240 Results for:udp

  • Sort by: 

Identifying issues in a multi-site Cisco UC deployment

17 Oct 2008

Deploying Cisco Unified Communications Manager between multiple sites requires an appropriate dial plan, appropriate bandwidth, a quality of service (QoS) implementation and a design that can survive IP WAN ... Read More

VCenter Server installation requirements

16 Jun 2010

Properly preparing for a vCenter Server installation involves identifying hardware, operating system, database and networking requirements before implementation. Read More

NAS gateway specifications

08 Aug 2007

A NAS gateway offers file-based accesses to external storage on a disk array -- or a SAN, where users can take advantage of superior performance and reliability while maintaining a level of simplicity. Since ... Read More

IP network design, part 1: Fundamental principles

19 Jan 2006

A competent network design is the foundation upon which all successful network implementations are built. This is the first of four articles that focus on the design of IP-based networks, due to the prevalence of ... Read More

IP network design, part 2: The IP addressing plan

27 Jan 2006

The IP addressing plan is the foundation upon which a successful logical design is built. Part two of this tip explains how to formulate a scalable IP addressing plan that can support the network as it grows. Read More

Snort command line output modes

23 May 2007

Snort command line output modes, as described here, are usually selected for testing purposes or demonstrations. Read More

Using OpenID

01 May 2007

Learn more about OpenID, a decentralized, open source framework for user-centric digital identity. With OpenID, rather than managing all online accounts individually, users can manage their identity in one place ... Read More

The VPN Expert: VPN client alternatives, part 4 -- IPsec

By Lisa Phifer 10 Dec 2002

Here's a list of IPsec clients that run on many systems. See what they have to offer and what they are often missing. Read More

Traffic Talk: Testing Snort with Metasploit

By Richard Bejtlich 02 Feb 2010

Are your customers' network security solutions working as expected? Learn about testing Snort with Metasploit in this detailed tip from Richard Bejtlich, complete with code examples and step-by-step instructions. Read More

Clustering Technologies: In Memory Session Replication in Tomcat 4

01 Apr 2002

In this article we will cover one of the clustering technologies, HTTP session replication, that is used within the J2EE model. There is an example is provided of how session replication can be implemented using ... Read More