Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Learn and implement network automation within the Enterprise network using Python 3. This introductory book will be your guide to building an integrated virtual networking lab to begin your Network Automation journey and master the basics of Python Network Automation.
The book features a review of the practical Python network automation scripting skills and tips learned from the production network, so you can safely test and practice in a lab environment first, various Python modules such as paramiko and netmiko, pandas, re, and much more. You'll also develop essential skills such as Python scripting, regular expressions, Linux and Windows administration, VMware virtualization, and Cisco networking from the comfort of your laptop/PC with no actual networking hardware. Finally, you will learn to write a fully automated and working Cisco IOS XE upgrade application using Python.
Introduction to Python Network Automation uses a canonical order, where you beginat the bottom and by the time you have completed this book, you will at least reach the intermediate level of Python coding for enterprise networking automation using native Python tools.
What You'll Learn
Who This Book Is For
IT engineers and developers, network managers and students, who would like to learn network automation using Python.
Brendan is currently working as a Senior Technical Consultant for Australia's leading Telco, Telstra. Telstra is the largest Australian Internet Service Provider (ISP) as well as one of the leading IT System Integrator and Managed Services Provider in Australian IT industry. He has more than 15 years of hands-on experience working with Cisco Networking, Unified Collaboration, VMware Virtualization and Operating System Administration. He began his IT career in Cisco Systems and then moved onto various roles in leading System Integrators in Australian IT scenes. He is currently working on a number of external clients' environment and supports a diverse IT ecosystem, currently focusing on Python Network Automation. This book is largely based on Python network Automation he has developed in his previous job and the original book, "Python Network Automation: by building a virtual lab". Also, this book is a memoir of Network Automation Journey leveraging off the power of Python as the preferred Programming Language.
Chapter 1: Introduction to Python Network Automation
Chapter 2: Learn Python Basics on Windows
Chapter 3: More Python Exercises
Chapter 4: Introduction to VMware Workstation
Chapter 5: Creating Virtual Machines Using Ubuntu 20 Server Image
Chapter 6: Creating Virtual Machines Using CentOS 8 Server Image
Chapter 7: Linux Fundamentals
Chapter 9: Regular Expressions for Network Automation
Chapter 10: GNS3 Basics
Chapter 11 Cisco IOS Labs
Chapter 12. Building a Python Automation Lab Environment
Chapter 13. Python Network Automation Lab: Basic Telnet
Chapter 14. Python Network Automation Labs: SSH Paramiko and Netmiko
Chapter 15. Python Network Automation Labs: Cron and SNMPv3
Chapter 16. Python Network Automation Labs: Ansible, pyATS, Docker, and Twilio API
Chapter 17. Upgrading Multiple Cisco IOS XE Routers
Chapter 18. Python NetworkAutomation Lab: Cisco IOS Upgrade mini-tools Development
Chapter 19. Python Network Automation Labs Combining and Completing Cisco IOS Upgrade Application
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.