Tips

  • IP network design, part 1: Fundamental principles

    A competent network design is the foundation upon which all successful network implementations are built. This is the first of four articles that focus on the design of IP-based networks, due to th...

  • How to use IPsec filtering rules to filter network traf

    Learn how to control what enters and exits your PCs by using IPsec filtering rules to filter particular protocol and port combinations for both inbound and outbound network traffic.

  • Application firewall tips and tricks

    Network firewalls only examine packet information at the transport layer and below. For a more thorough examination of network traffic, organizations can deploy application firewalls, which work at...

  • Network asset management software

    Network asset management software acts as a watchdog and can help save staff time, downtime, and money -- and thwart security disasters before they happen. David Jacobs explains how it can be of se...

  • IOS command shortcut favorites

    Tom Lancaster recommends his favorite keyboard shortcuts for configuring Cisco routers from the command line.

  • Network virtualization -- the next big thing?

    What exactly is network virtualization and what consequence does it have for your network? This week Loki enlightens us -- offering various descriptions and uses for your consideration.

  • Free RSS readers: What you need to know

    Do you RSS? If "Really Simple Syndication" is foreign to you, this tip will bring you up to speed by introducing how the increasingly popular news-feed technology works and how you can use it to ke...

  • OSI: Securing the Stack, Layer 5 -- session hijacking

    To help secure your systems against session hijacking, this tip walks you through the steps hackers use to hijack active sessions and take over your network. You'll also learn how to detect and pre...

  • Cisco switch configuration for DOS applications on Netw

    An ITKnowledge Exchange member had a question about speeding up DOS applications through switch configuration, and fellow techies jumped in on the conversation and helped out. Here is a portion of ...

  • Making sense of Windows routing tables

    When routing packets across a network, things do occasionally go wrong. In these situations, it is helpful to be familiar with the Windows routing tables. Routing tables dictate the flow of packets...

  • Wireless LAN management

    Everyone is either deploying WLAN technology or considering the deployment of the technology. But the need for security and regulatory compliance is driving the need for better WLAN management. Rob...

  • WCCP

    WCCP is a relatively new protocol that allows routers to talk to your cache server. It isn't a routing protocol in the traditional sense, but it may be directing traffic around your network in the ...

  • Guide to intrusion detection and prevention

    This guide covers intrusion detection and prevention.

  • How to stop a rogue user from circumventing network sec

    An end user with "super user" access poses a great danger to your network. In this tip, security practitioners share best practices, tools and tactics to monitor and limit user activity, and offer ...

  • Network security checklist

    While 100% security is hardly a possibility, there are several things that you can do to make your network more secure. Learn about them with this network security checklist.

  • Router numbers

    Many of the routing protocols implemented in Cisco's IOS require a number to follow the command that enables the routing protocol in question. If you're new to routing, these numbers can be a littl...

  • Configuring Windows Server 2003 to act as a NAT router

    Today, IP addresses are quickly becoming a scarce commodity. But a PC must have an IP address in order to communicate with the Internet. So what if there aren't enough IP addresses left for every P...

  • Changes to TCP/IP in Windows Vista

    Microsoft has made some major changes to the way that TCP/IP is implemented in the next version of its operating system, Windows Vista. Learn what they are and what they mean to your network.

  • Testing and planning for new products

    Putting new solutions in place can be a frustrating and costly experience. Following some simple rules can avoid mistakes.

  • Ten quick router security tips

    Network administrators need to know the basics in router security. This quick tip lists10 basic router security tips.