Details

IP Address Management


IP Address Management


IEEE Press Series on Networks and Service Management 2. Aufl.

von: Timothy Rooney, Michael Dooley

116,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 12.12.2020
ISBN/EAN: 9781119692300
Sprache: englisch
Anzahl Seiten: 640

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Rediscover fundamental and advanced topics in IPAM, DNS, DHCP and other core networking technologies with this updated one-stop reference</b></p> <p>The thoroughly revised second edition of <i>IP Address Management</i> is the definitive reference for working with core IP management technologies, like address allocation, assignment, and network navigation via DNS. Accomplished professionals and authors Timothy Rooney and Michael Dooley offer readers coverage of recent IPAM developments in the world of cloud computing, Internet of Things (IoT), and security, as well as a comprehensive treatment of foundational concepts in IPAM.</p> <p>The new edition addresses the way that IPAM needs and methods have evolved since the publication of the first edition. The book covers the impact of mainstream use of private and public cloud services, the maturation of IPv6 implementations, new DNS security approaches, and the proliferation of IoT devices. The authors have also reorganized the flow of the book, with much of the technical reference material appearing at the end and making for a smoother and simpler reading experience.</p> <p>The 2nd edition of <i>IP Address Management</i> also covers topics like such as:</p> <ul> <li>Discussions about the fundamentals of Internet Protocol Address Management (IPAM), including IP addressing, address allocation and assignment, DHCP, and DNS</li> <li>An examination of IPAM practices, including core processes and tasks, deployment strategies, IPAM security best-practices, and DNS security approaches</li> <li>A treatment of IPAM in the modern context, including how to adapt to cloud computing, the Internet of Things, IPv6, and new trends in IPAM</li> <li>A one-stop reference for IPAM topics, including IP addressing, DHCP, DNS, IPv6, and DNS security</li> </ul> <p>Perfect for IP network engineers and managers, network planners, network architects, and security engineers, the second edition of <i>IP Address Management</i> also belongs on the bookshelves of senior undergraduate and graduate students studying in networking, information technology, and computer security-related courses and programs.</p>
<p>Preface xix</p> <p>Acknowledgments xxiii</p> <p>About the Authors xxv</p> <p>Part I IPAM Introduction 1</p> <p><b>1 Introduction </b><b>3</b></p> <p>IP Networking Overview 3</p> <p>IP Routing 6</p> <p>IP Addresses 7</p> <p>Protocol Layering 12</p> <p>OSI and TCP/IP Layers 14</p> <p>TCP/UDP Ports 15</p> <p>Intra-Link Communications 15</p> <p>Are We on the Same Link? 17</p> <p>Limiting Broadcast Domains 18</p> <p>Interlink Communications 19</p> <p>Worldwide IP Communications 20</p> <p>Dynamic Routing 22</p> <p>Routers and Subnets 24</p> <p>Assigning IP addresses 25</p> <p>The Human Element 26</p> <p>Why Manage IP Space? 