MORE TOP PICKS: Cisco fires top dog in Brazil Cisco’s legal problems in Brazil: a timeline Cisco's Chambers makes it into Fortune's Power 25 list where Steve Jobs rules Cisco in the emerging markets: Is it all as rosy as it seems? FROM OUR BLOGGERS: Brad Reese on Cisco: Cisco-invented NetFlow MIA as Cisco invests in the network behavior analysis business Beware Mazu Networks, Lancope, Q1Labs, Arbor Networks and the like, the creator of NetFlow: Cisco, appears to be investing in the Network Behavior Analysis Business and unlike the above companies, they aren’t doing it with NetFlow. "We can very quickly tell users, how people are behaving on the network, what threats exist and help them optimize it for business purposes," said Paul Brady – President of Mazu Networks. "We are able to without agents or inline devices through the use of NetFlow which is pervasive on almost all networks and transparent, meaning very little to no overhead." However, Cisco’s strategy appears to take a different approach. Joe Panettieri's Eye on Cisco: Cisco prepares marketing surprise Hundreds of Cisco partners are heading to Miami on December 2 for a private gathering with the networking giant. Is this yet another geek fest with plenty of golf mixed in? Guess again. The invitation-only gathering is a first-of-its-kind marketing summit for partners, and provides important clues about Cisco's strategic thinking for 2008. Jeff Doyle on IP Routing: What about a volume III? When Cisco Press approached me in 1996 or so about writing a book, they were a pretty new operation and they left it to me to choose the topic. So I chose the plum, "Routing TCP/IP," which originally was supposed to be one volume. Halfway through the project my editor and I both realized we couldn’t squeeze everything I wanted to cover in a single book so it evolved into two volumes. And those two volumes have been a cornerstone of my career. Given the success of these two volumes I had a conversation last year with Brett Bartow, the Executive Editor at Cisco Press, about doing a Volume III ... Wendell Odom's Cisco Cert Zone: A few hints and another question about frame relay addressing Monday's sample question focused on the data link layer addresses used as frames pass over a Frame Relay WAN. Today, I’ll summarize the key points that must be considered when answering that question, as well as posing a follow-on general question about Frame Relay addressing. (If you’ve not looked at Monday’s question yet, it may be worth reading the question, and picking some answers, before reading these suggestions.) Dheeraj Tolani's Cisco Routing Switching Essentials: Securing Cisco devices So far, we’ve discussed securing your devices by implementing passwords on your console, your aux, and your VTY. We’ve discussed using SSH rather than telnet for security purposes, and we’ve talked about using “enable secret passwords” on your accounts. In my last article, we discussed disabling protocols like CDP for security purposes since it gives away too much information about your network. There are still many other things covered in Global Knowledge courses that you can do to secure your network. Michael Morris From the Field: Routing iSCSI with 10GIG We recently redesigned our DC network templates. Part of this redesign created a "Storage Pod" where our network storage resources would be located and virtualized. This consolidated storage devices not just physically, but logically into separate VLANs. The previous DC design had the storage resources in the same VLAN as the application and database servers. All iSCSI access was at Layer-2, ignoring the "i" in iSCSI. This was a legacy decision driven by our storage teams who were convinced that any Layer-3 routing of iSCSI would severely impact performance. Jamey Heary: Cisco Security Expert: PCI compliance, the 12 step program If your company stores, processes, or transmits the primary account number on a credit card then you are required to meet, or exceed, the data security standards set forth in the PCI security standards. These security requirements apply to all network components that forward or have access to card holder data. This would include switches, routers, firewalls, IPS, Servers, workstations, wireless, storage, etc. So basically, if the device is IP (Internet Protocol) reachable to cardholder data then it is in scope for the PCI requirements. ChannelSurfing with Ken Presti: Green Google and the Cisco channel The blogosphere has been full of reactions to Google’s renewable energy initiative. If you’re still coming out of a turkey-induced slumber, the company announced plans to invest huge quantities of money in the development of renewable energy technologies, especially solar, wind, and geothermal. Some of the reactions are very complimentary; others more skeptical. But I had a completely different reaction jump into my mind when I saw the announcement. Author Expert: Michael Behringer: Who is responsible for abuse of Internet technology? The Internet with all its peripheral infrastructure has an enormous potential, to the good guys as well as to the bad ones. No surprise. Lots of technologies are extremely powerful, and provide a lot of detail on the network as well as its users. Somehow the potential abuse of Internet based data needs to be controlled. But how? And who is responsible for this? Joe Chapman's Network Training Edge: The line and the LAN Depending on the person - or provider - you ask you may get different answers as to what types of services are supported in a 'metro ethernet' environment. Fortunately, the Metro Ethernet Forum (MEF) has gotten together the leading providers and manufacturers in the industry and has built a cohesive list of the products, platforms, standards and services which should constitute a great starting point for anyone looking to get into this area. HOT DISCUSSIONS AMONG CISCO SUBNET READERS: Cisconet: Parts of Cisco.com inaccessible for most of Monday Morris: Any CCIEs in Syria??? Cisconet: What admin tasks would you like to offload? Odom: The confidence that comes from sniffing/tracing Badccie: Cisco Gold partners who hire and fire just for certification FREEBIES, GIVEAWAYS AND OTHER NOTABLES: * Enter to win a Skyline-ATS training course of your choice worth up to $3,495. Details here. FINAL FEW DAYS TO ENTER! *Enter to Win a Cisco Press Book: Up for grabs are 15 copies of "MPLS VPN Security" by Michael H. Behringer and Monique J. Morrow, is the first book to address the security features of MPLS VPN networks and to show you how to harden and securely operate an MPLS network. Details here. Get a sneak peek of a chapter from one of the books here. Read Michael Behringer's blog for Cisco Subnet here. * Read a free chapter from "Firewall Fundamentals" by Wes Noonan and Ido Dubrawsky. Free excerpt here *Browse through our library of other free Cisco Press book chapters. * Check out Cisco Subnet's library for more free chapters from Cisco Press books. |
No comments:
Post a Comment