cisco ccna and home network security artical

6.
Network Loop Prevention with the Rapid Spanning Tree Protocol (RSTP)
By Sean Wilkins
Jun 30, 2015
Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, examines the differences between the Spanning Tree Protocol (STP) and the more modern Rapid Spanning Tree Protocol (RSTP).
7.
Wireless LAN Implications, Problems, and Solutions
By Jim Geier
Jun 15, 2015
When designing and supporting a WLAN, however, you must be aware of potential implications, such as security vulnerabilities, radio signal interference, multipath propagation, and other issues. This chapter from Designing and Deploying 802.11 Wireless Networksexplains the impacts of these problems and introduces some ways to resolve them.



10.
Cisco Networking Academy Connecting Networks Companion Guide: Point-to-Point Connections
By Cisco Networking Academy
May 8, 2014
This chapter covers the terms, technology, and protocols used in serial connections, introducing the High-Level Data Link Control (HDLC) and Point-to-Point Protocol (PPP).
11.
Cisco Networking Academy Connecting Networks Companion Guide: Connecting to the WAN
By Cisco Networking Academy
May 7, 2014
Different technologies are used for WANs than for LANs. This chapter introduces WAN standards, technologies, and purposes. It covers selecting the appropriate WAN technologies, services, and devices to meet the changing business requirements of an evolving enterprise.
16.
Cisco Networking Academy's Introduction to Static Routing
By Cisco Networking Academy
Mar 27, 2014
This chapter explains the types of static routes as well as the advantages and disadvantages of each type. It also addresses routing configuration and troubleshooting.
17.
Cisco Networking Academy's Introduction to Routing Dynamically
By Cisco Networking Academy
Mar 24, 2014
This chapter explains multiple routing protocols (particularly dynamic routing protocols) and describes their relative strengths and weaknesses. It also shows how to read a routing table easily and interpret the IPv6 routing information listed within it.
18.
Cisco Networking Academy's Introduction to Routing Concepts
By Cisco Networking Academy
Mar 20, 2014
This chapter introduces and explains the primary functions and features of a router and explains the process for connecting and configuring devices to the router. It continues by describing the process by which routers manage packets, determine data paths, and build routing tables.
16.
Cisco Networking Academy's Introduction to Static Routing
By Cisco Networking Academy
Mar 27, 2014
This chapter explains the types of static routes as well as the advantages and disadvantages of each type. It also addresses routing configuration and troubleshooting.
17.
Cisco Networking Academy's Introduction to Routing Dynamically
By Cisco Networking Academy
Mar 24, 2014
This chapter explains multiple routing protocols (particularly dynamic routing protocols) and describes their relative strengths and weaknesses. It also shows how to read a routing table easily and interpret the IPv6 routing information listed within it.
18.
Cisco Networking Academy's Introduction to Routing Concepts
By Cisco Networking Academy
Mar 20, 2014
This chapter introduces and explains the primary functions and features of a router and explains the process for connecting and configuring devices to the router. It continues by describing the process by which routers manage packets, determine data paths, and build routing tables.
47.
IPv6 Translation and Tunneling Technologies
By Sean Wilkins
Jun 26, 2013
With the exhaustion of the IPv4 addressing space quickly approaching, it has become a high priority for organizations to begin their own deployments of IPv6. This can be accomplished in a number of different ways. This article examines specific methods and how they can be used to support an IPv6 deployment.
48.
IPv6 Tunneling Technology Configuration
By Sean Wilkins
Jun 26, 2013
This article focuses on the basic configuration of available IPv6 tunneling technologies for Cisco networks.
55.
Creating Your Own VPN
By Eric Geier
Oct 23, 2012
Security expert Eric Geier shows you how to set up a VPN to securely access your PC or network when you’re away, and to secure your Internet connection when using Wi-Fi hotspots.



60.
Protecting Your Network from the Wi-Fi Protected Setup Security Hole
By Eric Geier
Mar 12, 2012
Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.

