’s NTP Settings
			Configuring the Primary Central Manager’s DNS Settings
			Configuring WAAS Group Settings
			Device Group Basic Settings
			Standby Central Manager
			Standby Central Manager’s Configuration
		AppNav-XE
			Initial GBI AppNav-XE Deployment
			Deploying a Data Center Cluster
			Deploying a Separate Node Group and Policy for Replication
			Deploying a New Policy for Data Center Replication
		GBI Branch Deployment
			Branch 1 Sizing
			Branch 1 Deployment
			Branch 12 Sizing
			Branch 12 WAAS Deployment
		Summary
Part V: QoS
	Chapter 14 Intelligent WAN Quality of Service (QoS)
		QoS Overview
		Ingress QoS NBAR-Based Classification
		Ingress LAN Policy Maps
		Egress QoS DSCP-Based Classification
		Egress QoS Policy Map
		Hierarchical QoS
		DMVPN Per-Tunnel QoS
			Per-Tunnel QoS Tunnel Markings
			Bandwidth-Based QoS Policies
			Bandwidth Remaining QoS Policies
			Subrate Physical Interface QoS Policies
			Association of Per-Tunnel QoS Policies
			Per-Tunnel QoS Verification
			Per-Tunnel QoS Caveats
		QoS and IPSec Packet Replay Protection
		Complete QoS Configuration
		Summary
		Further Reading
Part VI: Direct Internet Access
	Chapter 15 Direct Internet Access (DIA)
		Guest Internet Access
			Dynamic Host Configuration Protocol (DHCP)
			Network Address Translation (NAT)
			Verification of NAT
			Zone-Based Firewall (ZBFW) Guest Access
			Verification of ZBFW for Guest Access
		Guest Access Quality of Service (QoS)
		Guest Access Web-Based Acceptable Use Policy
			Guest Network Consent
			Guest Authentication
		Internal User Access
		Fully Specified Static Default Route
		Verification of Internet Connectivity
		Cisco Intelligent WAN (IWAN) Network Address Translation (NAT)
		Policy-Based Routing (PBR)
		Internal Access Zone-Based Firewall (ZBFW)
		Cloud Web Security (CWS)
		Baseline Configuration
		Outbound Proxy
		WAAS and WCCP Redirect
		Prevention of Internal Traffic Leakage to the Internet
		Summary
		References in this Chapter
Part VII: Migration
	Chapter 16 Deploying Cisco Intelligent WAN
		Pre-Migration Tasks
			Document the Existing WAN
			Network Traffic Analysis
			Proof of Concept
			Finalize the Design
		Migration Overview
			IWAN Routing Design Review
			EIGRP for the IWAN and the LAN
			BGP for the IWAN and an IGP (OSPF) for the LAN
			Routing Design During Migration
		Deploying DMVPN Hub Routers
		Migrating the Branch Routers
			Migrating a Single-Router Site with One Transport
			Migrating a Single-Router Site with Multiple Transports
			Migrating a Dual-Router Site with Multiple Transports
		Post-Migration Tasks
		Migrating from a Dual MPLS to a Hybrid IWAN Model
		Migrating IPsec Tunnels
		PfR Deployment
		Testing the Migration Plan
		Summary
		Further Reading
Part VIII: Conclusion
	Chapter 17 Conclusion and Looking Forward
		Intelligent WAN Today
		Intelligent WAN Architecture
		Intelligent WAN Tomorrow
Appendix A: Dynamic Multipoint VPN Redundancy Models
Appendix B: IPv6 Dynamic Multipoint VPN
Index
	A
	B
	C
	D
	E
	F
	G
	H
	I
	J
	K
	L
	M
	N
	O
	P
	Q
	R
	S
	T
	U
	V
	W
	X-Y-Z




نظرات کاربران