, , , , e.a.

Cisco Intelligent WAN (IWAN)

E-book Engels 2016 9780134423739
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Using Cisco Intelligent WAN (IWAN), businesses can deliver an uncompromised experience, security, and reliability to branch offices over any connection. Cisco IWAN simplifies WAN design, improves network responsiveness, and accelerates deployment of new services. Now, there’s an authoritative single-source guide to Cisco IWAN: all you need to understand it, design it, and deploy it for maximum value.

 

In Cisco Intelligent WAN (IWAN), leading Cisco experts cover all key IWAN technologies and components, addressing issues ranging from visibility and provisioning to troubleshooting and optimization. They offer extensive practical guidance on migrating to IWAN from your existing WAN infrastructure. This guide will be indispensable for all experienced network professionals who support WANs, are deploying Cisco IWAN solutions, or use related technologies such as DMVPN or PfR. Deploy Hybrid WAN connectivity to increase WAN capacity and improve application performance Overlay DMVPN on WAN transport to simplify operations, gain transport independence, and improve VPN scalability Secure DMVPN tunnels and IWAN routers Use Application Recognition to support QoS, Performance Routing (PfR), and application visibility Improve application delivery and WAN efficiency via PfR Monitor hub, transit, and branch sites, traffic classes, and channels Add application-level visibility and per-application monitoring to IWAN routers Overcome latency and bandwidth inefficiencies that limit application performance Use Cisco WAAS to customise each location’s optimisations, application accelerations, and virtualisation Smoothly integrate Cisco WAAS into branch office network infrastructure Ensure appropriate WAN application responsiveness and experience Improve SaaS application performance with Direct Internet Access (DIA) Perform pre-migration tasks, and prepare your current WAN for IWAN Migrate current point-to-point and multipoint technologies to IWAN

The full text downloaded to your computer

With eBooks you can: search for key concepts, words and phrases make highlights and notes as you study share your notes with friends

eBooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps.

Upon purchase, you will receive via email the code and instructions on how to access this product.

Time limit

The eBooks products do not have an expiry date. You will continue to access your digital ebook products whilst you have your Bookshelf installed.

