Network Design
Top Stories
-
Feature
31 May 2022
Understand the basics of 5G wireless networks
To build a 5G network, the deployment mode, spectrum band and services are all important factors to understand and consider. Here's what you should know about the basics of 5G. Continue Reading
-
Tip
11 Nov 2021
4 ideas for network cable management best practices
When organizing cable clutter, network engineers should follow some common best practices, including the use of cable labels, cable ties and proper documentation. Continue Reading
-
Tip
27 Nov 2006
LAN administration guide
LAN administration is an arduous task and your responsibilities often involve many different aspects and may include many tasks. This guide will help you with each step and task. Continue Reading
-
Answer
25 Nov 2006
Half duplex vs. full duplex Ethernet 10BASE-T topologies
Ever wonder why half duplex Ethernet 10BASE-T topologies have a slower data transmission rate than full duplex Ethernet 10BASE-Ttopologies? Find out in this expert response by Lindi Horton. Continue Reading
-
Answer
25 Nov 2006
What download speed will I get with a bandwidth of 1 MBPS?
Wondering what kind of download speed you can get with a bandwidth of 1 MBPS? Our expert, Lindi Horton can give you the lowdown on the download. Continue Reading
-
Answer
25 Nov 2006
What are the fundamental principles of CDMA?
In this Q&A, our expert, Lindi Horton gives us an explanation of what CDMA is and what some of its fundamental principles are. Continue Reading
-
Answer
25 Nov 2006
Intrusion detection vs. intrusion prevention
Our expert, Puneet Mehta, tells us what the key difference is between intrusion detection and intrusion prevention, in this expert response. Continue Reading
-
Feature
22 Nov 2006
How a Switch Works -- Chapter 6 of 'LAN Switching First-Step'
How a Switch Works explains how to differentiate among unicast, multicast, and broadcast transmission methods; store-and-forward, cut-through, and fragment-free switching mechanisms and then describes Layer 2 and Layer 3 switching operation. Continue Reading
-
Feature
22 Nov 2006
Introduction -- Chapter 1 of 'Network Analysis, Architecture and Design'
This chapter introduces the analysis, architecture, and design processes. Described are the fundamental concepts of the processes of network analysis, architecture, and design; systems and services; as well as their characteristics and prepares the reader for the analysis process. Continue Reading
-
Tip
20 Nov 2006
IP addressing and subnetting: Calculate a subnet mask using the subnet's formula
IP addressing and subnetting are an important part of networks. Learn how the subnet's formula works and why it's important to know how to calculate the subnet mask "longhand." Continue Reading
-
Feature
16 Nov 2006
"Network Security: The Complete Reference," Chapter 10: Network device security
Chapter 10 focuses on using routers and switches to increase the security of the network as well as providing appropriate configuration steps for protecting the devices themselves against attacks. Continue Reading
-
Feature
08 Nov 2006
Reducing costs and generating revenue with network monitoring
Like most IT managers, you have a lot on your plate, and improving network monitoring is only one of the tasks you need to address. This article will discuss business-focused ROI around a network monitoring system (NMS) and enable you to demonstrate to enterprise business and IT leaders why implementing a monitoring solution should rise to the top of your priority list. It will focus on two key ROI factors -- reducing costs and increasing revenue -- as well as some of the metrics in these areas that allow you to better track your return. Continue Reading
-
Report
07 Nov 2006
Network access control -- More than endpoint security
Network access control (NAC) holds a great deal of promise for network security, but sorting out the market and product options is a challenge. In this special report, you'll learn how to gauge if your enterprise is ready for NAC, what the difference is between the major systems, and whether an appliance approach may be the best option. Then peek under the covers at the actual endpoint functionality and how you can further leverage this technology in the future. Continue Reading
-
Answer
06 Nov 2006
System engineer vs. network administrator
Our Cisco certifications expert, David Minutella, answers what the responsibilities of a system engineer and network administrator are and what makes the two jobs different. Continue Reading
-
Tip
02 Nov 2006
How IPsec provides secure communications
IPsec provides secure site-to-site VPNs, remote access and host-to-host communication. In this tip, we peek inside the tunnel and examine how IPsec works. Continue Reading
-
Tip
31 Oct 2006
VPN client alternatives: Layer 2 Tunneling Protocol (L2TP) over IPsec