61.
Network Security First-Step: Firewalls
By Donald StoddardThomas M. Thomas
Feb 8, 2012
This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
62.
ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
By Brad Bowers
Jan 9, 2012
Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.
65.
Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
By Eric Geier
Sep 20, 2011
Eric Geier shows you how to protect your privacy when logging on to online accounts that don't always use secure connections, like Facebook, MySpace, Twitter, and Amazon.

73.
Deploying IPv6 in WAN/Branch Networks
By Muninder SambiSanjay HoodaShannon McFarlandNikhil Sharma
Apr 13, 2011
This chapter provides and overview of WAN/branch deployment and also covers WAN/branch IPv6 deployment considerations, WAN/branch deployment over native IPv6, and includes an example of WAN/branch implementation.
74.
PKI Processes and Procedures
By Andre KaramanianFrancois DessartSrinivas Tenneti
Apr 1, 2011
Several processes need to occur in a PKI network for a deployment to function smoothly. To address these processes, this chapter covers enrollment, Certificate Expiration and Renewal, Certificate Verification and Enforcement, and PKI Resiliency.

81.
Cisco Unified Wireless LAN Security Fundamentals
By Jake WoodhamsRobert MargJeff Smith
Dec 3, 2010
This chapter discusses the fundamentals of wireless LAN security in the context of the Cisco Unified Wireless Network (CUWN).
82.
The Evolution of Evil: Changes in the Use of USB Devices as Delivery Mechanisms for Malicious Code
By Brad Bowers
Oct 7, 2010
USB microcontrollers are small, capable of circumventing most malware detection software, and can deliver devastating payloads. Brad Bowers takes a closer look at this new attack vector and reveals some of the challenges IT security professionals face as the use of microcontrollers as an attack platform matures.
83.
Getting Owned: The USB Keystroke Injection Attack
By Seth Fogie
Oct 6, 2010
What do you call a USB-based device that can bypass all AV and autorun policies? Although most would consider it a perfect mischievous attack vector, Hyundai has used it as a tool to build customer loyalty. This leaves Seth Fogie wondering: Are people are planning to maliciously use this technology?
85.
Developing Network Security Strategies
By Priscilla Oppenheimer
Oct 4, 2010
To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.

89.
WLAN Design: Range, Performance, and Roaming Considerations
By Jim Geier
Aug 3, 2010
This chapter provides insight and addresses important elements you should consider to avoid common problems when designing a wireless LAN.

98.
CCDC and the Tale of the Insider Threat
By Brad Bowers
May 24, 2010
Brad Bowers discusses the value of including the threat of insider attacks in Collegiate Cyber Defense Competition (CCDC) events.
99.
Five Applications to Secure Your Wi-Fi Hotspot Connections
By Eric Geier
May 13, 2010
Don't risk eavesdroppers capturing your email, passwords, and other sensitive info! Eric Geier reviews five helpful apps that encrypt your wireless traffic.
100.
The Bad Guys from Outside: Malware
By Tom Gillis
Apr 29, 2010
In this chapter, you'll learn how malware works and why it presents such a threat to the enterprise.

102.
IPv6: Why Bother?
By David Chisnall
Apr 16, 2010
IPv6 has been coming Real Soon Now for well over a decade. David Chisnall looks at what the benefits it brings and how to support it.
103.
Moving to WPA/WPA2-Enterprise Wi-Fi Encryption
By Eric Geier
Apr 9, 2010
Wi-Fi networks in businesses should be using the Enterprise mode of WPA or WPA2 encryption. Eric Geier shows you how to move from the Personal (PSK) mode to the Enterprise (RADIUS) mode.
104.
Securing Your Wi-Fi Hotspot Sessions
By Eric Geier
Mar 30, 2010
Eric Geier shares tips to keep your email, documents, and computer safe while using Wi-Fi hotspots.

108.
Virtual LANs and VLAN Trunking
By Wendell OdomDenise DonohueRus Healy
Dec 25, 2009
This chapter covers some of the most fundamental and important LAN topics with coverage of VLANs and VLAN trunking in preparation for the CCIE Routing and Switching Exam.

110.
How to Network Windows 7, Vista, and XP Computers
By Eric Geier
Nov 13, 2009
Upgrading to Windows 7 but still have XP or Vista machines? No problem. Eric Geier shows you how to network among all these Windows versions.

