240 Results for:udp
- Sort by:
Identifying issues in a multi-site Cisco UC deployment
17 Oct 2008Deploying Cisco Unified Communications Manager between multiple sites requires an appropriate dial plan, appropriate bandwidth, a quality of service (QoS) implementation and a design that can survive IP WAN ... Read More
VCenter Server installation requirements
16 Jun 2010Properly preparing for a vCenter Server installation involves identifying hardware, operating system, database and networking requirements before implementation. Read More
NAS gateway specifications
08 Aug 2007A NAS gateway offers file-based accesses to external storage on a disk array -- or a SAN, where users can take advantage of superior performance and reliability while maintaining a level of simplicity. Since ... Read More
IP network design, part 1: Fundamental principles
19 Jan 2006A competent network design is the foundation upon which all successful network implementations are built. This is the first of four articles that focus on the design of IP-based networks, due to the prevalence of ... Read More
IP network design, part 2: The IP addressing plan
27 Jan 2006The IP addressing plan is the foundation upon which a successful logical design is built. Part two of this tip explains how to formulate a scalable IP addressing plan that can support the network as it grows. Read More
Snort command line output modes
23 May 2007Snort command line output modes, as described here, are usually selected for testing purposes or demonstrations. Read More
Using OpenID
01 May 2007Learn more about OpenID, a decentralized, open source framework for user-centric digital identity. With OpenID, rather than managing all online accounts individually, users can manage their identity in one place ... Read More
The VPN Expert: VPN client alternatives, part 4 -- IPsec
10 Dec 2002Here's a list of IPsec clients that run on many systems. See what they have to offer and what they are often missing. Read More
Traffic Talk: Testing Snort with Metasploit
02 Feb 2010Are your customers' network security solutions working as expected? Learn about testing Snort with Metasploit in this detailed tip from Richard Bejtlich, complete with code examples and step-by-step instructions. Read More
Clustering Technologies: In Memory Session Replication in Tomcat 4
01 Apr 2002In this article we will cover one of the clustering technologies, HTTP session replication, that is used within the J2EE model. There is an example is provided of how session replication can be implemented using ... Read More