This month, Lisa Phifer discusses a robust VPN client alternative: Layer 2 Tunneling Protocol (L2TP) over IPsec. Continue Reading
-
Tip
30 Oct 2006
Network test plan: Checklist for architecture changes
For every change you make to your network architecture, you should have a test plan and a backout plan. In this tip, learn how to build a test plan and review a sample checklist of things to include. Continue Reading
-
Feature
25 Oct 2006
Mobility -- Chapter 5 of 802.11 Wireless LAN Fundamentals
Mobility, Chapter 5 of 802.11 Wireless LAN Fundamentals, covers the characteristics of roaming, Layer 2 roaming, Layer 3 roaming and an introduction to mobile IP. Continue Reading
-
Tutorial
23 Oct 2006
CCNA exam preparation guide
A learning guide for CCNA exam preparation with book chapters, expert advice and quiz. Continue Reading
-
Tip
19 Oct 2006
How SSL and TLS secure network transactions
SSL and TLS are protocols that were developed primarily to protect Web transactions, but they can be used to protect any type of network traffic that utilizes TCP at the transport layer, including the popular SSL VPN. In this tip, learn how SSL and TLS were developed and how they work. Continue Reading
-
Tip
17 Oct 2006
Router Expert: Building a WLAN proxy server, DHCP services: Part 1
Router expert Michael Martin discusses DHCP implementation options and provides sample configurations to support various SSID network models in this continuation of his series on building a WLAN proxy server. Continue Reading
-
Tip
09 Oct 2006
IP addressing and subnetting: What network administrators need to know
IP addressing and subnetting are an important part of networks. Learn about how IP addresses work, subnet masks, classful vs. classless IP addresses, default gateways and more. Continue Reading
-
Answer
04 Oct 2006
The most commonly used network operating system
In this Q&A, Lindi Horton answers the question "What network operating system is more currently and commonly used?" Continue Reading
-
Tip
02 Oct 2006
OSI: Securing the stack, Layer 2 -- Understanding the role of ARP
Security expert Michael Gregg continues his layer-by-layer discussion of OSI model network security with this tip on the vulnerabilities present in Layer 2, the Data Link Layer, and specifically addresses the Address Resolution Protocol. Continue Reading
-
Tip
13 Sep 2006
How round-trip time and limiting data rate impact network performance
This tip reviews how network parameters such as round-trip time and limiting data rate affect network performance. Continue Reading
-
Tip
04 Sep 2006
OSI: Securing the stack, Layer 1 -- Physical security threats
Security expert Michael Gregg kicks off his layer-by-layer discussion of OSI model network security with this tip on securing Layer 1 against physical security threats. Continue Reading
-
Tip
28 Aug 2006
Duplex mismatch
What is duplex, and what is the difference between half and full duplex? What is a duplex mismatch? How can autonegotiation help or hurt your network? How can you resolve duplex conflicts? In this tip, David Davis helps networking engineers and newcomers understand the issues behind one of the most troublesome problems plaguing today's networks. Continue Reading
-
Tip
26 Aug 2006
IPSec and NAT incompatibility
Learn why Authentication Header (AH) doesn't work with Network Address Translation (NAT) or Port Address Translation (PAT) and that Encapsulating Security Payload (ESP) is also incompatible with PAT. Continue Reading
-
Answer
20 Aug 2006
Wireless LAN setup for hotels
Phifer discusses the requirements for WLAN setups in hotels. Continue Reading
-
Tip
03 Aug 2006
VPNs for disaster recovery: IPsec vs. SSL
Using a VPN as a failover mechanism when a primary communications link may be unavailable due to a disaster can be a smart move -- as well as an easy one to implement. In this tip, learn about the pros and cons of IPsec and SSL VPN options for disaster recovery. Continue Reading
-
Tip
28 Jul 2006
Troubleshooting wireless networks: A systematic approach
Troubleshooting wireless networks can take up a lot of time for network operations staff with a wireless LAN (WLAN) environment. Wireless guru Lisa Phifer discusses the tools and processes involved and breaks down how to approach and resolve wireless problems with a step-by-step, systematic method. Continue Reading
-
Tip
21 Jul 2006
DNS for a wireless network: Router Expert
DNS services are essential for building a secure wireless LAN. Our Router Expert provides complete instructions for setting up a DNS server, including implementing BIND, configuring a non-authoritative server and creating zone files. Continue Reading
-
Tip
09 Jul 2006
T1 vs. VoIP for branch office connectivity
Learn how to decide between a T1, fractional T1 and VoIP for connecting branch offices. Continue Reading
-
Tip
06 Jul 2006
WAN optimization and bottlenecks: Is the WAN really the weakest link?