111.
Creating a Hotspot Gateway with RouterOS
By Eric Geier
Nov 2, 2009
Eric Geier shows how to set up the integrated hotspot gateway with RouterOS.
112.
Creating a VPN Server with RouterOS
By Eric Geier
Oct 27, 2009
Eric Geier continues his RouterOS series by discussing its VPN capabilities
113.
Tips on Setting Up and Hosting a Wi-Fi Hotspot
By Eric Geier
Oct 21, 2009
Eric Geier shares tips on installing and operating a Wi-Fi hotspot.
114.
Ten Useful and Free Networking Tools
By Eric Geier
Oct 13, 2009
Eric Geier shares 10 free and useful networking tools and utilities.
115.
Supercharging Your Cheap Router with Enterprise Features
By Eric Geier
Oct 5, 2009
Did you know you can replace the firmware on your router? Eric Geier describes the highs and lows of aftermarket firmware projects.
116.
Seven Troubleshooting Tips for Wireless N Networks
By Eric Geier
Oct 1, 2009
Are your wireless N connections not getting the speeds, performance, or range you hoped for? Eric Geier helps you get your money's worth.
117.
Turn an Old PC into a LAN Server with RouterOS, Part 2
By Eric Geier
Sep 28, 2009
Eric Geier concludes his two-part tutorial on getting a RouterOS machine up and running on a spare PC.
118.
I/O Consolidation in the Data Center
By Claudio DeSantiSilvano Gai
Sep 23, 2009
This chapter explains the benefits and challenges of designing physical infrastructure to simultaneously carry multiple types of traffic.
119.
IP Routing Use Cases
By Muhammad Afaq Khan
Sep 22, 2009
This chapter discusses the capabilities of the Cisco ASR 1000 series router family and then reviews how those strengths can be used to address relevant problems.
120.
Turn an Old PC into a LAN Server with RouterOS, Part 1
By Eric Geier
Sep 21, 2009
Eric Geier shows you how to get an enterprise router at a fraction of the cost with the MikroTik RouterOS software that you can load onto an old PC.

121.
Using Static IP Addresses on Your Network
By Eric Geier
Sep 14, 2009
Eric Geier helps you discover ways to convert from dynamic to static addresses on your network.

121.
Using Static IP Addresses on Your Network
By Eric Geier
Sep 14, 2009
Eric Geier helps you discover ways to convert from dynamic to static addresses on your network.

148.
Attacking and Defending the Internet with Border Gateway Protocol (BGP)
By Carolyn Meinel
Aug 25, 2008
Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.
149.
CCENT/CCNA ICND1 Exam Guide: Introduction to Wireless LANs
By Wendell Odom
Jul 15, 2008
This chapter examines the basic concepts, standards, installation, and security options for some of the most common WLAN technologies today.
150.
CCNA ICND2 Exam Guide: Troubleshooting IP Routing
By Wendell Odom
Jul 10, 2008
This troubleshooting chapter explains ping and traceroute commands, the troubleshooting the packet forwarding process, and provides troubleshooting tools and tips.

153.
CCNA Portable Command Guide: IPv6
By Scott Empson
Jul 1, 2008
This chapter provides information and commands concerning a number of IPv6-related topics.
154.
Identifying and Classifying Network Security Threats
By Omar Santos
Jun 26, 2008
This chapter presents several best practices and methodologies you can use to successfully and quickly identify and classify security threats and anomalies in the network.

159.
SSL VPN Design Considerations
By Jazib FrahimQiang Huang
Jun 10, 2008
This chapter discusses design issues you should consider when you build a Secure Socket Layer (SSL) Virtual Private Network (VPN) solution.

165.
Border Gateway Protocol, Route Manipulation, and IP Multicast
By Anthony BrunoSteve Jordan
Oct 26, 2007

169.
SSH Security Primer: Server Security Settings
By John Traenkenschuh
Feb 23, 2007
John Tränkenschuh describes the settings and implementation details important to your OpenSSH server installation. Because an OpenSSH server functions as a VPN gateway as much as a means to transfer files and invoke commands remotely, it's important to get this right.
170.
SSH Security Primer: Client Security
By John Traenkenschuh
Feb 16, 2007
John Tränkenschuh provides a quick survey of SSH client security issues and suggested configurations for the reference SSH distribution, OpenSSH.