26</p> <p>Basic IPAM Approaches 27</p> <p>Early History 27</p> <p>Today’s IP Networks and IP Management Challenges 28</p> <p><b>2 IP Addressing </b><b>31</b></p> <p>Internet Protocol History 31</p> <p>The Internet Protocol, Take 1 32</p> <p>Class-Based Addressing 32</p> <p>Internet Growing Pains 35</p> <p>Private Address Space 38</p> <p>Classless Addressing 40</p> <p>Special Use IPv4 Addresses 40</p> <p>The Internet Protocol, Take 2 41</p> <p>IPv6 Address Types and Structure 42</p> <p>IPv6 Address Notation 43</p> <p>Address Structure 45</p> <p>IPv6 Address Allocations 46</p> <p>2000::/3 – Global Unicast Address Space 47</p> <p>fc00::/7 – Unique Local Address Space 47</p> <p>fe80::/10 – Link Local Address Space 47</p> <p>ff00::/8 – Multicast Address Space 48</p> <p>Special Use IPv6 Addresses 48</p> <p>IPv4–IPv6 Coexistence 49</p> <p><b>3 IP Address Assignment </b><b>51</b></p> <p>Address Planning 51</p> <p>Regional Internet Registries 51</p> <p>RIR Address Allocation 53</p> <p>Address Allocation Efficiency 54</p> <p>Multi-Homing and IP Address Space 55</p> <p>Endpoint Address Allocation 58</p> <p>Server-based Address Allocation Using DHCP 58</p> <p>DHCP Servers and Address Assignment 61</p> <p>Device Identification by Class 62</p> <p>DHCP Options 62</p> <p>DHCP for IPv6 (DHCPv6) 62</p> <p>DHCP Comparison IPv4 vs. IPv6 63</p> <p>DHCPv6 Address Assignment 64</p> <p>DHCPv6 Prefix Delegation 65</p> <p>Device Unique Identifiers (DUIDs) 66</p> <p>Identity Associations (IAs) 66</p> <p>DHCPv6 Options 67</p> <p>IPv6 Address Autoconfiguration 67</p> <p>Neighbor Discovery 68</p> <p>Modified EUI-64 Interface Identifiers 69</p> <p>Opaque Interface IDs 69</p> <p>Reserved Interface IDs 72</p> <p>Duplicate Address Detection (DAD) 72</p> <p><b>4 Navigating the Internet with DNS </b><b>75</b></p> <p>Domain Hierarchy 75</p> <p>Name Resolution 76</p> <p>Resource Records 80</p> <p>Zones and Domains 81</p> <p>Dissemination of Zone Information 83</p> <p>Reverse Domains 84</p> <p>IPv6 Reverse Domains 89</p> <p>Additional Zones 91</p> <p>Root Hints 91</p> <p>Localhost Zones 92</p> <p>DNS Update 92</p> <p><b>5 IPAM Technology Applications </b><b>93</b></p> <p>DHCP Applications 93</p> <p>Device Type Specific Configuration 94</p> <p>Broadband Subscriber Provisioning 95</p> <p>Related Lease Assignment or Limitation Applications 101</p> <p>Pre-Boot Execution Environment (PXE) clients 102</p> <p>PPP/RADIUS Environments 103</p> <p>Mobile IP 104</p> <p>Popular DNS Applications 105</p> <p>Host Name and IP Address Resolution 106</p> <p>A – IPv4 Address Record 107</p> <p>AAAA – IPv6 address record 107</p> <p>PTR – Pointer Record 107</p> <p>Alias Host Name Resolutions 108</p> <p>CNAME – Canonical Name Record 108</p> <p>Network Services Location 108</p> <p>SRV – Services Location Record 109</p> <p>Textual Information Lookup 110</p> <p>TXT – Text Record 110</p> <p>Many More Applications 110</p> <p><b>Part II IPAM Mechanics </b><b>111</b></p> <p><b>6 IP Management Core Tasks </b><b>113</b></p> <p>IPAM Is Foundational 113</p> <p>Impacts of Inadequate IPAM Practice 114</p> <p>IPAM Is Core to Network Management 115</p> <p>FCAPS Summary 116</p> <p>Configuration Management 117</p> <p>Address Allocation Considerations 118</p> <p>Address Allocation Tasks 120</p> <p>IP Address Assignment 133</p> <p>Address Deletion Tasks 135</p> <p>Address Renumbering or Movement Tasks 136</p> <p>Network Services Configuration 140</p> <p>Fault Management 143</p> <p>Monitoring and Fault Detection 143</p> <p>Troubleshooting and Fault Resolution 144</p> <p>Accounting Management 147</p> <p>Inventory Assurance 147</p> <p>Performance Management 151</p> <p>Services