OSPF The Ultimate For CCIE Enterprise and Infrastructure Exam kindle and paperback format

After my first publication of the book OSPF Demystified With RFC in 2014 which goes beyond the CCIE level which explores OSPF from the RFC’s perspective. Since one year I had the idea to write a book for CCIE Enterprise and Infrastructure to be an ultimate preparation to enforce candidates’s skills and to acquire solid knownledges after attending a global preparation or in depth bootcamp, this why I call it OSPF The Ultimate.

The idea is to offer a series of 30 practice labs that covers all the blueprint of the lab exam with high level scenarios, and to acquire additional scenarios and an indepth exploration of the most important OSPF’s concept related to the exam such as LSA Types in details by analysing the most important fields, Area Types, Network Types OSPF Path Selection (with many tricky scenarios), Route Filtering (with many tricky scenarios), Forwarding Address, Prefix Suppression, Loop-Free Alternate, Summary Routes and so on . Also I given a way to be able to reproduce them using the basic configuration present at the top of each lab.

The ultimate goals is:

To be able to troubleshoot any problem by reasoning.
To be able to answer challenges that requires only one command.
How to follow some logic to detect any problem or to explain an unexpected behavior.
How to fix it with some restrictions such as: you are not allowed to use cost and so on.

Table of content:

Lab 1: OSPFv2 Link State Database LSDB In depth Exploration
Lab 2: OSPFv3 Link State Database LSDB In depth Exploration
Lab 3: OSPF Network Types P2P P2M and Broadcast
Lab 4: OSPF Network Type P2M and Broadcast with Type-2 LSA
Lab 6: Stub and Totally Stub Area Types
Lab 7: NSSA Area Type In depth Exploration
Lab 8: NSSA Area Type Filtering Options
Lab 9: NSSA ABRs translator Condition
Lab 10: Path Selection Scenario 1
Lab 11: Path Selection Scenario 2
Lab 12: Path Selection Scenario 3
Lab 13: Path Selection Scenario 4
Lab 14: Forwarding Address Scenario 1
Lab 15: Forwarding Address Scenario 2
Lab 16: Forwarding Address Scenario 3
Lab 17: Route Filtering Scenario 1
Lab 18: Route Filtering Scenario 2
Lab 19: Route Filtering Scenario 3
Lab 20: Route Filtering Scenario 4
Lab 21: OSPFv2 RFC 6860 Hiding Transit-Only Networks
Lab 22: OSPFv3 RFC 6860 Hiding Transit-Only Networks
Lab 23: OSPF TTL security check 286
Lab 24: Stub router advertisement Graceful Shutdown
Lab 25: OSPF Link-State Database Overload Protection
Lab 26: OSPF Refresh and Flooding Reduction in Stable Topologies
Lab 27: OSPF SPF Throttling
Lab 28: Inter-Area Summary route lowest cost and highest cost
Lab 29: OSPF Loop-Free Alternate LFA Fast Reroute FRR
Lab 30: Capability Transit feature and routing loop

Dial Plan Call Routing Demystified Cisco Unified Communication Manager Kindle Format

Description:

Dial plan and Call Routing are the most important complex components for any Cisco Unified Communications system and deployment. Whether implementing single-site or multisite deployments, understanding the dial plan and Call Routing and the solid knowledge of how to implement them on Cisco Unified Communication Manager is essential for any voice engineer. Generally, the dial plan is the decision maker and instructs the call processing agent on how to route the calls.

Goals and Methods:

When we talk about Dial Plan and Call Routing, many components are involved such route pattern, route list, route group, trunk and gateway, also Translation Pattern and Transformation Pattern for digits manipulation of the called and calling parties.

This Book is written to demystify the Dial Plan and Call Routing, especially the components that are used to implement them with atypical scenarios, to show you how translation pattern works?, how transformation pattern works?, what is the difference between them?, where to implement them?, how and where to implement digit manipulations of the called and calling parties at different level? Under route pattern, route group, at the phone level with the external phone number mask, at the gateway level, also one of the most important parts of Dial Plan is the Globalized Call Routing or Unified Dial Plan using the +164 format, the globalization is covered in details and anwser the question: Why we need the Unified Dial Plan? And how some features such as device mobility, AAR (Automated Alternate Routing), Emergency Numbers, Class of Service and TEHO (Tail Hop End Off) are simplified.

The Dial Plan and Call Routing on Cisco Unified Communication Server are covered with atypical explanations and scenarios so that you will definitely get a feeling of, “This is how a call is routed”, and “This is how a feature works”.

