دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [2 ed.]
نویسندگان: CHRIS WILSON WILLIAM RIVERA NOEL CARTHERN
سری:
ISBN (شابک) : 9781484266717, 1484266714
ناشر: APRESS
سال نشر: 2021
تعداد صفحات: [1117]
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 35 Mb
در صورت تبدیل فایل کتاب CISCO NETWORKS : engineers' handbook of routing, switching, and security with ios, nx-os, and asa. به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب شبکه های سیسکو: راهنمای مهندسین مسیریابی، سوئیچینگ و امنیت با ios، nx-os و asa. نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
برای مهندسان شبکه مبتدی و با تجربه که وظیفه ایجاد اتصالات LAN، WAN و مرکز داده را بر عهده دارند، این کتاب دستورالعملهای روشنی را برای نصب، پیکربندی و عیبیابی شبکهها با دستگاههای سیسکو ارائه میکند. Cisco Networks، 2nd Edition یک راهنمای عملی و مرجع میز کار برای مهندسان سیسکو است. این نسخه جدید ابزارهایی را که میتوان برای خودکارسازی و عیبیابی شبکهها استفاده کرد، مورد بحث قرار خواهد داد. فصل جدیدی در مورد کیفیت خدمات برای آموزش مدیریت منابع شبکه با اولویت بندی انواع خاصی از ترافیک شبکه اضافه شده است. نسخه جدید دارای یک بخش بی سیم به روز شده است که بر یک کنترل کننده به روز شده و یکپارچه سازی با Cisco Identity Services Engine (ISE) و Cisco Prime Infrastructure تمرکز دارد. این همراه میز عملی به عنوان یک نمای کلی جامع از دانش و مهارت های اولیه مورد نیاز شرکت کنندگان در آزمون CCNA و CCNP دو چندان می شود. آشنایی قبلی با مسیریابی و سوئیچینگ سیسکو مطلوب است اما ضروری نیست، زیرا کریس کارترن، دکتر ویل ویلسون و نوئل ریورا کتاب خود را با مروری بر مبانی شبکه آغاز می کنند. علاوه بر این، آنها ملاحظات عملی و عیب یابی هنگام ایجاد یک رسانه فیزیکی برای ارتباطات شبکه را توضیح می دهند. بعداً آنها مفهوم لایه های شبکه، سوئیچینگ LAN میانی و مسیریابی را توضیح می دهند. سپس شما را با ابزارها و اتوماسیون مورد استفاده در شبکه های سیسکو آشنا می کنند. با حرکت رو به جلو، آنها هواپیماهای مدیریت، هواپیماهای داده و هواپیماهای کنترل را توضیح می دهند. سپس امنیت پیشرفته، عیب یابی و مدیریت شبکه را شرح می دهند. آنها کتاب را با بخشی که بر استفاده از اتوماسیون شبکه برای خودکارسازی شبکه های سیسکو IOS تمرکز دارد، پایان می دهند. آنچه خواهید آموخت پیکربندی سوئیچ ها، روترها و دستگاه های مرکز داده Cisco در معماری های شبکه شرکتی معمولی از ابزارهای کلاه سیاه برای انجام تست نفوذ بر روی امنیت شبکه خود استفاده کنید پیکربندی و ایمن شبکه های خصوصی مجازی (VPN) فعال کردن مدیریت هویت در شبکه خود با موتور خدمات هویت سیسکو (ISE) به. این کتاب چه کسی برای طراحان، مهندسان، برنامه نویسان، مدیران و دانشجویان شبکه است.
