Tweet this! Tweet this!

Saturday

251 Cabling - The Complete Guide to Network Wiring



The top-selling book on safe and effective cabling, endorsed by the Electronic Technician's Association International, has been updated to deliver the most current and reliable information. In this definitive guide, cable installers, network administrators, consultants, and technicians get all the crucial cabling information they need, including installer and troubleshooting tips and expanded coverage on fiber optic cables. A 32-page color insert offers quick identification of connectors and cables, as well as vendor information and recommendations. Since correct cable usage helps build reliable, high performance networks and incorrect cable usage can doom a network, don't miss out on this essential resource.

Click here to Download "251 Cabling - The Complete Guide to Network Wiring"

Friday

250 Cisco Press ASA 5505 Getting started guide



Cisco ASA 5505
Getting Started Guide

Software Version 8.0

Click here to Download "250 Cisco Press ASA 5505 Getting started guide"

249 Cisco Press IPSec VPN Design



The definitive design and deployment guide for secure virtual private networks
  • Learn about IPSec protocols and Cisco IOS IPSec packet processing
  • Understand the differences between IPSec tunnel mode and transport mode
  • Evaluate the IPSec features that improve VPN scalability and fault tolerance, such as dead peer detection and control plane keepalives
  • Overcome the challenges of working with NAT and PMTUD
  • Explore IPSec remote-access features, including extended authentication, mode-configuration, and digital certificates
  • Examine the pros and cons of various IPSec connection models such as native IPSec, GRE, and remote access
  • Apply fault tolerance methods to IPSec VPN designs
  • Employ mechanisms to alleviate the configuration complexity of a large- scale IPSec VPN, including Tunnel End-Point Discovery (TED) and Dynamic Multipoint VPNs (DMVPN)
  • Add services to IPSec VPNs, including voice and multicast
  • Understand how network-based VPNs operate and how to integrate IPSec VPNs with MPLS VPNs
Among the many functions that networking technologies permit is the ability for organizations to easily and securely communicate with branch offices, mobile users, telecommuters, and business partners. Such connectivity is now vital to maintaining a competitive level of business productivity. Although several technologies exist that can enable interconnectivity among business sites, Internet-based virtual private networks (VPNs) have evolved as the most effective means to link corporate network resources to remote employees, offices, and mobile workers. VPNs provide productivity enhancements, efficient and convenient remote access to network resources, site-to-site connectivity, a high level of security, and tremendous cost savings.

IPSec VPN Design is the first book to present a detailed examination of the design aspects of IPSec protocols that enable secure VPN communication. Divided into three parts, the book provides a solid understanding of design and architectural issues of large-scale, secure VPN solutions. Part I includes a comprehensive introduction to the general architecture of IPSec, including its protocols and Cisco IOS® IPSec implementation details. Part II examines IPSec VPN design principles covering hub-and-spoke, full-mesh, and fault-tolerant designs. This part of the book also covers dynamic configuration models used to simplify IPSec VPN designs. Part III addresses design issues in adding services to an IPSec VPN such as voice and multicast. This part of the book also shows you how to effectively integrate IPSec VPNs with MPLS VPNs.

IPSec VPN Design provides you with the field-tested design and configuration advice to help you deploy an effective and secure VPN solution in any environment.

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Click here to Download "249 Cisco Press IPSec VPN Design"

248 SSL Remote Access VPN




SSL Remote Access VPNs

An introduction to designing and configuring SSL virtual private networks

Jazib Frahim, CCIE® No. 5459

Qiang Huang, CCIE No. 4937

Cisco® SSL VPN solutions (formerly known as Cisco WebVPN solutions) give you a flexible and secure way to extend networking resources to virtually any remote user with access to the Internet and a web browser. Remote access based on SSL VPN delivers secure access to network resources by establishing an encrypted tunnel across the Internet using a broadband (cable or DSL) or ISP dialup connection.

SSL Remote Access VPNs provides you with a basic working knowledge of SSL virtual private networks on Cisco SSL VPN-capable devices. Design guidance is provided to assist you in implementing SSL VPN in existing network infrastructures. This includes examining existing hardware and software to determine whether they are SSL VPN capable, providing design recommendations, and guiding you on setting up the Cisco SSL VPN devices. Common deployment scenarios are covered to assist you in deploying an SSL VPN in your network.

SSL Remote Access VPNs gives you everything you need to know to understand, design, install, configure, and troubleshoot all the components that make up an effective, secure SSL VPN solution.