Monitoring 151</p> <p>Address Capacity Management 152</p> <p>Auditing and Reporting 152</p> <p>Security Management 153</p> <p>ITIL® Process Mappings 153</p> <p>ITIL Practice Areas 154</p> <p>Conclusion 162</p> <p><b>7 IPv6 Deployment </b><b>163</b></p> <p>IPv6 Deployment Process Overview 164</p> <p>IPv6</p> <p>Address Plan Objectives 165</p> <p>IPv6 Address Plan Examples 166</p> <p>Case 1 166</p> <p>Observations 168</p> <p>Case 2 169</p> <p>Observations 169</p> <p>General IPv6 Address Plan Guidelines 170</p> <p>ULA Considerations 171</p> <p>Renumbering Impacts 172</p> <p>IPv4–IPv6 Coexistence Technologies 173</p> <p>Dual Stack Approach 173</p> <p>Dual Stack Deployment 174</p> <p>DNS Considerations 174</p> <p>DHCP Considerations 175</p> <p>Tunneling Approaches 176</p> <p>Tunneling Scenarios for IPv6 Packets over IPv4 Networks 176</p> <p>Dual-Stack Lite 177</p> <p>Lightweight 4over6 181</p> <p>Mapping of Address and Port with Encapsulation (MAP-E) 181</p> <p>Additional Tunneling Approaches 183</p> <p>Translation Approaches 184</p> <p>IP/ICMP Translation 185</p> <p>Address Translation 186</p> <p>Packet Fragmentation Considerations 187</p> <p>IP Header Translation Algorithm 188</p> <p>Bump in the Host (BIH) 189</p> <p>Network Address Translation for IPv6–IPv4 (NAT64) 192</p> <p>NAT64 and DNS64 193</p> <p>464XLAT 195</p> <p>Mapping of Address and Port with Translation (MAP-T) 195</p> <p>Other Translation Techniques 196</p> <p>Planning Your IPv6 Deployment Process 197</p> <p><b>8 IPAM for the Internet of Things 201</b></p> <p>IoT Architectures 201</p> <p>6LoWPAN 203</p> <p>Summary 209</p> <p><b>9 IPAM in the Cloud </b><b>211</b></p> <p>IPAM VNFs 212</p> <p>Cloud IPAM Concepts 212</p> <p>IP Initialization Process 212</p> <p>IP Initialization Implementation 213</p> <p>DHCP Method 214</p> <p>Private Cloud Static Method 216</p> <p>Public Cloud Static Method 218</p> <p>Cloud Automation with APIs 218</p> <p>Multi-Cloud IPAM 220</p> <p>Private Cloud Automation 221</p> <p>Public Cloud Automation 223</p> <p>IPAM Automation Benefits 223</p> <p>Unifying IPAM Automation 224</p> <p>Streamlined Subnet Allocation Workflow 226</p> <p>Workflow Realization 230</p> <p>Tips for Defining Workflows 233</p> <p>Automation Scenarios 234</p> <p>Intra-IPAM Automation 234</p> <p>DHCP Server Configuration 235</p> <p>DNS Server Configuration 236</p> <p>Subnet Assignment 236</p> <p>IP Address Assignment Request 236</p> <p>Extra-IPAM Workflow Examples 237</p> <p>Regional Internet Registry Reporting 237</p> <p>Router Configuration Provisioning 238</p> <p>Customer Provisioning 238</p> <p>Asset Inventory Integration 238</p> <p>Trouble Ticket Creation 239</p> <p>Summary 239</p> <p><b>Part III IPAM and Security </b><b>241</b></p> <p><b>10 IPAM Services Security </b><b>243</b></p> <p>Securing DHCP 244</p> <p>DHCP Service Availability 244</p> <p>DHCP Server/OS Attacks 244</p> <p>DHCP Server/OS Attack Mitigation 245</p> <p>DHCP Service Threats 245</p> <p>DHCP Threat Mitigation 246</p> <p>DHCP Authentication and Encryption 247</p> <p>DNS Infrastructure Risks and Attacks 248</p> <p>DNS Service Availability 249</p> <p>DNS Server/OS Attacks 249</p> <p>DNS Server/OS Attack Mitigation 250</p> <p>DNS Service Denial 250</p> <p>Distributed Denial of Service 251</p> <p>Bogus Domain Queries 251</p> <p>Pseudorandom Subdomain Attacks 252</p> <p>Denial of Service Mitigation 253</p> <p>Reflector