Introduction |
|
xxiii | |
|
Part 1 Cisco Data Center Networking and Infrastructure |
|
|
|
Chapter 1 Cisco Data Center Orchestration |
|
|
1 | (40) |
|
IT Challenges and Data Center Solutions |
|
|
2 | (2) |
|
|
4 | (10) |
|
|
6 | (5) |
|
Hardware vs. Software Stack |
|
|
11 | (1) |
|
Cisco Data Center Networking (DCN) Licensing |
|
|
11 | (1) |
|
|
12 | (2) |
|
Cisco Nexus Dashboard Orchestrator |
|
|
14 | (11) |
|
|
15 | (1) |
|
Large-Scale Data Center Deployment |
|
|
15 | (1) |
|
Data Center Interconnectivity |
|
|
16 | (1) |
|
Cisco NDO Multidomain Integrations |
|
|
16 | (2) |
|
Hybrid Cloud and Multicloud |
|
|
18 | (1) |
|
Service Provider/'5G Telco |
|
|
18 | (1) |
|
Functions Provided by the Nexus Dashboard Orchestrator |
|
|
19 | (2) |
|
Deployment of Cisco Nexus Dashboard Orchestrator |
|
|
21 | (1) |
|
|
22 | (2) |
|
Manage Sites Using Cisco Nexus Dashboard Orchestrator |
|
|
24 | (1) |
|
Cisco Nexus Dashboard Fabric Controller |
|
|
25 | (9) |
|
Cisco NDFC Benefits and Features |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (6) |
|
Platform Support Information |
|
|
34 | (1) |
|
|
34 | (1) |
|
Third-party Applications and Cloud-based Services |
|
|
34 | (5) |
|
Cisco Nexus Dashboard Open Ecosystem with Splunk |
|
|
36 | (1) |
|
Cisco Nexus Dashboard Open Ecosystem with ServiceNow |
|
|
37 | (2) |
|
|
39 | (1) |
|
References/Additional Reading |
|
|
40 | (1) |
|
Chapter 2 Cisco Data Center Analytics and Insights |
|
|
41 | (40) |
|
Cisco Nexus Dashboard Insights |
|
|
41 | (27) |
|
Cisco Nexus Dashboard Insights Licensing |
|
|
45 | (1) |
|
Key Components of Cisco Nexus Dashboard Insights |
|
|
46 | (4) |
|
Browsing Cisco Nexus Dashboard Insights |
|
|
50 | (1) |
|
|
50 | (2) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
54 | (2) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
Diagnostics, Impact, Recommendation |
|
|
58 | (2) |
|
|
60 | (1) |
|
|
60 | (2) |
|
|
62 | (1) |
|
Cisco Nexus Dashboard Insights Features and Benefits |
|
|
63 | (3) |
|
Cisco Nexus Insights Cloud Connector |
|
|
66 | (2) |
|
Cisco Nexus Dashboard Data Broker |
|
|
68 | (6) |
|
Automated SPAN Configuration in Production Network |
|
|
70 | (1) |
|
Cisco Application Centric Infrastructure (ACI) Integration |
|
|
71 | (1) |
|
Cisco DNA Center Integration |
|
|
72 | (1) |
|
Scalable Traffic Monitoring with Cisco Nexus Dashboard Data Broker Inline Option |
|
|
72 | (1) |
|
Cisco Nexus Dashboard Data Broker Access Mechanisms |
|
|
73 | (1) |
|
|
74 | (5) |
|
Meraki Virtual MX Appliances for Public and Private Clouds |
|
|
77 | (1) |
|
Features and Functionality of the vMX Appliance |
|
|
77 | (1) |
|
Vmx Setup for Microsoft Azure |
|
|
78 | (1) |
|
Vmx Setup for Google Cloud Platform |
|
|
78 | (1) |
|
Vmx Setup for Alibaba Cloud |
|
|
79 | (1) |
|
|
79 | (1) |
|
References/Additional Reading |
|
|
79 | (2) |
|
Chapter 3 Cisco Data Center Solutions for Hybrid Cloud |
|
|
81 | (48) |
|
Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) |
|
|
82 | (10) |
|
Challenges in Hybrid Cloud Environments |
|
|
82 | (3) |
|
High-Level Architecture of Cisco Cloud ACI on AWS |
|
|
85 | (1) |