Jazib Frahim, CCIE® No. 5459, is currently working as a technical leader in the Worldwide Security Services Practice of the Cisco Advanced Services for Network Security. He is responsible for guiding customers in the design and implementation of their networks, with a focus on network security. He holds two CCIEs, one in routing and switching and the other in security.

Qiang Huang, CCIE No. 4937, is a product manager in the Cisco Campus Switch System Technology Group, focusing on driving the security and intelligent services roadmap for market-leading modular Ethernet switching platforms. During his time at Cisco, Qiang has played an important role in a number of technology groups, including the Cisco TAC security and VPN team, where he was responsible for trouble-shooting complicated customer deployments in security and VPN solutions. Qiang has extensive knowledge of security and VPN technologies and experience in real-life customer deployments. Qiang holds CCIE certifications in routing and switching, security, and ISP Dial.

* Understand remote access VPN technologies, such as Point-to-Point Tunneling Protocol (PPTP), Internet Protocol Security (IPsec), Layer 2 Forwarding (L2F), Layer 2 Tunneling (L2TP) over IPsec, and SSL VPN
* Learn about the building blocks of SSL VPN, including cryptographic algorithms and SSL and Transport Layer Security (TLS)
* Evaluate common design best practices for planning and designing an SSL VPN solution
* Gain insight into SSL VPN functionality on Cisco Adaptive Security Appliance (ASA) and Cisco IOS® routers
* Install and configure SSL VPNs on Cisco ASA and Cisco IOS routers
* Manage your SSL VPN deployment using Cisco Security Manager

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Click here to Download "248 SSL Remote Access VPN"

247 IPSec Virtual Private Networks


What is IPSec? What’s a VPNNetworksinglesecurity. Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies. After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies. point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become.

Click here to Download "247 IPSec Virtual Private Networks"

246 Fax Modem and Text for IP Telephony



Fax, Modem and Text for IP Telephony
This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.
IP Telephony has revolutionized many aspects of telecommunications and it continues to be deployed at a rapid pace. The benefits of transporting voice over an IP infrastructure include increased flexibility, better scalability, and a significant cost savings over traditional telephony networks. However, during the deployment of these VoIP solutions, other types of traditional telephony communications that can also realize these same benefits are often overlooked or ignored.
Fax, Modem, and Text for IP Telephony is a comprehensive resource that confronts the need for information on transporting alternative, non-voice communications over the IP protocol. Beginning with the basic theory and operation of fax, modem, and text telephony, this book then educates you on all of the current transport options that are available. An extensive design guide then provides the pertinent advice and best practices for making the correct planning decisions and choosing the best transport option for your network.
Fax, Modem, and Text for IP Telephony also includes meticulous configuration and troubleshooting guides. The configuration guides in this book include a number of sample configurations and tips to manage any fax, modem, or text deployment. The troubleshooting guides present the essential methodologies, debugs, and analysis tools for quickly resolving both the common and complex issues that may be encountered. This book is the perfect companion to other VoIP resources, and it is the only book that empowers you to successfully handle any fax, modem, or text implementation.
David Hanes, CCIE® No. 3491, is currently a senior engineer specializing in training, network design assistance, and troubleshooting of fax technologies for the Customer Assurance Engineering (CAE) group at Cisco®. Since joining Cisco in 1997, David has worked as a TAC engineer for the WAN, WAN Switching, and Multiservice Voice teams, a team lead for the Multiservice Voice team, and an escalation engineer covering a variety of voice and fax technologies. David has troubleshot escalated issues in Cisco customer networks worldwide and remains a technical resource for other Cisco employees and customers.
Gonzalo Salgueiro CCIE No. 4541, is a senior escalation engineer supporting voice, fax, and modem technologies for the Cisco TAC. Gonzalo has spent more than 11 years troubleshooting complex issues in large-scale VoIP networks as well as providing technical leadership for some of the most critical worldwide voice and fax deployments. Prior to joining the Escalation Team in 1999 Gonzalo had roles as a TAC engineer for both the Access/Dial and Multiservice Voice teams as well as a team lead for the Access/Dial team.