Specificaties

ISBN13:9780134423739
Taal:Engels
Bindwijze:e-book

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p style="margin:0px;">Part I Introduction to IWAN</p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 1 Evolution of the WAN </p> <p style="margin:0px;">WAN Connectivity </p> <p style="margin:0px;">Increasing Demands on Enterprise WANs </p> <p style="margin:0px;">Quality of Service for the WAN </p> <p style="margin:0px;">Branch Internet Connectivity and Security </p> <p style="margin:0px;">Cisco Intelligent WAN </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Part II Transport Independent Design</p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 2 Transport Independence </p> <p style="margin:0px;">WAN Transport Technologies </p> <p style="margin:0px;">Benefits of Transport Independence </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 3 Dynamic Multipoint VPN </p> <p style="margin:0px;">Generic Routing Encapsulation (GRE) Tunnels </p> <p style="margin:0px;">Next Hop Resolution Protocol (NHRP) </p> <p style="margin:0px;">Dynamic Multipoint VPN (DMVPN) </p> <p style="margin:0px;">DMVPN Configuration </p> <p style="margin:0px;">Spoke-to-Spoke Communication </p> <p style="margin:0px;">Problems with Overlay Networks </p> <p style="margin:0px;">IP NHRP Authentication </p> <p style="margin:0px;">Unique IP NHRP Registration </p> <p style="margin:0px;">DMVPN Failure Detection and High Availability </p> <p style="margin:0px;">DMVPN Dual-Hub and Dual-Cloud Designs </p> <p style="margin:0px;">IWAN DMVPN Sample Configurations </p> <p style="margin:0px;">Sample IWAN DMVPN Transport Models </p> <p style="margin:0px;">Backup Connectivity via Cellular Modem </p> <p style="margin:0px;">IWAN DMVPN Guidelines </p> <p style="margin:0px;">Troubleshooting Tips </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Further Reading </p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 4 Intelligent WAN (IWAN) Routing </p> <p style="margin:0px;">Routing Protocol Overview </p> <p style="margin:0px;">Topology </p> <p style="margin:0px;">WAN Routing Principles </p> <p style="margin:0px;">EIGRP for IWAN </p> <p style="margin:0px;">Border Gateway Protocol (BGP) </p> <p style="margin:0px;">FVRF Transport Routing </p> <p style="margin:0px;">Multicast Routing </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Further Reading </p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 5 Securing DMVPN Tunnels and Routers </p> <p style="margin:0px;">Elements of Secure Transport </p> <p style="margin:0px;">IPsec Fundamentals </p> <p style="margin:0px;">IPsec Tunnel Protection </p> <p style="margin:0px;">IKEv2 Protection </p> <p style="margin:0px;">Securing Routers That Connect to the Internet </p> <p style="margin:0px;">Control Plane Policing (CoPP) </p> <p style="margin:0px;">Device Hardening </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Further Reading </p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Part III Intelligent Path Control</p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 6 Application Recognition </p> <p style="margin:0px;">What Is Application Recognition? </p> <p style="margin:0px;">What Are the Benefits of Application Recognition? </p> <p style="margin:0px;">NBAR2 Application Recognition </p> <p style="margin:0px;">NBAR2 Application ID, Attributes, and Extracted Fields </p> <p style="margin:0px;">NBAR2 Operation and Functions </p> <p style="margin:0px;">Custom Applications and Attributes </p> <p style="margin:0px;">NBAR2 State with Regard to Device High Availability </p> <p style="margin:0px;">Encrypted Traffic </p> <p style="margin:0px;">NBAR2 Interoperability with Other Services </p> <p style="margin:0px;">NBAR2 Protocol Discovery </p> <p style="margin:0px;">NBAR2 Visibility Dashboard </p> <p style="margin:0px;">NBAR2 Protocol Packs </p> <p style="margin:0px;">Validation and Troubleshooting </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Further Reading </p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 7 Introduction to Performance Routing (PfR) </p> <p style="margin:0px;">Performance Routing (PfR) </p> <p style="margin:0px;">Introduction to the IWAN Domain </p> <p style="margin:0px;">Intelligent Path Control Principles </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Further Reading </p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 8 PfR Provisioning </p> <p style="margin:0px;">IWAN Domain </p> <p style="margin:0px;">Topology </p> <p style="margin:0px;">PfR Configuration </p> <p style="margin:0px;">Advanced Parameters </p> <p style="margin:0px;">Path Selection </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Further Reading </p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 9 PfR Monitoring </p> <p style="margin:0px;">Topology </p> <p style="margin:0px;">Checking the Hub Site </p> <p style="margin:0px;">Checking the Transit Site </p> <p style="margin:0px;">Check the Branch Site </p> <p style="margin:0px;">Monitoring Operations </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Further Reading </p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 10 Application Visibility </p> <p style="margin:0px;">Application Visibility Fundamentals </p> <p style="margin:0px;">Performance Metrics </p> <p style="margin:0px;">Flexible NetFlow </p> <p style="margin:0px;">Evolution to Performance Monitor </p> <p style="margin:0px;">Metrics Export </p> <p style="margin:0px;">Deployment Considerations </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Further Reading </p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Part IV Application Optimization</p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 11 Introduction to Application Optimization </p> <p style="margin:0px;">Application Behavior </p> <p style="margin:0px;">Cisco Wide Area Application Services (WAAS) </p> <p style="margin:0px;">Caching and Compression </p> <p style="margin:0px;">Application-Specific Acceleration </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Further Reading </p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 12 Cisco Wide Area Application Services (WAAS) </p> <p style="margin:0px;">Cisco WAAS Architecture </p> <p style="margin:0px;">Cisco WAAS Platforms </p> <p style="margin:0px;">WAAS Design and Performance Metrics </p> <p style="margin:0px;">Cisco WAAS Operational Modes</p> <p style="margin:0px;">Interception Techniques and Protocols</p> <p style="margin:0px;">WAAS Interception Network Integration Best Practices </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Further Reading </p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 13 Deploying Application Optimizations </p> <p style="margin:0px;">GBI: Saving WAN Bandwidth and Replicating Data </p> <p style="margin:0px;">WAN Optimization Solution </p> <p style="margin:0px;">Deploying Cisco WAAS </p> <p style="margin:0px;">AppNav-XE</p> <p style="margin:0px;">GBI Branch Deployment</p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Part V QoS</p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 14 Intelligent WAN Quality of Service (QoS) </p> <p style="margin:0px;">QoS Overview </p> <p style="margin:0px;">Ingress QoS NBAR-Based Classification </p> <p style="margin:0px;">Ingress LAN Policy Maps </p> <p style="margin:0px;">Egress QoS DSCP-Based Classification </p> <p style="margin:0px;">Egress QoS Policy Map </p> <p style="margin:0px;">Hierarchical QoS </p> <p style="margin:0px;">DMVPN Per-Tunnel QoS </p> <p style="margin:0px;">QoS and IPSec Packet Replay Protection </p> <p style="margin:0px;">Complete QoS Configuration </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Further Reading </p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Part VI Direct Internet Access</p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 15 Direct Internet Access (DIA) </p> <p style="margin:0px;">Guest Internet Access </p> <p style="margin:0px;">Guest Access Quality of Service (QoS) </p> <p style="margin:0px;">Guest Access Web-Based Acceptable Use Policy </p> <p style="margin:0px;">Internal User Access </p> <p style="margin:0px;">Fully Specified Static Default Route </p> <p style="margin:0px;">Verification of Internet Connectivity </p> <p style="margin:0px;">Network Address Translation (NAT) </p> <p style="margin:0px;">Policy-Based Routing (PBR) </p> <p style="margin:0px;">Internal Access Zone-Based Firewall (ZBFW) </p> <p style="margin:0px;">Cloud Web Security (CWS) </p> <p style="margin:0px;">Baseline Configuration </p> <p style="margin:0px;">Outbound Proxy </p> <p style="margin:0px;">WAAS and WCCP Redirect </p> <p style="margin:0px;">Prevention of Internal Traffic Leakage to the Internet </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">References in this Chapter </p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Part VII Migration</p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 16 Deploying Cisco Intelligent WAN </p> <p style="margin:0px;">Pre-Migration Tasks </p> <p style="margin:0px;">Migration Overview</p> <p style="margin:0px;">Deploying DMVPN Hub Routers </p> <p style="margin:0px;">Migrating the Branch Routers</p> <p style="margin:0px;">Post-Migration Tasks </p> <p style="margin:0px;">Migrating from a Dual MPLS to a Hybrid IWAN Model </p> <p style="margin:0px;">Migrating IPsec Tunnels </p> <p style="margin:0px;">PfR Deployment </p> <p style="margin:0px;">Testing the Migration Plan </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Further Reading </p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Part VIII Conclusion</p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">Chapter 17 Conclusion and Looking Forward </p> <p style="margin:0px;">Intelligent WAN Today </p> <p style="margin:0px;">Intelligent WAN Architecture </p> <p style="margin:0px;">Intelligent WAN Tomorrow </p> <p style="margin:0px;">Appendix A Dynamic Multipoint VPN Redundancy Models </p> <p style="margin:0px;">Appendix B IPv6 Dynamic Multipoint VPN </p> <p style="margin:0px;">Index </p> <p style="margin:0px;">&nbsp;</p>

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Cisco Intelligent WAN (IWAN)