Features
Features
-
Network refresh: Look at your needs, not the name on the box
In this Q&A, one networking pro shares why he and his team broke from their existing vendors during a network refresh and went with a new roster for their routers and switches. Continue Reading
-
Network automation scripts: Separating myth from reality
Network automation can make work easier, but be careful which processes you automate. Done wrong, automation can break more things than it fixes. Continue Reading
-
NIA awards: A look back at innovative technology products
As 2015 draws to a close, we look at the innovative technology products that garnered a SearchNetworking Network Innovation Award. Continue Reading
-
Blue Coat ProxySG: Secure Web gateway overview
With features like authentication and Web filtering, the Blue Coat ProxySG secure Web gateway can be deployed as a physical appliance, a virtual machine or a cloud-based service. Continue Reading
-
Palo Alto WildFire: Malware sandbox product overview
Tightly integrated with existing Palo Alto next-generation firewalls, the Palo Alto WildFire cloud-based malware sandbox service supports both public and private cloud deployments. Continue Reading
-
WAN optimization techniques pace IT investment
TechTarget's most recent Networking Purchasing Intentions survey reveals IT's priority to invest in WAN optimization techniques in the next 12 months. Continue Reading
-
NIA: Saisei's FlowCommand SDN appliance secures network flows
Saisei, our latest Network Innovation Award winner, uses its FlowCommand virtual SDN appliance to control network flows and prevent individual users from hogging bandwidth. Continue Reading
-
Facing network breach threats, visibility is key
In this Q&A, an IT pro at Penn Mutual shares how his dual strategy of user education and Layer 7 visibility helps prevent network breaches. Continue Reading
-
What are data center-class switches?
Choosing the right switch for your data center can be a difficult task. This article looks at how data center-class switches are evolving in the enterprise to offer flexibility and speed for new traffic flows. Continue Reading
-
Umpqua Bank employs NSX, micro-segmentation for enterprise security
Umpqua Bank's Sam Guidice tells how the organization deployed VMware's NSX as part of its effort to utilize micro-segmentation for enterprise security. Continue Reading
-
Network programming skills from scripting to DevOps: What to learn
Networking pros don't need to become code monkeys, but a little network programming can go a long way toward advancing their careers. Continue Reading
-
What is Ethernet-dedicated Internet?
Ethernet-dedicated Internet is a continuous, high-bandwidth way for enterprises to connect their LANs to the public Internet and to streamline the performance of their WAN. Continue Reading
-
Primer: A new generation of programmable ASICs
Programmable application-specific integrated circuits allow the data plane of switches to support new technologies, like software-defined networking. Continue Reading
-
How to plan for a campus core switch refresh: Basic requirements
Network architects and engineers discuss the features and functions they look for when planning a campus core upgrade. Continue Reading
-
Will we ever need 400 Gigabit Ethernet enterprise networks?
With 40 and 100 Gigabit Ethernet so new, what could possibly drive the need for 400 Gigabit Ethernet in the enterprise? Hint: It’s not just the WAN. Continue Reading
-
Avaya-Nortel acquisition: Infamous end; questionable beginning
The Avaya-Nortel acquisition was one of the more notable top networking stories of 2009, marking the end of a legacy player and a questionable beginning for Avaya as it struggles with whether to integrate the Nortel data networking portfolio. Continue Reading
-
10 Gigabit Ethernet tutorial: Connecting data centers, storage, LAN and beyond
As IT teams build 10 Gigabit Ethernet networks, they'll have to choose the right 10 Gigabit Ethernet cabling and components in order to ensure data center optimization and prevent latency in the network. They''ll also need to be sure their networks ... Continue Reading
-
Network-to-network VPN gateway configuration for Cisco EzVPN
Learn how to support network-to-network IPsec VPN topologies using a router as the VPN gateway with Cisco EzVPN. Continue Reading
-
How a Switch Works -- Chapter 6 of 'LAN Switching First-Step'
How a Switch Works explains how to differentiate among unicast, multicast, and broadcast transmission methods; store-and-forward, cut-through, and fragment-free switching mechanisms and then describes Layer 2 and Layer 3 switching operation. Continue Reading
-
Introduction -- Chapter 1 of 'Network Analysis, Architecture and Design'
This chapter introduces the analysis, architecture, and design processes. Described are the fundamental concepts of the processes of network analysis, architecture, and design; systems and services; as well as their characteristics and prepares the ... Continue Reading
-
"Network Security: The Complete Reference," Chapter 10: Network device security
Chapter 10 focuses on using routers and switches to increase the security of the network as well as providing appropriate configuration steps for protecting the devices themselves against attacks. Continue Reading
-
Reducing costs and generating revenue with network monitoring
