-
How to stop a rogue user from circumventing network sec
An end user with "super user" access poses a great danger to your network. In this tip, security practitioners share best practices, tools and tactics to monitor and limit user activity, and offer ...
-
Guide to intrusion detection and prevention
This guide covers intrusion detection and prevention.
-
Network security checklist
While 100% security is hardly a possibility, there are several things that you can do to make your network more secure. Learn about them with this network security checklist.
-
Router numbers
Many of the routing protocols implemented in Cisco's IOS require a number to follow the command that enables the routing protocol in question. If you're new to routing, these numbers can be a littl...
-
Configuring Windows Server 2003 to act as a NAT router
Today, IP addresses are quickly becoming a scarce commodity. But a PC must have an IP address in order to communicate with the Internet. So what if there aren't enough IP addresses left for every P...
-
Changes to TCP/IP in Windows Vista
Microsoft has made some major changes to the way that TCP/IP is implemented in the next version of its operating system, Windows Vista. Learn what they are and what they mean to your network.
-
Testing and planning for new products
Putting new solutions in place can be a frustrating and costly experience. Following some simple rules can avoid mistakes.
-
Ten quick router security tips
Network administrators need to know the basics in router security. This quick tip lists10 basic router security tips.
-
Wireless LAN security: 802.11i
What is 802.11i, and is it really practical for you to implement in your organization? Robbie Harrell explores how the new wireless standard can improve security -- and reasons why you may want to ...
-
Router Expert: Building VLAN interfaces in Linux and IO
Segmenting a wireless LAN with VLANs can increase security. Find out from our router expert how to support VLAN interfaces in Linux and Cisco IOS.
-
Cisco PIX ASDM installation & troubleshooting
Learn some helpful hints for installing and troubleshooting Cisco's Adaptive Security Device Manager (ASDM) for PIX firewalls in this two-part tip.
-
Cisco PIX ASDM installation & troubleshooting, part 2
In part two of this tip, look at some common problems that arise with ASDM installation.
-
Cache poisoning attacks and how to prevent them
Want something scary to think about? A compromise of your name servers could cut you off from the Internet or redirect your customers to a competitor. It could even shunt sensitive electronic mail ...
-
Remote admin cards
A special card, usually in a PCI form factor, can give you the equivalent of console access via the network -- and help increase security as well.
-
How QoS appliances subdue VoIP bugbears
QoS appliances look deep into packets to counteract delay, jitter and packet loss, improving call quality. David Jacobs explains how in this tip.
-
Router Expert: Building 802.11Q VLANs
Network segmentation can be a great way to increase security. This article covers segmenting with VLANs and the 802.1Q standard.
-
The death of SLAs
The SLA is essentially an empty agreement. Its intention is to assure that an enterprise's critical applications and network-dependent business processes operate optimally. But its nature bears lit...
-
Understanding the differences between IDS and IPS
We all know that the Internet is a haven for cyber criminals who use the connectivity to launch an unprecedented number of attacks against enterprise networks. IDS and IPS have been developed to co...
-
Avoiding open relays
Getting on a spam blacklist can cause an annoying and crippling e-mail outage. One of the keys to staying off blacklists is making sure your e-mail system doesn't turn into an open relay. Tom Lanca...
-
Are Cisco switches still tops?
A recent survey shows more organizations are dissatisfied with the cost and value of Cisco's LAN switches, while a number of competitors may be gaining ground.
-
Troubleshooting network routing issues
Expert Patrick Hubbard shares how you can make your life easier by alleviating some annoying network routing issues.
-
Resource pools for hybrid cloud management
Working with individual applications in hybrid cloud management can be complex, but Quality of Experience can be ensured.
-
What to know about implementing Security as a Service
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability.
-
Enterprise wireless standards: The basics
Glen Kemp discusses the standards and protocols that support enterprise-class wireless deployments and how they differ from consumer configurations.
Network Management Strategies for the CIO