Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
Understanding business service management
Business service management (BSM), a method of linking critical business services to the supporting IT services and infrastructure. Continue Reading
Top 10 things to know about network administration
A list of the most important things network administrators should know. Continue Reading
Do multiple APs on the same channel cause wireless cards to jump between them?
-
Test your network with Qcheck
A short review of a free network testing tool called Qcheck. Continue Reading
Router Expert: Understanding reverse telnet and IOS terminal lines
Learn how users interact with the terminal server and its connected devices through the use of reverse telnet, line and group rotaries, and terminal line interfaces. Continue Reading
Why does my server automatically shutdown?
What's the difference between WPA and 802.11i?
When I use the Microsoft Windows VPN Client, what kind of VPN tunnel is created?
How do I block a MAC address?
Is VPN from wireless or WPA/WEP more secure?
-
Which networking courses, such as MCSE, CCNA, etc., are best to learn the basics?
Detecting duplex mismatches
How to detect and solve one of the more annoying performance issues on an Ethernet network.Continue Reading
Could you explain the characteristics and principles of operation of a Layer 3 switch?
Layer 3 switch principles and operation are covered.Continue Reading
How can I connect to my VPN to access Outlook and stay away from Webmail?
What is involved in a network audit?
Deploying both a private and public WLAN
Lisa Phifer answers a reader's request for information about planning and deploying a wireless LAN -- one private and one public.Continue Reading
WAN compression
How WAN compression can help maximize bandwidth.Continue Reading
OSI layers are layers of server software or server hardware?
Why do we get CAT6 Return Loss failures when the cable is installed in floor boxes that show signs o
Bandwidth 101
Straight forward explanation of bandwidth measurementContinue Reading
When a user is unable to access certain Web pages, what is the first thing I should do to try to loc
What are the minimum and maximum sizes of an ICMP packet?
Why is it useful to use both a physical and a logical network design?
Network development planning
Which Layer 2 switching functions increase available bandwidth?
What is the difference between an error and a bug?
TCP/IP headers
MPLS migration - Planning in advance
A look at early considerations when you are planning a MPLS VPN migration.Continue Reading
Identifying IP addresses
Some methods for identifying IP addresses on various systems.Continue Reading
How to setup Reverse Telnet
A detailed procedure for setting up reverse Telnet.Continue Reading
Monitor your traffic with MRTG
The Multi Router Traffic Grapher is a free tool that can help you monitor the traffic on your network. Learn more here.Continue Reading
WLAN implementation tutorial -- Capacity planning: Step 1
For WLAN implementation, make sure you have Step 1 down -- capacity planning, not just coverage.Continue Reading
How can we increase our VPN connection speed?
We recently purchased a new software R&D system to allow our offices in New Jersey and Canada to link up. In order to secure the data we setup VPN's for every computer connecting to the server at the main office. Everyone who connects using a VPN ...Continue Reading
What is maximum distance to a hub or any device and what are the maximum PCs for a network?
When should I use 802.11a versus 802.11g?
L2 VPNs
A short overview of Layer 2 VPNs and some of their draft standards.Continue Reading
Chassis or stackable?
The age old networking quandary receives another look in this tip that analyses the features of the chassis design.Continue Reading
The Network Life Cycle
Each phase of the NLC has its own requirements that can typically be met with a judicious selection of tools and assessment solutions.Continue Reading
Forensic analysis, the CSI of security
Forensics can give an organization a unique perspective on where breaches are taking place and how they are occurring, as well as how to prevent them.Continue Reading
Router Expert: Implementing router interface redundancy
While redundancy is simple as a concept, it becomes quite problematic in practice. This tip offers the basic options for router interface redundancy.Continue Reading
Are IP NAT Traversal and VPN Passthrough the same thing?
What are the top 10 VPN clients in use today?
Can I use CAT5e instead of plain CAT5? Are they interchangeable?
Access Point coverage maps
How much do the CCIE exams cost?1
Learning Guide: Voice over IP basics
This guide contains all the VoIP basics and essentials you will need when implementing an IP telephony network.Continue Reading
OSPF configuration
Nuances of OSPF configuration could impact your network more than you expect.Continue Reading
Using passive-interface to prevent DoS
How to use the passive-interface command to prevent Denial of Service attacks.Continue Reading
I have a Cisco router and I want to monitor my bandwidth. Do you know of any software that gives you
IP storage 101 for the network admin
With the advent of IP storage, the time has come for network administrators to get up to speed on storage.Continue Reading
Are there are any VPN clients for Mac OS X that support L2TP?