"How much traffic" is no longer a good enough measure of WAN bandwidth. In this tip, Carrie Higbie looks at how today's ever-increasing expectations for data transfer rates require increased attention to WAN optimization, and suggests how applications-level traffic monitoring can lead to better WAN optimization strategies. Continue Reading
-
Tip
05 Jul 2006
Duplex mismatch: Why duplex conflicts plague the network, part 1
Duplex mismatch problems -- caused by two ends of the Ethernet attempting a full-duplex connection, resulting in packet loss -- simply will not go away. After a decade of plaguing IP networks, duplex conflicts still seem to be the single worst source of performance degradation. Trivial to fix but ridiculously hard to identify and localize, mismatches recur frequently, as interfaces go up and down over time and network hosts are updated and changed. In column, Dr. Loki Jorgensen explores why duplex mismatches are difficult to conquer using auto-negotiation. Continue Reading
-
Tip
22 Jun 2006
Security and the TCP/IP stack
Each layer of TCP/IP has security mechanisms, protocols, and applications. This tip describes the more popular ones that are associated with each layer of TCP/IP. Continue Reading
-
Tip
22 Jun 2006
How to move an SSL certificate between Exchange servers
SearchExchange.com contributor Serdar Yegulalp provides step-by-step instructions on how to move an SSL certificate from one Exchange server to another, and explains a couple of gotchas to watch out for during the process. Continue Reading
-
Feature
16 Jun 2006
Wi-Fi firewalls boost wireless security by blocking airborne attacks
Wi-Fi firewalls, or wireless intrusion prevention systems, are servers that monitor and filter Wi-Fi traffic, blocking unauthorized 802.11 usage and attacks while still in the air. Learn about the benefits of the product and what to consider when selecting one. Continue Reading
-
Tip
07 Jun 2006
Five steps to stamp out unsafe Wi-Fi use
Lisa Phifer helps dispel the top myths of wireless security and explains five steps that network administrators can take to lead their users toward safer Wi-Fi usage. Continue Reading
- Answer 05 Jun 2006
-
Quiz
05 Jun 2006
Routing versus routed protocols and the CCNA
Many networking professionals don't really know what a routing protocol is or does. There are those who also couldn't tell you the difference between a routing protocol and a routed protocol. If you are working as a network engineer or preparing to take the CCNA, you need to understand the distinction between routing and routed protocols, as well as how these protocols function on the network. Continue Reading
-
Tip
01 Jun 2006
Reducing false positives in network monitoring
Network managers need to be aware of the importance of choosing the right tool to monitor their system's internal counters. In this tip, Brien Posey narrows in on alert mechanisms for Windows servers and helps you understand how to reduce false positives in network monitoring. Continue Reading
-
Tip
31 May 2006
OpenNMS, an introduction: Affordable network management
Open source expert Maria Winslow brings network managers up to speed about the free open source enterprise-grade network-management system OpenNMS. Continue Reading
-
Quiz
29 May 2006
Wireless networking (CWNA)
Do you think you know a lot about wireless networking? Are you interested in taking the Certified Wireless Network Administrator (CWNA) exam? Test your knowledge with our 13-question quiz on wireless networking! Continue Reading
-
Tip
17 May 2006
IEEE 802.3at: Power over Ethernet plus
802.3af Power over Ethernet (PoE) has been widely adopted for powering VoIP phones, wireless access points and a number of other network-connected products. But it provides a limited amount of power. In this tip, David Jacobs investigates the latest developments in 802.3at PoE, designed to deliver more power to each device. Continue Reading
-
Tip
04 May 2006
VPNs: Fundamentals and basics
VPNs are discussed in this introductory tip on the fundamentals of virtual private networks. Continue Reading
-
Tip
03 May 2006
Content Delivery Networking: an introduction
Doug Downer gives an overview of Content Delivery Network (CDN) technology and its components, which bring together the functionality of file access, caching, multimedia delivery and application processing. Continue Reading
-
Answer
24 Apr 2006
Why is the cable supporting my LAN experiencing abnormal attenuation?
