-
WLAN usage monitoring
In this tip, Lisa Phifer demonstrates how to monitor 802.11 network usage for accounting, capacity planning, and compliance reporting by combining traditional network and session monitoring techniq...
-
TCPdump: Qualify traffic and create a traffic collectio
In this excerpt from The router is the firewall, part 3 -- Configuring CBAC, router expert Michael J. Martin explains how to use the popular open source tool TCPdump to audit network traffic.
-
A router by any other name is still a router
While many articles discuss what makes a switch a switch and a router a router, this article focuses on delineating the characteristics between enterprise and home devices.
-
Prevent network spoofing
Network spoofing occurs when the attacker forges the source or destination address in the IP header, ultimately causing a Denial of Service. In this tip, security expert Michael Gregg explains how ...
-
New wireless products and standards
New products and standards will help boost wireless security.
-
Network security 1-2-3
Network security is more than just firewall protection. This tip offers the basics on services and strategies for securing networks on a small budget.
-
Nessus: Vulnerability scanning in the enterprise
General advice for building an enterprise scanning program with the open source vulnerability scanner Nessus.
-
Wireless networks are watching you
Location-based technology promises great boons for business and the public good -- but some consumers are still concerned about it infringing on their privacy.
-
Managing Nessus reports
Vulnerability scanning with Nessus can produce mountains of data. Learn three tips for getting the most out of the open source vulnerability scanner and managing the data produced by this valuable ...
-
Getting started with Nessus
Nessus, an open source vulnerability scanner, can scan a network for potential security risks and provide detailed reporting that enables you to remediate gaps in your corporation's security postur...
-
WLAN security tools: Buyers' guide for SMBs
Wireless LAN security is critical for small and midsized businesses, which are often the target of unauthorized access attempts and denial-of-service attacks.
-
Check IT List: Network appliances for small offices
As the supply and demand for network and security tools increases for small and midsized businesses, so do the options for SMB network appliances. Ed Tittel offers advice for your network setup.
-
Layer 3 switches explained
Layer 3 switches are explained in this tip -- including the difference between a switch, a router and a Layer 3 router.
-
Securing your Layer 2 network: Don't overlook the basic
Before dropping substantial cash on a fancy surveillance system, most sensible home owners would ensure that their doors and windows were locked. Similarly, there are simple security measures you c...
-
What to do when Performance Monitor yields unexpected r
When the Performance Monitor built into Windows behaves in an unexpected manner, admins may have to look closely to find a logical explanation to the problem.
-
Power over Ethernet for network engineers
This introduction to Power over Ethernet (PoE) is directed toward network engineers and discusses how the technology works, its power capabilities and some benefits it provides for the network admi...
-
New security features in Internet Explorer 7
In Internet Explorer 7, Microsoft seems to have addressed many of the security issues that have plagued IE for the last decade. Of course only time will tell if IE 7 is really secure or not, but th...
-
Hack your storage network in the name of increased secu
Information security expert Kevin Beaver discusses security tests you can perform and tools you can use to ethically hack your storage systems and uncover vulnerabilities you might not have discove...
-
Blocking online music access
While letting employees listen to music online may seem like a harmless way to boost morale, streaming audio drains network bandwidth. In this tip, your peers offer advice, tools and tactics you ca...
-
Alleviate network congestion on iSCSI SANs via switch s
Careful configuration of an iSCSI SAN will usually preclude most problems. But if network performance is still slow, there are several adapter and switch settings that can help speed things up and ...
-
Premises- or provider-based network management?
IT expert David Davis outlines the pros and cons of premises- versus provider-based network management.
-
Networking blogs: Reevaluating the optical market
This week, networking bloggers discuss a potential sea change for the optical market, and reveal some key tips for using custom config builders.
-
Data center spaghetti: Trials, tribulations of cabling
Switching out servers at a data center can go from ho-hum to disaster unless you have a tested cable management plan in place.
-
Networking blogs: Wi-Fi Certified 802.11ac is here
In this week's blog roundup, get expert insight on preparing for 802.11ac and solutions to CDN bandwidth issues.
Network Management Strategies for the CIO