Cisco Press - Cisco Express Forwarding

Stacia McKee is a customer support engineer and technical leader of the Routing Protocols Technical Assistance Center (TAC) team. This team focuses on providing post-sales support of IP routing protocols, MPLS, QoS, IP multicast, and many other Layer 3 technologies. Stacia has been with Cisco for more than six years, previously serving as a technical leader of the Architecture TAC team and a member of the WAN/Access TAC team.

  • Learn the key features of packet-switching architectures
  • Understand the basics of the CEF architecture and operation
  • Examine the enhanced CEF structure, which improves scalability
  • Learn how to troubleshoot in software-switching environments
  • Understand the effect of CEF on a Cisco Catalyst 6500 Supervisor 720
  • Configure and troubleshoot load sharing with CEF
  • Evaluate the effect of CEF in an MPLS VPN environment
  • Review CEF design considerations that impact scalability

Part I Understanding, Configuring, and Troubleshooting CEF

Chapter 1 Introduction to Packet-Switching Architectures

Chapter 2 Understanding Cisco Express Forwarding
Chapter 3 CEF Enhanced Scalability
Chapter 4 Basic IP Connectivity and CEF Troubleshooting

Part II CEF Case Studies

Chapter 5 Understanding Packet Switching on the Cisco Catalyst 6500 Supervisor 720

Chapter 6 Load Sharing with CEF

Chapter 7 Understanding CEF in an MPLS VPN Environment

Part III Appendix

Appendix A Scalability

CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study) (Exam Certification Guide)

Official self-study test preparation guide for the Cisco 9E0-121 and 642-511 CSVPN exams

Coverage of the CSVPN topics enables you to identify and fill your knowledge gaps before the exam date. You'll learn about:

  • Configuring Cisco VPN 3000 concentrators and VPN 3002 Hardware Clients for remote access
  • Enabling secure VPNs using IPSec technologies
  • Peer authentication using preshared keys and digital certificates
  • Using Network Address Translation (NAT) and Port Address Translation (PAT) over VPNs
  • Administering and monitoring VPN concentrators in remote-access and LAN-to-LAN networksUtilizing IPSec protocols and features
  • Configuring VPN Client personal firewall support through the VPN concentrator
  • Integrated unit and interactive user authentication through the Cisco VPN 3002 Hardware Client

Becoming a CCSP distinguishes you as part of an exclusive group of experts, ready to take on today's most challenging security tasks. Installation and configuration of Cisco VPN 3000 Series concentrators and Cisco VPN 3002 Hardware Clients are critical tasks in today's network environments, especially as reliance on the public Internet as an extension of business networks increases. Whether you are seeking a Cisco VPN Specialist Certification or the full-fledged CCSP Certification, learning what you need to know to pass the CSVPN (Cisco Secure Virtual Private Networks) exam qualifies you to keep your company's network safe while meeting its business needs.

Cisco Press - Network Management Fundamentals

Network Management Fundamentals explains the different technologies that are used in network management and how they relate to each other. The book focuses on fundamental concepts and principles. It provides a solid technical foundation for the practitioner to successfully navigate network management topics and apply those concepts to particular situations.

The book is divided into four parts:

  • Part I provides an overview of what network management is about and why it is relevant. It also conveys an informal understanding of the functions, tools, and activities that are associated with it.
  • Part II examines network management from several different angles, culminating in a discussion of how these aspects are combined into management reference models.
  • Part III provides more detail into different building blocks of network management introduced in Part II, such as management protocols, management organization, and management communication patterns.
  • Part IV rounds out the book with a number of management topics of general interest, including management integration and service-level management.

Optical Network Design and Implementation (Networking Technology)

A comprehensive guide to understanding and configuring multiservice DWDM, SONET, and SDH architectures

Optical Network Design and Implementation provides in-depth coverage of the following:

  • DS1/DS3/E1/E3 over SONET/SDH
  • IEEE 802.17 Resilient Packet Ring (RPR)
  • Fast/Gigabit Ethernet over SONET/SDH
  • VRF virtual private networks
  • Double-tagged 802.1Q VPNs
  • SAN transport, FICON, and Fibre Channel over SONET/SDH
  • DWDM infrastructures
  • Analysis of DWDM, SONET, and SDH architectures

Multiservice optical networking has multiple applications in service provider and enterprise environments. To help you make the most of these applications, Optical Network Design and Implementation provides a complete reference of technology solutions for next-generation optical networks. The book explains the differences among various MAN technologies, getting you up to speed on the solutions you need to use.