Why is the cable supporting my LAN experiencing abnormal attenuation? Continue Reading
-
Tip
24 Apr 2006
Configuring and troubleshooting wireless LAN clients
An understanding of wireless LAN (WLAN) client and WLAN access point communication mechanisms is critical to anyone attempting to initially connect or troubleshoot a WLAN connection. In this tip, Robbie Harrell discusses some of the issues that can be dealt with on the client side when a user experiences WLAN connectivity problems. Continue Reading
-
Feature
18 Apr 2006
Multi Router Traffic Grapher (MRTG) - Open Source Network Administration, Chapter 3
The Multi Router Traffic Grapher (MRTG) is an open source tool used to monitor the traffic load on network links. In this chapter James Kretchmar tells us how MRTG produces Web pages containing PNG images, which provide a live visual representation of this traffic. Continue Reading
-
Feature
10 Apr 2006
Lesson 2: How to build a secure wireless infrastructure
In Lesson 2 of Wireless Security Lunchtime Learning, you'll learn how to build a secure wireless infrastructure by understanding the myriad security standards and features that Wi-Fi products boast, as well as how traditional wired network devices and configurations can be applied to a WLAN. Continue Reading
-
Feature
10 Apr 2006
To block or not to block: Rogue containment methods
Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wired network access. This tip explores how these containment features work, their potential side-effects, and what network administrators should consider before activating them. Continue Reading
-
Feature
10 Apr 2006
Using your WIDS to monitor WLAN performance
"Wireless intrusion detection" -- the very name brings to mind security. But many WIDS products can also be used to monitor WLAN performance, providing valuable insight for trouble-shooting, fine-tuning, and usage planning. This tip explains how to leverage your WIDS get more from your WLAN. Continue Reading
-
Feature
10 Apr 2006
Fighting wireless DoS attacks
Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occur and where they come from, so that you can track the intruder down and bring him to justice -- or at least scare him away. This tip offers practical advice on how to recognize and respond to DoS attacks launched against your WLAN. Continue Reading
-
Feature
10 Apr 2006
Wi-Fi vulnerability assessment checklist
Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions. Continue Reading
-
Feature
10 Apr 2006
Using VLANs to compartmentalize WLAN traffic
Virtual LANs have long been used within enterprise networks to create logical workgroups, independent of physical location or LAN topology. This tip describes how to use these same VLAN capabilities, found in both wired and wireless devices, to tag and compartmentalize Wi-Fi traffic, supporting your company's security and traffic management policies. Continue Reading
-
Feature
10 Apr 2006
Combining 802.1X and VLANs for WLAN authorization
Many WLAN owners know that 802.1X/EAP makes it possible to authenticate individual wireless users. But did you know that 802.1X can also be used to funnel wireless traffic onto VLANs, enforcing user or group-based permissions? This tip explains how to use RADIUS attributes returned by 802.1X to supply VLAN tags, establishing that critical link between authentication and authorization. Continue Reading
-
Feature
10 Apr 2006
Choosing the right flavor of 802.1X
Which of the nearly 50 defined EAP Types would work best in your WLAN? In this tip, we compare the most popular EAP Types used with 802.1X, authentication methods that can be supported by each, known vulnerabilities and suitable usage environments. Continue Reading
-
Feature
10 Apr 2006
Wireless attacks, A to Z
In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference list of attacks against 802.11 and 802.1X, categorized by type of threat, and mapped to associated hacker methods and tools. Continue Reading
-
Feature
10 Apr 2006
Lesson 4: How to use wireless IDS/IPS
In Lesson 4 of Wireless Security Lunchtime Learning, you'll walk away with an understanding of the value of wireless IDS/IPS -- even if your organization doesn't support a wireless LAN. Also learn how to choose a WIDS for your environment and how to fight wireless DoS attacks. Continue Reading
-
Feature
05 Apr 2006
Building a wireless LAN proxy server
Our router expert, Michael Martin, walks you through building an http proxy server for a wireless LAN with a Linux base. Continue Reading
-
Tip
03 Apr 2006
Securing your Layer 2 network: Don't overlook the basics
Before dropping substantial cash on a fancy surveillance system, most sensible home owners would ensure that their doors and windows were locked. Similarly, there are simple security measures you can take to configure your systems for Layer 2 security. Continue Reading
-
Tip
29 Mar 2006
Understanding network traffic flow analysis
Network traffic flow is often compared to highway traffic flow. In this tip, Lindi Horton shows parallels between those two worlds and explains why traffic flow analysis is such an essential piece of knowledge for engineering a network. Continue Reading
-
Feature
16 Mar 2006
Best practices for network management in the non-profit world
