-
Certifications for networking professionals
Networking certification is an important part of a networking career, as discussed in this tip on four certifications for networking professionals. Despite ups and downs in the economy, the job mar...
-
Network visualization, automation: At odds?
Visualization is a powerful tool. But in the context of network management, the prevalence of graphs may indicate that your network management system (NMS) is not ready to meet the requirements of ...
-
Five common routing errors you can avoid
Router configuration errors don't have to take down your network. Learn five common routing mistakes -- and how to avoid them -- in this tip.
-
IP addressing
Learn about IP addresses with this tutorial.
-
Router Expert: Building a WLAN proxy server, implementi
Using application service redirection (ASR) in the wireless LAN environment provides guest users enough information to be able to get access without the need for direct support.
-
IEEE 802.11n: Looking ahead to the next wireless standa
The upcoming IEEE 802.11n wireless standard will enable high-bandwidth applications such as streaming video to coexist with wireless VoIP. This tip is the first of two that describe the 802.11n wir...
-
IEEE 802.11n: Research carefully before deploying
Before deploying the IEEE 802.11n wireless standard, consider how the new Wi-Fi technology will affect your entire network.
-
Router Expert: Building a WLAN proxy server, implementi
Router expert Michael Martin continues his discussion of building a WLAN proxy server by explaining how to implement Web Proxy Auto Discovery Protocol (WPAD), which will allow guest users to automa...
-
Seeing through transparency claims
WAN acceleration and optimization techniques require communication between devices for consistent, reliable compression and decompression of data packets. In this tip, learn the pros and cons of he...
-
Cisco WLAN design best practices
Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing ...
-
Phishers and spambots -- appliances that fight back
Most email security appliances are designed to deflect unsolicited inbound SMTP traffic. In this edition of our Security Spotlight Lisa Phifer examines the benefits of deploying an email security a...
-
Introduction to IDS and IPCop
This article, excerpted from the book "Configuring IPCop Firewalls: Closing Borders with Open Source," explores how intrusion detection systems (IDS) and intrusion prevention systems (IPS) includin...
-
WAN acceleration scalability: Part 3
As WAN acceleration becomes more critical to business operations, the average size and scope of deployment is steadily increasing. In this tip, we wrap up our series on considerations for scaling a...
-
Cisco IOS IP routing -- dynamic routing
Dynamic routing is an essential part of Cisco IOS IP network routing. In this tip, David Davis explains how dynamic routing works, discusses the most important routing protocols -- OSPF, EIGRP, RIP...
-
OSI: Securing the Stack, Layer 4 -- Fingerprinting
At Layer 4 of the OSI model, the transport layer, a major security threat is fingerprinting. Learn how active and passive fingerprinting can endanger your network -- and what you can do to prevent ...
-
LAN administration guide
LAN administration is an arduous task and your responsibilities often involve many different aspects and may include many tasks. This guide will help you with each step and task.
-
Cisco IOS IP routing: Static routes
Whether you are a network engineer or a student preparing for Cisco certification, it's important to understand how routers work. In this series on Cisco IOS IP routing, David Davis explains the di...
-
Wireless connections with ad hoc networks
Ad hoc wireless networking in Windows Vista with the IPv6 protocol has its risks, but it also has several built-in security mechanisms. In this tip, Brien Posey explains how these security features...
-
Calculate a subnet mask using the subnet's formula
IP addressing and subnetting are an important part of networks. Learn how the subnet's formula works and why it's important to know how to calculate the subnet mask "longhand."
-
Security Spotlight: SSL VPN appliances simplify secure
By leveraging the ubiquitous Web browser as a client platform, SSL VPN appliances represent a promising alternative for delivering simple-but-secure off-site access to private business services and...
-
Troubleshooting network routing issues
Expert Patrick Hubbard shares how you can make your life easier by alleviating some annoying network routing issues.
-
Resource pools for hybrid cloud management
Working with individual applications in hybrid cloud management can be complex, but Quality of Experience can be ensured.
-
What to know about implementing Security as a Service
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability.
-
Enterprise wireless standards: The basics
Glen Kemp discusses the standards and protocols that support enterprise-class wireless deployments and how they differ from consumer configurations.
Network Management Strategies for the CIO