O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Implementing Cisco Networking Solutions

Book Description

Learn the art of designing, implementing, and managing Cisco's networking solutions on datacenters, wirelessly, security and mobility to set up an Enterprise network.

About This Book

  • Implement Cisco's networking solutions on datacenters and wirelessly, Cloud, Security, and Mobility
  • Leverage Cisco IOS to manage network infrastructures.
  • A practical guide that will show how to troubleshoot common issues on the network.

Who This Book Is For

This book is targeted at network designers and IT engineers who are involved in designing, configuring, and operating enterprise networks, and are in taking decisions to make the necessary network changes to meet newer business needs such as evaluating new technology choices, enterprise growth, and adding new services on the network. The reader is expected to have a general understanding of the fundamentals of networking, including the OSI stack and IP addressing.

What You Will Learn

  • Understand the network lifecycle approach
  • Get to know what makes a good network design
  • Design components and technology choices at various places in the network (PINS)
  • Work on sample configurations for network devices in the LAN/ WAN/ DC, and the wireless domain
  • Get familiar with the configurations and best practices for securing the network
  • Explore best practices for network operations

In Detail

Most enterprises use Cisco networking equipment to design and implement their networks. However, some networks outperform networks in other enterprises in terms of performance and meeting new business demands, because they were designed with a visionary approach.

The book starts by describing the various stages in the network lifecycle and covers the plan, build, and operate phases. It covers topics that will help network engineers capture requirements, choose the right technology, design and implement the network, and finally manage and operate the network. It divides the overall network into its constituents depending upon functionality, and describe the technologies used and the design considerations for each functional area. The areas covered include the campus wired network, wireless access network, WAN choices, datacenter technologies, and security technologies. It also discusses the need to identify business-critical applications on the network, and how to prioritize these applications by deploying QoS on the network.

Each topic provides the technology choices, and the scenario, involved in choosing each technology, and provides configuration guidelines for configuring and implementing solutions in enterprise networks.

Style and approach

A step-by-step practical guide that ensures you implement Cisco solutions such as enterprise networks, cloud, and data centers, on small-to-large organizations.

Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the code file.

