loading
IETF RFC 8502 - L2L3 VPN Multicast MIB
December 1, 2018 - IETF

This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes two MIB modules that will be used by other MIB modules for monitoring and/or configuring Layer 2 and Layer 3 Virtual Private Networks...

IETF RFC 8534 - Explicit Tracking with Wildcard Routes in Multicast VPN
February 1, 2019 - IETF

The base Multicast VPN (MVPN) specifications (RFCs 6513 and 6514) provide procedures to allow a multicast ingress node to invoke "explicit tracking" for a multicast flow or set of flows, thus learning the egress nodes for that flow or set of flows. However, the specifications are not...

IETF RFC 8503 - BGP/MPLS Layer 3 VPN Multicast Management Information Base
December 1, 2018 - IETF

This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects to configure and/or monitor Multicast communication over IP Virtual Private Networks (VPNs) supported by the...

IETF RFC 8529 - YANG Data Model for Network Instances
March 1, 2019 - IETF

This document defines a network instance module. This module can be used to manage the virtual resource partitioning that may be present on a network device. Examples of common industry terms for virtual resource partitioning are VPN Routing and Forwarding (VRF) instances and Virtual Switch...

Implementing Azure: Putting Modern DevOps to Use
January 31, 2019 - PACKT

Explore powerful Azure DevOps solutions to develop and deploy your software faster and more efficiently. Key Features * Build modern microservice-based systems with Azure architecture * Learn to deploy and manage cloud services and virtual machines * Configure clusters with Azure Service Fabric for...

IETF RFC 8466 - A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery
October 1, 2018 - IETF

This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this...

Implementing Azure Solutions
October 31, 2018 - PACKT

Get up and running with Azure services and learn how to implement them in your organization Key Features *Deploy Azure Services in a controlled and preconfigured environment *Discover best practices and techniques for implementing Azure Solutions *Build and deploy an app using Azure App Services...

IETF RFC 8365 - A Network Virtualization Overlay Solution Using Ethernet VPN (EVPN)
March 1, 2018 - IETF

This document specifies how Ethernet VPN (EVPN) can be used as a Network Virtualization Overlay (NVO) solution and explores the various tunnel encapsulation options over IP and their impact on the EVPN control plane and procedures. In particular, the following encapsulation options are...

Network Security with pfSense
July 30, 2018 - PACKT

Use an open source firewall and features such as failover, load balancer, OpenVPN, IPSec, and Squid to protect your network Key Features * Explore pfSense, a trusted open source network security solution * Configure pfSense as a firewall and create and manage firewall rules * Test pfSense for...

Learn pfSense 2.4
July 1, 2018 - PACKT

Install, Configure and Setup different connections with pfSense Key Features *Build firewall and routing solutions with PfSense. *Learn how to create captive portals, how to connect Pfsense to your https environment and so on. *Practical approach towards building firewall solutions for your...

Hands-On Cybersecurity for Architects
July 30, 2018 - PACKT

Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization Key Features *Architect complex security structures using standard practices and use cases *Integrate security with any architecture solution *Implement...

CCNA Security 210-260 Certification Guide
June 15, 2018 - PACKT

Become a Cisco security specialist by developing your skills in network security and explore advanced security technologies About This Book • Enhance your skills in network security by learning about Cisco's device configuration and installation • Unlock the practical aspects of CCNA security to...

IETF RFC 8317 - Ethernet-Tree (E-Tree) Support in Ethernet VPN (EVPN) and Provider Backbone Bridging EVPN (PBB-EVPN)
January 1, 2018 - IETF

The MEF Forum (MEF) has defined a rooted-multipoint Ethernet service known as Ethernet-Tree (E-Tree). A solution framework for supporting this service in MPLS networks is described in RFC 7387, "A Framework for Ethernet-Tree (E-Tree) Service over a Multiprotocol Label Switching (MPLS) Network"....

IETF RFC 8214 - Virtual Private Wire Service Support in Ethernet VPN
August 1, 2017 - IETF

This document describes how Ethernet VPN (EVPN) can be used to support the Virtual Private Wire Service (VPWS) in MPLS/IP networks. EVPN accomplishes the following for VPWS: provides Single-Active as well as All-Active multihoming with flow-based load-balancing, eliminates the need for...

Windows Server 2016 Security, Certificates, and Remote Access Cookbook
April 27, 2018 - PACKT

This book contains more than 25 hands-on recipes that will equip you to build a PKI and roll out remote access capabilities via Microsoft DirectAccess and VPN. This book also contains tips and tricks for increasing the security footprint of your Windows Server infrastructure. About This Book...

IETF RFC 8338 - Signaling Root-Initiated Point-to-Multipoint Pseudowire Using LDP
March 1, 2018 - IETF

This document specifies a mechanism to signal Point-to-Multipoint (P2MP) Pseudowire (PW) trees using LDP. Such a mechanism is suitable for any Layer 2 VPN service requiring P2MP connectivity over an IP or MPLS-enabled PSN. A P2MP PW established via the proposed mechanism is root initiated....

IETF RFC 8299 - YANG Data Model for L3VPN Service Delivery
January 1, 2018 - IETF

This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended...

IETF RFC 7899 - Multicast VPN State Damping
June 1, 2016 - IETF

This document describes procedures to damp Multicast VPN (MVPN) routing state changes and control the effect of the churn due to the multicast dynamicity in customer sites. The procedures described in this document are applicable to BGP-based multicast VPN and help avoid uncontrolled...

Advanced Infrastructure Penetration Testing
February 26, 2018 - PACKT

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure About This Book • Advanced exploitation techniques to breach modern operating systems and complex network devices • Learn about Docker...

CCNA Security Study Guide: Exam 210-260
January 1, 2018 - WILEY

Lay the foundation for a successful career in network security CCNA Security Study Guide offers comprehensive review for Exam 210-260. Packed with concise explanations of core security concepts, this book is designed to help you successfully prepare for the exam. Expert instruction guides you...

Advertisement