Style Attacks 253</p> <p>Reflector Attack Mitigation 254</p> <p>Authoritative Poisoning 254</p> <p>Authoritative Poisoning Mitigation 255</p> <p>Resolver Redirection Attacks 256</p> <p>Resolver Attack Defenses 256</p> <p>Securing DNS Transactions 257</p> <p>Cache Poisoning Style Attacks 257</p> <p>Cache Poisoning Mitigation 259</p> <p>DNSSEC Overview 259</p> <p>The DNSSEC Resolution Process 260</p> <p>Negative Trust Anchors 262</p> <p>DNSSEC Deployment 263</p> <p>Last Mile Protection 264</p> <p>DNS Cookies 264</p> <p>DNS Encryption 264</p> <p>DNS Over TLS (DoT) 264</p> <p>DNS Over HTTPS (DoH) 265</p> <p>Encryption Beyond the Last Mile 267</p> <p><b>11 IPAM and Network Security </b><b>269</b></p> <p>Securing Network Access 269</p> <p>Discriminatory Address Assignment with DHCP 269</p> <p>DHCP Lease Query 274</p> <p>Alternative Access Control Approaches 275</p> <p>Layer 2 Switch Alerting 275</p> <p>802.1X 276</p> <p>Securing the Network Using IPAM 277</p> <p>IP-Based Security Policies (ACLs, etc.) 277</p> <p>Malware Detection Using DNS 277</p> <p>Malware Proliferation Techniques 278</p> <p>Phishing 279</p> <p>Spear Phishing 279</p> <p>Software Downloads 279</p> <p>File Sharing 279</p> <p>Email Attachments 280</p> <p>Watering Hole Attack 280</p> <p>Replication 280</p> <p>Brute Force 280</p> <p>Malware Examples 280</p> <p>Malware Mitigation 281</p> <p>DNS Firewall 282</p> <p>DNS Firewall Policy Precedence 284</p> <p>Logging Configuration 285</p> <p>Other Attacks that Leverage DNS 285</p> <p>Network Reconnaissance 285</p> <p>Network Reconnaissance Defenses 286</p> <p>DNS Rebinding Attack 287</p> <p>Data Exfiltration 287</p> <p>Data Exfiltration Mitigation 287</p> <p>DNS as Data Transport (Tunneling) 288</p> <p>Advanced Persistent Threats 289</p> <p>Advanced Persistent Threats Mitigation 290</p> <p><b>12 IPAM and Your Internet Presence </b><b>291</b></p> <p>IP Address Space Integrity 291</p> <p>Publicizing</p> <p>Your Public Namespace 292</p> <p>Domain Registries and Registrars 292</p> <p>DNS Hosting Providers 294</p> <p>Signing Your Public Namespace 295</p> <p>DNSSEC Zone Signing 295</p> <p>Key Rollover 296</p> <p>Prepublish Rollover 297</p> <p>Dual Signature Rollover 298</p> <p>Algorithm Rollover 299</p> <p>Key Security 301</p> <p>Enhancing Internet Application Encryption Integrity 302</p> <p>DNS-Based Authentication of Named Entities (DANE) 303</p> <p>Securing Email with DNS 305</p> <p>Email and DNS 305</p> <p>DNS Block Listing 306</p> <p>Sender Policy Framework (SPF) 307</p> <p>Domain Keys Identified Mail (DKIM) 307</p> <p>Domain-Based Message Authentication, Reporting, and Conformance (DMARC) 308</p> <p><b>Part IV IPAM in Practice </b><b>311</b></p> <p><b>13 IPAM Use Case </b><b>313</b></p> <p>Introduction 313</p> <p>IPv4 Address Allocation 316</p> <p>First-Level Allocation 317</p> <p>Second-Layer Allocation 318</p> <p>Address Allocation Layer 3 320</p> <p>Core Address Space 323</p> <p>External Extensions of Address Space 323</p> <p>Allocation Trade-Offs and Tracking 324</p> <p>IPAM Worldwide’s Public IPv4 Address Space 325</p> <p>IPAM Worldwide’s IPv6 Allocations 326</p> <p>External Extensions Address Space 329</p> <p>IP Address Tracking 332</p> <p>DNS and IP Address Management 334</p> <p><b>14 IPAM Deployment Strategies </b><b>337</b></p> <p>General Deployment Principles for DHCP/DNS 337</p> <p>Disaster Recovery/Business Continuity 