  • Learn basic and advanced operational theory and practical implementation of fax, modem, and text communications
  • Understand how to implement fax, modem, and text communications using protocols such as H.323, SIP, MGCP, and SCCP.
  • Explore the functionality and advantages of T.38 fax relay, passthrough, modem relay, T.37 Store-and-Forward Fax, and text relay for IP network deployments
  • Employ expert-recommended best practices and design solutions for deploying fax, modem, and text in an IP telephony environment
  • Optimize your network with comprehensive fax, modem, and text configuration and design tips for use with IOS and non-IOS gateways
  • Master the latest fax, modem, and text troubleshooting tools and techniques employed by Cisco engineers
Click here to Download "246 Fax Modem and Text for IP Telephony"

Thursday

245 Cisco press Firewall Fundamentals



The essential guide to understanding and using firewalls to protect personal computers and your network
  • An easy-to-read introduction to the most commonly deployed network security device
  • Understand the threats firewalls are designed to protect against
  • Learn basic firewall architectures, practical deployment scenarios, and common management and troubleshooting tasks
  • Includes configuration, deployment, and management checklists
Increasing reliance on the Internet in both work and home environments has radically increased the vulnerability of computing systems to attack from a wide variety of threats. Firewall technology continues to be the most prevalent form of protection against existing and new threats to computers and networks. A full understanding of what firewalls can do, how they can be deployed to maximum effect, and the differences among firewall types can make the difference between continued network integrity and complete network or computer failure. Firewall Fundamentals introduces readers to firewall concepts and explores various commercial and open source firewall implementations--including Cisco, Linksys, and Linux--allowing network administrators and small office/home office computer users to effectively choose and configure their devices. Firewall Fundamentals is written in clear and easy-to-understand language and helps novice users understand what firewalls are and how and where they are used. It introduces various types of firewalls, first conceptually and then by explaining how different firewall implementations actually work. It also provides numerous implementation examples, demonstrating the use of firewalls in both personal and business-related scenarios, and explains how a firewall should be installed and configured. Additionally, generic firewall troubleshooting methodologies and common management tasks are clearly defined and explained.

Click here to Download "245 Cisco press Firewall Fundamentals"

243 Cisco ASA Configuration Guide



Cisco ASA Configuration - Networking Professional's Library (2009)
McGraw-Hill Osborne Media | English | 2009-06-05 | ISBN: 0071622691 | 752 pages | PDF | 5.8 MB
"Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of information technology professionals or writing books, Richard's communication skills are unsurpassed. As information technology professionals we are faced with overcoming challenges every day...Cisco ASA Configuration is a great reference and tool for answering our challenges." --From the Foreword by Steve Marcinek (CCIE 7225), Systems Engineer, Cisco Systems

A hands-on guide to implementing Cisco ASA

Configure and maintain a Cisco ASA platform to meet the requirements of your security policy. Cisco ASA Configuration shows you how to control traffic in the corporate network and protect it from internal and external threats. This comprehensive resource covers the latest features available in Cisco ASA version 8.0, and includes detailed examples of complex configurations and troubleshooting. Implement and manage Cisco's powerful, multifunction network adaptive security appliance with help from this definitive guide.

• Configure Cisco ASA using the command-line interface (CLI) and Adaptive Security Device Manager (ASDM)
• Control traffic through the appliance with access control lists (ACLs) and object groups
• Filter Java, ActiveX, and web content
• Authenticate and authorize connections using Cut-through Proxy (CTP)
• Use Modular Policy Framework (MPF) to configure security appliance features
• Perform protocol and application inspection
• Enable IPSec site-to-site and remote access connections
• Configure WebVPN components for SSL VPN access
• Implement advanced features, including the transparent firewall, security contexts, and failover
• Detect and prevent network attacks
• Prepare and manage the AIP-SSM and CSC-SSM cards

Click here to Download "243 Cisco ASA Configuration Guide"

238 Reference guide to Fiber optic testing


Competitive market pressures demand that service providers continuously upgrade and maintain their networks to ensure the delivery of higher-speed, higher-quality applications and services to customers.
The advent of triple play and high speed systems raises the level of testing, accuracy, and precision required on the fiber infrastructure to support these new services. JDSU reduces the complexity around these new network architectures and this book makes them easier to test.
Following on from the earlier Fiber Optic Guide booklet (with over 25,000 copies printed worldwide), this new JDSU "Reference Guide to Fiber Optic Testing" is aimed at fiber optic installers, project managers, telecom technicians and engineers that need to understand, apply, and correctly measure and record the performance of fiber infrastructures.
This first volume reviews the basics in systems, standards, and network architectures and focuses on how to make the most of Optical Time Domain Reflectometers (OTDRs) to install, turn-up, and maintain fiber optic networks. The book covers:
  • Basic system and fiber infrastructure design
  • Basic fiber infrastructure testing
  • Basic OTDR testing
  • Advanced OTDR testing
Click here to Download "238 Reference guide to Fiber optic testing"