Tables of content:

Lab 1: Translation Pattern for inter-site dialing
Lab 2: Translation Pattern to block international calls
Lab 3: Translation Pattern for Overlapping Numbers
Lab 4: Call Routing using Standard Local Route Group
Lab 5: Digit manipulation of Calling Party
Lab 6: Globalization Dial Plan on CUCM
Lab 7: Globalization of Emergency Number
Lab 8: Traditional SRST Call Manager Fallback
Lab 9: Enhanced SRST CME-Based
Lab 10: Region and Call Admission Control
Lab 11: Automated Alternate Routing AAR
Lab 12: AAR with Globalized Call Routing
Lab 13: Device Mobility Without Globalized Call Routing
Lab 14: Device Mobility With Globalized Call Routing
Lab 15: Toll Fraud With CUCM and Unity Connection
Lab 16: Toll Fraud With OffNet to OffNet Transfer
Lab 17: Globalized Call Routing With Multisite Deployment
Lab 18: Tail End Hop OFF TEHO With Globalized Call Routing
Lab 19: H.323 Signaling Protocol With Wireshark
Lab 20: Firewall Traversal, NAT Traversal and MRA On Cisco Expressway
Lab 21: Auto Attendant On Cisco Unity Connection
Lab 22: Cisco Unified Border Element CUBE Diversion Header
Lab 23: Originator’ s CSS in Translation Pattern
Lab 24: Extend and Connect With Cisco Jabber
Lab 25: Conference Now Feature On CUCM
Appendixes
Appendix A: Route Pattern Translation Pattern Transformation Pattern order priority
Appendix B: Closest-Match Routing
Appendix C: Digits Manipulation on Cisco CUCM, Where and When to do it?

Network Security All-in-one ASA FTD ISE WSA Umbrella ISE Layer 2 Security Kindle Fomat

This book is written for Network engineers working in the Security field and to prepare the CCNP Security exam, it includes Cisco ASA Firewall, ASA with FirePOWER, Firepower Threat Defense FTD, Web Security Appliance, VPN Technologies, Cisco ISE, Cisco Umbrella and Layer 2 Security with practice labs in one book with a simple explanation through 80 Scenarios.

Table of Contents

Cisco ASA Firewall And FirePOWER Services

Lab 1: Auto NAT and Manual NAT
Lab 2: HTTP Inspection 16
Lab 3: FTP Inspection Part-1
Lab 4: FTP Inspection Part-2
Lab 5: TCP normalization
Lab 6: Access-list ACL using network object
Lab 7: Active/Standby Failover
Lab 8: Firewal Transparent mode
Lab 9: ASA FirePOWER module installation

Cisco Firepower Threat Defense

Lab 10: URL Filtering with ASA 5506-X FirePOWER
Lab 1: FTD Basic Configuration
Lab 2: FTD NAT Policy
Lab 3: FTD SSL Decryption for Outbound Connection
Lab 4: Security Intelligence
Lab 5: QoS on Firepower Threat Defense
Lab 6: Advanced Malware Protection AMP
Lab 7: Network Discovery Policy
Lab 8: Intrusion Prevention System IPS Policy Scenario 1
Lab 9: Intrusion Prevention System IPS Policy Scenario 2
Lab 10: Configuration of PBR using FlexConfig on FTD
Lab 11: Firepower Threat Defense Failover Active/Standby
Lab 12: Pre-Filter Policy on Firepower Threat Defense
Lab 13: VPN Site to Site with IKEv2 on Firepower

Cisco Web Security Appliance

Lab 1: Cisco WSA installation License Wizard
Lab 2: Transparent mode with WCCP and Access Policies
Lab 3: Custom URL Category Configuration
Lab 4: Configure Application Visibility Control for the Access Policy
Lab 5: Proxy Authentication using AD Realm
Lab 6: Identification Profile and Access Policies
Lab 7: HTTPS Decryption
Lab 8: Referrer Header Exception
Lab 9: Application Visibility and Control

Cisco Umbrella

Lab 1: Cisco Umbrella Basic Configuration
Lab 2: Intelligent Proxy and SSL Decryption
Lab 3: IP Layer Enforcement in Cisco Umbrella
Lab 4: Umbrella Active Directory Integration With Roaming Client

VPN Technologies

Lab 1: Static VTI Point-To-Point tunnel
Lab 2: Dynamic VTI Hub and Spoke tunnel
Lab 3: VPN Site-to-Site with dynamic IP
Lab 4: DMVPN Phase 2 using EIGRP
Lab 5: DMVPN Phase 2 using OSPF
Lab 6: DMVPN Phase 3 using EIGRP
Lab 7: DMVPN Phase 3 using OSPF
Lab 8: VPN Site-to-Site between ASA using PKI
Lab 9: Site-to-Site FlexVPN IOS router
Lab 10: GRE VPN over IPsec
Lab 11: Site-to-Site IKEv2 IPsec VPN
Lab 12: Basic VPN AnyConnect Remote Access
Lab 13: VPN AnyConnect authentication using ACS
Lab 14: VPN AnyConnect authentication using ISE
Lab 15: Basic VPN Clientless Remote Access
Lab 16: VPN Clientless authentication using ISE