338</p> <p>DHCP Deployment 339</p> <p>DHCP Server Platforms 339</p> <p>DHCP Servers 339</p> <p>Virtualized DHCP Deployment 339</p> <p>DHCP Appliances 339</p> <p>DHCP Deployment Approaches 340</p> <p>Centralized DHCP Server Deployment 340</p> <p>Distributed DHCP Server Deployment 342</p> <p>DHCP Services Deployment Design Considerations 344</p> <p>DHCP Deployment on Edge Devices 347</p> <p>DNS Deployment 348</p> <p>DNS Trust Sectors 349</p> <p>External DNS Trust Sector 350</p> <p>Extranet DNS Trust Sector 355</p> <p>Recursive DNS Trust Sector 357</p> <p>Internal DNS Trust Sector 361</p> <p>Deploying DNS Servers with Anycast Addresses 362</p> <p>Anycast Addressing Benefits 362</p> <p>Anycast Caveats 364</p> <p>Configuring Anycast Addressing 365</p> <p>IPAM Deployment Summary 366</p> <p>High Availability 366</p> <p>Multiple Vendors 366</p> <p>Sizing and Scalability 367</p> <p>Load Balancers 367</p> <p>Lab Deployment 367</p> <p><b>15 The Business Case for IPAM </b><b>369</b></p> <p>IPAM Business Benefits 369</p> <p>Automation 370</p> <p>Outage Reduction 370</p> <p>Rapid Trouble Resolution 370</p> <p>Accurate IPAM Inventory and Reporting 371</p> <p>Expanded IP Services 371</p> <p>Distributed Administration 371</p> <p>Enhanced Security 371</p> <p>Business Case Overview 372</p> <p>Business Case Cost Basis 373</p> <p>Address Block Management 374</p> <p>Subnet Management 381</p> <p>IP Address Assignment – Moves, Adds, and Changes 383</p> <p>Inventory Assurance 386</p> <p>Address Capacity Management 387</p> <p>Auditing and Reporting 392</p> <p>Server Upgrade Management 392</p> <p>Outage and Security Recovery Costs 393</p> <p>IPAM System Administration Costs 396</p> <p>Cost Basis Summary 399</p> <p>Savings with IPAM Deployment 399</p> <p>Business Case Expenses 403</p> <p>Netting it Out: Business Case Results 403</p> <p>Conclusion 405</p> <p><b>16 IPAM Evolution/Trends </b><b>407</b></p> <p>Security Advancements 407</p> <p>Intent-Based Networking 409</p> <p>Artificial Intelligence Applied to IPAM 410</p> <p>IP Address Capacity Management 412</p> <p>DNS Query and Response Analytics 412</p> <p>DNS Malware Detection 413</p> <p>Network Address Intrusions 413</p> <p>IPAM Administration Activity Analysis 414</p> <p>AI Summary 414</p> <p>Edge Computing 414</p> <p>Identifier/Locator Networking 415</p> <p>Information</p> <p>Centric Networking 416</p> <p><b>Part V IPAM Reference </b><b>419</b></p> <p><b>17 IP Addressing Reference </b><b>421</b></p> <p>IP Version 4 421</p> <p>The IPv4 Header 421</p> <p>IP Version 6 423</p> <p>The IPv6 Header 423</p> <p>IPv6 Multicast Addressing 424</p> <p>Flags 425</p> <p>Special Case Multicast Addresses 429</p> <p>Solicited Node Multicast Address 429</p> <p>Node Information Query Address 429</p> <p>IPv6 Addresses with Embedded IPv4 Addresses 430</p> <p>Reserved Subnet Anycast Addresses 430</p> <p><b>18 DHCP Reference </b><b>433</b></p> <p>DHCPv6 Protocol 433</p> <p>DHCPv6 Packet Format 433</p> <p>DHCPv6 Message Types 433</p> <p>DHCPv6 Failover Overview 437</p> <p>DHCPv6 Options 439</p> <p>DHCP for IPv4 454</p> <p>DHCP Packet Format 454</p> <p>DHCPv4 Message Types 456</p> <p>DHCP Options 474</p> <p><b>19 DNS Reference </b><b>475</b></p> <p>DNS Message Format 475</p> <p>Encoding of Domain Names 475</p> <p>Name Compression 476</p> <p>Internationalized</p> <p>Domain Names 478</p> <p>DNS Message Format 479</p> <p>Message