Optical Network Design and Implementation contains a broad range of technical details on multiservice optical networking and covers optical networking theory, design, and configuration by providing informative text, illustrations, and examples. It can be used as a reference for anyone designing, implementing, or supporting an optical network. Even if you're not using Cisco ONS equipment, this book can increase your awareness and understanding of optical technologies and provide you with detailed design concepts and rules for building highly scalable multiservice optical networks.

MPLS VPN Security (Networking Technology)

A practical guide to hardening MPLS networks

  • Define "zones of trust" for your MPLS VPN environment
  • Understand fundamental security principles and how MPLS VPNs work
  • Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network’s backbone, misconfigurations, sniffing, and inside attack forms
  • Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons
  • Interpret complex architectures such as extranet access with recommendations of Inter-AS, carrier-supporting carriers, Layer 2 security considerations, and multiple provider trust model issues
  • Operate and maintain a secure MPLS core with industry best practices
  • Integrate IPsec into your MPLS VPN for extra security in encryption and data origin verification
  • Build VPNs by interconnecting Layer 2 networks with new available architectures such as virtual private wire service (VPWS) and virtual private LAN service (VPLS)
  • Protect your core network from attack by considering Operations, Administration, and Management (OAM) and MPLS backbone security incidents

Multiprotocol Label Switching (MPLS) is becoming a widely deployed technology, specifically for providing virtual private network (VPN) services. Security is a major concern for companies migrating to MPLS VPNs from existing VPN technologies such as ATM. Organizations deploying MPLS VPNs need security best practices for protecting their networks, specifically for the more complex deployment models such as inter-provider networks and Internet provisioning on the network.

Cisco Press - Lan Switching first-step

Your first step into the world of LAN switching

  • No LAN switching experience required
  • Includes clear and easily understood explanations
  • Makes learning easy

Your first step to LAN switching begins here!

  • Learn local-area network (LAN) key concepts and terminology
  • Identify key issues involved with designing and managing a switched LAN
  • Answer the question: do I need a hub, a bridge, or a switch?

Welcome to the world of LAN switching!

Network switches work by connecting network paths together and making intelligent decisions about moving traffic in a network. By keeping track of changes in the network, switches reduce congestion and improve speed.

No LAN switching experience needed!

Cisco Wireless LAN Security (Networking Technology)

Expert guidance for securing your 802.11 networks

  • Learn best practices for securely managing, operating, and scaling WLANs
  • Comprehend the security-related technological underpinnings of WLANs
  • Explore new security protocols in 802.11i and WPA and learn how they prevent attacks
  • Review centralized deployment models for wired/wireless integration
  • Deepen your knowledge of defense by understanding the tools that attackers use to perform reconnaissance and to attack authentication and encryption mechanisms
  • Understand how to design secure WLANs to support enterprise applications with the new standards and practices detailed in this book
  • Reference the next generation authentication standards and protocols
  • Find out about mobility, hotspots, and campus wireless networks
  • Grasp Open Authentication, MAC-based authentication, shared key authentication, EAP authentication protocols, WEP, WPA, and 802.11i

Cisco Wireless LAN Security is an in-depth guide to wireless LAN technology and security, introducing the key aspects of 802.11 security by illustrating major wireless LAN (WLAN) standards that can protect the entire network. Because a WLAN is less effective as an isolated piece of the network, this book emphasizes how to effectively integrate WLAN devices into the wired network while maintaining maximum security.

Cisco LAN Switching Fundamentals (Cisco Press Fundamentals Series)

Cisco LAN Switching Fundamentals provides network administrators with a fundamental reference book that will help them quickly and easily understand some of the more common design and deployment challenges they will face. The book begins with, Part I, LAN Switches, an introduction to LAN switching then moves quickly into LAN and Catalyst switching architectures, focusing solely on the Cisco LAN solutions, including the Cisco 6000 Series switches. Part I also includes configuring switches, including the Cisco 2900, 4xxx, 5xxx, and 6xxx switches, virtual LANs, IP Telephony switching, also based on the current Cisco telephony solution, and multi-layer switching detailing operation and routing. Part II, Design and Implementation, details Campus LANs, including design models for large scale and SMB switched networks and campus LANs to support IP Telephony and other new world technologies. Tuning the network including load balancing, integrating servers, securing switches, as well as a detailed, real-world case study detailing the latest Cisco solution for SMB replacement and replacement of a multi-site large scale shared Ethernet to switched network is covered. Finally, Part III details troubleshooting campus LAN techniques essential to maintain a secure and highly available network. Cisco LAN Switching will provide all of the fundamental information necessary for the novice to intermediate network administrator to maintain a healthy and up-to-date network.