237 Glossary for Fiber optic testing


Competitive market pressures demand that service providers continuously upgrade and maintain their networks to ensure the delivery of higher-speed, higher-quality applications and services to customers.
The advent of triple play and high speed systems raises the level of testing, accuracy, and precision required on the fiber infrastructure to support these new services. JDSU reduces the complexity around these new network architectures and this book makes them easier to test.
Following on from the earlier Fiber Optic Guide booklet (with over 25,000 copies printed worldwide), this new JDSU "Reference Guide to Fiber Optic Testing" is aimed at fiber optic installers, project managers, telecom technicians and engineers that need to understand, apply, and correctly measure and record the performance of fiber infrastructures.
This first volume reviews the basics in systems, standards, and network architectures and focuses on how to make the most of Optical Time Domain Reflectometers (OTDRs) to install, turn-up, and maintain fiber optic networks. The book covers:
  • Basic system and fiber infrastructure design
  • Basic fiber infrastructure testing
  • Basic OTDR testing
  • Advanced OTDR testing
Click here to Download "237 Glossary for Fiber optic testing"

229 Routing TCPIP, Volume II (CCIE Professional Development series)



A detailed examination of exterior routing protocols and advanced IP routing issues
Routing TCP/IP, Volume II, enables you to:
* Master the operational components, configuration, and troubleshooting of BGP-4-the de facto interdomain routing protocol
* Understand the operation, configuration, and troubleshooting of NAT
* Learn how to deploy, configure, and troubleshoot IP multicast routing through an array of case studies and exercises
* Familiarize yourself with the design goals and current state of IPv6, the new generation of the IP protocol
* Implement router management through a diverse range of expert-tested methods
* Test and validate your knowledge with practical, comprehensive review questions, configuration exercises, and troubleshooting exercises
* Further your CCIE preparation while mastering advanced TCP/IP concepts

The complexities of exterior gateway protocols, including TCP connections, message states, path attributes, interior routing protocol interoperation, and setting up neighbor connections, require a comprehensive understanding of router operations in order to manage network growth. Routing TCP/IP, Volume II, provides you with the expertise necessary to understand and implement Border Gateway Protocol Version 4 (BGP-4), multicast routing, Network Address Translation (NAT), IPv6, and effective router management techniques. Jeff Doyle's practical approach, easy-to-read format, and comprehensive topic coverage make this book an instant classic and a must-have addition to any network professional's library.

Routing TCP/IP, Volume II, expands upon the central theme of Volume I: scalability and management of network growth. Volume II moves beyond the interior gateway protocols covered in Volume I to examine both inter-autonomous system routing and more exotic routing issues such as multicasting and IPv6. This second volume follows the same informational structure used effectively in Volume I: discussing the topic fundamentals, following up with a series of configuration examples designed to show the concept in a real-world environment, and relying on tested troubleshooting measures to resolve any problems that might arise. This book helps you accomplish more than earning the highly valued CCIE number after your name; it also helps you develop the knowledge and skills that are essential to perform your job at an expert level. Whether you are pursuing CCIE certification, need to review for your CCIE recertification exam, or are just looking for expert-level advice on advanced routing issues, Routing TCP/IP, Volume II, helps you understand foundation concepts and apply best practice techniques for effective network growth and management.

Click here to Download "229 Routing TCPIP, Volume II (CCIE Professional Development series)"

228 CCIE Professional Development Routing TCPIP Volume 1, 2nd Ed



A detailed examination of interior routing protocols — completely updated in a new edition

# A complete revision of the best-selling first edition–widely considered a premier text on TCP/IP routing protocols
# A core textbook for CCIE preparation and a practical reference for network designers, administrators, and engineers
# Includes configuration and troubleshooting lessons that would cost thousands to learn in a classroom and numerous real-world examples and case studies

Praised in its first edition for its approachable style and wealth of information, this new edition provides readers a deep understanding of IP routing protocols, teaches how to implement these protocols using Cisco routers, and brings readers up to date protocol and implementation enhancements. Routing TCP/IP, Volume 1, Second Edition, includes protocol changes and Cisco features that enhance routing integrity, secure routers from attacks initiated through routing protocols, and provide greater control over the propagation of routing information for all the IP interior routing protocols. Routing TCP/IP, Volume 1, Second Edition, provides a detailed analysis of each of the IP interior gateway protocols (IGPs). Its structure remains the same as the best-selling first edition, though information within each section is enhanced and modified to include the new developments in routing protocols and Cisco implementations. What’s New In This Edition? The first edition covers routing protocols as they existed in 1998. The new book updates all covered routing protocols and discusses new features integrated in the latest version of Cisco IOS Software. IPv6, its use with interior routing protocols, and its interoperability and integration with IPv4 are also integrated into this book. Approximately 200 pages of new information are added to the main text, with some old text removed. Additional exercise and solutions are also included.

