General Networking

All General Networking Articles

Showing 201-220 of 329

Sort by Date | Title

201.
Cisco ASA Security Contexts
Dec 16, 2005
The virtual firewall methodology enables a physical firewall to be partitioned into multiple standalone firewalls. Each standalone firewall acts and behaves as an independent entity with its own configuration, interfaces, security policies, routing table, and administrators. In Cisco ASA, these virtual firewalls are known as security contexts. This chapter covers security contexts in detail.
202.
Cisco IPS Device Manager (IDM)
Dec 16, 2005
The Cisco IPS Device Manager (IDM) is a tool that enables you to configure and manage a single Cisco network sensor. This Java-based web tool provides you with a graphical interface to manipulate the operation of your sensor. This chapter will help you get started with the Cisco IDM.
203.
A Network Administrator's View of Multiservice Networks
Dec 9, 2005
Multiservice networks provide more than one distinct communications service type over the same physical infrastructure. Multiservice implies not only the existence of multiple traffic types within the network, but also the ability of a single network to support all of these applications without compromising quality of service (QoS) for any of them. This chapter covers multiservice networks in detail from the network administrator's viewpoint.
204.
An Overview of Cisco IP Communications
Dec 9, 2005
This chapter provides an overview of Cisco IP Communications, including VoIP and how Cisco IP Communications differs from traditional telephone systems, and how you can use VoIP to achieve savings by routing your telephone calls over the IP WAN.
205.
The Basic Uses of TCP/IP Route Maps
Dec 9, 2005
Route maps are similar to access lists; they both have criteria for matching the details of certain packets and an action of permitting or denying those packets. This chapter explains the basics of Route Maps. Included are sample exercises to help you practice administration and use of Route Maps.
206.
Cisco 802.11 Wireless Networking: Installing and Configuring Access Points
Dec 1, 2005
The largest hurdle toward getting your wireless LAN (WLAN) up and running is the configuration of your access points (APs) and wireless clients. This chapter examines how to install and configure the AP.
207.
Corporate Governance, Business Continuity Planning, and Disaster Recovery
Dec 1, 2005
To protect business stakeholders, corporate governance focuses a sharp eye on all measures and systems within the organization to ensure compliance with laws, regulations, and standards. Michelle Johnston Sollicito points out the many required aspects of a proper business continuity plan and shows you where to look for holes in your process.
208.
IPSec Authentication and Authorization Models
Oct 21, 2005
This chapter covers IPSec features and mechanisms that are primarily targeted at the authentication of remote access users. You'll learn about XAUTH, which provides extended authentication for IPSec telecommuters by using authentication schemes such as RADIUS. MODECFG uses a push model to push attributes to the IPSec client.
209.
Deploying Cisco CallManager and Unity Devices
Oct 14, 2005
This chapter covers all the required tasks needed to add phones and gateways to a Cisco CallManager system. Four methods to add phones to the system are discussed: manual registration, Auto-registration, BAT, and TAPS.
210.
Analyzing MPLS VPN Security
Oct 6, 2005
VPN users have certain expectations and requirements for their VPN service. In a nutshell, they want their service to be both private and secure. In other words, they want their VPN to be as secure as with dedicated circuits while gaining the scalability benefits of a shared infrastructure. Both concepts, of privacy and security, are not black and white, and need to be defined for a real world implementation. This chapter introduces you to VPN MPLS security requirements.
211.
Two-Factor Authentication in Windows
Oct 6, 2005
Simple passwords aren't good enough any more, as the flood of stories about phishing, fraud, and compromised accounts by the millions demonstrate. The Next Big Thing in computer security is two-factor authentication and, like it or not, you're probably going to be dealing with it in the next year or so. But two-factor authentication is a concept, not a product, and how it's implemented is critical to its success.
212.
Choosing an Optimal Location for Your Data Center
Sep 30, 2005
When a company buys new land, it is important to consider the property's suitability to house a server environment. Failing to do so often means having to spend more on Data Center infrastructure, either to add what's missing or to overcome shortcomings on the site. The most desirable type of location is one that supports the Data Center's mission to safeguard server equipment and accommodate growth and change. This chapter will help you assess your server site for suitability.
213.
Which Routing Protocol Should My Network Use?
Sep 30, 2005
One of the toughest questions facing network engineers is which routing protocol to use. Each has its strengths, and each works better with some network designs than with others. This chapter will help you decide which routing protocol is best for your particular network.
214.
Improve Your Network's Security Using Network Admission Control
Aug 26, 2005
Is there a place for security focused on the good guys in networking? There is, and one of the latest additions to this area of security is called Network Admission Control (NAC). Sean Convery introduces NAC, a security measure built around the idea that asking specific questions of an organization's end hosts can improve the overall security of a network by improving the compliance of end systems to a given admission policy.
215.
Deploying Secure Internet Connectivity with Cisco ASA and PIX Firewalls
Aug 5, 2005
This chapter provides you with the necessary information to use the ASDM Startup Wizard to perform the initial configuration of your network. It provides a step-by-step procedure explaining how to use the ASDM Startup Wizard to set up the initial configuration for your ASA/PIX Security Appliance.
216.
Understanding Cisco Security Agent Components and Installation
Jul 29, 2005
In this chapter, you will continue to gain an understanding of the CSA architecture through an exploration of the agent software components, protocol communication, and installation.
217.
Interexchange Carrier MPLS Network Design Study
Jul 22, 2005
USCom is a fictitious nationwide data and long-distance voice service provider in the U.S. This chapter discusses the current USCom MPLS network design, its evolution, and how USCom characteristics and objectives influenced the corresponding design decisions that were made in order to illustrate how design decisions should stem from the characteristics of your company.
218.
Mobile IP Technology and Applications
Jul 8, 2005
This chapter highlights the major concepts of IOS Mobile IP configuration in a simple lab topology. It presents in detail the most important concepts in IOS Mobile IP configuration. We start out by using six routers to examine each component individually. Several alternatives requiring fewer routers are presented at the end of the chapter.
219.
Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams
Jul 1, 2005
In addition to viruses and worms, there are some other annoying programs and files out there that you need to protect your home network from. This chapter focuses on spam, cookies, spyware, and scams—what they are, how they work, and how to get rid of or at least control them.
220.
Host Intrusion Prevention Systems: Defense-in-Depth's Best Friend
Jul 1, 2005
Chad Sullivan takes a look at common security issues and how host Intrusion Prevention Systems (IPS) can become the most crucial piece of your corporate layered security plan.