-
Extending switched networks with virtual LANs - Chapter 3 of CCNA Self-Study: Interconnecting Cisco
Chapter 3 of "CCNA Self-Study" by Steve McQuerry explores how VLANs operate to provide more effective networks by controlling broadcasts in your network. To configure VLANs on a Catalyst switch, yo...17 Feb 2006
-
Network challenges and considerations: Bandwidth utilization series, part 5
Network challenges and final considerations are discussed in this insightful series on bandwidth utilization.17 Feb 2006
-
Cisco unveils steps toward self-defending network
In his keynote, CEO John Chambers touted product enhancements that advance his push for networks that can defend themselves without human intervention.16 Feb 2006
-
Flood of NAC products toughens security decisions
The continuing flood of network access control products is forcing networking pros to weigh all of the options before securing their networks.15 Feb 2006
-
Wireless LAN management: Managing security compliance
Find out the security threats that need to be addressed to make your network compliant with security regulations.15 Feb 2006
-
Can the Cisco Firewall PIX 506e be configured to direct outside traffic from port 3879 to a specific
Can the Cisco Firewall PIX 506e be configured to direct outside traffic from port 3879 to a specific IP address on our intranet?15 Feb 2006
-
Is it possible to replace our existing VPN authentication method with a third party method?
Is it possible to replace our existing VPN authentication method with a third party method?15 Feb 2006
-
Cisco CCNA exam: Are you ready? Take this 10-question quiz to find out
This 10-question quiz will help you prepare for the Cisco CCNA exam.14 Feb 2006
-
Checklist: What to Do When You've Been Hacked
Checklist: What to Do When You've Been Hacked14 Feb 2006
-
Concepts in IP addressing -- Chapter 3 of 'CCNA Exam Cram 2'
The CCNA exam(s) require a near-perfect fluency in subnetting. Success requires speed and accuracy in answering the many questions you will see on this topic. The key to this level of fluency is pr...14 Feb 2006
-
802.11a and g bring more sweet spots for wireless access
An often-overlooked factor in placing wireless access points, the difference between the 802.11a, b and g specifications can mean substantial differences in both data rates and available channels. ...14 Feb 2006
-
handshaking
In telephone communication, handshaking is the exchange of information between two modems and the resulting agreement about which protocol to use that precedes each telephone connection.13 Feb 2006
-
Cisco CCNA exam cram 10-question quiz: Answer key
Are you thinking about taking Cisco's CCNA exam (640-801)? Here's a 10-question quiz to let you know whether you're on the right track. (Questions and detailed answers taken from the book CCNA Exam...13 Feb 2006
-
Certifications that will earn you the most money
Ed Tittel takes a look at the five network certifications that earned the most money in 2005.13 Feb 2006
-
IP network design, part 4: LAN design
This final section of the IP network design series relates to the issues encountered with campus LAN design. The benefits of Ethernet switching over a traditional hub environment are first explaine...13 Feb 2006
-
Wireless access points: Placement checklist
When planning to deploy wireless or tweak your existing deployment, the conventional wisdom is that you need a "site survey." If you're trying to locate the best places to put your wireless access ...10 Feb 2006
-
Protecting your network against spoofed IP packets
These days, the vast majority of administrators go to great lengths to protect the files on their network. Typically, elaborate firewalls are used to keep outsiders away from file servers. The file...10 Feb 2006
-
SonicWall's e-mail security to stop spam
SonicWall's acquisition of e-mail security vendor, MailFrontier, promises first-line defense against malicious spam attacks. MailFrontier's e-mail protection technology stops a threat at the enter...09 Feb 2006
-
802.11 wireless protocol
802.11 is a family of wireless and mobile networking specifications developed by the IEEE. Learn more...09 Feb 2006
-
Intrusion prevention devices
Hackers are constantly at work developing new ways to attack your network, so guarding against these attacks requires eternal vigilance. Intrusion prevention devices are one essential element of de...08 Feb 2006
Network Management Strategies for the CIO