Cisco Networking Academy CCNA Semester 2

Cisco Networking Academy CCNA Semester 1

CCNA Courses 1 through 4 of the Academy program, equivalent to 280 hours of instruction, provide students with a basic foundation in networking. Students who successfully complete this portion of the program are eligible to earn Cisco Certified Network Associate (CCNA™) certification. The first four courses are available at the secondary and post-secondary levels.

Managing Cisco Network Security

Cisco authorized self-study book for network security foundation learning

  • Master technology concepts and security services to protect your network
  • Develop and implement a network security policy
  • Configure Cisco routers to secure the network environment by controlling SNMP access, routing updates, network traffic, and Ethernet switch port and access security
  • Understand the AAA architecture and configure the network access server for AAA, CiscoSecure ACS, and TACACS+
  • Secure Internet connections by creating a perimeter security system with Cisco routers
  • Configure a variety of features of the PIX Firewall, including access control, multiple interfaces, AAA, PPTP support, Java applet blocking, URL and FTP filtering, SNMP and syslog support, redundancy, and maintenance
  • Understand Cisco Encryption Technology and the steps you must follow to configure it on Cisco routers
  • Learn how to use IPSec protocols to create a secure VPN and scale IPSec networks to support multiple IPSec peers

While the benefits of the information revolution are enormous, so too are the risks you take when offering products, services, and information to your customers, employees, and business partners via your network. Now more than ever, taking the proper steps to ensure the integrity of your network is critical for protecting your most valuable asset: your data. Even so, most corporate and government networks are vulnerable to attack. Managing Cisco Network Security teaches you how to install, configure, operate, manage, and verify Cisco network security products and Cisco IOS(r) Software security features.

Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816) 3rd Edition Self-Study Guide

Whether you are preparing for CCNA certification or simply want to gain a better understanding of how to build medium-size Cisco networks, you will benefit from the foundation information presented in this book.

Interconnecting Cisco Network Devices, Part 2 (ICND2), is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit

Steve McQuerry, CCIE® No. 6108, is a consulting systems engineer with Cisco focused on data center architecture. Steve works with enterprise customers in the Midwestern United States to help them plan their data center architectures. He has been an active member of the internetworking community since 1991 and has held multiple certifications from Novell, Microsoft, and Cisco. Before joining Cisco Steve worked as an independent contractor with Global Knowledge, where he taught and developed coursework around Cisco technologies and certifications.

  • Review the Cisco IOS® Software command structure for routers and switches
  • Build LANs and understand how to overcome problems associated with Layer 2 switching
  • Evaluate the differences between link-state and distance vector routing protocols
  • Configure and troubleshoot OSPF in a single area
  • Configure and troubleshoot EIGRP
  • Identify and filter traffic with ACLs
  • Use Network Address Translation (NAT) and Port Address Translation (PAT) to conserve IPv4 address space and implement IPv6
  • Connect different sites over WANs or the Internet using IPsec VPN, SSL VPN, leased line, and Frame Relay connections

This volume is in the Certification Self-Study Series offered by Cisco Press®. Books in this series provide officially developed self-study solutions to help networking professionals understand technology implementations and prepare for the Cisco Career Certifications examinations.

Cisco Press - Deploying Voice over Wireless LANs

The definitive guide to planning, architecting, deploying, supporting, and creating Voice over Wireless LAN solutions

  • Understand VoWLAN components, applications, and benefits
  • See VoWLAN at work in actual enterprise environments
  • Master VoWLAN signaling, including voice signal characteristics, A/D conversion, and compression
  • Discover the latest 802.11 VoWLAN standards, including 802.11e, 802.11r, and 802.11k
  • Secure IP-based VoWLAN systems against intrusion and compromise
  • Analyze your organization’s requirements and design an optimal VoWLAN solution
  • Plan for capacity, roaming, and integration with cellular systems
  • Install, configure, test, verify, and validate your VoWLAN system
  • Plan for operational support and implement appropriate administration tools and methods
  • Includes a complete VoWLAN glossary