181.
Basic IPsec VPN Topologies and Configurations
By James Henry Carmouche
Sep 29, 2006
In this chapter, you will review several common deployments of IPsec virtual private networks (VPNs).
182.
Multiprotocol Label Switching Traffic Engineering Technology Overview
By Santiago Alvarez
Sep 22, 2006
This chapter presents a review of Multiprotocol Label Switching Traffic Engineering (MPLS TE) technology. MPLS TE can play an important role in the implementation of network services with quality of service (QoS) guarantees.
183.
How to Configure OpenVPN
By Michael Riley
Sep 8, 2006
Michael Riley shows you how to use OpenVPN for secure internet surfing on your client PCs. He’ll also help you set up the configuration that will allow you access to your home network while you’re traveling.

193.
Penetration Testing and Network Defense: Performing Host Reconnaissance
By Andrew WhitakerDaniel Newman
Jun 2, 2006
Malicious hackers also value reconnaissance as the first step in an effective attack. For them, seeing what is on the "other side of the hill" is crucial to knowing what type of attack to launch. Although penetration testers might not always have the luxury of time that a malicious hacker might have, they do recognize the value of reconnaissance. This chapter will help you develop network reconnaissance skills to help you protect your network from intrusion.
194.
Wireless LAN Design
By Catherine PaquetDiane Teare
Jun 2, 2006
This chapter discusses wireless LAN (WLAN) technology and describes how it improves mobility. After introducing WLANs as strategic assets to corporate networks, WLAN standards and components are discussed. The security and management of WLANs are explored, followed by design considerations for WLANs.
195.
Intrusion Prevention: Signatures and Actions
By Earl CarterJonathan Hogue
May 26, 2006
Attack signatures have been around for long enough that the definition should be universally understood, but that's not the case. Simply put, an IPS signature is any distinctive characteristic that identifies something. Using this definition, all IPS products use signatures of some kind, regardless of what the product descriptions claim. To find something and stop it, you must be able to identify it, and for you to identify it, it must display a distinct characteristic. This chapter introduces you to the concept of signatures.
196.
Home Network Router Security Secrets
By Andy Walker
Apr 7, 2006
Ever delve inside your home network routers and use the hidden security settings that can lock down a network nice and tight? Most people never do. Andy Walker reveals 10 secrets on how to easily access your router's security settings.
197.
A Student-Hacker Showdown at the Collegiate Cyber Defense Competition
By Seth Fogie
Mar 31, 2006
Students-turned-IT managers faced off against experienced hackers at the Mid-Atlantic Regional Collegiate Cyber Defense Competition. Seth Fogie witnessed this real-world competition and reports on its unexpected twists, turns, and even drama.

208.
IPSec Authentication and Authorization Models
By Vijay BollapragadaMohamed KhalidScott Wainner
Oct 21, 2005
This chapter covers IPSec features and mechanisms that are primarily targeted at the authentication of remote access users. You'll learn about XAUTH, which provides extended authentication for IPSec telecommuters by using authentication schemes such as RADIUS. MODECFG uses a push model to push attributes to the IPSec client.
209.
Deploying Cisco CallManager and Unity Devices
By David Bateman
Oct 14, 2005
This chapter covers all the required tasks needed to add phones and gateways to a Cisco CallManager system. Four methods to add phones to the system are discussed: manual registration, Auto-registration, BAT, and TAPS.
210.
Analyzing MPLS VPN Security
By Michael H. BehringerMonique Morrow
Oct 6, 2005
VPN users have certain expectations and requirements for their VPN service. In a nutshell, they want their service to be both private and secure. In other words, they want their VPN to be as secure as with dedicated circuits while gaining the scalability benefits of a shared infrastructure. Both concepts, of privacy and security, are not black and white, and need to be defined for a real world implementation. This chapter introduces you to VPN MPLS security requirements.
211.
Two-Factor Authentication in Windows
By Rick Cook
Oct 6, 2005
Simple passwords aren't good enough any more, as the flood of stories about phishing, fraud, and compromised accounts by the millions demonstrate. The Next Big Thing in computer security is two-factor authentication and, like it or not, you're probably going to be dealing with it in the next year or so. But two-factor authentication is a concept, not a product, and how it's implemented is critical to its success.