For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices. Cisco Networks, 2nd Edition is a practical guide and desk reference for Cisco engineers. This new edition will discuss tools that can be used to automate and troubleshoot networks. A new chapter on quality of service has been added to teach managing network resources by prioritizing specific types of network traffic. The new edition has an updated wireless section which focuses on an updated controller and integration with Cisco Identity Services Engine (ISE) and Cisco Prime Infrastructure. This practical desk companion doubles as a comprehensive overview of the basic knowledge and skills needed by CCNA and CCNP exam takers. Prior familiarity with Cisco routing and switching is desirable but not necessary, as Chris Carthern, Dr. Will Wilson, and Noel Rivera start their book with a review of network basics. Further they explain practical considerations and troubleshooting when establishing a physical medium for network communications. Later they explain the concept of network layers, intermediate LAN switching, and routing. Next they introduce you to the tools and automation used with Cisco networks. Moving forward they explain management planes, data planes, and control planes. Next they describe advanced security, trouble shooting, and network management. They conclude the book with a section which focuses on using network automation to automate Cisco IOS networks. What You Will Learn Configure Cisco switches, routers, and data center devices in typical corporate network architectures Use black-hat tools to conduct penetration testing on the security of your network Configure and secure virtual private networks (VPNs) Enable identity management in your network with the Cisco Identity Services Engine (ISE) to. Who This Book Is For Network designers, engineers, programmers, managers, and students.
Table of Contents About the Authors About the Technical Reviewer Acknowledgments Introduction Chapter 1: Introduction to Practical Networking Tools of the Trade Open Systems Interconnection (OSI) Model Physical Layer Data Link Layer Network Layer Transport Layer Connection-Oriented Session Layer Presentation Layer Application Layer The OSI Model: Bringing It All Together TCP/IP TCP/IP Application Layer TCP/IP Transport Layer TCP/IP Internet Layer TCP/IP Network Interface Layer Reliability Three-Way Handshake and Connection Termination User Datagram Protocol Port Numbers Types of Networks Personal Area Network Local Area Network Campus Area Network Metropolitan Area Network Wide Area Network Wireless Wide Area Network Virtual Private Network Hierarchical Internetwork Model Software-Defined Networking Overview Software-Defined Network Control Models Summary Chapter 2: The Physical Medium Layer 1 Standards Cables Twisted Pair Cable Coaxial Cable Fiber-Optic Cabling Fiber-Optic Transmission Rates Wireless Communication Ethernet Duplex Time Division Duplexing Frequency Division Duplexing Autonegotiation Unidirectional Link Detection Common Issues Duplex Mismatch Bad Connector Terminations Summary Chapter 3: Data Link Layer Protocols The Address Resolution Protocol (ARP) The Reverse Address Resolution Protocol (RARP) Link Layer Functions Framing Addressing Synchronizing Flow Control Error Control Link Layer Discovery Protocol (LLDP) Class of Endpoints LLDP Benefits Cisco Discovery Protocol (CDP) Address Resolution Mapping on IPv6 Networks Summary Chapter 4: The Network Layer with IP IP Addressing (Public vs. Private) Public Private IPv4 Class A Class B Class C IPv4 Packet Header IPv6 IPv6 Addresses IPv6 Packet Header Classless Inter-Domain Routing Subnetting Subnet Mask A Simple Guide to Subnetting Variable-Length Subnet Masking Classful Subnetting VLSM Subnetting Subnetting Exercises Subnetting Exercise Answers Exercise 1 Answers Exercise 2 Answers Exercise 