-
Establishing communication between two networks via switches
I have two 3Com layer 3 switches (4924) connecting to two separate networks in a building. How do I configure these switches so that the communication can be established between the two networks?
These
...24 Oct 2005 -
Tool gives on-site management capabilities to distributed networks
Uplogix today introduced Envoy 2.0, a management tool for distributed networks, and one company plans to use it to keep an eye on its global infrastructure.24 Oct 2005
-
Remote admin cards
A special card, usually in a PCI form factor, can give you the equivalent of console access via the network -- and help increase security as well.24 Oct 2005
-
Answer Key: Major IT players: How'd they start out?
Answer Key: Major IT players: How'd they start out?21 Oct 2005
-
Using route analytics to ensure that 'best practices' for routing maintenance really work
IP routing is one of network management's most complex domains. And no wonder: not only are routing protocols highly automated and distributed in nature, but routing errors can have a large-scale...21 Oct 2005
-
How QoS appliances subdue VoIP bugbears
QoS appliances look deep into packets to counteract delay, jitter and packet loss, improving call quality. David Jacobs explains how in this tip.20 Oct 2005
-
How can we allow only certain ports to identify and address remote parties in SafeNet SoftRemote VPN
20 Oct 2005
-
Wireless LAN management strategies
Implementing a WLAN is straightforward, but making sure it runs optimally can be challenging. Luckily, networking professionals can control and maintain their wireless networks by using well-known ...18 Oct 2005
-
Advancement to Cisco's NAC framework boosts security in LAN, wireless space
The networking giant today announced additions to its security framework, including support for the company's popular Catalyst switches and wireless services.18 Oct 2005
-
Boom predicted for IP telephony, wireless LAN spending
Wireless LAN and IP telephony are already hot, but IDC expects spending to double by 2009, fueled by implementations in retail, finance, government and professional services.17 Oct 2005
-
What are some key points to consider when hiring an outside firm to handle an organization's network
14 Oct 2005
-
Is it true that I may encounter contention issues if I uplink a Gigabit switch to a fast Ethernet sw
14 Oct 2005
-
What could be causing slow performance on our Nortel 1010 VPN and how can improve it?
14 Oct 2005
-
FastFacts on RFID
These resources will help you better understand RFID in no time.14 Oct 2005
-
How do I open port 177 on my router so that other clients can get a GUI display of my server remotel
14 Oct 2005
-
Router Expert: Building 802.11Q VLANs
Network segmentation can be a great way to increase security. This article covers segmenting with VLANs and the 802.1Q standard.13 Oct 2005
-
Wireless LAN quiz
Take our wireless LAN quiz to find out how much you know about WLAN technologies.13 Oct 2005
-
Wireless LAN quiz answers
Wireless LANs quiz answer key.13 Oct 2005
-
OpenSSL vulnerable to man-in-the-middle attacks
Exploits of this flaw, which makes OpenSSL vulnerable to man-in-the-middle attacks, could force a client and server to negotiate the less secure SSL 2.0, even if both parties support the more secur...12 Oct 2005
-
New filter sinks phishing expeditions
A new anti-phishing filter from TippingPoint Technologies Inc. uses multiple layers to block sneaky scams at the network level.12 Oct 2005
Network Management Strategies for the CIO