Network Administrators Survival Guide

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $7.80
Usually ships in 1-2 business days
(Save 89%)
Other sellers (Paperback)
  • All (15) from $7.80   
  • New (6) from $54.33   
  • Used (9) from $7.79   

Overview

The all-in-one practical guide to supporting your Cisco network

  • Provides detailed tips for using freeware and open-source tools readily available from the Internet, including the reasons behind choosing a particular tool
  • Refer to a single source for common Cisco network administration issues
  • Dedicated section for network security aids administrators in effectively dealing with security issues
  • Deploy fully functional RADIUS and TACACS+ for servers for controlling access to Cisco devices
  • Deploy Linux- and Windows-based syslog servers to centrally collect syslog information generated by Cisco devices
  • Deploy Linux- and Windows-based network monitoring systems to monitor interface traffic through Cisco devices including routers, switches, VPN concentrators, and Cisco PIX® firewalls
  • Use the trending feature of network monitoring systems for long-term network analysis and capacity planning
  • Automatically detect and report configuration changes on Cisco IOS® Software-based devices and Cisco PIX firewalls
  • Deploy Cisco-based VPNs in mixed environments using Linux- and Windows-based VPN servers

Network Administrators Survival Guide solves many common network administration problems by providing administrators with an all-in-one practical guide to supporting Cisco® networks using freeware tools. It is a single reference source that explains particular issues, their significance for administrators, and the installation and configuration process for the tools. The solutions are Cisco centric and provide detail not available in generic online information. Network Administrators Survival Guide emphasizes solutions for network managers and administrators of small to medium-sized businesses and enterprises.

Each chapter is broadly based on a network administration function, starting with an overview of the topic, followed by the methodology involved to accomplish that function. This includes the tools available, why they are the right choice, and their installation, configuration, and usage methods. For any given function, Network Administrators Survival Guide covers both Windows- and Linux-based tools as appropriate. Most of the Windows-based tools offer the advantage of GUI for ease of use, whereas the Linux-based tools are command-line based and can be used in automated scripts. Both are significant for network administrators.

Based on author Anand Deveriya’s extensive field experience, this practical guide to maintaining Cisco networks will save you significant time and money. Any network administrator—beginner or advanced—will find this book useful. The solutions to practical aspects of network administration make Network Administrators Survival Guide a must-have reference for supporting your Cisco network.

Read More Show Less

Product Details

  • ISBN-13: 9781587052118
  • Publisher: Cisco Press
  • Publication date: 9/28/2005
  • Series: Networking Technology Series
  • Edition description: New Edition
  • Pages: 552
  • Sales rank: 1,177,618
  • Product dimensions: 7.41 (w) x 9.12 (h) x 1.17 (d)

Meet the Author

Anand Deveriya, CCIE® No. 10401, is a senior network engineer with NEC Unified Solutions, where he designs and deploys secure, scalable, and redundant networks using Cisco technology and products. In his various networking roles, he has devised solutions for many of the network administration challenges noted throughout this book. Anand was a technical editor for CCIE Security Exam Certification Guide, published by Cisco Press.

Read More Show Less

Table of Contents

Part I Basic Network Administration

Chapter 1 Cisco Device Installation

Introduction

Connecting to Cisco Devices for Configuration

Local Connection Using a Console Interface

Remote Connection Using Telnet

Automating Tasks Using Macros

Securing Remote Connections to Cisco Devices Using Secure Shell (SSH)

Cisco Device Configuration for SSH

SSH Client Installation

Configuring Cisco Devices Using GUI Tools

HTTP Interface for IOS-Based Devices

PIX Device Manager

Security Device Manager

Other GUI Tools for Configuring Cisco Devices

Managing System Files

File Management Using a TFTP Server

Configuring Cisco Devices to Use TFTP

Using an FTP Server for File Management

Summary

Chapter 2 Basic Network Connectivity

Basics of Network Monitoring Tools: ping and traceroute

Verifying Network Connectivity Using traceroute

Case Study: Using ping and traceroute to Isolate a BGP Meltdown Emergency

Observation

Conclusions

Actions

Advanced Network Connectivity Testing Tools

Using whois Lookup for Domain Registration Information

Using nslookup to Find DNS Information

Using netstat for Port and Connection Information

Using the MS Windows–Based netstat Command

Using the arp Command to Trace Layer 2 Issues

Summary

Chapter 3 Access Control

Overview of AAA Technology

TACACS+

RADIUS

RADIUS and TACACS+ Comparison

Using TACACS+ for AAA

Deploying a Linux-Based TACACS+ Server

Configuring Cisco Routers for TACACS+

Configuring a Cisco Switch for TACACS+

Configuring Cisco PIX Firewalls for TACACS+

Configuring a Cisco VPN Concentrator for TACACS+

Using RADIUS for AAA

Deploying a Linux-Based RADIUS Server

Configuring a Microsoft IAS Server as a RADIUS Server

Configuring a Cisco Router for RADIUS

Configuring a Cisco Switch for RADIUS

Configuring Cisco PIX Firewalls for RADIUS

Commercial Products

Summary

Chapter 4 Using Syslog

Overview of Syslog

Deploying Syslog Servers

Deploying the Default Syslog Daemon

Deploying a Linux-Based Syslog-ng Server

Configuring a Windows-Based Syslog Server

Securing Syslog Servers

Configuring Cisco Devices to Use a Syslog Server

Configuring Cisco Routers for Syslog

Configuring a Cisco Switch for Syslog

Configuring a Cisco PIX Firewall for Syslog

Configuring a Cisco VPN Concentrator for Syslog

Commercial Cisco Products

Summary

Part II Network Management Systems (NMS)