|
Cisco ACI Nexus Dashboard Orchestrator |
|
|
86 | (1) |
|
|
86 | (2) |
|
Cisco Cloud APIC's First Time Setup Wizard |
|
|
88 | (1) |
|
Registering a Cisco ACI Cloud Site in NDO |
|
|
89 | (1) |
|
Deploying a Multitier Application in a Hybrid Scenario |
|
|
89 | (3) |
|
|
92 | (11) |
|
Infrastructure Configuration and Management |
|
|
94 | (1) |
|
Cisco UCS Management Through Cisco UCS Director |
|
|
95 | (1) |
|
Cisco UCS Management Tasks You Can Perform in Cisco UCS Director |
|
|
95 | (1) |
|
Configuration and Administration |
|
|
95 | (1) |
|
|
95 | (2) |
|
Orchestration and Automation |
|
|
97 | (1) |
|
Infrastructure as a Service |
|
|
97 | (5) |
|
|
102 | (1) |
|
Rapid Application Deployment |
|
|
102 | (1) |
|
|
103 | (1) |
|
Cisco Workload Optimization Manager |
|
|
103 | (13) |
|
Create More Effective Teams |
|
|
105 | (1) |
|
Optimize Your Multicloud Environment |
|
|
106 | (1) |
|
Optimize Public Cloud Costs |
|
|
106 | (1) |
|
Optimize Hyperconverged Workloads |
|
|
107 | (1) |
|
Ensure Application Performance |
|
|
107 | (1) |
|
Cisco Workload Optimization Main Features |
|
|
108 | (1) |
|
|
109 | (1) |
|
View Your Global Environment |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
112 | (2) |
|
Set Policies and Service Level Agreements |
|
|
114 | (1) |
|
Cisco Intersight Workload Optimizer |
|
|
115 | (1) |
|
Cisco Hyperflex - Intersight |
|
|
116 | (11) |
|
|
117 | (1) |
|
Benefits of Using Cisco Intersight |
|
|
118 | (1) |
|
Hyperconverged Infrastructure (HCI): Hyperf lex |
|
|
119 | (3) |
|
Deploying Hyperflex Anywhere with Intersight |
|
|
122 | (3) |
|
Cisco Intersight Workload Engine at a Glance |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
References/Additional Reading |
|
|
127 | (2) |
|
Part 2 Cisco Applications and Workload Management |
|
|
|
Chapter 4 Application, Analytics, and Workload Performance Management with AppDynamics |
|
|
129 | (72) |
|
|
129 | (1) |
|
|
130 | (5) |
|
|
130 | (1) |
|
Application Performance Monitoring |
|
|
130 | (1) |
|
Infrastructure Visibility with Database Visibility |
|
|
131 | (1) |
|
End User Monitoring for Client Experience |
|
|
132 | (1) |
|
Business iQ and Analytics for Business Impact |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
Health Rules, Policies, and Actions |
|
|
134 | (1) |
|
Infrastructure Monitoring |
|
|
134 | (1) |
|
Integrate and Extend AppDynamics |
|
|
135 | (1) |
|
Deployment Planning Guide |
|
|
135 | (7) |
|
|
136 | (1) |
|
|
136 | (1) |
|
Platform Components and Tools |
|
|
136 | (1) |
|
On-Premises Deployment Architecture |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
138 | (2) |
|
|
140 | (1) |
|
SaaS Deployment Architecture |
|
|
140 | (2) |
|
|
142 | (4) |
|
Overview of Application Monitoring |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
Historical and Live Entity Data |
|
|
145 | (1) |
|
Anchor Metrics for Entities |
|
|
145 | (1) |
|
|
145 | (1) |
|
How the Controller Displays Live Entities |
|
|
146 | (1) |
|
|
146 | (1) |
|
Integration with Other AppDynamics Modules |
|
|
146 | (2) |
|
Application Monitoring and Infrastructure Visibility |
|
|
