• Making sense of Windows routing tables

    When routing packets across a network, things do occasionally go wrong. In these situations, it is helpful to be familiar with the Windows routing tables. Routing tables dictate the flow of packets from the machine in question. This tip will show ...  Continue Reading

  • Network security checklist

    While 100% security is hardly a possibility, there are several things that you can do to make your network more secure. Learn about them with this network security checklist.  Continue Reading

  • VRFs and routing

    Doug Downer continues his series about VPN routing and forwarding instances focused on the task of configuring and verifying a VRF scenario with a requirement for separate customers on a shared device. In this tip, he shows how to configure a method...  Continue Reading

  • Router numbers

    Many of the routing protocols implemented in Cisco's IOS require a number to follow the command that enables the routing protocol in question. If you're new to routing, these numbers can be a little confusing, as they mean something different to ...  Continue Reading

  • Wireless LAN security: 802.11i

    What is 802.11i, and is it really practical for you to implement in your organization? Robbie Harrell explores how the new wireless standard can improve security -- and reasons why you may want to switch to 802.11i or stick with WPA.  Continue Reading

Unified Communications
Mobile Computing
Data Center