Header 480</p> <p>Question Section 482</p> <p>Answer Section 485</p> <p>Authority Section 487</p> <p>Additional Section 487</p> <p>DNS Update Messages 487</p> <p>DNS Extensions (EDNS0) 489</p> <p>The DNS Resolution Process Revisited 494</p> <p>DNS Resolution Privacy Extension 501</p> <p>DNS Resolver Configuration 502</p> <p>DNS Applications and Resource Records 504</p> <p>Resource Record Format 504</p> <p>Host Name and IP Address Resolution 506</p> <p>A – IPv4 Address Record 506</p> <p>AAAA – IPv6 Address Record 506</p> <p>PTR – Pointer Record 507</p> <p>Alias Host and Domain Name Resolutions 507</p> <p>CNAME – Canonical Name Record 507</p> <p>DNAME – Domain Alias Record 508</p> <p>Network Services Location 508</p> <p>SRV – Services Location Record 508</p> <p>AFSDB – DCE or AFS Server Record (Experimental) 509</p> <p>WKS – Well Known Service Record (Historic) 510</p> <p>Host and Textual Information Lookup 510</p> <p>TXT – Text Record 510</p> <p>HINFO – Host Information Record 510</p> <p>DNS Protocol Operational Record Types 512</p> <p>SOA – Start of Authority Record 512</p> <p>NS – Name Server Record 513</p> <p>Dynamic DNS Update Uniqueness Validation 514</p> <p>DHCID – Dynamic Host Configuration Identifier Record 514</p> <p>Telephone Number Resolution 515</p> <p>NAPTR – Naming Authority Pointer Record 517</p> <p>Email and Anti-spam Management 518</p> <p>Email and DNS 519</p> <p>MX – Mail Exchanger Record 519</p> <p>Allow or Block Listing 523</p> <p>Sender Policy Framework (SPF) 523</p> <p>SPF – Sender Policy Framework Formatting for a TXT Record 524</p> <p>Mechanisms 524</p> <p>Modifiers 526</p> <p>Macros 527</p> <p>Macro Examples 528</p> <p>Sender ID (Historical) 528</p> <p>Domain Keys Identified Mail (DKIM) 529</p> <p>DKIM Signature Email Header Field 530</p> <p>DKIM TXT Record 531</p> <p>DMARC TXT Record 532</p> <p>Historic Email Resource Record Types 533</p> <p>MR – Mail Rename Record 533</p> <p>MB – Mailbox Record 533</p> <p>MG – Mail Group Member Record 534</p> <p>MINFO – Mailbox/Mailing List Information 534</p> <p>Security Applications 534</p> <p>Securing Name Resolution – DNSSEC Resource Record Types 534</p> <p>DNSKEY – DNS Key Record 534</p> <p>DS – Delegation Signer Record 536</p> <p>NSEC – Next Secure Record 536</p> <p>NSEC3 – NSEC3 Record 537</p> <p>NSEC3PARAM – NSEC3 Parameters Record 538</p> <p>RRSIG – Resource Record Set Signature Record 539</p> <p>Other Security-oriented DNS Resource Record Types 540</p> <p>TA – Trust Authority Record 540</p> <p>CERT – Certificate Record 540</p> <p>IPSECKEY – Public Key for IPSec Record 541</p> <p>KEY – Key Record 542</p> <p>KX – Key Exchanger Record 543</p> <p>SIG – Signature Record 543</p> <p>SSHFP – Secure Shell Fingerprint Record 544</p> <p>Geographical Location Lookup 544</p> <p>GPOS – Geographical Position Record 544</p> <p>LOC – Location Resource Record 545</p> <p>Non-IP Host-Address Lookups 545</p> <p>ISDN – Integrated Services Digital Network Record (Experimental) 545</p> <p>NSAP – Network Service Access Point Record 545</p> <p>NSAP-PTR – Network Service Access Point Reverse Record 546</p> <p>PX – Pointer for X.400 546</p> <p>X25 – X.25 PSDN Address Record (Experimental) 546</p> <p>RT – Route Through 547</p> <p>The Null Record Type 547</p> <p>NULL 547</p> <p>Experimental Name-Address Lookup Records 547</p> <p>IPv6 Address Chaining – The A6 Record (Experimental) 547</p> <p>APL – Address Prefix List Record (Experimental) 548</p> <p>DNS Resource Record Summary 549</p> <p><b>20 RFC Reference </b><b>555</b></p> <p>Glossary 583</p> <p>Bibliography 585</p> <p>Index 601</p>
