Imate žicu za učenje?

Overview/Description Building a highly available virtual private network (VPN) network involves protecting it against expected failures, and enabling the VPN network to heal itself in a reasonable amount of time. Organizations have different uptime requirements for their networks. Frequently, when migrating from a traditional circuit-based WAN network, which had high availability mechanisms in place (backup dial interfaces, backup routers), the need to provide the same or better functionality in a VPN is paramount. Fully meshed virtual private networks (VPNs) present a scalability and...
Overview/Description The network infrastructure is one of the foundation elements of enterprise IT infrastructures and is a critical business asset of telecommunications service providers. A compromise of the network infrastructure or its individual components can have far-reaching consequences that can significantly increase risk to enterprise and service provider business processes. Cisco IOS Network Foundation Protection (NFP) provides a strategy for network infrastructure protection by using Cisco IOS Software security features. This course describes the threats against the network...
Overview/Description Remote access virtual private network (VPN) technologies allow mobile workers to access sensitive resources over untrusted networks by using modern transmission protection and access authorization technologies. Cisco IOS Software provides a rich set of remote access VPN features that cover a wide range of common enterprise use cases. This course introduces and compares remote access VPN technologies and access methods. Target Audience Network professionals responsible for securing and managing their network infrastructures who have CCNA certification, CCNA Security...
Overview/Description An IP Security (IPSec) virtual private network (VPN) is a VPN that you deploy on a shared infrastructure using IPSec transmission protection technology. You can use site-to-site IPSec VPNs as an alternative to a WAN infrastructure to replace or augment existing private networks that interconnect enterprise sites and use leased-line or enterprise-owned Frame Relay and ATM networks. IPSec VPNs do not inherently change WAN requirements, such as support for multiple WAN Layer 2 protocols, high reliability, and extensive scalability, but instead meet these requirements more...
Overview/Description When you are migrating to a VoIP network, all network requirements, including power and capacity planning, must be examined so that voice is seamlessly integrated into the existing network. IP telephony services provided over the campus infrastructure must have mechanisms set in place to differentiate traffic types and to offer priority processing to delay sensitive voice traffic. Congestion avoidance techniques, quality of service (QoS), and high availability also need to be implemented to ensure an optimal flow throughout the network. This course covers how to plan...
Overview/Description Over the last 50 years, businesses have achieved improving levels of productivity and competitive advantages through the use of communication and computing technology. Over the past 20 years the enterprise campus network has evolved, becoming a key element in this business computing and communication infrastructure. The increasing complexity of business and network requirements creates an environment where a fixed model no longer completely describes the set of capabilities and services that constitute the campus network today. The Cisco Life-cycle Services model uses a...
Overview/Description Businesses and consumers that rely on intranet and Internet services for their mission-critical communications require and expect their networks and applications to be continuously available to them. A network with high availability provides an alternative means by which all infrastructure paths and key servers can be accessed at all times. It is important for you as a Cisco administrator to know how to implement high availability using Cisco IOS software. Features such as Hot Standby Router Protocol (HSRP) provide Layer 3 redundancy to network hosts. Virtual Router...
Overview/Description A network with high availability provides an alternate means of allowing constant access to all infrastructure paths and key servers. High availability is not only about adding redundant devices. It also implies planning with an eye on where the points of failure occur, and to design the network so that these points of failure can be compensated for. As a Cisco administrator it is important for you to have the knowledge required to implement a highly available network. This course covers how to evaluate the uses, requirements, benefits, and performance expectations for...
Overview/Description Multiple active paths between switches can cause loops in the network topology. This can cause duplication of frames being forwarded. To prevent loops while providing path redundancy, you can use Spanning Tree Protocol (STP). One limitation of the traditional Spanning Tree Protocol (STP; IEEE 802.1D) is the convergence delay after a topology change. In response, several enhancements were made to improve this convergence time by adding specific Cisco features to the original 802.1D protocol, and by creating new protocols that are faster or more efficient. This course...
Overview/Description When a network architect hands off a design to you, you must be able to create an implementation plan based on your knowledge of VLANs. As a Cisco administrator, it is important that you understand the purpose of VLANs and how VLAN implementation can simplify network management and troubleshooting, and can improve network performance. You must be able to create an implementation plan, implement that plan, and then verify the operation of the VLANs and trunks. Sometimes network resources may be located far from where users might need them, and links between switches or...

Koraci do učenja

1Prijavi se

Prijavite se, a ako nemate korisničko ime, registrirajte se.

2Pronađi i upiši program

Pronađite edukacijske programe u Katalogu i Certifikaciji, ili koristite polje za pretragu.

3Uči

Upisani programi dostupni su u meniju Korisnik, Moji tečajevi.

»Detaljne upute

Trebate pomoć?