Like most IT managers, you have a lot on your plate, and improving network monitoring is only one of the tasks you need to address. This article will discuss business-focused ROI around a network monitoring system (NMS) and enable you to demonstrate... Continue Reading
-
Mobility -- Chapter 5 of 802.11 Wireless LAN Fundamentals
Mobility, Chapter 5 of 802.11 Wireless LAN Fundamentals, covers the characteristics of roaming, Layer 2 roaming, Layer 3 roaming and an introduction to mobile IP. Continue Reading
-
Wi-Fi firewalls boost wireless security by blocking airborne attacks
Wi-Fi firewalls, or wireless intrusion prevention systems, are servers that monitor and filter Wi-Fi traffic, blocking unauthorized 802.11 usage and attacks while still in the air. Learn about the benefits of the product and what to consider when ... Continue Reading
-
Multi Router Traffic Grapher (MRTG) - Open Source Network Administration, Chapter 3
The Multi Router Traffic Grapher (MRTG) is an open source tool used to monitor the traffic load on network links. In this chapter James Kretchmar tells us how MRTG produces Web pages containing PNG images, which provide a live visual representation ... Continue Reading
-
Lesson 4: How to use wireless IDS/IPS
In Lesson 4 of Wireless Security Lunchtime Learning, you'll walk away with an understanding of the value of wireless IDS/IPS -- even if your organization doesn't support a wireless LAN. Also learn how to choose a WIDS for your environment and how to... Continue Reading
-
Lesson 2: How to build a secure wireless infrastructure
In Lesson 2 of Wireless Security Lunchtime Learning, you'll learn how to build a secure wireless infrastructure by understanding the myriad security standards and features that Wi-Fi products boast, as well as how traditional wired network devices ... Continue Reading
-
To block or not to block: Rogue containment methods
Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wired network access. This tip explores how these ... Continue Reading
-
Using your WIDS to monitor WLAN performance
"Wireless intrusion detection" -- the very name brings to mind security. But many WIDS products can also be used to monitor WLAN performance, providing valuable insight for trouble-shooting, fine-tuning, and usage planning. This tip explains how to ... Continue Reading
-
Fighting wireless DoS attacks
Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occur and where they come from, so that you can track ... Continue Reading
-
Wi-Fi vulnerability assessment checklist
Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions. Continue Reading
-
Using VLANs to compartmentalize WLAN traffic
Virtual LANs have long been used within enterprise networks to create logical workgroups, independent of physical location or LAN topology. This tip describes how to use these same VLAN capabilities, found in both wired and wireless devices, to tag ... Continue Reading
-
Combining 802.1X and VLANs for WLAN authorization
Many WLAN owners know that 802.1X/EAP makes it possible to authenticate individual wireless users. But did you know that 802.1X can also be used to funnel wireless traffic onto VLANs, enforcing user or group-based permissions? This tip explains how ... Continue Reading
-
Wireless attacks, A to Z
In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference list of attacks against 802.11 and 802.1X, ... Continue Reading
-
Building a wireless LAN proxy server
Our router expert, Michael Martin, walks you through building an http proxy server for a wireless LAN with a Linux base. Continue Reading
-
Best practices for network management in the non-profit world
Discover how the Washington, D.C.-based National Parks Conservation Association developed their network management solution to ensure network uptime and availability. Continue Reading
-
The importance of IP address management
IP addresses are an integral part of any corporate network, and companies large and small are consuming them faster with more applications and devices than ever before. Overlooking the importance of getting a handle on IP addresses can prove ... Continue Reading
-
Will becoming an A+ certified technician help you?
-
Subnetting to increase performance
There comes a time when a network becomes too big and performance begins to suffer as a result of too much traffic. When that happens, one of the ways that you can solve the problem is by breaking the network into smaller pieces using subnets. Continue Reading
-
Router and firewall configuration
ITKnowledge Exchange member "stephang" had a question about the balance between blocking packets and enabling NAT on his router and on his firewall. Fellow forum members chipped in with their advice; check out what they had to say. Continue Reading
-
Commonly overlooked security hazards
Security expert Dave Piscitello covers the ten most commonly overlooked security hazards and easy ways to prevent them from placing your network at risk. Continue Reading
-
The network administrator's survival guide
This piece from contributor Douglas Chick presents a humorous look at surviving in your role as a network administrator. Continue Reading
-
Most popular viruses and hacking tools
Here are 2004's most popular hacker tools, viruses, remote tools, adware, spyware, Trojans and worms. Continue Reading
-
Network Security Principles and Practices: Secure LAN switching
This book excerpt offers steps you can take to make Layer 2 environments and switches more secure, including permit lists, protocol filtering and VLANs. Continue Reading