Network Administrators Survival Guide
Home > Computing and Information Technology > Computer networking and communications > Network Administrators Survival Guide: (Networking Technology)
Network Administrators Survival Guide: (Networking Technology)

Network Administrators Survival Guide: (Networking Technology)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

The all-in-one practical guide to supporting your Cisco network   Provides detailed tips for using freeware and open-source tools readily available from the Internet, including the reasons behind choosing a particular tool Refer to a single source for common Cisco network administration issues Dedicated section for network security aids administrators in effectively dealing with security issues Deploy fully functional RADIUS and TACACS+ for servers for controlling access to Cisco devices Deploy Linux- and Windows-based syslog servers to centrally collect syslog information generated by Cisco devices Deploy Linux- and Windows-based network monitoring systems to monitor interface traffic through Cisco devices including routers, switches, VPN concentrators, and Cisco PIX® firewalls Use the trending feature of network monitoring systems for long-term network analysis and capacity planning Automatically detect and report configuration changes on Cisco IOS® Software-based devices and Cisco PIX firewalls Deploy Cisco-based VPNs in mixed environments using Linux- and Windows-based VPN servers  Network Administrators Survival Guide solves many common network administration problems by providing administrators with an all-in-one practical guide to supporting Cisco® networks using freeware tools. It is a single reference source that explains particular issues, their significance for administrators, and the installation and configuration process for the tools. The solutions are Cisco centric and provide detail not available in generic online information. Network Administrators Survival Guide emphasizes solutions for network managers and administrators of small to medium-sized businesses and enterprises.   Each chapter is broadly based on a network administration function, starting with an overview of the topic, followed by the methodology involved to accomplish that function. This includes the tools available, why they are the right choice, and their installation, configuration, and usage methods. For any given function, Network Administrators Survival Guide covers both Windows- and Linux-based tools as appropriate. Most of the Windows-based tools offer the advantage of GUI for ease of use, whereas the Linux-based tools are command-line based and can be used in automated scripts. Both are significant for network administrators.   Based on author Anand Deveriya’s extensive field experience, this practical guide to maintaining Cisco networks will save you significant time and money. Any network administrator—beginner or advanced—will find this book useful. The solutions to practical aspects of network administration make Network Administrators Survival Guide a must-have reference for supporting your Cisco network.    