Table of Contents

  1. Preface
    1. What this book covers
    2. What you need for this book
    3. Who this book is for
    4. Conventions
    5. Reader feedback
    6. Customer support
      1. Downloading the example code
      2. Downloading the color images of this book
      3. Errata
      4. Piracy
      5. Questions
  2. Network Building Essentials
    1. Introduction to networks
    2. The OSI model and the TCP/IP stack
      1. Basic OSI reference model
        1. Layer 1 - The physical layer
        2. Layer 2 - The data link layer
        3. Layer 3 - The network layer
        4. Layer 4 - The transport layer
        5. Layer 5 - The session layer
        6. Layer 6 - The presentation layer
        7. Layer 7 - The application layer
      2. The TCP/IP model
        1. Internet Protocol (IP)
        2. Transmission Control Protocol (TCP)
        3. User Datagram Protocol (UDP)
        4. IP version 6
    3. Building a network
      1. Purpose of networks
      2. Network lifecycle
        1. Advantages of network lifecycle approach
        2. Prepare phase
        3. Plan phase
        4. Design phase
        5. Implement phase
        6. Operate phase
        7. Optimize phase
    4. Summary
  3. Networks for Digital Enterprises
    1. The impact of technology on business
      1. Digitization as the key enabler
    2. A digital-ready infrastructure
      1. Enabling technologies
        1. Input/output systems
          1. IoT systems
        2. Network
          1. Software-defined networking
          2. Network function virtualization
          3. Network programmability
        3. Processing centres
          1. Edge computing
          2. Cloud computing
          3. Analytics
      2. Network as the cornerstone
        1. Network enabling new experiences
        2. Network providing new Insights
    3. Facets of a digital infrastructure
      1. Functionality
      2. Resiliency
      3. Modularity
      4. Flexibility
      5. Scalability
      6. Security
      7. Agility
      8. Manageability
      9. Visibility and analytics
    4. Cisco Digital Network Architecture
    5. Summary
  4. Components of the Enterprise Network
    1. Networking devices and their functions
      1. Switches
      2. Wireless Access Points
      3. Routers
      4. Firewalls
    2. Introduction to Cisco IOS
      1. IOS command modes
      2. Configuration files
    3. Places in the network
      1. Campus network
      2. Wide Area Network (WAN)
      3. Data center
      4. Internet edge
      5. Interdependency between the various components
    4. Summary
  5. Understanding and Configuring Campus Network Technologies
    1. Campus network technologies
      1. Layer 2 technologies
        1. Ethernet
          1. Ethernet switch and MAC-based forwarding
          2. Virtual LANs
          3. Access ports and trunk ports
        2. Spanning Tree Protocols
        3. Link aggregation
        4. Address Resolution Protocol (ARP)
        5. Configuring layer 2 protocols
      2. Layer 3 technologies
        1. IP addressing
          1. IPv4 addresses
        2. Routable and private addresses
          1. Sample addressing
          2. Configuring IP addresses
          3. A note about WAN addresses
          4. Secondary addresses
        3. First Hop Redundancy Protocols (FHRP)
          1. HSRP
          2. VRRP
          3. GLBP
      3. Routing protocols
        1. Routing table
        2. Static routing
        3. Dynamic routing
          1. Distance vector routing
          2. Link-state routing
          3. External routing
        4. Route redistribution
        5. Routing table segmentation
    2. Campus LAN design considerations
      1. Topology choices
        1. Ring and star topologies
        2. Physical versus logical topology
      2. Naming convention
      3. Layer 2 versus layer 3 boundaries
      4. Sizing the campus network
        1. Stacking switches
    3. A sample network
    4. Summary
  6. Understanding and Configuring Wireless Access Technologies
    1. Benefits of wireless networks
    2. Wireless fundamentals
      1. An RF signal
        1. Signal strength
        2. Modulation
        3. Signal to Noise Ratio (SNR)
        4. Frequency bands
        5. Channels
        6. MIMO
        7. Channel bonding
        8. Antenna characteristics
      2. Wireless standards
        1. IEEE 802.11
        2. IEEE 802.11a
        3. IEEE 802.11b
        4. IEEE 802.11g
        5. IEEE 802.11n
        6. IEEE 802.11ac
      3. Mixed mode operation/interoperability
    3. Configuring the WLAN
      1. Cisco mobility express
        1. Wireless LAN controller and CAPWAP
          1. Configuring AP using Cisco Mobility Express
      2. Configuration using the WLC
        1. WLC redundancy
          1. HA stateful switchover
        2. Configuring the WLC deployment
      3. FlexConnect mode
        1. Configuring the APs in FlexConnect mode
    4. Summary
  7. Understanding and Configuring WAN Technologies
    1. Considerations for a WAN design
    2. WAN technology choices
      1. Configuring WAN serial links
        1. Serial links with PPP/HDLC encapsulation
        2. FR encapsulation
        3. Multilink PPP
      2. Configuring overlay P2P links
    3. Virtual private networks
      1. Layer 2 VPNs
      2. Layer 3 VPNs
        1. VRF-Lite
        2. Remote access VPNs
      3. Managed versus unmanaged services
    4. Connecting to the internet
      1. Routing at the internet edge