3 Answers Exercise 4 Answers Summary Chapter 5: Intermediate LAN Switching Cisco Console Access Configuration Help Displaying the Running Configuration Configuring the Router Switching Link Aggregation Group (LAG) Spanning Tree Protocol Why Do You Need STP? How STP Works Bridge Protocol Data Units Rapid Spanning Tree Protocol Virtual Logical Network (VLAN) VLAN Configuration IOU1 Configuration Trunking Trunk Configuration Routing Between VLANs Routing VLAN Configurations VLAN Trunking Protocol VTP Modes VTP Pruning VTP Configuration Multiple Spanning Tree Protocol MSTP Configuration Port Priority Configuration Port Cost Configuration Distro1 Configuration Distro2 Configuration Access1 Configuration Access2 Configuration Summary Exercises Exercise Answers Exercise 1 IOU1 IOU2 Exercise 2 IOU1 IOU2 Exercise 3 IOU1 IOU2 IOU3 IOU4 IOU5 IOU5 Exercise 4 IOU1 IOU2 IOU3 IOU4 Exercise 5 IOU1 IOU2 IOU3 Exercise 6 IOU1 IOU2 IOU3 IOU4 Chapter 6: Routing Static Routing The Process of Routing Default Routing Testing Connectivity Dynamic Routing Protocols Distance-Vector Routing Protocol Link-State Routing Protocol Hybrid Routing Protocol RIP RIP Configuration Authentication EIGRP OSPF Configuring OSPF Router ID IS-IS IS-IS Addressing IS-IS Configuration Link-State Packet Database Authentication Passive Interfaces IS-IS Adjacency BGP BGP Configuration Administrative Distance RIP EIGRP OSPF IS-IS BGP Summary Exercises Exercise Answers Exercise 1 Exercise 2 Exercise 3 Exercise 4 Exercise 5 Exercise 6 Chapter 7: Introduction to Tools and Automation Tools Overview Introduction to Prime Infrastructure Hands-On Experience and Limitations Introduction to Identity Services Engine Introduction to Software-Defined WAN and vManage Introduction to Digital Network Architecture Introduction to Application Centric Infrastructure Vendor-Agnostic Automation Tools Summary Chapter 8: Basic Switch and Router Troubleshooting Troubleshooting Documenting Your Network First Things First: Identify the Problem Top-Down Approach Bottom-Up Approach Physical Medium and Ethernet VLANs and Trunks EtherChannel VTP Spanning Tree Routing Static Routing Dynamic Routing RIP EIGRP OSPF IS-IS BGP Summary Exercises Exercise Answers Exercise 1 Exercise 2 Exercise 3 Exercise 4 Exercise 5 Exercise 6 Exercise 7 Chapter 9: Network Address Translation and Dynamic Host Configuration Protocol NAT Static NAT Dynamic NAT Port Address Translation (PAT) DHCP DHCP Process DHCPDISCOVER DHCPOFFER DHCPREQUEST DHCPACK Setting Up a Router As a DHCP Client Setting Up a Router to Send a Request to a DHCP Server Setting Up a RouterAs a DHCP Server Summary Exercises Exercise Answers Exercise 1 Exercise 2 Exercise 3 Exercise 4 Chapter 10: Management Plane The Management Plane Defined Authentication and Authorization Basics User Accounts Password Recovery Banners Management Sessions Telnet SSH Console and Auxiliary Lines 10.6 Disabling Services Disabled Services Disabled Services on Interfaces Authentication, Authorization, and Accounting (AAA) RADIUS TACACS+ Certificate-Based Authentication and Authorization Monitoring/Logging Simple Network Management Protocol Syslog Prime Infrastructure Overview Introduction to Netconf Exercises Exercise Answers Exercise 1 Exercise 2 Exercise 3 Summary Chapter 11: Data Plane Traffic Protocols Filters and Introduction to Data Plane Security State Machines Stateful Protocols Stateless Protocols NetFlow and sFlow Exercises Summary Chapter 12: Control Plane Layer 2 Layer 2 and 3 Interaction Routing Protocols Interior Gateway Protocols Exterior Gateway Protocols Protocol-Independent Multicasting Domain Name System Network Time Protocol Tools for Control Plane Management Exercises Preliminary Work OSPF BGP NTP Named Mode EIGRP with Authentication Multicast Exercise Answers Preliminary Configurations Configuration Snippets Verification OSPF