Table of Contents:
Part I           Basic Network Administration Chapter 1   Cisco Device Installation                  Introduction                  Connecting to Cisco Devices for Configuration                  Local Connection Using a Console Interface                  Remote Connection Using Telnet                  Automating Tasks Using Macros                  Securing Remote Connections to Cisco Devices Using Secure Shell (SSH)                  Cisco Device Configuration for SSH                  SSH Client Installation                  Configuring Cisco Devices Using GUI Tools                  HTTP Interface for IOS-Based Devices                  PIX Device Manager                  Security Device Manager                  Other GUI Tools for Configuring Cisco Devices                  Managing System Files                  File Management Using a TFTP Server                  Configuring Cisco Devices to Use TFTP                  Using an FTP Server for File Management                  Summary Chapter 2   Basic Network Connectivity                  Basics of Network Monitoring Tools: ping and traceroute                  Verifying Network Connectivity Using traceroute                  Case Study: Using ping and traceroute to Isolate a BGP Meltdown Emergency                  Observation                  Conclusions                  Actions                  Advanced Network Connectivity Testing Tools                  Using whois Lookup for Domain Registration Information                  Using nslookup to Find DNS Information                  Using netstat for Port and Connection Information                  Using the MS Windows–Based netstat Command                  Using the arp Command to Trace Layer 2 Issues                  Summary   Chapter 3   Access Control                  Overview of AAA Technology                  TACACS+                  RADIUS                  RADIUS and TACACS+ Comparison                  Using TACACS+ for AAA                  Deploying a Linux-Based TACACS+ Server                  Configuring Cisco Routers for TACACS+                  Configuring a Cisco Switch for TACACS+                  Configuring Cisco PIX Firewalls for TACACS+                  Configuring a Cisco VPN Concentrator for TACACS+                  Using RADIUS for AAA                  Deploying a Linux-Based RADIUS Server                  Configuring a Microsoft IAS Server as a RADIUS Server                  Configuring a Cisco Router for RADIUS                  Configuring a Cisco Switch for RADIUS                  Configuring Cisco PIX Firewalls for RADIUS                  Commercial Products                  Summary   Chapter 4    Using Syslog                  Overview of Syslog                  Deploying Syslog Servers                  Deploying the Default Syslog Daemon                  Deploying a Linux-Based Syslog-ng Server                  Configuring a Windows-Based Syslog Server                  Securing Syslog Servers                  Configuring Cisco Devices to Use a Syslog Server                  Configuring Cisco Routers for Syslog                  Configuring a Cisco Switch for Syslog                  Configuring a Cisco PIX Firewall for Syslog                  Configuring a Cisco VPN Concentrator for Syslog                  Commercial Cisco Products                  Summary   Part II          Network Management Systems (NMS) Chapter 5   Monitoring Network Availability                  Network-Monitoring Fundamentals                  Network-Monitoring Terms                  Network-Monitoring Techniques                  Deploying a Network-Monitoring System                  Deploying a Linux-Based Big Brother Network-Monitoring System                  Deploying a Windows-Based Big Brother Network-Monitoring System                  Deploying Nagios for Linux-Based Network Monitoring                  Adding Redundancy and Security to Network-Monitoring Systems                  Commercial Cisco Products                  Summary   Chapter 6   Network Performance Monitoring                  Performance-Monitoring Overview                  Deploying Network Performance—Monitoring Tools                  Deploying a Linux-Based Performance-Monitoring System–MRTG                  Deploying a Windows-Based Performance-Monitoring System–MRTG                  Performance and Scalability Enhancements                  RRDTool                  Cricket                  Deploying a Windows-Based Performance-Monitoring System–Cacti                  Configuring Cisco Devices for Performance Monitoring                  Enabling the SNMP Agent on Cisco Routers                  Enabling the SNMP Agent on Cisco Switches                  Enabling the SNMP Agent on a Cisco PIX Firewall                  Enabling the SNMP Agent on Cisco VPN 3000 Concentrators                  Securing SNMP                  Commercial Cisco Offerings                  Summary   Part III         Security Chapter 7   Network Security Testing                  Network Security Testing Overview                  Bootable CD-ROM—Based Tool Kits                  Network Scanners                  Nmap Scanner                  Nessus Scanner                  Packet Analyzers                  Preparing the Network                  Using Packet Analyzers                  Summary   Chapter 8   Router and Switch Security                  Router and Switch Security Overview                  Securing Cisco Routers                  Best Practice Recommendations                  Summary   Chapter 9   Intrusion Detection System (IDS)                  IDS Overview                  IDS Classification                  IDS Placement                  IDS Tools                  Snort                  Rancid                  IDS Sensors Using Common Cisco Devices                  Router IDSs                  PIX IDSs                  Commercial Cisco Products                  Summary   Chapter 10 Virtual Private Networks (VPN)                  VPN Overview                  IPSec Overview                  Linux-Based VPNs                  OpenSWAN                  Interoperating OpenSWAN with Cisco IOS                  Interoperating OpenSWAN with a Cisco PIX Firewall                  Interoperating OpenSWAN with a Cisco VPN Concentrator                  Windows-Based VPNs                  Windows/Cisco Interoperability                  Summary   Part IV         Network Documentation Chapter 11 Documentation Tools: Network Diagrams                  Network Diagram Overview                  Topology                  File Formats                  Features                  Linux-Based Graphic Design Tools                  Deploying Dia                  Creating Diagrams with Dia                  Viewing Sample Dia Diagrams                  Windows-Based Graphic Design Tools                  Deploying Network Notepad                  Creating Diagrams in Network Notepad                  Viewing Sample Diagrams Created by Network Notepad                  What’s Next                  Summary   1587052113TOC91405  

About the Author :
Anand Deveriya, CCIE® No. 10401, is a senior network engineer with NEC Unified Solutions, where he designs and deploys secure, scalable, and redundant networks using Cisco technology and products. In his various networking roles, he has devised solutions for many of the network administration challenges noted throughout this book. Anand was a technical editor for CCIE Security Exam Certification Guide, published by Cisco Press.


Best Sellers


Product Details
  • ISBN-13: 9780133798739
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • Series Title: Networking Technology
  • ISBN-10: 0133798739
  • Publisher Date: 27 Sep 2005
  • Binding: Digital download
  • No of Pages: 240


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Network Administrators Survival Guide: (Networking Technology)
Pearson Education (US) -
Network Administrators Survival Guide: (Networking Technology)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Network Administrators Survival Guide: (Networking Technology)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!