Cisco Identity Services Engine 2.6

Lab 1: Cipher Negotiation TLS Issues
Lab 2: 802.1X With Dynamic VLAN and DACL
Lab 3: Advanced 802.1X Configuration
Lab 4: Guest Access With Self-Registered Portal
Lab 5: Guest Access With Hotspot Portal
Lab 6: Profiling Using DHCP Probe
Lab 7: Device Admin using TACACS From Scratch
Lab 8: Advanced Device Admin TACACS Scenario 2
Lab 9: Cisco ISE Integration with F5 BIG-IP
Lab 10: VPN Anyconnect with ISE and Tunnel-Group-Lock
Lab 11: Authorization Policy Based On Profiling Data
Lab 12: Cisco ISE with F5 BIG-IP for Dot1x Load Balancing
Lab 13: Cisco ISE with F5 BIG-IP for Guest Load Balancing

Cisco Layer 2 Security

Lab 1: DHCP Snooping IP source guard and ARP inspection
Lab 2: DHCP Snooping and ARP Inspection Part-1
Lab 3: DHCP Snooping and ARP Inspection Part-2
Lab 4: IP source guard
Lab 5: ARP Inspection using ARP ACL and “static” keyword
Lab 6: Private VLANs PVLANs
Lab 7: BPDU Loop Guard
Bonus: Comprehensive Security Lab

OSPF Demystified With RFC:Request For Comments Translated into Practice Kindle and Paperback formats

Description:

OSPF Routing Protocol is the most used protocol in the world, especially in the world of service provider, through this hand-on-labs workbook, you will discover another aspect of OSPF which is the RFCs that stands for “Request For Comments”, A Request for Comments (RFC) is a formal document developed by a committee of the Internet Engineering Task Force (IETF) and subsequently reviewed by interested parties. Memos in the RFC document series contain technical and organizational notes about the Internet. They cover many aspects of computer networking, including protocols.

One of these internet protocols, OSPF is described in many RFCs, and why it is important to read and understand these RFCs? because there are many differences about path selection and behaviors between them such as Type 7 translation, summary cost, forward address, and so on, this impact is very important to know it in order to interpret an OSPF behavior.

This new approach of OSPF with RFC changes drastically the traditional path selection based on: 1-ROUTE TYPE and 2-COST.

The changes are huge, another order of selection should be taken in consideration with RFC.

Goals and Methods:

The goal of this atypical and unique book in the world about OSPF Routing Protocol: is to translate the RFCs into Practice through 101 uncommon scenarios.It is written with atypical scenarios and explained with another view, in constrast with other resources, the only book in the market that explains OSPF with RFCs Request For Comments, more important, demystifying the different RFC ‘s behavior regarding path selection, NSSA Area options with RFC 1587 and 3101, OSPFv2 and OSPFv3 ‘s behavior when moving from RFC 1583 to RFC 2328 and from RFC 1583 to RFC 5340 respectively.

Understanding how the RFCs explain OSPF is very important, it gives you a way to look inside OSPF Packets, such as LSA Types, LSDB and NSSA Area Types and demystifying the most misunderstanding OSPF’s behavior, such as LSA Types, Area Types, Network Types OSPF Path Selection, Route Filtering, Forwarding Address, Prefix Suppression, Loop-Free Alternate, Summary Routes and so on.

To understand what inside OSPF LSAs, what happen and why this happen? for example: why the P-bit should be cleared in some situations and why it should be set, why the Forward Address must be set and why it must cleared, how suboptimal routing or routing loop can occur in OSPF and so on.

Many questions are answered in 82 scenarios step by step that you will not find elsewhere.

By traveling through this workbook you will:

  • Be able to troubleshoot any problem by reasoning.
  • Be able to answer amazing challenges that requires only one command.

This workbook provides you challenges where you will learn:

  • How to follow some logic to detect any problem or to explain an unexpected behavior.
  • How to fix it with some restrictions such as: you are not allowed to use cost and so on.

Understanding OSPF needs atypical and uncommon explanations, useful and appropriate show commands and debug commands rather than showing just routing tables or LSDB tables.

As you read this book, you definitely get a feeling of, “This is how a feature works”, “This is how to understand a behavior” and “This is how to solve a problem”.