Tips

  • Introduction to IDS and IPCop

    This article, excerpted from the book "Configuring IPCop Firewalls: Closing Borders with Open Source," explores how intrusion detection systems (IDS) and intrusion prevention systems (IPS) includin...

  • WAN acceleration scalability: Part 3

    As WAN acceleration becomes more critical to business operations, the average size and scope of deployment is steadily increasing. In this tip, we wrap up our series on considerations for scaling a...

  • Cisco IOS IP routing -- dynamic routing

    Dynamic routing is an essential part of Cisco IOS IP network routing. In this tip, David Davis explains how dynamic routing works, discusses the most important routing protocols -- OSPF, EIGRP, RIP...

  • OSI: Securing the Stack, Layer 4 -- Fingerprinting

    At Layer 4 of the OSI model, the transport layer, a major security threat is fingerprinting. Learn how active and passive fingerprinting can endanger your network -- and what you can do to prevent ...

  • LAN administration guide

    LAN administration is an arduous task and your responsibilities often involve many different aspects and may include many tasks. This guide will help you with each step and task.

  • Wireless connections with ad hoc networks

    Ad hoc wireless networking in Windows Vista with the IPv6 protocol has its risks, but it also has several built-in security mechanisms. In this tip, Brien Posey explains how these security features...

  • Cisco IOS IP routing: Static routes

    Whether you are a network engineer or a student preparing for Cisco certification, it's important to understand how routers work. In this series on Cisco IOS IP routing, David Davis explains the di...

  • Calculate a subnet mask using the subnet's formula

    IP addressing and subnetting are an important part of networks. Learn how the subnet's formula works and why it's important to know how to calculate the subnet mask "longhand."

  • Stop dropped connections

    What happens when you try implementing wireless 802.11g in a place with no open spaces? You probably get unreliable service. Lisa Phifer takes the mystery out of dropped connections in this tip.

  • Security Spotlight: SSL VPN appliances simplify secure

    By leveraging the ubiquitous Web browser as a client platform, SSL VPN appliances represent a promising alternative for delivering simple-but-secure off-site access to private business services and...

  • IP addressing and subnetting: Calculate a subnet mask u

    IP addressing and subnetting are an important if basic part of networks. Network administators will learn how to calculate a subnet mask using the host's formula.

  • Performance management -- making it relevant

    Network engineers struggle with data overload. So much so that it's impossible to analyze the avalanche of available network data to provide meaningful information for business management. In this ...

  • Better management = increased value

    As our networks become more complex and network traffic continues to increase, network professionals need comprehensive data analytics, management and reporting skills. This column explores three c...

  • OSI: Securing the Stack, Layer 3 -- The role of ICMP

    Michael Gregg examines the security vulnerabilities of Internet Control Message Protocol (ICMP) and how to help secure OSI Layer 3, the network layer.

  • Network test plan: Checklist for architecture changes

    For every change you make to your network architecture, you should have a test plan and a backout plan. In this tip, learn how to build a test plan and review a sample checklist of things to include.

  • WAN acceleration scalability: Part 2

    Dr. David Hughes continues his discussion of the top considerations for scaling a WAN acceleration appliance. Here are numbers three through six: performance under load, hardware acceleration for e...

  • Building a WLAN proxy server, DHCP services: Part 2

    Router expert Michael Martin continues his discussion of building a WLAN proxy server and implementing the dhcpd.conf file. In this tip, he provides a second dhcpd.conf example that shows both the ...

  • Network Behavior Analysis goes long and wide

    Need to bulk up your network's backcourt defense? Network Behavior Analysis (NBA) is a new approach to network security that passively monitors your traffic patterns to prevent zero-day exploits, w...

  • Measuring network hardware utilization

    Monitoring your network goes beyond just keeping tabs on your servers. You also need to monitor your hardware, such as routers and switches, to tell not only that these types of devices are functio...

  • Building a WLAN proxy server, DHCP services

    Router expert Michael Martin discusses DHCP implementation options and provides sample configurations to support various SSID network models in this continuation of his series on building a WLAN pr...