Tips

  • Gigabit wireless LAN basics: 802.11ac and 802.11ad

    Just when enterprises are getting comfortable with 802.11n technology, enter gigabit wireless LAN standards 802.11ad and 802.11ac, which could produce draft products in a year.

  • Controlling embedded Wi-Fi device access to the WLAN

    Enterprise IT shops are finding themselves using WPA2-Personal and other authentication methods to manage embedded Wi-Fi devices on the WLAN.

  • What you need for WLAN access control

    Wireless LAN access control may not be as simple as 802.1X authentication. Network managers will have to shoot for policy creation, device fingerprinting and network integration.

  • Firewalls for virtualization: Hatching a plan

    Creating a virtualization firewall strategy entails determining exactly how you want to protect your virtual environments and then implementing firewall segmentation for security.

  • Migrating to 10 GbE enables data and storage network co

    Migrating your data center to 10 Gigabit Ethernet (10 GbE) enables higher available bandwidth with fewer ports to manage, and lends itself to data and storage network convergence -- both of which ...

  • Do virtual network appliances measure up?

    There's lots of talk about network virtualization benefits, but are virtual network appliances all they're cracked up to be? Only in some scenarios.

  • How to secure an enterprise guest wireless network

    If you're implementing an enterprise-class wireless guest network, tighter security is crucial. A guest wireless LAN must support better visibility and user control.

  • Ending human error in firewall configuration and change

    Firewall change management can enable firewall management automation so that human errors will be less likely to destroy performance and network admins will know the status of their firewall config...

  • Networking for live VM migration: Watch the pitfalls!

    Live migration networking poses all sorts of challenges, including the potential need for long-distance data center bridging that results in traffic trombones. When it comes to server virtualizatio...

  • How to ensure WLAN performance optimization

    To ensure wireless LAN performance optimization, you’ll need to implement new WLAN measurement and testing tools and conduct WLAN performance testing periodically even after network implementation.

  • Do Web application firewalls complicate enterprise secu

    Using Web application firewalls should only be one slice of your overall enterprise network security strategy. Even then, users must be aware that application firewalls can leave behind vulnerabili...

  • Application monitoring: How to see the whole network

    Application performance monitoring tools must provide visibility to everything from storage I/O to remote end-user access and a whole lot in between. Here’s what your monitoring tools should show.

  • Four tips to end-to-end application monitoring

    Network application performance monitoring inevitably leads to the use of multiple monitoring tools at once. That doesn’t have to be a management nightmare.

  • WLAN troubleshooting: Get proactive!

    Wireless LAN troubleshooting and WLAN diagnostics can be done proactively with a new set of tools, including WLAN managers and distributed sensor platforms that track and problem solve on complex n...

  • Integrating public and private clouds

    Network managers must support integrated public and private cloud services because users will go under the radar to use public cloud services that help them get their work done more easily.

  • WLAN testing: Using WIPS and centralized testing tools

    WLAN testing has grown to accommodate the full-time surveillance necessary for super-speed 802.11n technology and mobile applications. Now WLAN testing can be done with AP-based wireless intrusion ...

  • Application-layer firewalls: Protection up the stack

    Application-layer firewalls must be combined with lower-level network security firewalls in order to implement a network firewall strategy that defends against low-level attacks as well as applicat...

  • Building a private cloud?

    If you're learning how to build a private cloud, it's best to begin slowly. In this tip, learn the phases to building a private cloud, including implementing server and storage virtualization, as w...

  • Core network services get dynamic for virtualization

    Without dynamic core network services, virtualization will be stalled. Dynamic DNS and DHCP, as well as IPAM, are necessary to manage the constantly changing addresses and configuration in a virtua...

  • Using virtual appliances and desktop virtualization

    IT organizations are implementing desktop virtualization and virtual appliances for virtual WAN optimization and virtual application delivery, but there are challenges to overcome along the way.