Tips
Tips
-
Preventing Layer 2 security threats
Layer 2 switched environments, typically found in enterprise customer wiring closets, can be easy targets for network security attacks. Continue Reading
-
Run your VoIP calls over a VPN for enhanced security
A look at using a VPN to enhance VoIP security. Continue Reading
-
Top 10 'show' commands
A list of the top ten 'show' commands. Continue Reading
-
MPLS - Label Switched Paths
A look at some of the details of working with Label Switched Paths (LSPs). Continue Reading
-
Top 10 things to know about network administration
A list of the most important things network administrators should know. Continue Reading
-
Router Expert: Understanding reverse telnet and IOS terminal lines
Learn how users interact with the terminal server and its connected devices through the use of reverse telnet, line and group rotaries, and terminal line interfaces. Continue Reading
-
Deploying both a private and public WLAN
Lisa Phifer answers a reader's request for information about planning and deploying a wireless LAN -- one private and one public. Continue Reading
-
Monitor your traffic with MRTG
The Multi Router Traffic Grapher is a free tool that can help you monitor the traffic on your network. Learn more here. Continue Reading
-
WLAN implementation tutorial -- Capacity planning: Step 1
For WLAN implementation, make sure you have Step 1 down -- capacity planning, not just coverage. Continue Reading
-
The Network Life Cycle
Each phase of the NLC has its own requirements that can typically be met with a judicious selection of tools and assessment solutions. Continue Reading
-
Router Expert: Implementing router interface redundancy
While redundancy is simple as a concept, it becomes quite problematic in practice. This tip offers the basic options for router interface redundancy. Continue Reading
-
Learning Guide: Voice over IP basics
This guide contains all the VoIP basics and essentials you will need when implementing an IP telephony network. Continue Reading
-
OSPF configuration
Nuances of OSPF configuration could impact your network more than you expect. Continue Reading
-
Layer 3 MPLS VPNs
A look at some of the details of Layer 3 MPLS VPNs. Continue Reading
-
Router Expert: Cisco asynchronous serial support
Cisco IOS-based routers support three asynchronous serial interface types: Console, Auxiliary, and asynchronous port modules. This tip compares them. Continue Reading
-
Tips on working with VLSM
Variable Length Subnet Masks (VLSM) can require some serious number crunching but there are many ways to help make the process simpler. Continue Reading
-
MPLS Versus IPSEC VPNs: Which one is right for you
An examination of the similarities and differences between IPSEC and MPLS and some insight as to when one should be used over the other. Continue Reading
-
WLAN security: Beyond the VPN
Wired networks have used virtual private networks (VPNs) to secure transactions across this edge, but this approach has its limitations. Continue Reading
-
WLAN security checklist
WLAN security checklist Continue Reading
-
Should you use a voice VLAN
Advantages and disadvantages of using a voice VLAN. Continue Reading
-
The VPN Expert: VPN client alternatives, part 4 -- IPsec
Here's a list of IPsec clients that run on many systems. See what they have to offer and what they are often missing. Continue Reading
-
LAN addressing
LAN addressing Continue Reading
-
Wireless LAN requirements
Thinking of going wireless? Find out what you need to consider in planning for a wireless network. Continue Reading
-
The importance of the subnet mask