Click here to Download "228 CCIE Professional Development Routing TCPIP Volume 1, 2nd Ed"

227 CCSP SNAA Quick reference Guide




CCSP SNAA Quick reference Guide

Click here to Download "227 CCSP SNAA Quick reference Guide"

183 Cisco Press Telecommunications Technologies Reference



A comprehensive guide to North American and international telecommunications standards
  • Complete reference for ITU standards
  • Covers signaling methods and SS7 node types and infrastructures
  • Elucidates E1 and R2 configuration and Japanese digital hierarchy
  • Thoroughly covers the North American T3 and international E3 digital hierarchies, including information on how to get more bandwidth out of both
  • Addresses T1 line coding and frame format schemes as well as implementation requirements
  • Itemizes Frame Relay specifications and covers its functions and configuration
  • Explains ATM and B-ISDN development and functionality
  • Presents the DOCSIS initialization sequence, configurations, and topologies
  • Explains the SMDS interface protocol, configuration, troubleshooting, and Data Exchange Interface (DXI)
  • Covers xDSL architectures, encoding technologies, circuit attributes, and power levels
  • Includes a detailed, thorough comparison of SONET and SDH technologies
Knowledge of telecommunications technologies such as DDS, ISDN, T1/E1, ATM, and SONET is critical in today's competitive IT job market. A comprehensive reference for IT engineers and managers working with WAN connectivity, Telecommunications Technologies Reference covers not only DDS, ISDN, T1, and other physical media but goes further to explain how their international counterparts work-much-needed information when working with today's global, sophisticated networks.
In addition to thoroughly explaining the practical applications of each of these technologies, Telecommunications Technologies Reference includes historical material on how and why each was designed and delves into the underlying principles that support the technologies. With its clear, logical organization, this valuable guide helps telecommunications professionals stay abreast of ever-evolving technologies and key new developments. "Expert whiteboards"-detailed sidebars written by seasoned industry professionals-impart advanced real-world information on major topics throughout the book. Chapter summaries and end-of-chapter review questions help reinforce important concepts and assess your comprehension level.
Whether you are an engineer seeking detailed information on routing data and voice communication, a student looking for an introductory overview of telecommunications resources, or a manager needing fundamental information on WAN technologies, Telecommunications Technologies Reference has all the information you need, collected neatly into one simple-to-reference book. This comprehensive resource will earn a place on your technical library bookshelf as a frequently referenced, indispensable telecommunications guide.


Click here to Download "183 Cisco Press Telecommunications Technologies Reference"

182 Cisco Press Top-Down Network Design 2nd Edition



* By Priscilla Oppenheimer.
* Published by Cisco Press.
* Series: Networking Technology.

Click here to Download "182 Cisco Press Top-Down Network Design 2nd Edition"

181 Cisco Press Understanding Cisco Security MARS


Learn the differences between various log aggregation and correlation systems

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Click here to Download "181 Cisco Press Understanding Cisco Security MARS"

180 Cisco Press TCP IP First Step



Your first step into the world of TCP/IP

* No TCP/IP experience required
* Includes clear and easily understood explanations
* Makes learning easy

Click here to Download "180 Cisco Press TCP IP First Step"

Friday

179 Junos For Dummies



Junos For Dummies by Michael Bushong, Cathy Gadecki, Aviva Garrett

Click here to Download "179 Junos For Dummies"

178 JUNOS Enterprise Routing



JUNOS Enterprise Routing Mar 2008 by OReilly

Click here to Download "178 JUNOS Enterprise Routing"

177 Junos Cookbook



Junos Cookbook (Juniper Networks Routing Platform) by OReilly

Click here to Download "177 Junos Cookbook"

Disclaimer

Disclaimer

All this information provided here is collected from various sources on the internet, I do not take responsibility of any violation of legal rights. If anything found to be violating and brought to my notice it will be removed asap.

Contact information is provided at the bottom of the page.

**
Google, as a third-party vendor, uses cookies to serve ads on our site **

Get Email Updates

Enter your email address:

Followers

Ads