-
What is the length of a ScUTP and TERA cable run?
Learn what the length of a ScUTP cable run and TERA cable run is in this response from our network infrastructure expert on standards-based runs.
-
Does a firewall need two static IPs for port forwarding?
See if it takes two static IPs to accomplish port forwarding in a Cisco firewall, in this expert response from network security expert Puneet Mehta.
-
What IPv6 topology/configuration is used most in peer-to-peer tunneling?
Learn what IPv6 topology and configuration is used most in peer-to-peer tunneling, in this expert response with Silvia Hagen.
-
How does asynchronous transfer mode differ from existing network technologies?
Learn how asynchronous transfer mode (ATM) differs from existing network technologies in this response from our networking infrastructure expert, Carrie Higbie.
-
What network monitoring tools monitor all OSI layers?
To understand network monitoring in all Open Systems Interconnection (OSI) layers, view this expert response.
-
Is there Cisco router documentation for proactive and reactive checklists?
Find documentation on proactive and reactive checklists for Cisco routers from our management expert, Craig Thomas.
-
After a server outage what emergency steps secure your network?
What emergency and recovery steps are taken when there is a network server outage? Find out from security expert Michael Gregg.
-
What's the prefix of a Unique Local IPv6 Unicast Address?
Learn the prefix and configuration of a Unique Local IPv6 Unicast Address, in this expert response.
-
Why was IPv6 developed, and what issues does IPv4 have?
Learn what issues cannot be rectified using IPv4 and why IPv6 was developed, in this Ask the Expert.
-
Can I use my Windows Server as an Internet proxy server?
To use your Windows Server as an Internet proxy server, what do you need to do? Find out from our wireless expert, Lisa Phifer.
-
What's the difference between licensed and unlicensed wireless?
Learn what the tradeoff is between licensed and unlicensed wireless.
-
Will 802.11n WAPs we purchase today be compatible with NAC?
Find out how to tell whether the new 802.11n WAPs that you purchase today will be compatible with NAC, from our wireless expert, Lisa Phifer.
-
How do I pass my Certified Information Systems Auditor (CISA) exam?
Are you searching for good Certified Information Systems Auditor (CISA) material to pass your exam? Training and certification expert Ed Tittel recommends these books.
-
What IT job can I apply for with my experience?
Learn what IT job you can apply for with the masters, certification and experience you have as a technician, in this expert response with Ed Tittel.
-
Should you certify before getting a Masters degree?
Discover whether you should get a certification before entering a masters program. Training and certification expert Ed Tittel explains how a Masters degree compares with certifying in this response.
-
How do I make a Cisco lab for CCNP training?
Want to know how to set up a cost-effective Cisco lab for CCNP training? Learn from Cisco certification expert Dave Minutella in this response.
-
Do you have suggestions for aspiring CCNA's?
As an aspiring CCNA, see what Cisco certification expert, David Minutella, recommends for those already considering an academy course, in this expert response.
-
Can I assign switches to use a set of ports?
Learn how to set up your switch to use a set of ports for different types of access in this expert response.
-
At what circuit utilization percentage should I increase bandwidth?
How do you know when to increase your bandwidth? Find out from WAN optimization expert Dr. David Hughes.
-
How do you assign a default gateway?
Find out the command you need to run to assign a default gateway in this response from our routing and switching expert, Sudhanshu Gupta.
-
BYOD security: Which VPN is best for you, IPsec or SSL?
By 2016, 40% of the workforce will be mobile. IPsec VPNs are being widely discussed for BYOD security. But should we also be talking about SSL VPNs?
-
Why should you care about SDN?
Expert Jim Damoulakis weighs in on the potential of software-defined networking, or SDN, and why you should care.
-
Can you really have security, convenience and BYOD?
Employee-owned devices can seriously undermine security. But bring your own device is probably here to stay. So what should IT do?
Network Management Strategies for the CIO