Email Alerts
-
Choosing an edge switch: What to consider before you invest
Choosing an edge switch means considering a host of edge switch features that range from advanced security like IPS and malware-scanning to wireless LAN features like integrated access points and Power over Ethernet Plus. Tip
-
Integrating LAN edge switch security and network access control
The best form of network edge security is to integrate LAN edge switch security features with network access control devices so that networking teams can use VLANs, ACLs and health checks at the switch alongside NAC's behavior analysis. Tip
-
Configuring LAN edge switches for network access authentication
Intelligent edge switches can play a role in network access authentication, but these functions are often overlooked. Tip
-
LAN edge switch security functions: Switch ACLs; filtering port traffic
LAN edge switch security functions enable network administrators to use switch access control lists (ACLs) to filter incoming and outgoing traffic, as well as port-level traffic filtering and VLAN management for a more in-depth approach to LAN securi... Tip
-
How to test LAN switch energy efficiency
Vendors promise energy-efficient networks, but they often can't provide actual measurements for LAN switch power consumption. In this best practices guide, learn methods for measuring LAN switch energy efficiency. Tip
-
Testing LAN switch power consumption: A best practices guide
LAN switch power consumption testing is as crucial as benchmarking speeds and feeds on switches. Enterprises that develop a set of best practices for testing network power consumption will save millions in op-ex annually. Tip
-
HTTP error code troubleshooting, Part 1: HTTP status codes defined
To troubleshoot HTTP error codes, you must first understand HTTP status codes. Any time a client issues an HTTP request to a Web server, the server returns a response code. In this tip, learn the 100, 200, 300, 400 and 500 Series response status code... Tip
-
Prevent unauthorized USB devices with software restriction policies, third-party apps
In the conclusion of his series on preventing unauthorized USB device use on your network, Brien Posey discusses the pros and cons of using software restriction policies such as certificate rules, hash rules, Internet zone rules, and path rules to pr... Tip
-
Comparing different backup strategies
Review the primary options for backup including direct, network and SAN, and determine which solution is best for your backup strategy. Tip
-
Cleaning up: Managing Windows networks using scripts, part 2
In the continuation of his series on managing different aspects of Windows networks using scripts, Mitch Tulloch walks you through the steps of "tidying up" a simple script that changes the IP address assigned to your network adapter. Tip
Network Management Strategies for the CIO