Total Pageviews

Showing posts with label Downloads. Show all posts
Showing posts with label Downloads. Show all posts

Sunday, November 13, 2011

EIGRP or OSPF Which one should I use?

Here is a very good presentation on EIGRP Vs OSPF
EIGRP or OSPF Which one should I use? pdf
EIGRP OSPF
EIGRP forms adjacencies and exchanges routing updates with neighbors OSPF forms adjacencies with DR/BDROSPF can be more efficient than EIGRP for large meshed networks
EIGRP uses metric based on bandwidth and delay OSPF uses interface cost (inversely proportional to bandwidth)EIGRP may provide more flexibility in selecting best path
EIGRP by default limits usage to at most 50% of link bandwidth in worst case OSPF uses 100% of link bandwidth when required EIGRP may be better suited for lower bandwidth WAN applications
EIGRP provides feature velocity, but is Cisco-proprietary OSPF is an Internet RFC standard
EIGRP sends hop-by-hop queries only when Feasible Successor cannot be found OSPF regularly syncs LSA database and floods network with topology change EIGRP can be more efficient by minimizing routing information exchanged
EIGRP is a conceptually simpler routing protocol OSPF’s rules for different types of areas and LSAs can be conceptually more difficult to understand Some customers believe EIGRP is easier to implement, but both are feature-rich and scalable
EIGRP supports automatic summarization OSPF’s requires manual summarization Care is needed in either case to ensure proper summarization!
EIGRP supports both equal and unequal cost load sharing OSPF only supports equal cost load sharing

OSPF Troubleshooting

Saturday, November 12, 2011

Free Online Trainings

Free Online  Trainings
Routing & Switching
Security
Voice
Network Management
QoS
Wireless
Iron Port
Juniper
Routing & SwitchingCategory
Describing Spanning Tree ProtocolSTP
Correcting Common VLAN Configuration ErrorsVLAN
Operation of Cisco IOSIOS
Configuring RIPRIP
Review of Basic Configuration Including RIP e-LabRIP
Troubleshooting RIP Update IssuesRIP
Managing the Startup Configuration File e-LabIOS
Managing the Switch Operating System File e-LabSwitching
Managing the MAC Address Tables e-LabSwitching
Preparing for Boot System Commands e-LabRouter
A Deep Dive into OSPF Link-State Advertisements Part 1OSPF
A Deep Dive into OSPF Link-State Advertisements Part 2OSPF
A Deep Dive into OSPF Link-State Advertisements Part 3OSPF
EIGRP Metrics and Load-Balancing Play NowEIGRP
Basic IP Routing ConceptsRouting
Routing Information Protocol (RIP)RIP
Enhanced Interior Gateway Routing Protocol (EIGRP)EIGRP
Open Shortest Path First (OSPF)”>Open Shortest Path First (OSPF)OSPF
Moving traffic using Access ListsACL
BGP Introduction and BasicsBGP
BGP Path SelectionBGP
Controlling the Flow of BGP UpdatesBGP
BGP Multipath and Conditional AdvertisementBGP
BGP Load Sharing in Single and Multihomed Environments: Sample Configurations.BGP
BGP Challenge LabsBGP
Securing Cisco Routers (SECR) v1.0Secure
IP Routing – IntroductionRouting
IP Routing Access ListsACL
Introducing the OSPF ProtocolOSPF
Open Shortest Path First (OSPF) Network TypesOSPF
Adjacencies Introducing EIGRP ProtocolEIGRP
Enhanced Interior Gateway Routing Protocol (EIGRP)EIGRP
Fundamental Configuration and Verification of EIGRPEIGRP
Introducing BGP ConfederationsBGP
Understanding BGP Path AttributesBGP
Intermediate System-to-Intermediate System Routing Protocol (IS-IS)ISIS
Introducing Route ReflectorsRR
Cisco MPLS ConceptsMPLS
Introducing MPLS VPNsMPLS
Configuring Small-Scale Routing Protocols Between PE and CE RoutersMPLS
Understanding MPLS Traffic Engineering ConceptsMPLS
Introduction to LAN Switches QLMLAN
Understanding VLANS by Understanding MAC Table OperationVLAN
Securing Cisco LAN Switches (SECL) 1.0Sec LAN
LAN Switching Technologies: Catalyst 6500 Switches6500
Packet Cable NetworksCable
Developing an Optimum Design for Layer 2Design
Describing & Implementing Spanning Tree TutorialSTP
Understanding VLANs and TrunksVLAN
VLAN Trunking Protocol (VTP) Training.VLAN VTP
How Transparent Bridging WorksVTP
LAN Switch Security – Part 1.LAN Sec
  
