-
How do I get a proper load-share on this router running no routing protocols?
Sudhanshu Gupta explains how to get a proper load-share on a router running no routing protocols that achieves a 90% reception and 80% transmission, in this Q&A.
-
How are IP addresses and subnet masks calculated?
Learn how to calculate IP addresses and subnet masks in this Q&A with Chris Partsenidis.
-
Can you suggest a free vulnerability assessment tool to identify vulnerabilities in a campus network
Learn what free vulnerability assessment tools to identify vulnerabilities in a campus network are available in this response from security expert Puneet Mehta.
-
Does it make sense to construct a WAN using Internet protocol?
See if constructing a WAN using Internet protocol makes sense, in this Q&A by WAN optimization expert David Hughes.
-
Is there any Web site to help me stay current with CCNA?
Cisco certification expert David Minutella offers his advice on staying current with CCNA after it has expired.
-
To specialize in network security, should I get a CCSP or a CCNP?
Cisco certifications expert David Minutella makes his recommendation for those looking into the network security career path.
-
How to decide between CCNA course studies at different universities
David Minutella talks about what you need to look for when choosing a school to take your CCNA course study, in this expert response.
-
How do I get upper management to see the urgency of our compromised network, and how do I begin test
Testing the integrity of your network's data and expressing concern to upper management are issues discussed by security expert Puneet Mehta in this Q&A.
-
Who is responsible for the firewalls?
Firewall responsibility complications are cleared up in this Q&A with network security expert Puneet Mehta.
-
Do I need WAN optimization if my replication software is already performing data de-duplication?
WAN optimization for replication software that is already performing data de-duplication may be beneficial, says David Hughes in this expert response explaining why.
-
How can I access each device from my network while keeping the companies' networks secure?
Access devices from a network while keeping companies' networks secure by reading VPN expert Sampath Ramaswami's advice.
-
Can a L3 switch be used in a WAN environment?
Learn if an L3 switch can be used in a WAN environment in this expert response by David Hughes.
-
Can more than one computer on a LAN function as a server?
Network administration expert Lindi Horton answers whether or not more than one computer on a LAN can function as a server.
-
How can I know what programs are running in another machine in the same network?
For those who need to access other machines on a network, expert Lindi Horton discusses what monitoring software is available.
-
Does intermittent connectivity mean my switch is going?
Learn a few key troubleshooting steps in this Q&A with Lindi Horton, to see if a switch is going.
-
Is it possible to assign each radio to a specific channel for transmission in a multi-radio wireless
Wireless networking expert Lisa Phifer explains how to configure a multi-radio wireless network system in this Q&A.
-
Are new wireless products supporting 802.11n any more or less secure than older 802.11a/b/g wireless
View this expert response to see if new wireless products, supporting 802.11n, are any more or less secure than older 802.11a/b/g wireless products.
-
Is there any network management software that can look after wireless routers, switches and access p
Wireless networking expert Lisa Phifer explains the types of network management software available for looking after wireless routers, switches and access points, in this response.
-
Where can I find a good practice lab for Aruba mobility controller, switches and access points?
Find a good practice lab for Aruba mobility controller, switches and access points in this expert response by Lisa Phifer.
-
What jobs are available for people with A+ certification?
In this Q&A, certification expert Ed Tittel answers what jobs are available for the A+ certified.
-
BYOD security: Which VPN is best for you, IPsec or SSL?
By 2016, 40% of the workforce will be mobile. IPsec VPNs are being widely discussed for BYOD security. But should we also be talking about SSL VPNs?
-
Why should you care about SDN?
Expert Jim Damoulakis weighs in on the potential of software-defined networking, or SDN, and why you should care.
-
Can you really have security, convenience and BYOD?
Employee-owned devices can seriously undermine security. But bring your own device is probably here to stay. So what should IT do?
Network Management Strategies for the CIO