-
What are the best methods for handling rogue access points?
Our network security expert, Michael Gregg, explains how to enforce network policy and handle rogue access points (APs) in this expert response.
-
How to configure ISDN and backup leases on routers
Routing expert Sudhanshu Gupta explains how to configure ISDN and backup leases on routers in this expert answer.
-
How can I configure 10 VLANs with 5 unmanaged switches?
Given a Cisco Layer 3 (L3) switch and 5 unmanaged switches, learn how to create 10 VLANs from our routing and switching expert, Sudhanshu Gupta.
-
How to route L3 switches for a serial LAN design
Learn from our routing and switching expert how to configure a Layer 3 switch in a serial LAN design to route from the interface to the last machine, in this Ask the Expert Q&A.
-
Types of link-state advertisements (LSAs) used in Open Shortest Path First (OSPF)
Routing and switching expert Sudhanshu Gupta explains the different types of link-state advertisements (LSAs) that would be used for Open Shortest Path First (OSPF), in this expert answer.
-
What is broadcasting and which switch will fix timed-out requests?
Broadcasting is defined by our routing and switching expert as he explains which network switch resolves time-out requests, in this response.
-
How can I finish Cisco's CCIE security certification in time?
Under deadline to get a Cisco Certified Internetwork Expert (CCIE) security certification? Use this advice from our expert to help you pass your exam in time.
-
What are three vital pieces of criteria used to evaluate a network?
Learn what to look for when evaluating a network, including common problems with architecture.
-
Is my firewall setting preventing wireless network guest access?
In a wireless guest network, find out why some vendors can connect without authentication while others cannot get an IP in this ask the expert response.
-
Can routers be configured to send files to appropriate servers?
Our routing expert explains how to configure your router to send files to assigned servers in this expert response.
-
IP address configuration to connect Layer 3 switches to ports
Our routing and switching expert explains the IP address configuration needed to connect a Layer 3 (L3) switch to a port, in this response.
-
How do I configure two leased lines in one router?
Our routing and switching expert explains how to configure two leased lines in one router, in this Ask the Expert answer.
-
How to retrieve passwords from locked laptops
How can I retrieve passwords from locked laptops? Our networking fundamentals expert answers this question.
-
How to interpret test scan results to assess network vulnerability
Once you've run some test scans with a network tool, how do you interpret the results to assess network vulnerability? Find out in this Ask the Expert response with our enterprise network security ...
-
What's the Ethernet packet collision rate in Windows OS?
Is there a way to know the Ethernet packet collision count/rate in a Windows OS? Find out in this answer from our networking fundamentals expert, Chris Partsenidis.
-
What commands allow network traffic to pass through PIX firewalls?
The PIX firewall can secure networks but you need to allow access to the right people. Learn which commands get network traffic flowing, from security expert Puneet Mehta.
-
For an SMB firewall, what features should I look at?
Which features should you look at when choosing a SMB firewall? Find out in this expert response with our network security expert.
-
Why are IPv6's IP addresses in hexadecimal formatting?
Why would IPv6 use hexadecimal formatting if it's so user unfriendly, and what sort of workarounds are there to make IP addressing easier? Find out in this expert answer.
-
Wireless troubleshooting: AP not reestablishing association after loss of connectivity
Learn how to troubleshoot your wireless connectivity with our expert, Lisa Phifer. She explains why connectivity is reachable in a mobile cabin and why the AP can't reestablish association after lo...
-
What can we expect in an 802.11n Wireless LAN standard implementation?
At what stage is 802.11n implementation in, and what changes can we expect to see with it? Learn about the standard from wireless networking expert Lisa Phifer.
-
BYOD security: Which VPN is best for you, IPsec or SSL?
By 2016, 40% of the workforce will be mobile. IPsec VPNs are being widely discussed for BYOD security. But should we also be talking about SSL VPNs?
-
Why should you care about SDN?
Expert Jim Damoulakis weighs in on the potential of software-defined networking, or SDN, and why you should care.
-
Can you really have security, convenience and BYOD?
Employee-owned devices can seriously undermine security. But bring your own device is probably here to stay. So what should IT do?
Network Management Strategies for the CIO