SecurityCategory
Site-to-Site VPNs: Cryptography BasicsS2S
Configuring IPsec Site-to-Site VPNS2S
Site-to-Site IPsec VPN OperationsS2S
Advanced Firewall Security ConfigurationASA
Configuring Interfaces on an Advanced FirewallASA
Introducing Access Control List OperationACL
Configuring Basic Features on the Cisco ASA 5505ASA
Active/Active Failover for ASA 5500ASA
Active/Standby Failover for ASA 5500ASA
High Availability for the Cisco ASA 5500 Series Adaptive Security Appliance, Part II: Active/Active FailoverASA
Cisco ASA 5500 Series Adaptive Security Appliance VPN ClusteringASA
VPN Clustering for ASA 5500ASA
Migrating from PIX 500 to ASA 5500ASA
Simplifying Access Control Policies on PIX 500 and ASA 5500ASA
ASA Jumpstart Lab Walk-thru and DiscussionASA
Securing VoIP applications using the enhanced features of the Cisco ASAASA
Utilizing the Packet Tracer Feature on the Cisco ASAASA
Configuring The Easy VPN Hardware Client feature on the Cisco ASA 5505ASA
Configuring the L2TP/IPSEC feature on the Cisco ASAIPSEC
Cisco SSL VPN Client for WebVPN (or Thick SSL Client)SSL
SSL VPN JumpStart – Browser-Based (Clientless) SSL VPNSSL
SSL VPN JumpStart – Client-Based SSL VPN (AnyConnect SSL VPN Client)SSL
SSL VPN JumpStart – CSD SSL VPN Access ControlsSSL
SSL VPN JumpStart – Identity and Authentication Policy InheritanceSSL
SSL VPN JumpStart – Posture Assessment NAC Features and IntegrationSSL
Configuring The Easy VPN Hardware Client feature on the Cisco ASA 5505ASA
Configuring the L2TP/IPSEC feature on the Cisco ASAASA
Using Cisco ASA 5500 Series SSL VPN for Clientless Access (WebVPN)ASA
Using Cisco Secure Desktop to Provide Endpoint Security for SSL VPNSSL
SSL VPN Client Access on ASA 5500ASA
Using Citrix™ with SSL VPN Clientless Access on ASA 5500ASA
ASA Pix to ASA and Basic SSL VPN Lab Walk-thru and DiscussionASA
Advanced IPsec Deployments and Concepts of DMVPN NetworksDMVPN
Cisco ASA 5500 Series Content Security and Control SSM (CSC-SSM): Installation, Setup and ActivationASA
Configuring the ASA 5500 Series with the CSC-SSMASA
Monitoring the ASA 5500 Series CSC-SSMASA
Configuring the Base License Features of the CSC-SSM in the ASA 5500 SeriesASA
Configuring the Plus License Features of the CSC-SSM in the ASA 5500 SeriesASA
LAN Switch Security – Part 1.LAN Sec
Securing Cisco LAN Switches (SECL) 1.0LAN Sec
Securing Cisco Routers (SECR) v1.0WAN Sec
QoS for SecurityQoS
Advanced IPsec Deployments and Concepts of DMVPN Networks PDFDMVPN
Cisco IOS DMVPN Overview PDFDMVPN
Enterprise Class VPNs PDFDMVPN
Introduction to DMVPN PDFDMVPN
Introduction to DMVPN Hub and Spoke PDFDMVPN
Introduction to DMVPN Spoke to Spoke Tunneling PDFDMVPN
Large Scale DMVPN PDFDMVPN
Configuring Cisco IPS 4200 Series SensorsIPS
Configuring Cisco Adaptive Security AppliancesASA
Configuring Cisco Security AgentCSA
Intrusion Prevention Services in ASA 5500IPS
Configuring the Meta Event Generator (IPS-QLM4)IPS
Configuring Event Action Rules (IPS-QLM2)IPS
IPS Jumpstart Design / Feature SessionIPS
IPS Jumpstart Lab Walk-thru and DiscussionIPS
Intermediate IPS Config Design SessionIPS
Intermediate IPS Config Lab Walk-thru and DiscussionIPS
Understanding and Configuring Inline IPS (IPS-QLM1)IPS
Understanding and Configuring In-Line VLAN IPSIPS
Upgrading a Sensor to IPS 5.0 (IPS-QLM3)IPS
Modular Policy Framework on PIX 500 and ASA 5500MPF
ASA Phone ProxyPhone Proxy
NAC In-Band Lab Walk-thru and DiscussionNAC
NAC Out-of-Band Lab Walk-thru and DiscussionNAC
NAC Out-of-Band with Centralized CAS Lab Walk-thru and DiscussionNAC
Securing Hosts Using Cisco Security Agent (HIPS) v3.1NAC
Using the Set command in CSA 5.0NAC
Using the Trusted QoS Feature in CSA 5.0NAC
MARS Jumpstart Lab Walk-thru and DiscussionMARS
MARS 6.0 NPI Jumpstart Lab Walk-thru and DiscussionMARS
TrustSec: 802.1x Workshop DESIGN SessionTrustSec
TrustSec: 802.1x Workshop TECH SessionTrustSec
TrustSec: NAC Profiler Workshop DESIGN SessionTrustSec
TrustSec: NAC Profiler Workshop TECH SessionTrustSec
ACS 5.1 Product IntroductionACS
ACS 5.1 Best PracticesACS
Introducing Access Control List OperationACS
Switch Security and ACS 5.0ACS
Cisco Secure Services 5.1ACS
Access Control Policy for a Wireless NetworkACS
Access Control Policy for Client-less DevicesACS
Access Control Policy for Device AdministrationACS
Introduction to ACS 5.0 Rule-Based Policy ModelACS
Optimize Your Troubleshooting TechnologyACS
Cisco Secure Desktop SoftwareACS
CiscoSecure ACS:Primer/Tutorial v4.0ACS
Using Cisco Secure Desktop to Provide Endpoint Security for SSL VPNACS
Cisco SMB Class E-TourSMB
Diffie-Hellman (D-H) Key Exchange CalculationsD-H
Cost of data breaches keeps rising 
Employees think they have right to download applications at work 
Express 5.0 
Secure Network Analysis Essentials with Case Studies 
Spyware New Champ among IT Security Worries 
Things That Go Bump In The Night – When a Security Disaster Hits Will You Have What It Takes? 
  