Part I Fundamental Elements

Chapter 1 VoWLAN Applications and Benefits

Chapter 2 VoWLAN System Components

Chapter 3 VoWLAN Signaling Fundamentals

Part II Critical Technologies

Chapter 4 Wireless LAN Technologies

Chapter 5 VoWLAN Security Solutions

Part III Implementation Steps

Chapter 6 Analyzing VoWLAN Requirements

Chapter 7 Designing a VoWLAN Solution

Chapter 8 Installing, Configuring, and Testing a VoWLAN System

Chapter 9 Supporting a VoWLAN System

Appendix A Answers to Chapter Review Questions


This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Cisco Pess - Wireless Networks First-step

Your First-Step into the World of Wireless Networks

  • No experience required!
  • Gain an understanding of wireless networking basics with this reader friendly guide
  • The first book anyone should read about wireless networks with step-by-step instruction
  • Learn from an author experienced in and known for writing to a generalist wireless audience with a clear, simple-to-understand style
As a basic introduction to wireless networking, Wireless Networks First-Step assumes that readers have no previous wireless experience. The book provides an overview of wireless networking, along with details of applicable standards and technologies. Newcomers to wireless technologies will find practical information along with an abundance of examples.

Integrated Cisco and UNIX Network Architectures (Cisco Press Networking Technology)

Design, build, and operate integrated gateway routing systems

  • Learn how to design, build, and administer integrated gateway routing systems
  • Identify the advantages and disadvantages of Cisco/UNIX integrated designs
  • Review lab exercises throughout the book that bring concepts to life
  • Encounter the fascinating world of dynamic UNIX routing and TCP/IP stacks
  • Understand the way forwarding and signaling are implemented in the UNIX world
  • Gain proficiency with tunnels and VPNs
  • Utilize advanced features such as high availability, NAT, bandwidth management, policy routing, and multicast architectures
  • Explore Linux and BSD networking concepts
Integrated Cisco and UNIX Network Architectures reveals not just the feasibility but also the desirability of Cisco/UNIX integrated routing with regard to systems integration, interoperability, and feature requirements. Detailed, progressively complex lab scenarios emphasize enterprise and ISP requirements, casting light on the similarities and differences of these two worlds. Platform issues, such as behavior of firewall filters, kernel features, and proper standards compliance, are discussed, analyzed with sniffers, and tested with handcrafted traffic from packet generators and test applications.

Cisco AVVID and IP Telephony Design and Implementation

Corporate demand for AVVID solutions is rapidly increasing - engineers will need this book
Cisco AVVID (Architecture for Voice, Video and Integrated Data), the latest development from Cisco Systems, is redefining the way businesses communicate. AVVID allows businesses to transmit voice, data, and video over a single integrated architecture called a "multiservice" or "converged" network.
Cisco AVVID Design & Implementation is designed to be a complete desk-reference for network administrators and engineers responsible for a complicated AVVID network. Covering history, protocols, hardware, servers, switches, bridges, routers, and discussions about implementation issues, realities of cost, requirements and network limitations. Engineers will learn how to design and build a comprehensive Cisco AVVID network infrastructure.

CCIE Routing and Switching Official Exam Certification Guide

The official study guide helps you master all the topics on the CCIE Routing and Switching written exam, including:

  • Bridging and LAN Switching
  • IP addressing, IP services, and TCP/IP protocol details
  • IP routing
  • Quality of service (QoS)
  • Frame Relay and Point-to-Point protocols
  • IP multicast
  • Security
  • Enterprise wireless mobility
  • General networking theory

Administering Cisco QOS for IP Networks

Administering Cisco QoS for IP Networks discusses IP Quality of Service (QoS) and how it applies to Enterprise and Internet Service Provider (ISP) environments. It reviews routing protocols and quality of service mechanisms available today on Cisco network devices and it will provide you with examples and exercises for a hands-on experience designed to give you the background to implement these capabilities in your network.

Application Acceleration and WAN Optimization Fundamentals (Cisco Press Fundamentals)

Adding servers to the infrastructure potentially can improve performance but does so at the cost of capital and operational expenditure, data protection, and complexity. Application Acceleration and WAN Optimization Fundamentals gives you a powerful set of technologies found within accelerator solutions that help bridge the divide that IT faces- one where infrastructure should be intelligently deployed in centrally-managed facilities, while also providing performance metrics for remote users that fosters productivity, job satisfaction, and global collaboration.Accelerator solutions enable high performance access to remote information- files, content, video, rich media, applications, and more, and such solutions can help I/T satisfy requirements from users, management, and regulatory bodies simultaneously.