Discover how the Washington, D.C.-based National Parks Conservation Association developed their network management solution to ensure network uptime and availability. Continue Reading
-
Tip
15 Mar 2006
Using Snort, Nessus and Tripwire for network security
Why pay a proprietary vendor a ton of money for a security application you can get for little or no money? In this tip, learn the pros and cons of open source network security tools Snort, Nessus and Tripwire. Continue Reading
-
Tip
13 Feb 2006
IP network design, part 4: LAN design
This final section of the IP network design series relates to the issues encountered with campus LAN design. The benefits of Ethernet switching over a traditional hub environment are first explained. The motivation behind the deployment of virtual LANs (VLANs) is explored along with the issues faced when planning and configuring VLANs. This article also discusses techniques for ensuring a scalable and resilient campus network design. The Spanning Tree Protocol is also addressed and how it can be optimized on a large switched network. Finally, the design issues associated with an IP telephony rollout are covered in the conclusion of this article. Continue Reading
-
Tip
13 Feb 2006
Certifications that will earn you the most money
Ed Tittel takes a look at the five network certifications that earned the most money in 2005. Continue Reading
-
Tip
06 Feb 2006
IP network design, part 3: Designing the WAN
The wide area network (WAN) is the single biggest contributor to a corporate network's cost of ownership. Therefore, this is the area where the cost-versus-performance tradeoff is most pronounced and most critical. This article explores the various alternatives that must be evaluated when choosing and designing a WAN infrastructure. The different topological and technological options are discussed in terms of how they relate to the fundamental WAN design goals. Traditional technological alternatives that include synchronous serial lines, frame relay and ATM will be discussed along with more state-of-the-art options such as DSL and MPLS. Continue Reading
-
Tip
01 Feb 2006
Implementing software restriction policies
This tip explains how you can use software restriction policies to keep your workstations in pristine shape and cut down on help desk calls at the same time. Continue Reading
-
Tip
31 Jan 2006
LAN connectivity problem: Blame DNS, NIC or firewall?
ITKnowledge Exchange member "BinooDas1234" had connectivity issues with a troublesome LAN, and fellow techies jumped in to help out. But does the answer lie in the DNS configuration, the NIC drivers or elsewhere? Here is a portion of the conversation. Continue Reading
-
Tip
31 Jan 2006
Router Expert: Initial configuration of a Cisco 1200 802.11g WLAN access point
Our router expert continues his series on building a secure wireless LAN with a Linux base. This article explains how to utilize a single Cisco 1200 series access point to provide access to three different IP network segments using VLANs and multiple service set identifiers. Continue Reading
-
Tip
27 Jan 2006
IP network design, part 2: The IP addressing plan
The IP addressing plan is the foundation upon which a successful logical design is built. Part two of this tip explains how to formulate a scalable IP addressing plan that can support the network as it grows. Continue Reading
-
Feature
26 Jan 2006
The importance of IP address management
IP addresses are an integral part of any corporate network, and companies large and small are consuming them faster with more applications and devices than ever before. Overlooking the importance of getting a handle on IP addresses can prove disastrous. Continue Reading
-
Tip
19 Jan 2006
IP network design, part 1: Fundamental principles
A competent network design is the foundation upon which all successful network implementations are built. This is the first of four articles that focus on the design of IP-based networks, due to the prevalence of IP as the de-facto standard desktop protocol. Continue Reading
- Feature 17 Jan 2006
-
Tip
02 Jan 2006
OSI: Securing the Stack, Layer 5 -- session hijacking
To help secure your systems against session hijacking, this tip walks you through the steps hackers use to hijack active sessions and take over your network. You'll also learn how to detect and prevent session hijacking attacks, a major security concern at the session layer -- Layer 5 of the OSI model. Continue Reading
-
Tutorial
01 Jan 2006
802.11 Learning Guide
802.11 is perhaps the fastest-changing network protocol around. We've gathered a wealth of information to get you up-to-speed quickly on the various specifications. Learn about all the 802.11 wireless LAN (WLAN) specifications in this learning guide. Continue Reading
-
Feature
12 Dec 2005
Subnetting to increase performance
There comes a time when a network becomes too big and performance begins to suffer as a result of too much traffic. When that happens, one of the ways that you can solve the problem is by breaking the network into smaller pieces using subnets. Continue Reading
-
Tip
09 Dec 2005
Making sense of Windows routing tables