VoiceCategory
Cisco Unified Communications Express as Survivable Remote Site TelephonySRST
Examining Remote Site Redundancy OptionsFallback
Unified Communications Systems Release Approach 
Unified Communications Architecture Focus Areas 
Deploying DHCP Server on Unified CallManager 5.0 
Unified CallManager 5.0 Directory Integration 
Deploying AutoQoS on Wan Routers 
Unified Communications Deployment Methods 
Unified Communications IP Telephony Architecture 
Unified IPCC 7.0 Enterprise Deployment Models 
Unified IPCC Express 4.5 Deployment Models 
Unified Communications IP Telephony Deployment Models 
Unified Communications QoS for Security 
Unified Communications RSVP Overview 
Unified Communications Systems Approach to Troubleshooting 
Demystifying Unified Communications Manager Partitions and Calling Search Spaces 
Troubleshooting Common VoIP Problems 
CCBU Serviceability and Security Enhancements 
Voice Centric Technology for Small Business 
SP – TCP/IP, IP Addressing & Subnetting 
Unified Communications Migration Challenge 
Cisco Unified Communications System Release 5.1 System Overview 
Cisco Unified Communications System Release 5.1 Installation and Upgrade 
Cisco Unified Communications System 
CTT-TAC: Introduction to Basic Analog Voice over IP 
CTT-TAC: Analog Voice Internetworking with E&M Signaling 
CTT-TAC: Basic Analog-to-Digital Voice over IP 
CTT-TAC: Link Efficiency Mechanisms 
CTT-TAC: Queuing Techniques 
Securing VoIP applications using the enhanced features of the Cisco ASA 
Designing and Implementing Cisco IPVC Rich Media Communications 
Cisco IPC Rockin’ Retailer Game 
Cisco Learning Game Trilogy 
Configuring Cisco CallManager Time-of-Day Routing 
Establishing an On-Cluster Call with Cisco Call Manager (CMONC) v1.0 
Telephony Troubleshooting Topics (TTOPS) 
Communication for the Open-minded (UC/Collaboration solutions)* * 
Deploying IPv6 Networks – Part 1 
VoIP Performance Management and Optimization – Part 1 
VoIP Performance: Management and Optimization – Part 2 
Enterprise Adoption of Hosted VoIP to Grow Exponentially 
UC500 
Cisco ACE XML Gateway 
Troubleshooting Common Gateway Registration Issues 
Cisco SPA 525 IP Phone TutorialIP Phone
Cisco IP Phone 7962IP Phone
Cisco IP Phone 7960IP Phone
Cisco IP Phone 7942IP Phone
Cisco IP Phone 7940IP Phone
Cisco IP Phone 7911IP Phone
Cisco IP Communicator v2.0IP Phone
Cisco IP Phones BasicsIP Phone
Cisco Unity Trainings & ToolsUnity Con
Connection 1.1 TrainingUnity Con
Connection 1.2 TrainingUnity Con
Connection 2.0(1) TrainingUnity Con
Connection 7.0(1) TrainingUnity Con
Connection 7.1(1) TrainingUnity Con
Connection 8.0(1) TrainingUnity Con
Unity 4.0(1) TrainingUnity Con
Unity 4.0(3) TrainingUnity Con
Unity 4.0(4) TrainingUnity Con
Unity 4.0(5) TrainingUnity Con
Unity 4.1 TrainingUnity Con
Unity 4.2 TrainingUnity Con
Unity 5.0(1) TrainingUnity Con
Unity 7.0(1) TrainingUnity Con
Unity 8.0(1) TrainingUnity Con
Unity Exchange 2010 TrainingUnity Con
Cisco Unity End User Training TutorialUnity Con
QLM – Troubleshooting Common Cisco Unity Integration IssuesUnity Con
Avaya one-X® UC All Inclusive Multimedia Training LibraryAyvaya
  