        1. Static routing
        2. BGP
    5. Encrypting and securing the WAN
    6. Optimizing the WAN
    7. Summary
  8. Understanding and Configuring Data Center Technologies
    1. Functions of a data center
    2. Evolution of the DC
      1. Network
      2. Computers
        1. Virtualization
      3. Storage
      4. Cloud computing
      5. Management systems
    3. Design of a DC
      1. Application hierarchy
      2. Zoning of the data center
      3. Types of networks in a DC
      4. Introduction to firewalls
        1. Firewall inspection
          1. Basic access control
          2. Protecting from IP fragments
          3. Application inspection
          4. Applying connection limits and TCP normalization
          5. Enabling threat detection
        2. Firewall security context
        3. Scaling the firewall
      5. Connecting the DC to the internet
        1. Network Address Translation
    4. Designing a sample DC
      1. Network design
      2. Firewall design
        1. Firewall redundancy
      3. Server redundancy
        1. NIC teaming
        2. Virtualization
        3. Server load balancers
      4. Planning a disaster recovery
    5. Providing remote access to the DC
    6. Summary
  9. Understanding and Configuring Network Security
    1. Security landscape
    2. Elements of enterprise security
    3. Securing network infrastructure
      1. Data plane security
        1. Controlling network access
          1. Password protection on wireless networks
          2. Network access control (NAC)
          3. Port security and MAC limiting
        2. Preventing spoofed attacks
          1. ARP spoofing
          2. Unicast RPF
          3. IP source guard
        3. Limiting punting to CPU
          1. IP options and source routing
          2. ICMP attacks
        4. Controlling user traffic
          1. Rate limiting and storm control
          2. Controlling user to user traffic
          3. Access control lists
        5. Preventing denial of service attacks
      2. Control plane security
        1. Disable unused services
          1. Disabling unused global services
          2. Disabling interface services
        2. Layer 2 control plane security
          1. STP security
          2. DHCP snooping
          3. Dynamic ARP Inspection (DAI)
        3. Control plane policing
        4. Protocol security
      3. Management plane security
    4. Security beyond the network devices
      1. Securing the network perimeter
        1. Firewalls
        2. Securing services
          1. Email services
          2. Web security
        3. Advanced Malware Protection (AMP)
      2. Securing the endpoints
      3. DNS-based security
      4. Securing data in transit
      5. Network behavioral analysis
    5. Summary
  10. Understanding and Configuring Quality of Service
    1. The need for QoS
    2. Network impact on traffic
      1. Packet loss
      2. Latency
      3. Jitter
    3. QoS models
      1. The integrated services model
      2. The differentiated services model
    4. QoS tools
      1. Traffic conditioning
        1. Policing
        2. Shaping
        3. Markdown
      2. Packet classification
      3. Packet marking
      4. Congestion management
        1. Queuing
        2. Scheduling
          1. Low latency queueing (LLQ)
          2. Class-based weighted fair queueing (CBWFQ)
      5. Congestion avoidance
        1. Tail drop
        2. Random early detection
        3. Weighted random early detection (WRED)
      6. Modular QoS command-line interface
    5. QoS design for an enterprise
      1. Defining the trust boundary
      2. Defining traffic types
      3. Assigning bandwidths
      4. Assessing hardware and assigning classes to queues
      5. Implementing configurations
        1. The ingress policy
        2. The egress policy
    6. QoS in a hybrid model with service provider WAN
    7. Summary
  11. A Systematic Approach to Network Management
    1. Frameworks related to network management
    2. Network management planning
      1. Pillars of network management
        1. People
        2. Processes
        3. Tools and technologies
      2. The importance of metrics
    3. Network operations systems components
      1. Simple Network Management Protocol (SNMP)
        1. SNMP traps
        2. SNMP polling
      2. Syslog
      3. Network Time Protocol (NTP)
      4. Controlling device access using RADIUS
      5. Role-based user access
      6. IP Service Level Assurance (IP-SLA)
      7. Management network
    4. Cisco Prime Infrastructure
    5. Implementing the network management strategy
    6. Summary
  12. Basic Troubleshooting Skills and Techniques
    1. A framework for structured troubleshooting
    2. Establishing the normal and detecting deviations
      1. The network baseline
      2. Application baseline
    3. Network troubleshooting commands
      1. IOS commands
      2. The ping command
      3. The traceroute command
      4. The debug commands
    4. Troubleshooting the network
      1. Troubleshooting user connectivity
      2. Troubleshooting layer 2 issues
      3. Troubleshooting the first hop connectivity
      4. Troubleshooting routing issues
      5. Troubleshooting forwarding plane issues
      6. Troubleshooting performance issues
      7. Troubleshooting the management plane
      8. Troubleshooting device level issues
        1. Hardware issues
        2. Software issues
    5. Summary