Configuration Snippets Verification BGP Configuration Snippets Verification NTP Configuration Snippets Verification Named Mode EIGRP with Authentication Configuration Snippets Verification Multicast Configuration Snippets Verification Summary Chapter 13: Introduction to Availability High Availability Layer 3 Multipathing First Hop Redundancy Protocol (FHRP) HSRP VRRP GLBP Multilinks Availability Exercises Exercise Answers Exercise 1 Exercise 2 Exercise 3 Summary Chapter 14: Advanced Routing EIGRP Unicast Summarization Load Balancing EIGRP Stub Traffic Engineering with EIGRP Authentication Multiarea and Advanced OSPF Summarization OSPF Stub Cost Manipulation OSPF Virtual Link Authentication Policy-Based Routing Using Route Maps Redistribution RIP Redistribution Overview EIGRP Redistribution Overview OSPF Redistribution Overview BGP Redistribution Overview Redistributing from OSPF Avoiding Loops and Suboptimal Routing BGP Address Families Peer Groups and Templates Dynamic Neighbors Next Hop Issues with iBGP Anycast Traffic Engineering with BGP IPv6 Routing EIGRPv6 OSPFv3 DHCPv6 Stateful DHCPv6 Server Example Stateless DHCPv6 Server Example NAT and IPV6 STATELESS Stateful NAT64 GRE Tunnels BGP Issues IPSec Router8 Configuration Router9 Configuration IKEv2 IKEv2 Proposal IKEv2 Policy IKEv2 Keyring IKEv2 Profile IKEv2 Smart Default Example Symmetric Key Configuration Asymmetric Pre-shared Key Configuration Summary Advanced Routing Exercises Exercise 1: EIGRP and OSFP Redistribution Exercise 2: GRE and IPSEC Exercise 3: IKEv2 Exercise 4: BGP Exercise 5: IPv6 OSPF and EIGRP Redistribution Exercise Answers Exercise 1 Router1 Configuration Router2 Configuration Router3 Configuration Router8 Configuration Exercise 2 Router7 Configuration Router4 Configuration Router5 Configuration Exercise 3 Router1 Configuration Router2 Configuration Exercise 4 Router1 Configuration Router2 Configuration Router3 Configuration Verification Exercise 5 Router1 Configuration Router2 Configuration Router3 Configuration Verification Chapter 15: QoS Intro to QoS Classifications and Markings Policing and Shaping QoS on Tunnels and Subinterfaces IPv6 QoS QoS Design Strategies Exercise Chapter 16: Advanced Security Private VLANs Use Case Promiscuous vs. Community vs. Isolated Configuration Extending Across L2 Trunk Extending Across Access Port Using Access Lists Extended ACL Configuration Inbound vs. Outbound VACL Configuration PACL 16.2.3.1 Configuration Troubleshooting ARP and DHCP Snooping Identity Services Engine ISE and 802.1x Switch Configuration Authentication Authorization TrustSec Compliance AAA Port Types Console AUX Port VTY Ports Local Authentication and Authorization Remote AAA (TACACS, RADIUS) Configuration Advanced Security Exercises Exercise 1: Extended ACL Exercises Exercise 2: AAA Exercises Exercise Answers Exercise 1 Exercise 2 Summary Chapter 17: Advanced Troubleshooting Access Control List VACL PACL Network Address Translation Static NAT Dynamic NAT Overload HSRP, VRRP, and GLBP HSRP VRRP EIGRP OSPF BGP Neighbor Relationships Missing Prefixes Route Redistribution EIGRP OSPF GRE Tunnels Recursive Routing IPSec Transform Mismatch Key Mismatch IPv6 Summary Advanced Troubleshooting Exercises Router1 Configuration Router2 Configuration Exercise Answers Exercise 1 Exercise 2 Exercise 3 Chapter 18: Effective Network Management Sample Network Logs Simple Network Management Protocol Service-Level Agreements and Embedded Event Manager sFlow and NetFlow Tools Intrusion Detection and Prevention Systems Management and Design of Management Data Exercises Syslog SNMP Service Policy Exercise Answers Initial Configuration Router1 Router2 Syslog SNMP Service Policy Summary Chapter 19: Data Center and NX-OS Fabric Design NX-OS NX-OSv VLAN Configuring a Non-routed VLAN Configuring a VLAN As a Routed Switched Virtual Interface (SVI) VLAN