Network ManagementCategory
Managing Borderless Network with CiscoWorks LMS 4.0 WebEx Playback View PPTX 
CiscoWorks LMS 4.0 “A New Management Paradigm” WebEx Playback View PPTX 
Cisco Network Analysis Module (NAM) 4.1 E-learning 
Introduction t Cisco Unified Communications Management Suite (CUCMS) 
CiscoWorks LAN Management Solution (LMS) 3.1 Tutorial Overview 
CiscoWorks LMS 3.1 Tutorial – Chapter 2 (New Features) 
CiscoWorks LMS 3.1 Tutorial – Chapter 3 (Scenarios) 
CiscoWorks LMS 3.1 Tutorial – Chapter 2 (Sys Admin) 
CiscoWorks LMS 3.1 Tutorial – Chapter 2(Reference. 
Cisco Configuration Assurance Solution (CCAS) Video Demonstration 
Cisco NAPAS: Performance Visibility Manager 1.0 Deployment Guide 
CiscoView Tutorial v6.1 
CiscoWorks Common Services Tutorial v3.0 
CiscoWorks LMS Campus Manager Tutorial v4.0 
CiscoWorks LMS Device Fault Manager Tutorial v2.0 
CiscoWorks LMS IPM Tutorial v2.6 
CiscoWorks LMS Resource Manager Essentials Tutorial v4.0 
Network Management: Accounting and Performance – Part 1 
Network Management: Accounting and Performance – Part 2 
Defense-In-Depth and Incident Management – Part 1 
Defense-In-Depth and Incident Management – Part 2 
CiscoWorks LAN Management Solution (LMS) 3.1 Tutorial – Chapter 1 
  
