-
Planning ahead for gigabit wireless LAN migration
In the era of gigabit wireless LAN migration, it is important to recognize key details of this kind of investment, and be prepared for 802.11ac and 802.11ad standards.
-
Gigabit wireless LAN basics: 802.11ac and 802.11ad
Just when enterprises are getting comfortable with 802.11n technology, enter gigabit wireless LAN standards 802.11ad and 802.11ac, which could produce draft products in a year.
-
Controlling embedded Wi-Fi device access to the WLAN
Enterprise IT shops are finding themselves using WPA2-Personal and other authentication methods to manage embedded Wi-Fi devices on the WLAN.
-
What you need for WLAN access control
Wireless LAN access control may not be as simple as 802.1X authentication. Network managers will have to shoot for policy creation, device fingerprinting and network integration.
-
Firewalls for virtualization: Hatching a plan
Creating a virtualization firewall strategy entails determining exactly how you want to protect your virtual environments and then implementing firewall segmentation for security.
-
Do virtual network appliances measure up?
There's lots of talk about network virtualization benefits, but are virtual network appliances all they're cracked up to be? Only in some scenarios.
-
Migrating to 10 GbE enables data and storage network co
Migrating your data center to 10 Gigabit Ethernet (10 GbE) enables higher available bandwidth with fewer ports to manage, and lends itself to data and storage network convergence -- both of which ...
-
How to secure an enterprise guest wireless network
If you're implementing an enterprise-class wireless guest network, tighter security is crucial. A guest wireless LAN must support better visibility and user control.
-
Ending human error in firewall configuration and change
Firewall change management can enable firewall management automation so that human errors will be less likely to destroy performance and network admins will know the status of their firewall config...
-
Networking for live VM migration: Watch the pitfalls!
Live migration networking poses all sorts of challenges, including the potential need for long-distance data center bridging that results in traffic trombones. When it comes to server virtualizatio...
-
How to ensure WLAN performance optimization
To ensure wireless LAN performance optimization, you’ll need to implement new WLAN measurement and testing tools and conduct WLAN performance testing periodically even after network implementation.
-
Do Web application firewalls complicate enterprise secu
Using Web application firewalls should only be one slice of your overall enterprise network security strategy. Even then, users must be aware that application firewalls can leave behind vulnerabili...
-
Application monitoring: How to see the whole network
Application performance monitoring tools must provide visibility to everything from storage I/O to remote end-user access and a whole lot in between. Here’s what your monitoring tools should show.
-
Four tips to end-to-end application monitoring
Network application performance monitoring inevitably leads to the use of multiple monitoring tools at once. That doesn’t have to be a management nightmare.
-
WLAN troubleshooting: Get proactive!
Wireless LAN troubleshooting and WLAN diagnostics can be done proactively with a new set of tools, including WLAN managers and distributed sensor platforms that track and problem solve on complex n...
-
Integrating public and private clouds
Network managers must support integrated public and private cloud services because users will go under the radar to use public cloud services that help them get their work done more easily.
-
WLAN testing: Using WIPS and centralized testing tools
WLAN testing has grown to accommodate the full-time surveillance necessary for super-speed 802.11n technology and mobile applications. Now WLAN testing can be done with AP-based wireless intrusion ...
-
Application-layer firewalls: Protection up the stack
Application-layer firewalls must be combined with lower-level network security firewalls in order to implement a network firewall strategy that defends against low-level attacks as well as applicat...
-
Building a private cloud?
If you're learning how to build a private cloud, it's best to begin slowly. In this tip, learn the phases to building a private cloud, including implementing server and storage virtualization, as w...
-
Core network services get dynamic for virtualization
Without dynamic core network services, virtualization will be stalled. Dynamic DNS and DHCP, as well as IPAM, are necessary to manage the constantly changing addresses and configuration in a virtua...
-
Troubleshooting network routing issues
Expert Patrick Hubbard shares how you can make your life easier by alleviating some annoying network routing issues.
-
Resource pools for hybrid cloud management
Working with individual applications in hybrid cloud management can be complex, but Quality of Experience can be ensured.
-
What to know about implementing Security as a Service
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability.
-
Enterprise wireless standards: The basics
Glen Kemp discusses the standards and protocols that support enterprise-class wireless deployments and how they differ from consumer configurations.
Network Management Strategies for the CIO