147 | (1) |
|
Application Monitoring and Browser Real User Monitoring |
|
|
148 | (1) |
|
Application Monitoring and Database Visibility |
|
|
148 | (1) |
|
Application Monitoring and Analytics |
|
|
148 | (1) |
|
Application Security Monitoring |
|
|
148 | (6) |
|
|
149 | (1) |
|
Cisco Secure Application Components |
|
|
149 | (1) |
|
Cisco Secure Application Architecture |
|
|
150 | (1) |
|
Monitor Application Security Using Cisco Secure Application |
|
|
151 | (1) |
|
Select Scope for the Dashboard |
|
|
152 | (1) |
|
Navigate to AppDynamics Application or Tier Flow Map |
|
|
153 | (1) |
|
View Data Using Search Filter |
|
|
153 | (1) |
|
|
154 | (15) |
|
Overview of End User Monitoring |
|
|
155 | (1) |
|
Understand End User Activity |
|
|
156 | (1) |
|
|
157 | (1) |
|
On-Premises EUM Deployments |
|
|
157 | (1) |
|
Access the SaaS EUM Server |
|
|
158 | (1) |
|
How EUM Works with Other AppDynamics Products |
|
|
158 | (1) |
|
EUM and Application Performance Monitoring |
|
|
158 | (1) |
|
EUM and Application Analytics |
|
|
158 | (1) |
|
|
159 | (1) |
|
Experience Journey Map UI |
|
|
159 | (4) |
|
|
163 | (1) |
|
Overview of the Controller UI for Browser Monitoring |
|
|
163 | (1) |
|
|
163 | (2) |
|
Resource Performance Dashboard |
|
|
165 | (3) |
|
|
168 | (1) |
|
Mobile Real User Monitoring |
|
|
169 | (1) |
|
|
169 | (2) |
|
Infrastructure Visibility |
|
|
171 | (7) |
|
Overview of Infrastructure Visibility |
|
|
171 | (1) |
|
|
172 | (1) |
|
Drill Down to the Root Cause |
|
|
173 | (1) |
|
Network Visibility Metrics |
|
|
174 | (2) |
|
|
176 | (1) |
|
Using the Server Visibility UI |
|
|
176 | (1) |
|
|
177 | (1) |
|
Java and NET Infrastructure Monitoring |
|
|
177 | (1) |
|
Infrastructure Visibility Strategies |
|
|
177 | (1) |
|
|
178 | (2) |
|
|
179 | (1) |
|
|
179 | (1) |
|
Monitoring Cloud Applications |
|
|
180 | (16) |
|
|
180 | (1) |
|
Monitor Containers with Docker Visibility |
|
|
181 | (1) |
|
Enable Container Monitoring |
|
|
182 | (1) |
|
Container Monitoring Setup |
|
|
183 | (1) |
|
|
183 | (2) |
|
View Container Metrics Using the Metric Browser |
|
|
185 | (1) |
|
|
186 | (1) |
|
Using Docker Visibility with Kubernetes |
|
|
186 | (1) |
|
Container Visibility with Kubernetes |
|
|
186 | (2) |
|
Enable Container Visibility |
|
|
188 | (1) |
|
Register the Container ID as the Host ID |
|
|
188 | (1) |
|
Instrument Applications with Kubernetes |
|
|
189 | (1) |
|
Deploy the Machine Agent on Kubernetes |
|
|
189 | (1) |
|
ClusterRole Configuration |
|
|
190 | (3) |
|
Network Visibility with Kubernetes |
|
|
193 | (3) |
|
Cloud Monitoring with AppDynamics Cloud |
|
|
196 | (1) |
|
Cloud Infrastructure Monitoring |
|
|
197 | (1) |
|
AWS Cloud Infrastructure Observability |
|
|
197 | (1) |
|
Azure Cloud Infrastructure Observability |
|
|
198 | (1) |
|
|
198 | (1) |
|
References/Additional Reading |
|
|
199 | (2) |
|
|
201 | (38) |
|
IT Challenges and Workload Management Solutions |
|
|
202 | (2) |
|
|
202 | (2) |
|
Cisco Intersight Workload Optimizer |
|
|
204 | (8) |
|
|
205 | (1) |
|
Optimize Hybrid Cloud Infrastructure with IWO |
|
|
206 | (3) |
|