219.
Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams
By Jim DohertyNeil Anderson
Jul 1, 2005
In addition to viruses and worms, there are some other annoying programs and files out there that you need to protect your home network from. This chapter focuses on spam, cookies, spyware, and scams—what they are, how they work, and how to get rid of or at least control them.

224.
Cisco Network Security Fundamentals: Wireless Security
By Gert DeLaetGert Schauwers
Dec 30, 2004
This chapter covers wireless security—what it is, how it works, how it is configured, what threatens it, and what policies can be designed to secure it.
243.
Network Security Basics
By Robyn Aber
May 7, 2004
Robyn Aber help us to explore how routers and switches are the keys to a strong network foundation.Together they enable the intelligent, end-to-end movement of converged data, voice, and video information within or outside the business.
244.
Cisco Frame Relay Configurations
By Jonathan Chin
Apr 30, 2004
Jonathan Chin dicussess basic Frame Relay operations on Cisco routers in a router-based Frame Relay network.
262.
Cisco Self-Study: Implementing Cisco IPv6 Networks (IPV6)
By Regis Desmeules
Jun 6, 2003
Discover the ins and outs of the new IPv6 header format. You will also learn different configuration processes of IPv6 in relation to Cisco.
278.
VLANs and Trunking
By David HucabyStephen McQuerry
Oct 25, 2002
282.
VLAN Access Control Lists
By Stephen McQuerry
Oct 11, 2002
298.
IP Access List Security for CCNA Exam #640-607
By Wendell Odom
Apr 19, 2002
Wendell Odom reviews the characteristics and limitations of the distance vector routing protocol RIP as part of the preparation for the CCNA exam #640-607.
303.
IPSec Overview Part Five: Security Associations
By Andrew Mason
Feb 22, 2002
Andrew Mason concludes his five-part series on the Cisco implementation of IPSec with a discussion of IPSec security associations.
304.
IPSec Overview Part Four: Internet Key Exchange (IKE)
By Andrew Mason
Feb 22, 2002
In part 4 of his five-part series on the Cisco implementation of IPSec, Andrew Mason describes the Internet Key Exchange (IKE).
305.
IPSec Overview Part One: General IPSec Standards
By Andrew Mason
Feb 22, 2002
In part 1 of a five-part series on the Cisco implementation of IPSec, Andrew Mason delves into the components that make up the IPSec protocol suite.
306.
IPSec Overview Part Three: Cryptographic Technologies
By Andrew Mason
Feb 22, 2002
In part 3 of his five-part series on the Cisco implementation of IPSec, Andrew Mason describes the cryptographic component technologies used in IPSec.
307.
IPSec Overview Part Two: Modes and Transforms
By Andrew Mason
Feb 22, 2002
In part 2 of his five-part series on the Cisco implementation of IPSec, Andrew Mason describes tunnel and transport modes and briefly explains transforms.
316.
Network Address Translation
By Jeff DoyleJennifer Carroll
Feb 8, 2002
Network address translation (NAT) is a function by which IP addresses within a packet are replaced with different IP addresses. This sample chapter from Cisco Press focuses on NAT within routers.
320.
VPNs and VPN Technologies
By Andrew Mason
Jan 4, 2002
This sample chapter defines virtual private networks (VPNs) and explores fundamental Internet Protocol Security (IPSec) technologies.
328.
Dynamic Routing Protocols
By Jeff Doyle
Nov 16, 2001
This sample chapter from CCIE: Routing TCP/IP Volume I shows how routers can discover how to correctly switch packets to their respective destinations automatically and share that information with other routers via dynamic routing protocols.

0 comments: