Tips

  • Wireless security -- Defending Wi-Fi clients

    When it comes to wireless security, considerable attention has been paid to encrypting data, authenticating users, restricting access, and detecting rogue access points. As these network and link d...

  • Managing Windows networks using scripts -- The basics

    Learning to use scripts can make the life of a network administrator a lot easier by allowing you to automate daily administration tasks. This tip begins a series on using scripts to manage Windows...

  • Selling network certification: How to talk up your cred

    Network certification has its benefits, but certification alone no longer guarantees employment. In this tip, learn how to justify your credentials' value.

  • Choosing WAN providers: Key questions to ask

    When evaluating carrier services for the WAN, it's imperative to ask some key questions regarding customer service, service-level agreements, global coverage, management and monitoring capabilities...

  • Configure Cisco wireless bridges for point-to-point net

    Point-to-point wireless bridging is ideal for many business networks. In this tip, learn how point-to-point wireless bridging can help you, the pros and cons of using it, and the configuration of t...

  • Cisco interface addressing

    A look at the various commands that can be used to address Cisco router interfaces on the WAN and LAN and when to use each.

  • Repairing network connections

    Learn how the Repair feature works for repairing network connections on Windows platforms in this tip from the WindowsNetworking.com series on TCP/IP troubleshooting.

  • Reduce branch office threats in 10 steps

    Many organizations host business-critical applications in branch offices, but doing so exposes them to many new threats. Here we examine the potential threats to your branch offices and discuss 10 ...

  • OSI: Securing the Stack, Layer 8 -- Social engineering,

    Network security is essential at every layer of the OSI model, including the mythical eighth layer, where users interact with technology. Since hackers can use social engineering to exploit people,...

  • Wireless Internet access -- 3G vs. Wi-Fi

    Most road warriors have just two truly viable alternatives for wireless Internet access: 3G and Wi-Fi. In this tip, Lisa Phifer covers the pros and cons of 3G and Wi-Fi for coverage, convenience, c...

  • Troubleshoot routing tables

    Learn how routing tables work and how to troubleshoot routing problems in Windows-based networks in this tip courtesy of WindowsNetworking.com.

  • Troubleshooting a DHCP server

    Learn how to troubleshoot a DHCP server to discover why it might fail to lease IP addresses and the solutions to those problems in this tip.

  • Understanding wireless antennas

    Upgraded antennas can improve wireless LAN performance, reach and security.

  • Anti-spam protocols help reduce spam

    Spam is not just annoying; it clogs networks and, at worst, can point to larger network security problems. Anti-spam protocols are useful in helping network administrators block spam. This tip cove...

  • How routers work

    Routers are essential to carrying network traffic, but how do they work? In this tip, you'll get perspective on how routing fits into the OSI model. You'll also learn how routers use routing tables...

  • Server and storage virtualization end network managemen

    In the past, system management and network management were separate disciplines. Recent advances in network-wide server and storage virtualization blur the boundaries and require an integrated view...

  • Network summarization -- Supernetting and wildcard mask

    Supernetting allows one routing table entry to represent an aggregation of networks. Network engineers need to understand supernetting, how to read routes received from other providers and how to c...

  • VLANs -- Controlling wired and wireless traffic

    Today, most business networks rely on virtual LANs (VLANs) to partition Ethernets and control the destinations reached by each worker. As users begin to shift between Ethernet and Wi-Fi throughout ...

  • The Tao of automated network management

    Integration of network management tools is the first step toward an automated future and requires a proactive approach with service providers.

  • New gigabit standard

    Last June, the 10GBASE-T standard was published promising 10 Gbit operations on copper cabling. This standard was originally targeted toward data centers, but the Ethernet Alliance and IEEE are wor...