Tips

  • How to stop a rogue user from circumventing network sec

    An end user with "super user" access poses a great danger to your network. In this tip, security practitioners share best practices, tools and tactics to monitor and limit user activity, and offer ...

  • Guide to intrusion detection and prevention

    This guide covers intrusion detection and prevention.

  • Network security checklist

    While 100% security is hardly a possibility, there are several things that you can do to make your network more secure. Learn about them with this network security checklist.

  • Router numbers

    Many of the routing protocols implemented in Cisco's IOS require a number to follow the command that enables the routing protocol in question. If you're new to routing, these numbers can be a littl...

  • Configuring Windows Server 2003 to act as a NAT router

    Today, IP addresses are quickly becoming a scarce commodity. But a PC must have an IP address in order to communicate with the Internet. So what if there aren't enough IP addresses left for every P...

  • Changes to TCP/IP in Windows Vista

    Microsoft has made some major changes to the way that TCP/IP is implemented in the next version of its operating system, Windows Vista. Learn what they are and what they mean to your network.

  • Testing and planning for new products

    Putting new solutions in place can be a frustrating and costly experience. Following some simple rules can avoid mistakes.

  • Ten quick router security tips

    Network administrators need to know the basics in router security. This quick tip lists10 basic router security tips.

  • Wireless LAN security: 802.11i

    What is 802.11i, and is it really practical for you to implement in your organization? Robbie Harrell explores how the new wireless standard can improve security -- and reasons why you may want to ...

  • Router Expert: Building VLAN interfaces in Linux and IO

    Segmenting a wireless LAN with VLANs can increase security. Find out from our router expert how to support VLAN interfaces in Linux and Cisco IOS.

  • Cisco PIX ASDM installation & troubleshooting

    Learn some helpful hints for installing and troubleshooting Cisco's Adaptive Security Device Manager (ASDM) for PIX firewalls in this two-part tip.

  • Cisco PIX ASDM installation & troubleshooting, part 2

    In part two of this tip, look at some common problems that arise with ASDM installation.

  • Cache poisoning attacks and how to prevent them

    Want something scary to think about? A compromise of your name servers could cut you off from the Internet or redirect your customers to a competitor. It could even shunt sensitive electronic mail ...

  • Remote admin cards

    A special card, usually in a PCI form factor, can give you the equivalent of console access via the network -- and help increase security as well.

  • How QoS appliances subdue VoIP bugbears

    QoS appliances look deep into packets to counteract delay, jitter and packet loss, improving call quality. David Jacobs explains how in this tip.

  • Router Expert: Building 802.11Q VLANs

    Network segmentation can be a great way to increase security. This article covers segmenting with VLANs and the 802.1Q standard.

  • The death of SLAs

    The SLA is essentially an empty agreement. Its intention is to assure that an enterprise's critical applications and network-dependent business processes operate optimally. But its nature bears lit...

  • Understanding the differences between IDS and IPS

    We all know that the Internet is a haven for cyber criminals who use the connectivity to launch an unprecedented number of attacks against enterprise networks. IDS and IPS have been developed to co...

  • Avoiding open relays

    Getting on a spam blacklist can cause an annoying and crippling e-mail outage. One of the keys to staying off blacklists is making sure your e-mail system doesn't turn into an open relay. Tom Lanca...

  • Are Cisco switches still tops?

    A recent survey shows more organizations are dissatisfied with the cost and value of Cisco's LAN switches, while a number of competitors may be gaining ground.