-
Is my firewall setting preventing wireless network guest access?
In a wireless guest network, find out why some vendors can connect without authentication while others cannot get an IP in this ask the expert response.19 Apr 2008
-
Craft a green IT action plan
Many IT departments want to undertake green IT initiatives, but don't know where to start. Use this research note to begin understanding green IT as an umbrella term, the difference between victory...18 Apr 2008
-
How green is my network? -- A look at the cost-savings benefit of green IT
The trend of green networking is an offshoot of the growing emphasis on greening, or decreasing the negative impact to the environment of just about everything -- including data centers and IT in g...16 Apr 2008
-
NAC vendor Bradford Networks offers simplified product for guest and contractor access
NAC vendor Bradford Networks has announced NAC Director GCS, a scaled-down version of NAC Director that manages network access for guests and contractors.15 Apr 2008
-
How to configure Windows Server 2008 advanced firewall MMC snap-in
Find out new features of the Windows Server 2008 Advanced Firewall -- and how to configure this powerful host-based firewall using the new MMC snap-in -- in this tip.15 Apr 2008
-
Can routers be configured to send files to appropriate servers?
Our routing expert explains how to configure your router to send files to assigned servers in this expert response.14 Apr 2008
-
Cisco certification program reaches one million served
Cisco recently awarded its millionth certification as its program continues to expand. The company plans to add a job-matching service.10 Apr 2008
-
Optical Carrier levels (OCx)
The Synchronous Optical Network (SONET) includes a set of signal rate multiples for transmitting digital signals on optical fiber.10 Apr 2008
-
IP address configuration to connect Layer 3 switches to ports
Our routing and switching expert explains the IP address configuration needed to connect a Layer 3 (L3) switch to a port, in this response.10 Apr 2008
-
Upgrading to 802.11n: Key considerations
802.11n physical and link layer enhancements could significantly increase your WLAN's speed, capacity, reach and reliability. But realizing this potential requires proper deployment: Your 802.11n u...10 Apr 2008
-
802.11n Wi-Fi adoption faces Power over Ethernet hurdle
Enterprises that are looking at 802.11n Wi-Fi should make sure their chosen vendor has solved the Power over Ethernet problem.10 Apr 2008
-
How do I configure two leased lines in one router?
Our routing and switching expert explains how to configure two leased lines in one router, in this Ask the Expert answer.10 Apr 2008
-
IEEE P802.3az Energy Efficient Ethernet: Small network power savings add up
Much energy is wasted while the network is idle. The IEEE P802.3az Energy Efficient Ethernet project aims to deliver major energy savings by combining many small network power savings, both economi...09 Apr 2008
-
How to retrieve passwords from locked laptops
How can I retrieve passwords from locked laptops? Our networking fundamentals expert answers this question.08 Apr 2008
-
How to interpret test scan results to assess network vulnerability
Once you've run some test scans with a network tool, how do you interpret the results to assess network vulnerability? Find out in this Ask the Expert response with our enterprise network security ...08 Apr 2008
-
What's the Ethernet packet collision rate in Windows OS?
Is there a way to know the Ethernet packet collision count/rate in a Windows OS? Find out in this answer from our networking fundamentals expert, Chris Partsenidis.07 Apr 2008
-
What commands allow network traffic to pass through PIX firewalls?
The PIX firewall can secure networks but you need to allow access to the right people. Learn which commands get network traffic flowing, from security expert Puneet Mehta.07 Apr 2008
-
For an SMB firewall, what features should I look at?
Which features should you look at when choosing a SMB firewall? Find out in this expert response with our network security expert.03 Apr 2008
-
Creating Remote Access and Site-to-Site VPNs with ISA Firewalls: from 'The Best Damn Firewall Book P
This chapter gives an excellent overview of ISA firewall VPN networking as well as solutions to create everything from remote access PPTP VPN servers to L2TP/IPSec site-to-site VPNs. Learn how to s...03 Apr 2008
-
Network pros spend months on troubleshooting
Most organizations say their networking professionals spend more than two months per year troubleshooting network problems.02 Apr 2008
Network Management Strategies for the CIO