<p><b>Michael Dooley</b> is Vice President of Operations for BT Diamond IP division. He has over 20 years of experience managing and developing enterprise-scale software products. His professional expertise includes IP addressing, DHCP, and DNS. He is co-author of <i>IPv6 Deployment and Management</i> and <i>DNS Security Management</i>. <p><b>Timothy Rooney</b> is the Product Manager for BT Diamond IP product development and has led the market introduction of NetControl, IPControl, Sapphire Appliances, and ImageControl, four next-gen IP management systems. He is co-author of <i>Introduction to IP Address Management, IP Address Management Principles and Practice, IPv6 Deployment and Management,</i> and <i>DNS Security Management.</i>
<p><b>Rediscover fundamental and advanced topics in IPAM, DNS, DHCP and other core networking technologies with this updated one-stop reference</b> <p>The thoroughly revised second edition of <i>IP Address Management</i> is the definitive reference for working with core IP management technologies, like address allocation, assignment, and network navigation via DNS. Accomplished professionals and authors Timothy Rooney and Michael Dooley offer readers coverage of recent IPAM developments in the world of cloud computing, Internet of Things (IoT), and security, as well as a comprehensive treatment of foundational concepts in IPAM. <p>The new edition addresses the way that IPAM needs and methods have evolved since the publication of the first edition. The book covers the impact of mainstream use of private and public cloud services, the maturation of IPv6 implementations, new DNS security approaches, and the proliferation of IoT devices. The authors have also reorganized the flow of the book, with much of the technical reference material appearing at the end and making for a smoother and simpler reading experience. <p>The 2nd edition of <i>IP Address Management</i> also covers topics like such as: <ul> <li>Discussions about the fundamentals of Internet Protocol Address Management (IPAM), including IP addressing, address allocation and assignment, DHCP, and DNS</li> <li>An examination of IPAM practices, including core processes and tasks, deployment strategies, IPAM security best-practices, and DNS security approaches</li> <li>A treatment of IPAM in the modern context, including how to adapt to cloud computing, the Internet of Things, IPv6, and new trends in IPAM</li> <li>A one-stop reference for IPAM topics, including IP addressing, DHCP, DNS, IPv6, and DNS security</li> </ul> <p>Perfect for IP network engineers and managers, network planners, network architects, and security engineers, the second edition of <i>IP Address Management</i> also belongs on the bookshelves of senior undergraduate and graduate students studying in networking, information technology, and computer security-related courses and programs.

Diese Produkte könnten Sie auch interessieren:

Symbian OS Explained
Symbian OS Explained
von: Jo Stichbury
PDF ebook
32,99 €
Symbian OS Internals
Symbian OS Internals
von: Jane Sales
PDF ebook
56,99 €
Parallel Combinatorial Optimization
Parallel Combinatorial Optimization
von: El-Ghazali Talbi
PDF ebook
120,99 €