General Networking

All General Networking Articles

Showing 161-180 of 329

Sort by Date | Title

161.
Home Network Router Security Secrets
Apr 7, 2006
Ever delve inside your home network routers and use the hidden security settings that can lock down a network nice and tight? Most people never do. Andy Walker reveals 10 secrets on how to easily access your router's security settings.
162.
Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams
Jul 1, 2005
In addition to viruses and worms, there are some other annoying programs and files out there that you need to protect your home network from. This chapter focuses on spam, cookies, spyware, and scams—what they are, how they work, and how to get rid of or at least control them.
163.
Host Intrusion Prevention Systems: Defense-in-Depth's Best Friend
Jul 1, 2005
Chad Sullivan takes a look at common security issues and how host Intrusion Prevention Systems (IPS) can become the most crucial piece of your corporate layered security plan.
164.
Hot Standby Router Protocol (HSRP) Configuration
Sep 23, 2013
In this article, networking consultant Sean Wilkins explains how Hot Standby Redundancy Protocol (HSRP) devices communicate together. The article then delves into the commands and configuration steps required to get HSRP up and operating between devices.
165.
How Apple's iPhone is Changing the Game Plan for Mobile Service Operators: An Interview with Mark Grayson and Kevin Shatzkamer
Jun 30, 2009
Linda Leung, Mark Grayson, and Kevin Shatzkamer discuss how mobile operators can implement all-IP networks, what enterprises and service providers can learn from each other, and how IPv6 affects the mobile world.
166.
How to Configure OpenVPN
Sep 8, 2006
Michael Riley shows you how to use OpenVPN for secure internet surfing on your client PCs. He’ll also help you set up the configuration that will allow you access to your home network while you’re traveling.
167.
How to Network Windows 7, Vista, and XP Computers
Nov 13, 2009
Upgrading to Windows 7 but still have XP or Vista machines? No problem. Eric Geier shows you how to network among all these Windows versions.
168.
I/O Consolidation in the Data Center
Sep 23, 2009
This chapter explains the benefits and challenges of designing physical infrastructure to simultaneously carry multiple types of traffic.
169.
Identifying and Classifying Network Security Threats
Jun 26, 2008
This chapter presents several best practices and methodologies you can use to successfully and quickly identify and classify security threats and anomalies in the network.
170.
IEEE 802.1X: Practical Port Control for Switches
By Stephen McQuerry
Oct 4, 2002
171.
Improve Your Network's Security Using Network Admission Control
Aug 26, 2005
Is there a place for security focused on the good guys in networking? There is, and one of the latest additions to this area of security is called Network Admission Control (NAC). Sean Convery introduces NAC, a security measure built around the idea that asking specific questions of an organization's end hosts can improve the overall security of a network by improving the compliance of end systems to a given admission policy.
172.
Initial Interdomain Network Topology
Aug 9, 2002
Take a look at a detailed example of an ISP customer within an interdomain multicast network implemented SSM in its network using URD, and learn the three ways to implement SSM in an interdomain environment.
173.
Integrated IS-IS Commands for CCNP BSCI
Dec 7, 2007
174.
Integrated IS-IS Routing Protocol Concepts
May 17, 2002
This chapter reviews the basic concepts underlying the design of the IS-IS routing protocol and discusses the two-level hierarchy for controlling distribution of routing information within IS-IS areas and between them.
175.
Integrated Services Digital Network Primer
Oct 18, 2002
176.
Interconnecting Data Centers Using VPLS: Data Center Layer 2 Interconnect
Jun 24, 2009
This chapter provides an overview of high availability (HA) clusters, legacy deployment models for interconnecting data centers, and problems related to extending Layer 2 networks.
177.
Interexchange Carrier MPLS Network Design Study
Jul 22, 2005
USCom is a fictitious nationwide data and long-distance voice service provider in the U.S. This chapter discusses the current USCom MPLS network design, its evolution, and how USCom characteristics and objectives influenced the corresponding design decisions that were made in order to illustrate how design decisions should stem from the characteristics of your company.
178.
Intermediate System-to-Intermediate System (IS-IS) Basics for the Cisco BSCI Exam
Nov 13, 2003
This Flash Cards excerpt gives you the basic facts about IS-IS you need to know for the Cisco BSCI exam.
179.
Internet Addressing and Routing First Step
Nov 5, 2004
This chapter explains how internet routing works, and how internet addresses are assigned and utilized by network structures.
180.
Introduction to Cisco IOS Software
Oct 31, 2003
This sample chapter introduces the fundamentals of Cisco IOS software, the operating system that runs on Cisco routers and switches.