- Connecting Non-802.1X Devices to an Enterprise Network
- Sep 27, 2011
- Whether you're an administrator or just a user of a Wi-Fi network secured with WPA/WPA2-Enterprise, you can learn from Eric Geier how to get non-802.1X computers and devices onto your network.
- Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
- Sep 20, 2011
- Eric Geier shows you how to protect your privacy when logging on to online accounts that don't always use secure connections, like Facebook, MySpace, Twitter, and Amazon.
- AT&T/T-Mobile Merger: Let's Call It What It Is, Part II
- Sep 14, 2011
- As two of the largest wireless carriers in the U.S. prepare to join forces, Leo A. Wrobel and special guest author Eddie M. Pope, Esq. explain why the U.S. Department of Justice thinks of this collaboration as a threat - and why you should be equally alarmed.
- CCNA SEC: Router Hardening
- Sep 14, 2011
- This article discusses various means of making sure your routers are set up with maximum security, including manually hardening the router and router hardening with Cisco SDM.
- AT&T/T-Mobile Merger: Let’s Call It What It Is
- Sep 5, 2011
- Anyone who has ever taken a basic economics course knows that fewer players in an industry lead to higher prices and more limited choice, absent regulatory oversight. Noted author and technical futurist Leo Wrobel explains why the AT&T/ T-Mobile merger is a bad idea – for consumers, the market, and even the U.S. Constitution – and how the future of the Internet itself is at stake.
- To Route or Not to Route: A Day in the Life of a Router
- Aug 31, 2011
- A lot goes into the decision process regarding routing, and it happens long before a packet arrives at the router for its turn to be forwarded. In this article, the author takes a close look at a day in the life of the router.
- What Happens in the VLAN Stays in the VLAN
- Aug 31, 2011
- This article discusses discover the secrets of the VLAN and why it is a critical tool in todays networks.
- Working with Protocol Analyzers and Related Certifications
- Aug 30, 2011
- Ed Tittel, creator of the Exam Cram series, discusses the current network protocol analyzers that any real expert needs to know. Who exactly counts as an "expert?" Ed also sorts out which of the many available certifications are really useful in identifying true masters of protocol analysis.
- Implementing Cisco Unified Communications Manager, Part 2 (CCNP Voice): Examining Remote-Site Redundancy Options
- Aug 25, 2011
- This chapter provides an overview of the different options with remote-site redundancy in CUCM multisite installations.
- CCNP Security VPN Cert Guide: Configuring Policies, Inheritance, and Attributes
- Aug 24, 2011
- This chapter looks at the methods available for policy assignment in real-life scenarios and reviews how these policy methods work together if more than one is assigned to a user through the inheritance mode.
- CCNP: Troubleshooting EIGRP
- Aug 3, 2011
- In this article, we will examine the art of Troubleshooting EIGRP, a key topic for CCNP certification. This article will begin by reviewing key information we should keep in mind about the protocol or its proper implementation and troubleshooting, and then specific scenarios will be illustrated. The article will also provide specific command guidance and usage.
- Cisco Unified Contact Center Enterprise Platform Deployment
- Jul 27, 2011
- Securing a Web App at the Last Minute
- Jul 26, 2011
- While consumers and the media are increasingly aware of the risks to confidential information over web apps, firms still tend to focus on development, leaving data security until just before the go-live date. Ajay Gupta points out that last-minute steps are available to improve the security of your apps before launching them onto the Internet.
- Flexible Netflow Concepts and Configuration
- Jul 22, 2011
- This article takes a look at the typical uses for the Flexible Netflow feature, how it works and how it can be configured into a complete solution.
- Cisco Network Infrastructure Security: Control Plane Policing Concepts and Configuration
- Jul 21, 2011
- This article takes a looks at control plane policing, examining what it is, how it works and how it can be configured to secure this equipment.
- SNMP Concepts and Configuration
- Jul 20, 2011
- This article takes a look at some of the basic SNMP concepts, examining how it works and how it can be configured to perform basic functions.
- Set Up Multiple SSIDs and VLANs on a DD-WRT Router
- Jul 19, 2011
- DD-WRT is arguably the most popular firmware replacement or upgrade for select wireless routers. Eric Geier walks you through creating a second SSID, segregating it from the main SSID, making two of the LAN ports on the back of the router connect to just the new SSID, and leaving the other two LAN ports connected to the main SSID.
- CCNP Security IPS 642-627 Official Cert Guide: Network IPS Traffic Analysis Methods, Evasion Possibilities, and Anti-evasive Countermeasures
David Burns, Odunayo Adesina
- Jul 18, 2011
- This chapter covers the various methods used for traffic analysis using a network IPS sensor, the various evasion techniques used by attackers to bypass detection & filtering while understanding the benefits and limitations of each method to assess the risk of evasion, and the various countermeasures, tools, and choosing the best approach based on the methods used by attackers.
- Designing Voicemail Systems with Cisco Unity Connection
- Jul 14, 2011
- This chapter focuses on the Cisco Unity Connection product design and capabilities as they pertain to its various systems, database, and networking.
- Routing Protocol Authentication Concepts and Configuration
- Jul 13, 2011
- This article takes a look at the available routing protocol authentication options for the most often used routing protocols: EIGRP, OSPF, RIP and BGP.