When routing packets across a network, things do occasionally go wrong. In these situations, it is helpful to be familiar with the Windows routing tables. Routing tables dictate the flow of packets from the machine in question. This tip will show you how to view the Windows routing tables and how to make sense of the data that is contained within it. Continue Reading
-
Tip
02 Dec 2005
Network security checklist
While 100% security is hardly a possibility, there are several things that you can do to make your network more secure. Learn about them with this network security checklist. Continue Reading
-
Tip
01 Dec 2005
VRFs and routing
Doug Downer continues his series about VPN routing and forwarding instances focused on the task of configuring and verifying a VRF scenario with a requirement for separate customers on a shared device. In this tip, he shows how to configure a method for communication between each customer outside of the shared interfaces and how to ensure that all customer routes are being advertised correctly. Continue Reading
-
Tip
29 Nov 2005
Router numbers
Many of the routing protocols implemented in Cisco's IOS require a number to follow the command that enables the routing protocol in question. If you're new to routing, these numbers can be a little confusing, as they mean something different to each protocol. This tip presents a quick explanation and general guidelines for understanding router numbers. Continue Reading
-
Tip
16 Nov 2005
Wireless LAN security: 802.11i
What is 802.11i, and is it really practical for you to implement in your organization? Robbie Harrell explores how the new wireless standard can improve security -- and reasons why you may want to switch to 802.11i or stick with WPA. Continue Reading
-
Tip
10 Nov 2005
Router Expert: Building VLAN interfaces in Linux and IOS
Segmenting a wireless LAN with VLANs can increase security. Find out from our router expert how to support VLAN interfaces in Linux and Cisco IOS. Continue Reading
- Answer 07 Nov 2005
-
Tip
31 Oct 2005
Cache poisoning attacks and how to prevent them
Want something scary to think about? A compromise of your name servers could cut you off from the Internet or redirect your customers to a competitor. It could even shunt sensitive electronic mail through an intermediate mail server or reroute your users to an exact replica of a popular Web site, where their keystrokes, including account names and passwords, are captured. In this tip, Cricket Liu provides a checklist of measures you can take to secure your DNS infrastructure. Continue Reading
- Answer 26 Oct 2005
-
Tip
20 Oct 2005
VPN security: Where are the vulnerabilities?
SOX compliance mandates have pushed organizations to deliver end-to-end VPN security. This means that the VPN itself is no longer enough. Robbie Harrell explains how organizations can apply security policies to the VPN in this tip. Continue Reading
- Answer 14 Oct 2005
-
Quiz
13 Oct 2005
Wireless LAN quiz
Take our wireless LAN quiz to find out how much you know about WLAN technologies. Continue Reading
- Quiz 13 Oct 2005
-
Tip
13 Oct 2005
Router Expert: Building 802.11Q VLANs
Network segmentation can be a great way to increase security. This article covers segmenting with VLANs and the 802.1Q standard. Continue Reading
-
Tip
11 Oct 2005
Understanding the differences between IDS and IPS
We all know that the Internet is a haven for cyber criminals who use the connectivity to launch an unprecedented number of attacks against enterprise networks. IDS and IPS have been developed to combat these threats, but they are not one in the same. Learn the differences between IDS and IPS, and which is right for your network, with this expert tip. Continue Reading
-
News
10 Oct 2005
Analysts: 3Com trying to woo enterprises with new ad campaign
Following strategic missteps and profitability woes, 3Com hopes a new ad campaign will remind enterprises that Cisco and HP ProCurve aren't the only vendors in town. Continue Reading
-
Tip
04 Oct 2005
Keeping it all separate with VRFs
A Virtual Routing and Forwarding (VRF) instance can deliver separation across both a shared infrastructure and shared devices, ultimately simplifying management. Continue Reading
- Answer 04 Oct 2005
- Answer 04 Oct 2005
-
Tip
27 Sep 2005
The network administrator's guide to forensic first response
The time between discovery of an incident and the handover of digital evidence is critical for the possibility of successful evidence retrieval. Mishandled evidence, whether to be used in court or solely in house, can damage the integrity of the investigation. The most critical concern, then, is to create the most conducive environment possible for the forensic examiner. This tip will discuss vital considerations for the administrator acting in a first responder's role to maintain the integrity of evidence and accountability. Continue Reading
-
Answer
08 Sep 2005
Placement of the firewall
In this expert response, Puneet Mehta tells us where the placement of the firewall should be architecturally. Continue Reading
- Answer 08 Sep 2005
-
Answer
28 Aug 2005
How to protect your network from broadcast and multicast storms
What methods are available to protect a network from broadcast and multicast storms? Continue Reading
-
Answer
28 Aug 2005
Security of each level of the OSI model
What kind of security is associated with each level of the OSI model? Continue Reading