-
Wireless LAN security: 802.11i
What is 802.11i, and is it really practical for you to implement in your organization? Robbie Harrell explores how the new wireless standard can improve security -- and reasons why you may want to ...
-
Router Expert: Building VLAN interfaces in Linux and IO
Segmenting a wireless LAN with VLANs can increase security. Find out from our router expert how to support VLAN interfaces in Linux and Cisco IOS.
-
Cisco PIX ASDM installation & troubleshooting
Learn some helpful hints for installing and troubleshooting Cisco's Adaptive Security Device Manager (ASDM) for PIX firewalls in this two-part tip.
-
Cisco PIX ASDM installation & troubleshooting, part 2
In part two of this tip, look at some common problems that arise with ASDM installation.
-
Cache poisoning attacks and how to prevent them
Want something scary to think about? A compromise of your name servers could cut you off from the Internet or redirect your customers to a competitor. It could even shunt sensitive electronic mail ...
-
Remote admin cards
A special card, usually in a PCI form factor, can give you the equivalent of console access via the network -- and help increase security as well.
-
How QoS appliances subdue VoIP bugbears
QoS appliances look deep into packets to counteract delay, jitter and packet loss, improving call quality. David Jacobs explains how in this tip.
-
Router Expert: Building 802.11Q VLANs
Network segmentation can be a great way to increase security. This article covers segmenting with VLANs and the 802.1Q standard.
-
Understanding the differences between IDS and IPS
We all know that the Internet is a haven for cyber criminals who use the connectivity to launch an unprecedented number of attacks against enterprise networks. IDS and IPS have been developed to co...
-
The death of SLAs
The SLA is essentially an empty agreement. Its intention is to assure that an enterprise's critical applications and network-dependent business processes operate optimally. But its nature bears lit...
-
Avoiding open relays
Getting on a spam blacklist can cause an annoying and crippling e-mail outage. One of the keys to staying off blacklists is making sure your e-mail system doesn't turn into an open relay. Tom Lanca...
-
Are Cisco switches still tops?
A recent survey shows more organizations are dissatisfied with the cost and value of Cisco's LAN switches, while a number of competitors may be gaining ground.
-
The network administrator's guide to forensic first res
The time between discovery of an incident and the handover of digital evidence is critical for the possibility of successful evidence retrieval. Mishandled evidence, whether to be used in court or...
-
Router Expert: Building a WLAN proxy server, IP routing
This tip describes how to configure a multi-interface Linux server so it reaches all of the networks beyond all of its local interfaces by implementing a static kernel IP route table.
-
'Hacking Wireless Networks For Dummies
This chapter download, "Still at War," covers installing and using network discovery and wardriving tools Kismet and Wellenreiter and discusses wardriving countermeasures.
-
VoIP natural fit with text-to-speech information delive
Turning text into sound involves several potential technical hurdles and numerous interesting components. Ed Tittel explains the process in this tip.
-
Max interrupts
If you've been having performance problems with your server, you may be able to ramp up network throughput by taking a deeper look at your driver configuration.
-
Placing systems in a firewall topology
Factors to consider when deciding where to place individual systems in a firewall topology, such as bastion host, screened subnet and multi-homed firewalls.
-
Practical configurations, Part 4
This tip on verification and troubleshooting in networking configuration teaches simple commands that will help not only in making a network run more smoothly, but also in learning how the individu...
-
Network Performance Management
Keeping a close eye on your network performance and throughput is critical. But as your network grows and becomes more complicated, managing it becomes all the more complex.
-
Premises- or provider-based network management?
IT expert David Davis outlines the pros and cons of premises- versus provider-based network management.
-
Networking blogs: Reevaluating the optical market
This week, networking bloggers discuss a potential sea change for the optical market, and reveal some key tips for using custom config builders.
-
Data center spaghetti: Trials, tribulations of cabling
Switching out servers at a data center can go from ho-hum to disaster unless you have a tested cable management plan in place.
-
Networking blogs: Wi-Fi Certified 802.11ac is here
In this week's blog roundup, get expert insight on preparing for 802.11ac and solutions to CDN bandwidth issues.
Network Management Strategies for the CIO