Chapter 5 Monitoring Network Availability

Network-Monitoring Fundamentals

Network-Monitoring Terms

Network-Monitoring Techniques

Deploying a Network-Monitoring System

Deploying a Linux-Based Big Brother Network-Monitoring System

Deploying a Windows-Based Big Brother Network-Monitoring System

Deploying Nagios for Linux-Based Network Monitoring

Adding Redundancy and Security to Network-Monitoring Systems

Commercial Cisco Products

Summary

Chapter 6 Network Performance Monitoring

Performance-Monitoring Overview

Deploying Network Performance—Monitoring Tools

Deploying a Linux-Based Performance-Monitoring System–MRTG

Deploying a Windows-Based Performance-Monitoring System–MRTG

Performance and Scalability Enhancements

RRDTool

Cricket

Deploying a Windows-Based Performance-Monitoring System–Cacti

Configuring Cisco Devices for Performance Monitoring

Enabling the SNMP Agent on Cisco Routers

Enabling the SNMP Agent on Cisco Switches

Enabling the SNMP Agent on a Cisco PIX Firewall

Enabling the SNMP Agent on Cisco VPN 3000 Concentrators

Securing SNMP

Commercial Cisco Offerings

Summary

Part III Security

Chapter 7 Network Security Testing

Network Security Testing Overview

Bootable CD-ROM—Based Tool Kits

Network Scanners

Nmap Scanner

Nessus Scanner

Packet Analyzers

Preparing the Network

Using Packet Analyzers

Summary

Chapter 8 Router and Switch Security

Router and Switch Security Overview

Securing Cisco Routers

Best Practice Recommendations

Summary

Chapter 9 Intrusion Detection System (IDS)

IDS Overview

IDS Classification

IDS Placement

IDS Tools

Snort

Rancid

IDS Sensors Using Common Cisco Devices

Router IDSs

PIX IDSs

Commercial Cisco Products

Summary

Chapter 10 Virtual Private Networks (VPN)

VPN Overview

IPSec Overview

Linux-Based VPNs

OpenSWAN

Interoperating OpenSWAN with Cisco IOS

Interoperating OpenSWAN with a Cisco PIX Firewall

Interoperating OpenSWAN with a Cisco VPN Concentrator

Windows-Based VPNs

Windows/Cisco Interoperability

Summary

Part IV Network Documentation

Chapter 11 Documentation Tools: Network Diagrams

Network Diagram Overview

Topology

File Formats

Features

Linux-Based Graphic Design Tools

Deploying Dia

Creating Diagrams with Dia

Viewing Sample Dia Diagrams

Windows-Based Graphic Design Tools

Deploying Network Notepad

Creating Diagrams in Network Notepad

Viewing Sample Diagrams Created by Network Notepad

What’s Next

Summary

1587052113TOC91405

Read More Show Less

Customer Reviews

Average Rating 4
( 1 )
Rating Distribution

5 Star

(0)

4 Star

(1)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted October 27, 2005

    Conquering the Chaos

    Network Administrators Survival Guide, by Anand Deveriya is part of a new trend from Cisco Press I have been noting: they are pushing more hands on usefulness. This book is intended for the person who has to support a network for a living. However, the reader does not need to be a Cisco expert to read this book. In fact, anyone who would be in a position to need its advice would be astute enough to implement it. Don't expect the author to explain all of the concepts behind every IOS command given. Deveriya is giving you a quick example of what works to get you going. This book is written for people who need to get things done in a hurry and don't have time to get their Ph.D. in a technology before implementing it. That doesn¿t mean their is no depth behind this writing. The author is a CCIE and the reviewers include William Parkhurst, Ph.D., author of some of the most technical books on Cisco. In fact there must have been a great deal of laborious rewriting to get it so brief. Deveriya has practical examples of how to set up several different brands of terminal emulation clients on both windows and Linux workstations. The entire book obviously comes from real world experience. The author not only reveals the diverse diagnostic functionality built into the Cisco IOS, he also demonstrates the tools that can be used on Windows and Linux workstations. The author walks the reader through a case study troubleshooting a BGP meltdown problem on a perimeter router by simply using different ping diagnostics along with show processes cpu. ¿We¿ were able to determine the cause and enabling ip route cache on the router solved the problem. 'Once again super ping saves the day!'

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)