Cisco Security Specialist's Guide to PIX Firewall

Demystifying the task of implementing, configuring, and administering Cisco’s PIX firewall appliances, Cisco Security Specialist’s Guide to PIX Firewall delivers a total solution both for managing these widely used devices and for passing the challenging Cisco Secure PIX Firewall Advanced Exam (9E0-571), a prerequisite for gaining prestigious Cisco Security Specialist 1 certification. Packed with insider tips and techniques on protocols, hardware and software components, troubleshooting and more, this powerful advisor illustrates attack concepts, explains must-know networking principles for optimizing and integrating PIX firewalls, sets forth real-world configuration and administration examples, and helps users master Cisco’s infamous command line interface.

Cisco Press Cisco CCNP BSCI Official Exam Certification Guide (4th Edition)

CCNP BSCI Official Exam Certification Guide, Fourth Edition, follows a logical organization of the CCNP® BSCI exam objectives. Material is presented in a concise manner, focusing on increasing readers' retention and recall of exam topics. “Do I Know This Already?” quizzes open each chapter and allow you to determine how much time you need to spend on each section. Exam topic lists and Foundation Summary tables make referencing easy and give you a quick refresher whenever you need it. Scenario-based exercises help you think about exam objectives in real-world situations, thus increasing recall during exam time. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts.

  • Master all 642-901 exam topics with the official study guide
  • Assess your knowledge with chapter-opening quizzes
  • Review key concepts with foundation summaries

Building Cisco Remote Access Networks

Cisco authorized self-study book for CCNP Remote Access foundation learning

  • Prepare for CCNP certification while learning the fundamentals of remote access networks
  • Apply Cisco solutions for assembling and cabling WAN components
  • Enable on-demand connections by configuring asynchronous connections with modems and configuring Point-to-Point Protocol
  • Enhance on-demand connectivity using ISDN and DDR technologies
  • Learn how to manage permanent connections with X.25, Frame Relay, backups, queuing, and compression

Building Cisco Remote Access Networks is a Cisco authorized self-paced learning tool. It teaches you how to design, configure, and maintain a remote access network using Cisco products. This book helps you enable and enhance the on-demand connectivity of a small office, home office, or telecommuter site to a central site. It is divided into six main areas: introduction to remote access networks, identifying Cisco solutions to remote access needs, enabling on-demand connections to the Central site, enhancing on-demand connectivity, enabling permanent connections to the Central site, and scaling remote access networks.

Building Cisco Networks for Windows 2000

Citrix MetaFrame can deliver Windows-based applications to any user, anywhere regardless of network connection, LAN protocol, or client operating system. Configuring Citrix MetaFrame for Windows 2000 Terminal Services is written for system administrators who are deploying Citrix MetaFrame in a Windows 2000 environment. It examines MetaFrame's newest features and enhancements, as well as Citrix’s Independent Computing Architecture (ICA). It explores how ICA, in conjunction with MetaFrame, will transform the way in which software is developed, deployed, and maintained in server-based computing environments. Finally, the book shows how to integrate Windows- and Unix-based networks over the Web using MetaFrame.

Cisco Networking Academy CCNA Semester 1

CCNA Courses 1 through 4 of the Academy program, equivalent to 280 hours of instruction, provide students with a basic foundation in networking. Students who successfully complete this portion of the program are eligible to earn Cisco Certified Network Associate (CCNA™) certification. The first four courses are available at the secondary and post-secondary levels.

Cisco Network Security Technologies and Solutions (CCIE Professional Development Series)

  • Filter traffic with access lists and implement security features on switches
  • Configure Cisco IOS router firewall features and deploy ASA and PIX Firewall appliances
  • Understand attack vectors and apply Layer 2 and Layer 3 mitigation techniques
  • Secure management access with AAA
  • Secure access control using multifactor authentication technology
  • Implement identity-based network access control
  • Apply the latest wireless LAN security solutions
  • Enforce security policy compliance with Cisco NAC
  • Learn the basics of cryptography and implement IPsec VPNs, DMVPN, GET VPN, SSL VPN, and MPLS VPN technologies
  • Monitor network activity and security incident response with network and host intrusion prevention, anomaly detection, and security monitoring and correlation
  • Deploy security management solutions such as Cisco Security Manager, SDM, ADSM, PDM, and IDM
  • Learn about regulatory compliance issues such as GLBA, HIPPA, and SOX

Pass4Sure Cisco Certified Network Associate : 640-802 Exam

"Cisco Certified Network Associate", also known as 640-802 exam, is a Cisco certification.
Preparing for the 640-802 exam? Searching 640-802 Test Questions, 640-802 Practice Exam, 640-802 Dumps?

