Networking Tips | Page 21


  • Cisco IOS IP routing: Static routes

    Whether you are a network engineer or a student preparing for Cisco certification, it's important to understand how routers work. In this series on Cisco IOS IP routing, David Davis explains the di...

  • Wireless connections with ad hoc networks

    Ad hoc wireless networking in Windows Vista with the IPv6 protocol has its risks, but it also has several built-in security mechanisms. In this tip, Brien Posey explains how these security features...

  • Calculate a subnet mask using the subnet's formula

    IP addressing and subnetting are an important part of networks. Learn how the subnet's formula works and why it's important to know how to calculate the subnet mask "longhand."

  • Stop dropped connections

    What happens when you try implementing wireless 802.11g in a place with no open spaces? You probably get unreliable service. Lisa Phifer takes the mystery out of dropped connections in this tip.

  • Security Spotlight: SSL VPN appliances simplify secure

    By leveraging the ubiquitous Web browser as a client platform, SSL VPN appliances represent a promising alternative for delivering simple-but-secure off-site access to private business services and...

  • IP addressing and subnetting: Calculate a subnet mask u

    IP addressing and subnetting are an important if basic part of networks. Network administators will learn how to calculate a subnet mask using the host's formula.

  • Performance management -- making it relevant

    Network engineers struggle with data overload. So much so that it's impossible to analyze the avalanche of available network data to provide meaningful information for business management. In this ...

  • Better management = increased value

    As our networks become more complex and network traffic continues to increase, network professionals need comprehensive data analytics, management and reporting skills. This column explores three c...

  • OSI: Securing the Stack, Layer 3 -- The role of ICMP

    Michael Gregg examines the security vulnerabilities of Internet Control Message Protocol (ICMP) and how to help secure OSI Layer 3, the network layer.

  • Network test plan: Checklist for architecture changes

    For every change you make to your network architecture, you should have a test plan and a backout plan. In this tip, learn how to build a test plan and review a sample checklist of things to include.

  • WAN acceleration scalability: Part 2

    Dr. David Hughes continues his discussion of the top considerations for scaling a WAN acceleration appliance. Here are numbers three through six: performance under load, hardware acceleration for e...

  • Building a WLAN proxy server, DHCP services: Part 2

    Router expert Michael Martin continues his discussion of building a WLAN proxy server and implementing the dhcpd.conf file. In this tip, he provides a second dhcpd.conf example that shows both the ...

  • Network Behavior Analysis goes long and wide

    Need to bulk up your network's backcourt defense? Network Behavior Analysis (NBA) is a new approach to network security that passively monitors your traffic patterns to prevent zero-day exploits, w...

  • Measuring network hardware utilization

    Monitoring your network goes beyond just keeping tabs on your servers. You also need to monitor your hardware, such as routers and switches, to tell not only that these types of devices are functio...

  • Building a WLAN proxy server, DHCP services

    Router expert Michael Martin discusses DHCP implementation options and provides sample configurations to support various SSID network models in this continuation of his series on building a WLAN pr...

  • Staging labs for network engineering

    Making changes to your network is less scary with adequate planning and staging, and go even more smoothly if you have a staging lab. In this tip, Tom Lancaster explains how and why such labs can b...

  • IP addressing and subnetting: What network administrato

    IP addressing and subnetting are an important part of networks. Learn about how IP addresses work, subnet masks, classful vs. classless IP addresses, default gateways and more.

  • Network cabling documentation

    Network cabling documentation with dedicated documenation software can keep your cables from becoming a big mess.

  • Convincing management to approve your networking projec

    Network pros must have great technology know-how, coupled with major league pitching abilities. This list of project dos and don'ts can help you over your managers.

  • OSI: Securing the stack, Layer 2

    Security expert Michael Gregg continues his layer-by-layer discussion of OSI model network security with this tip on the vulnerabilities present in Layer 2, the Data Link Layer, and specifically ad...