Tips
Tips
-
Router Expert: Building VLAN interfaces in Linux and IOS
Segmenting a wireless LAN with VLANs can increase security. Find out from our router expert how to support VLAN interfaces in Linux and Cisco IOS. Continue Reading
-
Cache poisoning attacks and how to prevent them
Want something scary to think about? A compromise of your name servers could cut you off from the Internet or redirect your customers to a competitor. It could even shunt sensitive electronic mail through an intermediate mail server or reroute your ... Continue Reading
-
VPN security: Where are the vulnerabilities?
SOX compliance mandates have pushed organizations to deliver end-to-end VPN security. This means that the VPN itself is no longer enough. Robbie Harrell explains how organizations can apply security policies to the VPN in this tip. Continue Reading
-
Router Expert: Building 802.11Q VLANs
Network segmentation can be a great way to increase security. This article covers segmenting with VLANs and the 802.1Q standard. Continue Reading
-
Understanding the differences between IDS and IPS
We all know that the Internet is a haven for cyber criminals who use the connectivity to launch an unprecedented number of attacks against enterprise networks. IDS and IPS have been developed to combat these threats, but they are not one in the same... Continue Reading
-
Keeping it all separate with VRFs
A Virtual Routing and Forwarding (VRF) instance can deliver separation across both a shared infrastructure and shared devices, ultimately simplifying management. Continue Reading
-
The network administrator's guide to forensic first response
The time between discovery of an incident and the handover of digital evidence is critical for the possibility of successful evidence retrieval. Mishandled evidence, whether to be used in court or solely in house, can damage the integrity of the ... Continue Reading
-
Hardening your router in 9 easy steps
For most enterprise LANs, the router has become one of the most critical security appliances in use. Configured properly, it can keep all but the most determined bad guys out, and if you want, it can even keep the good guys in. But an improperly ... Continue Reading
-
Router Expert: Standard interface configuration for a WLAN proxy server
Our router expert continues his series on building a secure WLAN with a Linux base. This article covers standard interface configuration of the http proxy server. Continue Reading
-
Troubleshooting Windows VPN servers
There are several aspects of the Windows remote access server that can create issues when a VPN client connects. This article focuses on some common trouble spots on the server side and offers steps to help pinpoint the problem. Continue Reading
-
Wireless LAN deployment and federal regulations
A look at the bare minimum requirements to keep your WLAN compliant with federal regulations. Continue Reading
-
Secure WLAN best practices and topology
Expert Michael Martin provides a list of wireless security "dos and don'ts" and a sample topology for a secure WLAN. Continue Reading
-
Seven steps to ensure project success
The Value Manager recently had a project fall well below expectations. He reviewed what happened and came up with seven key steps for managing technical risk and one golden rule. Continue Reading
-
Router Expert: Filtering with MAC addresses
This month our router expert discuss some strategies for controlling host network access using MAC address filtering. Continue Reading
-
Focus Windows port scanning with the netscan command
How to use the netscan command to focus Windows port scanning. Continue Reading
-
Network administrator security policies
Some security policy elements that are specific to network administrators. Continue Reading
-
Minimizing Layer 2 problems
Understanding the fundamentals of Spanning Tree Protocol. Continue Reading
-
Auto-MDIX
How Auto-MDIX can solve the cross-over cable conundrum. Continue Reading
-
MPLS: Experimental bits and QoS
MPLS experimental bits are used to provide QoS capabilities by utilizing the bits set in the MPLS labels. Continue Reading
-
VPLS, a new Layer 2 MPLS VPN technology
A new Layer 2 MPLS VPN technology that provides similar reliablity and QoS as MPLS VPN, but in a more simplified way. But beware, it does have it's limitations. Continue Reading
-
Protocols, Lesson 7: Subnet masks and their effect
Understand the different effects a subnet mask can have. Continue Reading
-
Protocols, Lesson 9: Subnet routing and communications
Lesson 9 in our protocol series covers the communications side of subnetting. Continue Reading
-
MPLS - Preparing an RFP (Dos and Don'ts)
A look at the things to include in an RFP, a request for proposal for VPN service. Continue Reading
-
Preventing Layer 2 security threats
Layer 2 switched environments, typically found in enterprise customer wiring closets, can be easy targets for network security attacks. Continue Reading
-
Run your VoIP calls over a VPN for enhanced security
A look at using a VPN to enhance VoIP security. Continue Reading
-
Top 10 'show' commands
A list of the top ten 'show' commands. Continue Reading
-
MPLS - Label Switched Paths
A look at some of the details of working with Label Switched Paths (LSPs). Continue Reading
-
Top 10 things to know about network administration
A list of the most important things network administrators should know. Continue Reading
-
Router Expert: Understanding reverse telnet and IOS terminal lines
Learn how users interact with the terminal server and its connected devices through the use of reverse telnet, line and group rotaries, and terminal line interfaces. Continue Reading
-
Deploying both a private and public WLAN
Lisa Phifer answers a reader's request for information about planning and deploying a wireless LAN -- one private and one public. Continue Reading
-
Monitor your traffic with MRTG
The Multi Router Traffic Grapher is a free tool that can help you monitor the traffic on your network. Learn more here. Continue Reading
-
WLAN implementation tutorial -- Capacity planning: Step 1
For WLAN implementation, make sure you have Step 1 down -- capacity planning, not just coverage. Continue Reading
-
The Network Life Cycle
Each phase of the NLC has its own requirements that can typically be met with a judicious selection of tools and assessment solutions. Continue Reading
-
Router Expert: Implementing router interface redundancy
While redundancy is simple as a concept, it becomes quite problematic in practice. This tip offers the basic options for router interface redundancy. Continue Reading
-
OSPF configuration
Nuances of OSPF configuration could impact your network more than you expect. Continue Reading
-
Learning Guide: Voice over IP basics
This guide contains all the VoIP basics and essentials you will need when implementing an IP telephony network. Continue Reading
-
Layer 3 MPLS VPNs
A look at some of the details of Layer 3 MPLS VPNs. Continue Reading
-
Router Expert: Cisco asynchronous serial support
Cisco IOS-based routers support three asynchronous serial interface types: Console, Auxiliary, and asynchronous port modules. This tip compares them. Continue Reading
-
Tips on working with VLSM
Variable Length Subnet Masks (VLSM) can require some serious number crunching but there are many ways to help make the process simpler. Continue Reading
-
MPLS Versus IPSEC VPNs: Which one is right for you
An examination of the similarities and differences between IPSEC and MPLS and some insight as to when one should be used over the other. Continue Reading
-
WLAN security: Beyond the VPN
Wired networks have used virtual private networks (VPNs) to secure transactions across this edge, but this approach has its limitations. Continue Reading
-
WLAN security checklist
WLAN security checklist Continue Reading
-
Should you use a voice VLAN
Advantages and disadvantages of using a voice VLAN. Continue Reading
-
The VPN Expert: VPN client alternatives, part 4 -- IPsec
Here's a list of IPsec clients that run on many systems. See what they have to offer and what they are often missing. Continue Reading
-
LAN addressing
LAN addressing Continue Reading
-
Wireless LAN requirements
Thinking of going wireless? Find out what you need to consider in planning for a wireless network. Continue Reading
-
The importance of the subnet mask