Network Hardware

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Configuring LAN edge switches for network access authentication

    Intelligent edge switches can play a role in network access authentication, but these functions are often overlooked. 

  • Secure Cisco routers against IOS flaw attack

    Learn how to secure Cisco routers against the recently announced Cisco IOS flaw, which could be exploited by hackers. Find out how to determine which routers are affected and ways to protect yourself from this vulnerability, including steps to disabl... 

  • How routers work

    Routers are essential to carrying network traffic, but how do they work? In this tip, you'll get perspective on how routing fits into the OSI model. You'll also learn how routers use routing tables to direct IP packets, find the best route to a desti... 

  • Prepare your networks for the Daylight Saving Time (DST) shift

    The Daylight Saving Time shift on March 11 will require preparation to keep your networks running smoothly. Are you ready? In this tip, Tom Lancaster reminds you how Daylight Saving Time works and explains how to re-configure your Cisco routers and s... 

  • Routing: Five common, easily avoided errors

    Router configuration errors don't have to take down your network. Learn five common routing mistakes -- and how to avoid them -- in this tip. 

  • Router Expert: Building a WLAN proxy server, implementing ASR

    Using application service redirection (ASR) in the wireless LAN environment provides guest users enough information to be able to get access without the need for direct support. 

  • Router Expert: Building a WLAN proxy server, implementing WPAD

    Router expert Michael Martin continues his discussion of building a WLAN proxy server by explaining how to implement Web Proxy Auto Discovery Protocol (WPAD), which will allow guest users to automatically discover the wireless network. 

  • Measuring network hardware utilization

    Monitoring your network goes beyond just keeping tabs on your servers. You also need to monitor your hardware, such as routers and switches, to tell not only that these types of devices are functional, but also that they are not being saturated by ex... 

  • Network cabling documentation

    Network cabling documentation with dedicated documenation software can keep your cables from becoming a big mess. 

  • Troubleshoot networks with the pathping command

    You can troubleshoot networks with the pathping command, which works like a combination of ping and tracert.