209 Results Found
When properly utilized, VLANs and trunks provide flexibility, stability and ease of troubleshooting. This paper provides technical details about VLANs and trunks, along with design options at a basic to intermediate level. Recommendations and commands are included throughout.
RTMT provides a set of canned views of both system resources and application counters that provide you with a snapshot of your environment right out of the box. Read on to learn how you can make RTMT even more helpful by customizing it to show you different views of your resources and CUCM environment.
Occasionally as I'm teaching a Cisco training class, I get an idea for a blog post and it happened again this week. The Securing Networks with ASA Fundamentals curriculum is mostly based on the Adaptive Security Device Manager (ASDM). While the class describes the us...
So far, in our discussion of Router Information Protocol (RIP), we’ve discussed the basics and also verified and reviewed RIP version1. We stated that RIP version 1 is a classful routing protocol that used FLSM and sent it routing updates without the subnet mask. In...
Next Hop Resolution Protocol (NHRP) is a resolution protocol that allows a Next Hop Client (NHC) to dynamically register with Next Hop Servers (NHSs). Learn more.
Google Cloud Platform (GCP) is Google’s public cloud offering comparable to Amazon Web Services and Microsoft Azure. The difference is that GCP is built upon Google's massive, cutting-edge infrastructure that handles the traffic and workload of all Google users. There is a wide range of services available in GCP ranging from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) to completely managed Software-as-a-Service (SaaS). We will discuss the available infrastructure components and how they provide a powerful and flexible foundation on which to build your applications.
The responsibility for securing organizational data has spread beyond the traditional IT professional. While there are more diverse security solutions, there are more diverse and sophisticated security threats. Security awareness and training is essential for everyone within an organization. Learn how Cisco has continued to evolve its security solutions and training.
Where should you apply the CSS, and why are there two places to apply it? One approach is to pick one of the parameters and apply the permissions there. Quite often, an administrator will pick the phone-level CSS and configure it there so that it applies to all calls made from all lines. The goal is to specify what partitions are allowed to be called.
Learn everything you need to know about the new Cisco CCNA and CCNP Data Center curriculum and certifications. Take the traditional path or the accelerated path to achieve CCNA Data Center Certification. Understand the Design and Troubleshooting paths for CCNP Data Center certification. Understand the revised course requirements and content changes. Understand the certification exam availability for the new exams, the retirement date for the old exams, and the available migration paths if you have an uncompleted certification with some courses or exams completed.
John Barnes, Global Knowledge's Cisco Course Developer, discusses enhancements to our UCS Troubleshooting Boot Camp and suggestions for students in preparation for this course.