Networking Tips | Page 20

Tips

  • Prepare your networks for the Daylight Saving Time (DST

    The Daylight Saving Time shift on March 11 will require preparation to keep your networks running smoothly. Are you ready? In this tip, Tom Lancaster reminds you how Daylight Saving Time works and ...

  • TCP/IP troubleshooting: A structured approach -- Introd

    This tip from WindowsNetworking.com describes a structured approach for troubleshooting connectivity problems with TCP/IP networks. This is the first of a series of articles on TCP/IP troubleshooting

  • Cisco wireless access point configuration from scratch

    Learn what the Cisco 1242 wireless access point can do for you and how to configure one from scratch. This tip covers basic security settings, enabling the wireless radios, and how to make a succes...

  • Vista's Network Diagnostics Framework: Good idea, less-

    Connectivity problems frustrate both users and help desk staff. In order to help expedite the diagnostic and repair process, Microsoft has created a new component called the Network Diagnostics Fra...

  • WLAN test tools, expertise, turn theoretical network in

    Specialized WLAN testing tools are needed to deploy and maintain an IEEE 802.11 wireless network.

  • OSI: Securing the Stack, Layer 6 -- Encryption

    SSL or TLS encryption takes place at the presentation layer, Layer 6 of the OSI model. In this tip, learn why encryption is so important and how certain hacker attacks can still circumvent SSL or T...

  • Content filtering -- Taming the wild Web

    Delivering safe, fast, transparent Web access that meets workforce needs has never been more challenging. Nearly four out of five FBI-surveyed companies report that employees abuse Internet privile...

  • Certifications for networking professionals

    Networking certification is an important part of a networking career, as discussed in this tip on four certifications for networking professionals. Despite ups and downs in the economy, the job mar...

  • Network visualization, automation: At odds?

    Visualization is a powerful tool. But in the context of network management, the prevalence of graphs may indicate that your network management system (NMS) is not ready to meet the requirements of ...

  • Five common routing errors you can avoid

    Router configuration errors don't have to take down your network. Learn five common routing mistakes -- and how to avoid them -- in this tip.

  • Router Expert: Building a WLAN proxy server, implementi

    Using application service redirection (ASR) in the wireless LAN environment provides guest users enough information to be able to get access without the need for direct support.

  • IP addressing

    Learn about IP addresses with this tutorial.

  • IEEE 802.11n: Research carefully before deploying

    Before deploying the IEEE 802.11n wireless standard, consider how the new Wi-Fi technology will affect your entire network.

  • IEEE 802.11n: Looking ahead to the next wireless standa

    The upcoming IEEE 802.11n wireless standard will enable high-bandwidth applications such as streaming video to coexist with wireless VoIP. This tip is the first of two that describe the 802.11n wir...

  • Router Expert: Building a WLAN proxy server, implementi

    Router expert Michael Martin continues his discussion of building a WLAN proxy server by explaining how to implement Web Proxy Auto Discovery Protocol (WPAD), which will allow guest users to automa...

  • Seeing through transparency claims

    WAN acceleration and optimization techniques require communication between devices for consistent, reliable compression and decompression of data packets. In this tip, learn the pros and cons of he...

  • Cisco WLAN design best practices

    Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing ...

  • Phishers and spambots -- appliances that fight back

    Most email security appliances are designed to deflect unsolicited inbound SMTP traffic. In this edition of our Security Spotlight Lisa Phifer examines the benefits of deploying an email security a...

  • Introduction to IDS and IPCop

    This article, excerpted from the book "Configuring IPCop Firewalls: Closing Borders with Open Source," explores how intrusion detection systems (IDS) and intrusion prevention systems (IPS) includin...

  • WAN acceleration scalability: Part 3

    As WAN acceleration becomes more critical to business operations, the average size and scope of deployment is steadily increasing. In this tip, we wrap up our series on considerations for scaling a...