QoSCategory
Take this small questionnaire (25) to evaluate your knowledge on QoS. 
Introducing QoS 
Introduction to Modular QoS CLI 
Class-Based Weighted Fair Queuing (CBWFQ) and Low Latency Queuing (LLQ) 
Congestion Management Configuring CBWFQ and LLQ 
Congestion Avoidance Introducing RED and WRED 
QoS for Security 
  
WirelessCategory
QLM 1: Introduction 
QLM 2: MIMO Technology 
QLM 3: 802.11n Physical Layer 
QLM 4: 802.11n MAC Layer 
QLM 5: Cisco AP-1250 Introduction 
QLM 6: Design Advice 
QLM 7: Cisco Unified Wireless Network Software Release 4.2 
QLM 8: AP-1250 Configuration for 802.11n 
Iron PortCategory
Cisco IronPort Training & Certification 
E-Learning – What’s New in AsyncOS 7.2 for Security Management (Web) 
E-Learning – Activating Cisco IronPort Web Usage Controls 
E-Learning – AnyConnect Secure Mobility 
E-Learning – Application Visibility and Control 
E-Learning – Cisco IronPort Hosted and Hybrid Email SecurityE-Learning – What’s New in AsyncOS 6.7 Security Management (Email) 
E-Learning – What’s New in AsyncOS 6.7.3 for Security Management (Web) 
E-Learning – What’s New in AsyncOS 7.1 for Email 
E-Learning – Cisco IronPort Hosted Security Services 
E-Learning – Introduction to Email Messaging 
E-Learning – Introduction to HTTP/HTTPS 
E-Learning – Centralized Configuration Manager 
E-Learning – Centralized Reporting and Tracking 
E-Learning – Domain Keys Identified Mail (DKIM) 
E-Learning – Email Encryption 
E-Learning – Essential Layers of Web Security 
E-Learning – Image Analysis for Email 
E-Learning – Reporting with Sawmill 
E-Learning – Safelists/Blocklists 
E-Learning – Sawmill for IronPort 7.3 
E-Learning – Sender Policy Framework (SPF) 
E-Learning – Smart Identifiers & Dictionary Weighting 
E-Learning – The Advantages of Next Generation Hardware for Web Security 
E-Learning – Using Content Filters to Prevent Data Loss 
E-Learning – Web Reputation 
  
JuniperCategory
Networking Fundamentals Online 
Networking Fundamentals ZIP 137.9 MB Downloadable 
Introduction to the IOS-to-Junos (I2J) Translator 
Junos As A Second Language 
Junos as a Scripting Language 
Junos as a Security Language 
MX960 and MX-960-ECM Ethernet Services Router installation and configuration 
J4350 and J6350 Hardware Installation and Configuration 
Junos As A Switching Language 
EX4500 Ethernet Switch Installation and Initial Configuration 
SRX210 and SRX240 Services Gateways Installation and Initial Configuration 
  
Quantcast