-
Identity and Access Management Security School
This Security School explores critical topics related to helping security practitioners establish and maintain an effective identity and access management plan.14 Jul 2006
-
Monitory excess bandwidth usage.
What are the pros and cons for using Open Xtra's NTOP freeware to monitor excessive Internet bandwidth usage? What is your recommendation?13 Jul 2006
-
Switch control in large enterprises
I am the lead network admin at our site. We have a fairly large LAN -- about 1700 workstations, 250 servers, 100 workgroup switches, etc. We have disabled all unused switch ports, but still have oc...13 Jul 2006
-
News briefs: Cisco security facelift; new WAN probe; bandwidth management
Cisco upgraded its Network Admission Control (NAC) appliance and rolled out two Adaptive Security appliance models. New WAN probe from Network Instruments provides historical analysis. Bandwidth-ma...13 Jul 2006
-
Emergency backup plans for wireless access
Advice for wireless coverage and access during emergencies.13 Jul 2006
-
Should I buy new APs with 802.11g or pre-802.11n?
Wireless networking expert Lisa Phifer explains which access points (APs) -- 802.11g or pre-802.11n -- are the most valuble purchase for your enterprise upgrade.13 Jul 2006
-
International wireless interoperability
Troubleshooting international wireless interoperability.13 Jul 2006
-
What is the purpose of Wi-Fi ad-hoc mode?
Our wireless networking expert, Lisa Phifer, defines and explains Wi-Fi ad-hoc mode and its pros and cons, in this Ask the Expert response.13 Jul 2006
-
Wi-Fi hot spot plan or 3G wireless data service
Should you use a Wi-Fi hot spot plan or a 3G wireless data service?13 Jul 2006
-
network configuration management (NCM)
Network configuration management is the process of organizing and maintaining information about all the components of a computer network... (Continued)12 Jul 2006
-
Network security education
Can you suggest any Web sites that give a good grounding in network security, maybe as a lead into Cisco security courses?12 Jul 2006
-
Keeping tabs on who is accessing your network
How can I monitor is someone is trying to connect a laptop or other device to my network drop. And if someone connects their laptops, how would I find out which network drop and switch port they a...12 Jul 2006
-
Manufacturing Message Specification (MMS)
The Manufacturing Message Specification (MMS) is an international standard that defines the ways in which control information is transferred among intelligent devices and systems such as computers ...07 Jul 2006
-
Monitoring bandwidth usage
What network monitoring software do you recommend for a medium-size business? I'd like to pinpoint users who are using excessive bandwidth for Internet surfing or peer-to-peer downloading.07 Jul 2006
-
Protecting your network from visitors
We get visitors at our facilities that tend to bring their own laptops with them. We would like to figure out a way to scan those laptops for pests, viruses, etc. before putting them on our network...07 Jul 2006
-
Understanding VPN technologies and capabilities
Virtual Private Networks (VPNs) are the mainstay of the mobile environment. Enterprises across the world are looking for and finding a multitude of ways to provide the remote, mobile end user with ...06 Jul 2006
-
In the news: secure wireless LANs, virtual desktop management, managing network vulnerability
Route1 offers an enterprise-based solution for virtual desktop management; NetClarity protects against network vulnerability; California school district rolls out state-of-the-art Trapeze WLAN, wi...06 Jul 2006
-
Blocking IPs
I have a T1 connection to my Cisco 2620, along with a public IP block of 255 IP's. I want to block some selected IP's from accessing the outside world05 Jul 2006
-
NAC helps aerospace firm's network blast off
Aerospace company EADS Astrium North America Inc. needs to prevent people without proper clearance from accessing sensitive data, something many network architects struggle with. They've employed a...05 Jul 2006
-
Duplex mismatch: Why duplex conflicts plague the network, part 1
Duplex mismatch problems -- caused by two ends of the Ethernet attempting a full-duplex connection, resulting in packet loss -- simply will not go away. After a decade of plaguing IP networks, dupl...05 Jul 2006
Network Management Strategies for the CIO