What is the difference between an IPsec tunnel and a normal tunnel, and what is the bandwidth of eac
VoIP congestion management - basic queuing methods
A look at some of the basic queuing methods to prevent network congestion.Continue Reading
Layer 3 MPLS VPNs
A look at some of the details of Layer 3 MPLS VPNs.Continue Reading
Diagrams - samples
Some samples of the Visio diagrams described in previous tips.Continue Reading
How do I control Internet bandwidth per IP on my LAN?
802.5 Ethernet vs. 802.3 Token Ring
What layer of the OSI model does a hub operate at?
Tips on working with VLSM
Variable Length Subnet Masks (VLSM) can require some serious number crunching but there are many ways to help make the process simpler.Continue Reading
How can I see who is using the most of our Internet bandwidth over our LAN?
What is 'layered architecture' in computer networks?
View these links to get an understanding of what layered architecture is in computer networks.Continue Reading
What are the characteristic of HDLC protocol?
How long is a bit?
Is it possible to determine the NIC speed of a remote workstation on my LAN?
Router Expert: Cisco asynchronous serial support
Cisco IOS-based routers support three asynchronous serial interface types: Console, Auxiliary, and asynchronous port modules. This tip compares them.Continue Reading
Ethernet throughput
Is there a way to stop the Microsoft DHCP server from handing out an IP address to unauthorized mach
Could you compare SONET versus Frame Relay with ATM networks.
Keep networks healthy with patch management
A vigorous patch management process, supported by powerful, centralized tools can go a long way toward ensuring the health of a network far into the future.Continue Reading
Can features such as VPN pass-through on routers be abused to dump traffic onto a NAT'd LAN?
MPLS Versus IPSEC VPNs: Which one is right for you
An examination of the similarities and differences between IPSEC and MPLS and some insight as to when one should be used over the other.Continue Reading
When one reads about the "edge" or the "border" of a network, what does it mean?
Tracking to ensure failover
Using SAAs tracking feature to ensure that your routers use the best traffic route.Continue Reading
Network diagrams and documentation: Part 1
Network diagrams and documentation are the topics of this tip on keeping your network organized.Continue Reading
If I connect two 5-port switches, do I end up with the same throughput as an 8-port switch?
Network management is critical to systems integration
One of the most critical, yet often overlooked, components to effective systems integration is network management.Continue Reading
Integrating RADIUS with an MSSP's remote access VPN
Network security expert Lisa Phifer addresses the integration of RADIUS with an MSSP's remote access VPN.Continue Reading
How do the clients in a WLAN communicate with the AP (Access Point) based on IP in the Network Layer
How do secondary networks work?
Combining VPN and WLAN technologies
Can you explain why certain wireless routers will not work with VPN connections?
Are packets sent inside frames, or are frames inside packets?
Should I use a hardware or software VPN?
I have read up on the software (Windows 2000) and also the hardware (Symantec Firewall/VPN) and I am scheduled to set one up in January. I think I am going with the hardware VPN. If you have any info, tips, suggestions they'd be welcome.Continue Reading
Client-side security considerations for SSL VPNs
Clientless SSL VPNs may be attractive for their lack of software, but they still require client-side security measures.Continue Reading
Optimizing Internet bandwidth with link load balancing
Learn how link load balancing can provide an efficient, cost-effective, and easy-to-use solution to maximize utilization of Internet access.Continue Reading
Network security, quiz: Lessons 1 - 4
Did you find our Administrator Academy lessons on network security useful? Take this quiz to see what you learned.Continue Reading
What you need from your routers in today's network environment
As we push toward IP network environments, multi-functional routers offer many benefits.Continue Reading
How can I check for high network utilization on my switched network?
Are networking jobs being outsourced as much as developer jobs?
MHSRP - Multi-group Hot Standby Router Protocol
How to use MHSRP to easily distribute your T-1 traffic over two routers.Continue Reading
10 steps to secure instant messaging
If you have or are considering deploying IM system in your corporate communication infrastructure, this tip offers you guidelines for keeping it secure.Continue Reading
WLAN security: Beyond the VPN
Wired networks have used virtual private networks (VPNs) to secure transactions across this edge, but this approach has its limitations.Continue Reading
Advanced packet filtering
In this article, Laura Chappell shows you the steps required to build an advanced filter using the Sniffer Pro.Continue Reading
What is EAP-FAST?
What happens when wireless stations roam?
Restricting access between two LANs
How do I evaluate the performance of a LAN setup?
Do simultaneous uploads slow down my downloads?
What are the top five companies that are providing enterprise level WLAN products and solutions?
Bottom up approach to network troubleshooting
Last week we covered the top down approach to troubleshooting, this week we look at bottom up network troubleshooting.Continue Reading