Trunking Protocol Nexus Routing EIGRP OSPF BGP Virtual Routing and Forwarding Contexts Port Channels Virtual Port Channels Port Profiles FEX First Hop Redundancy Protocols HSRP VRRP Nexus Security Local User Accounts TACACS+ Control Plane Policing Network Virtualization Virtual Device Context (VDC) Overlay Transport Virtualization Virtual Extensible LANs Overview Application Centric Infrastructure Overview NX-OS Exercise Exercise Answer Summary Chapter 20: Wireless LAN (WLAN) Wireless LANs (WLANs) Wireless Standards Wireless Components Wireless Access Points Wireless Controllers/Switches Installing a WLAN Wireless Site Survey Access Point Installation Access Point Configuration WLAN Controller Installation WLAN Controller Configuration Initial Configuration of WLC via a Web Browser WLC Monitoring VLAN Configuration DHCP Configuration WLAN Configuration MANAGEMENT Security Encryption and Authentication WPA 802.1x Authentication Server Cisco ISE Cisco ISE and WLAN Wireless Setup Wizard Hotspot Wizard BYOD Wizard Cisco Prime Administration: Prime Infrastructure server management. Wireless Network Monitoring Prime Infrastructure Maps Prime Infrastructure Configuration Threats and Vulnerabilities Summary Wireless Exercise Exercise Answers Exercise 1 Chapter 21: Firepower Testing Policies in a Safe Environment Management Access and Configuration Initial Setup Deploy the Management Console Machine Licensing Deploy the Threat Defense Virtual Machines Networking Requirements Stand-Alone Firepower Threat Defense Appliances Adding Devices to the FMC Updating and Patching Rule and Geolocation Updates and Scheduling Objects Overview Access List Address Pools DNS Server Group FlexConfig Interface Network PKI Port RADIUS Server Group URL Variable Set VPN Device Configuration Overview High Availability Containers Clustering Routing Static OSPF BGP DHCP Server Network Address Translation FlexConfig System Configuration and Platform Settings System Configuration Settings Platform Settings External Authentication Monitoring Overview Management Console Remote Syslog eStreamer Health Policies Access Policies Baselining and Discovery Access Policy Basics Application-Based Rules Intrusion Policies Introduction Intrusion Policy Tuning Virtual Private Networks Site to Site Remote Access Troubleshooting Summary Chapter 22: Introduction to Network Penetration Testing Overview Reconnaissance and Scanning Vulnerability Assessment Exploitation The Human Factor Summary Chapter 23: Multiprotocol Label Switching Multiprotocol Label Switching Basics Label Protocols LDP Security and Best Practices LDP Verification Layer 3 MPLS VPN Site-to-Site VPN BGP EIGRP OSPF VRF-Lite Shared Extranet Leaking Prefixes Layer 2 MPLS VPN IPv6 over MPLS Exercises MPLS Backbone Site-to-Site VPN Leak to CustomerB Tunneling IPv6 Exercise Answers MPLS Backbone PE1 Configuration PE2 Configuration P1 Configuration Verification Site-to-Site VPN CE-A1 Configuration CE-A2 Configuration PE1 Configuration PE2 Configuration Verification Leak to CustomerB CE-B1 Configuration PE2 Configuration PE1 Configuration Verification Tunneling IPv6 PE1 Configuration PE2 Configuration CE6-1 Configuration CE6-2 Configuration Verification Summary Chapter 24: DMVPN DMVPN Phase 1 DMVPN Phase 1 with Static Mapping DMVPN Phase 1 with Dynamic Mapping Phase 2 DMVPN Phase 2 with Static Mapping DMVPN Phase 2 with Dynamic Mapping Phase 3 Phase 3 with IPSec Phase 3 with OSPF FlexVPN Single-DMVPN Dual Hub Dual-DMVPN Dual Hub Summary DMVPN Exercises Exercise 1: DMVPN Phase 3 with BGP Exercise 2: IPSec Exercise 3: FlexVPN Exercise Answers Exercise 1: DMVPN Phase 3 with BGP Hub Configuration Branch2 Configuration Branch3 Configuration Branch4 Configuration Exercise 2: IPSec Hub Configuration Exercise 3: FlexVPN Hub Configuration Branch2 Configuration Branch3 Configuration Branch4 Configuration Index