How Intersight Workload Optimizer Works |
|
|
209 | (1) |
|
Understanding the Market and Virtual Currency |
|
|
210 | (2) |
|
|
212 | (1) |
|
Understanding Intersight Workload Optimizer Supply Chain |
|
|
212 | (3) |
|
|
212 | (2) |
|
Working with Intersight Workload Optimizer |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
215 | (13) |
|
Cisco Container Platform Architecture Overview |
|
|
218 | (1) |
|
Components of Cisco Container Platform |
|
|
219 | (1) |
|
Sample Deployment Topology |
|
|
219 | (2) |
|
Administering Clusters on vSphere |
|
|
221 | (3) |
|
Administering Amazon EKS Clusters Using CCP Control Plane |
|
|
224 | (2) |
|
|
226 | (1) |
|
|
226 | (1) |
|
Registering CCP Using a Registration Token |
|
|
226 | (1) |
|
Upgrading Cisco Container Platform |
|
|
227 | (1) |
|
Cisco Intersight Kubernetes Service |
|
|
228 | (10) |
|
|
229 | (1) |
|
|
229 | (1) |
|
Deploying Consistent, Production-Grade Kubernetes Anywhere |
|
|
230 | (1) |
|
|
230 | (2) |
|
|
232 | (1) |
|
Deploy Kubernetes from Intersight |
|
|
232 | (1) |
|
Step 1 Configure Policies |
|
|
232 | (2) |
|
|
234 | (4) |
|
|
238 | (1) |
|
References/Additional Reading |
|
|
238 | (1) |
|
Chapter 6 Cisco Cloud Webex Application |
|
|
239 | (48) |
|
|
239 | (29) |
|
|
241 | (2) |
|
|
243 | (1) |
|
|
244 | (1) |
|
Customize Your Audio and Video Preferences |
|
|
245 | (1) |
|
|
246 | (1) |
|
|
247 | (1) |
|
Webex Meetings Security Update |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
Read and Respond to Messages |
|
|
251 | (1) |
|
|
251 | (2) |
|
|
253 | (1) |
|
Webex Application Polling |
|
|
254 | (1) |
|
Poll in Webex Meetings or Webex Webinars |
|
|
255 | (1) |
|
|
256 | (3) |
|
|
259 | (1) |
|
|
260 | (1) |
|
Register for a Meeting or Webinar |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
262 | (1) |
|
Share Content in Meetings, Webinars, and Events |
|
|
263 | (1) |
|
Sharing Multiple Applications |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
Add Bots and Integrations |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
268 | (1) |
|
Cisco Webex Cloud Service Architecture |
|
|
268 | (18) |
|
Webex Teams Security Features and Deployment Practices |
|
|
269 | (1) |
|
Internet Access for Cloud-Based Services |
|
|
269 | (1) |
|
Reducing Traffic to the Webex Cloud by Deploying Video Mesh Nodes |
|
|
270 | (2) |
|
Webex Teams Inspection Capabilities |
|
|
272 | (1) |
|
Webex Team Data Protection |
|
|
273 | (3) |
|
Webex Teams Apps - Data at Rest Protection |
|
|
276 | (1) |
|
Webex Teams App for Web - Data Storage |
|
|
277 | (1) |
|
Webex Team Indexing Service |
|
|
277 | (2) |
|
|
279 | (2) |
|
Webex Team Single Sign-On |
|
|
281 | (1) |
|
Multifactor Authentication |
|
|
282 | (1) |
|
IdP and MDM/MAM with Webex Teams |
|
|
282 | (1) |
|
Webex Teams Proximity and Device Pairing |
|
|
282 | (1) |
|
Proximity for Cloud-Registered Webex Devices |
|
|
283 | (1) |
|
Proximity for On-Premises Registered Webex Deyices |
|
|
284 | (1) |
|
Other Webex Device Discovery Mechanisms |
|
|
285 | (1) |
|
|
286 | (1) |
|
References/Additional Reading |
|
|
286 | (1) |
|
Chapter 7 Internet of Things (loT) |
|
