Tips

  • IEEE 802.11n: Looking ahead to the next wireless standa

    The upcoming IEEE 802.11n wireless standard will enable high-bandwidth applications such as streaming video to coexist with wireless VoIP. This tip is the first of two that describe the 802.11n wir...

  • IEEE 802.11n: Research carefully before deploying

    Before deploying the IEEE 802.11n wireless standard, consider how the new Wi-Fi technology will affect your entire network.

  • Router Expert: Building a WLAN proxy server, implementi

    Router expert Michael Martin continues his discussion of building a WLAN proxy server by explaining how to implement Web Proxy Auto Discovery Protocol (WPAD), which will allow guest users to automa...

  • Seeing through transparency claims

    WAN acceleration and optimization techniques require communication between devices for consistent, reliable compression and decompression of data packets. In this tip, learn the pros and cons of he...

  • Cisco WLAN design best practices

    Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing ...

  • Phishers and spambots -- appliances that fight back

    Most email security appliances are designed to deflect unsolicited inbound SMTP traffic. In this edition of our Security Spotlight Lisa Phifer examines the benefits of deploying an email security a...

  • Introduction to IDS and IPCop

    This article, excerpted from the book "Configuring IPCop Firewalls: Closing Borders with Open Source," explores how intrusion detection systems (IDS) and intrusion prevention systems (IPS) includin...

  • WAN acceleration scalability: Part 3

    As WAN acceleration becomes more critical to business operations, the average size and scope of deployment is steadily increasing. In this tip, we wrap up our series on considerations for scaling a...

  • Cisco IOS IP routing -- dynamic routing

    Dynamic routing is an essential part of Cisco IOS IP network routing. In this tip, David Davis explains how dynamic routing works, discusses the most important routing protocols -- OSPF, EIGRP, RIP...

  • OSI: Securing the Stack, Layer 4 -- Fingerprinting

    At Layer 4 of the OSI model, the transport layer, a major security threat is fingerprinting. Learn how active and passive fingerprinting can endanger your network -- and what you can do to prevent ...

  • LAN administration guide

    LAN administration is an arduous task and your responsibilities often involve many different aspects and may include many tasks. This guide will help you with each step and task.

  • Cisco IOS IP routing: Static routes

    Whether you are a network engineer or a student preparing for Cisco certification, it's important to understand how routers work. In this series on Cisco IOS IP routing, David Davis explains the di...

  • Wireless connections with ad hoc networks

    Ad hoc wireless networking in Windows Vista with the IPv6 protocol has its risks, but it also has several built-in security mechanisms. In this tip, Brien Posey explains how these security features...

  • Calculate a subnet mask using the subnet's formula

    IP addressing and subnetting are an important part of networks. Learn how the subnet's formula works and why it's important to know how to calculate the subnet mask "longhand."

  • Security Spotlight: SSL VPN appliances simplify secure

    By leveraging the ubiquitous Web browser as a client platform, SSL VPN appliances represent a promising alternative for delivering simple-but-secure off-site access to private business services and...

  • Stop dropped connections

    What happens when you try implementing wireless 802.11g in a place with no open spaces? You probably get unreliable service. Lisa Phifer takes the mystery out of dropped connections in this tip.

  • IP addressing and subnetting: Calculate a subnet mask u

    IP addressing and subnetting are an important if basic part of networks. Network administators will learn how to calculate a subnet mask using the host's formula.

  • Better management = increased value

    As our networks become more complex and network traffic continues to increase, network professionals need comprehensive data analytics, management and reporting skills. This column explores three c...

  • Performance management -- making it relevant

    Network engineers struggle with data overload. So much so that it's impossible to analyze the avalanche of available network data to provide meaningful information for business management. In this ...

  • OSI: Securing the Stack, Layer 3 -- The role of ICMP

    Michael Gregg examines the security vulnerabilities of Internet Control Message Protocol (ICMP) and how to help secure OSI Layer 3, the network layer.