With the complete collection of questions and answers, Pass4sure has assembled to take you through 254 Q&As to your 640-802 Exam preparation. In the 640-802 exam resources, you will cover every field and category in CCNA helping to ready you for your successful Cisco Certification.

Questions and Answers : 254 Q&As

Cisco Press Optimizing Applications on Cisco Networks

Maximize the performance and availability of network applications and the network infrastructure with application performance management

    Learn and understand the business case for application performance management
  • Understand how to identify applications critical to your business model
  • Identify basic application characteristics and how they can be optimized for transmission
  • Understand the principle of proactive planning in order to maintain the delivery criteria necessary for your business critical applications
  • Improve service delivery and outsourcing decisions by utilizing meaningful SLAs
  • Identify and solve network application performance problems, saving valuable time and money
  • Includes real-world case studies that cover design and performance issues

Cisco Press Authorized Self-Study Guide Cisco IP Telephony

Cisco IP Telephony (CIPT), Second Edition, is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit

  • Examine design strategies behind a Cisco Unified CallManager cluster, cluster replication, and Cisco Unified CallManager deployment models
  • Perform Cisco Unified CallManager server installations and upgrades
  • Learn the features of all Cisco IP Phones, the IP phone startup process, and audio codec communication
  • Add IP phone users and apply bulk moves, adds, and changes
  • Configure Cisco gateways and trunks
  • Design and configure Cisco Unified CallManager route plans
  • Implement telephony call restrictions and control
  • Effectively coordinate multisite deploymentsConfigure user features, Cisco Unified CallManager Attendant, and Cisco IP Manager Assistant
  • Secure the Windows operating system and Cisco Unified CallManager administration
  • Prevent toll fraud and harden the IP phone against attack
  • Configure Cisco Unified CallManager to support video
  • Monitor performance and configure alarms, traces, and CAR

This volume is in the Certification Self-Study Series offered by Cisco Press®. Books in this series provide officially developed self-study solutions to help networking professionals understand technology implementations and prepare for the Cisco Career Certifications examinations

Cisco Voice over IP (CVOICE) Student Guide v6.0 Volumes 2

Cisco Student Guide  www.netap.netCisco Voice over IP (CVOICE) Student Guide v6.0 Volumes 2

The 642-436 CVOICE Cisco Voice over IP is the exam associated with the CCVP certification. This exam tests a candidate’s knowledge of the foundational elements of VOIP calls, and the description of dial plans, and the implementation of gateways, gatekeepers and IP-IP gateways. Candidates can prepare for this exam by taking the CVOICE Cisco Voice over IP course.

Cisco Voice over IP (CVOICE) Student Guide v6.0 Volumes 3

Cisco Student Guide  www.netap.netCisco Voice over IP (CVOICE) Student Guide v6.0 Volumes 3

The 642-436 CVOICE Cisco Voice over IP is the exam associated with the CCVP certification. This exam tests a candidate’s knowledge of the foundational elements of VOIP calls, and the description of dial plans, and the implementation of gateways, gatekeepers and IP-IP gateways. Candidates can prepare for this exam by taking the CVOICE Cisco Voice over IP course.

Designing Cisco Network Service Architectures (ARCH) Student Guide v2.0 Volume 1

Cisco Student Guide  www.netap.netDesigning Cisco Network Service Architectures (ARCH) Student Guide v2.0 Volume 1

The 642-873 ARCH Designing Cisco Network Service Architectures Exam is the exam associated with the CCDP certification. This exam tests a candidate’s knowledge of the latest development in network design and technologies, including network infrastructure, intelligent network services and converged network solutions. Candidates can prepare for this exam by taking the ARCH Designing Cisco Network Service Architectures

CCSP Snpa Quick Reference

With this document as your guide, you will review topics on securing networks using routers and switches. These fact-filled Quick Reference Sheets allow you to get all-important information at a glance, helping you focus your study on areas of weakness and enhance memory retention of essential exam concepts.


1. Cisco Security Appliance Technology and Features and Families

2. Getting Started with Cisco Security Appliances Configurations

3. Inbound Traffic, ACLs, Object Grouping

4. AAA Configurations

5. Switching and Routing on ASA

6. Protocol Inspections

7. PIX and ASA VPNs

8. Understanding Transparent Firewall Mode

9. Virtual Firewalls

10. Failover