|
287 | (26) |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
289 | (8) |
|
|
291 | (1) |
|
Understanding Cisco Kinetic Platform |
|
|
292 | (1) |
|
Cisco Kinetic - Gateway Management Module |
|
|
292 | (2) |
|
Cisco Kinetic - Data Control Module |
|
|
294 | (2) |
|
Cisco Kinetic - Edge & Fog Processing Module |
|
|
296 | (1) |
|
Introduction to Cisco IoT |
|
|
297 | (1) |
|
|
298 | (7) |
|
Supported Device Interfaces for Onboarding |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
301 | (3) |
|
SIM Card Activation and Seamless Device Onboarding |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
305 | (6) |
|
Edge to Multicloud Data Flow |
|
|
306 | (1) |
|
Overview of Configuration Lifecycle Management in EI |
|
|
307 | (1) |
|
Enable and Manage EI Agents |
|
|
307 | (1) |
|
Asset Management Workflow |
|
|
308 | (1) |
|
|
309 | (1) |
|
Add an MQTT Server Destination |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
311 | (2) |
|
Part 3 Cisco Cloud Security |
|
|
|
Chapter 8 Cisco Cloud Security |
|
|
313 | (48) |
|
|
313 | (1) |
|
|
314 | (14) |
|
|
315 | (1) |
|
|
316 | (1) |
|
Identify Sensitive Data in Cloud Environments |
|
|
316 | (1) |
|
Mitigate Increased Risk of Data Exposure in Cloud Applications |
|
|
316 | (1) |
|
Mitigate Risk Through Automated Responses |
|
|
317 | (1) |
|
|
317 | (1) |
|
Enabling Cloudlock via WSA (11.5) |
|
|
318 | (4) |
|
The Evolution of Cloud Security Service |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
323 | (1) |
|
Cloud Access Security Broker |
|
|
323 | (1) |
|
Interactive Threat Intelligence |
|
|
323 | (1) |
|
|
324 | (1) |
|
Leveraging Umbrella Log Files for Shadow IT Visibility |
|
|
324 | (1) |
|
Dashboard for Visibility and Trends |
|
|
324 | (1) |
|
Overview and Trending Information |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
Enabling Healthy and Efficient Cloud Adoption |
|
|
327 | (1) |
|
|
328 | (9) |
|
|
329 | (4) |
|
|
333 | (1) |
|
|
333 | (3) |
|
|
336 | (1) |
|
Cisco Secure Cloud Analytics |
|
|
337 | (11) |
|
Understanding Secure Cloud Analytics |
|
|
339 | (2) |
|
How Secure Cloud Analytics Works |
|
|
341 | (1) |
|
|
341 | (1) |
|
|
341 | (1) |
|
|
342 | (1) |
|
Public Cloud Monitoring Configuration for Amazon Web Services |
|
|
343 | (1) |
|
Public Cloud Monitoring Configuration for Google Cloud Platform |
|
|
344 | (1) |
|
Single GCP Project Configuration |
|
|
344 | (1) |
|
Multiple GCP Project Configuration |
|
|
344 | (1) |
|
Public Cloud Monitoring Configuration for Microsoft Azure |
|
|
345 | (1) |
|
|
346 | (1) |
|
Configuring the AWS CloudTrail Event Watchlist |
|
|
346 | (1) |
|
Configuring the GCP Logging Watchlist |
|
|
347 | (1) |
|
Configuring the Azure Activity Log Watchlist |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
348 | (12) |
|
Multifactor Authentication from Duo |
|
|
349 | (2) |
|
|
351 | (1) |
|
|
351 | (5) |
|
Enforce Adaptive Policies |
|
|
356 | (1) |
|
Secure Access for Every User |
|
|
357 | (1) |
|
Secure VPN-Less Remote Access for Any Environment |
|
|
358 | (1) |
|
Simple, Secure Single Sign-On |
|
|
358 | (2) |
|
|
360 | (1) |
Index |
|
361 | |