General Networking

All General Networking Articles

Showing 181-200 of 329

Sort by Date | Title

Page: < Prev 8 9 10 11 12 Next >

181.
Basic IPsec VPN Topologies and Configurations
Sep 29, 2006
In this chapter, you will review several common deployments of IPsec virtual private networks (VPNs).
182.
Multiprotocol Label Switching Traffic Engineering Technology Overview
Sep 22, 2006
This chapter presents a review of Multiprotocol Label Switching Traffic Engineering (MPLS TE) technology. MPLS TE can play an important role in the implementation of network services with quality of service (QoS) guarantees.
183.
How to Configure OpenVPN
Sep 8, 2006
Michael Riley shows you how to use OpenVPN for secure internet surfing on your client PCs. He’ll also help you set up the configuration that will allow you access to your home network while you’re traveling.
184.
Overview of Modern SCSI Networking Protocols
Aug 4, 2006
The goal of this chapter is to quickly acclimate readers to the standard upper-layer storage protocols currently being deployed. To that end, it provides a conceptual description and brief procedural overview for each ULP.
185.
Enterprise-Class Wireless LANs: Guidelines for A Successful Architecture and Design
Jul 21, 2006
This chapter adopts a "60,000-foot view" of the challenges ahead and asks you to answer some key questions on technical, financial, and program management issues. The chapter also introduces such topics as strategic preparation and planning, architectural considerations, and program management. Upon completion, you will be prepared to describe in strategic terms where you will deploy, how you will deploy, how you will fund and manage your deployment.
186.
Backup Basics Part 3: General Tips for a Backup Strategy
Jul 14, 2006
Knowing how to configure backup applications and select backup media is half the battle of designing a successful backup strategy. The other half is choosing how and when to back up the specific pieces of data that are stored on your servers, share points, and workstations. In this final article of his series on backup basics for new technicians and administrators, Ryan Faas offers some suggestions to help you make these important decisions.
187.
Creating Custom Policies for the Cisco Security Agent
Jul 14, 2006
Creating your own policies is a major part of operating a successful CSA deployment. To accomplish this, you must thoroughly understand the components available to you and the methods of research available. Understanding the rule types and the events caused by those rules helps you move forward in your deployment and perform day-to-day support. A solid grasp of the fundamentals and advanced components not only makes you an effective administrator but also an efficient one. This chapter will help you get started with this.
188.
Backup Basics Part 2: Demystifying Backup Media
Jun 30, 2006
In part two of a three-part series on backup basics, Ryan Faas continues to demystify backup options for new technicians and server/systems administrators. This time, the topic is choosing the media in which to store your backups. Find out the pros and cons of tape, hard drives, and RAID arrays; using network storage; and archiving using CDs or DVDs.
189.
Backup Basics Part 1: Demystifying Server and Workstation Backup Methods
Jun 16, 2006
Understanding the options for backing up servers and workstations is important for any technician or system/server administrator. But for new IT staff, all the details about how backups work and how to configure them can be confusing. In this first article in a three-part series, Ryan Faas demystifies the various types of backups that can be performed on servers and workstations using most backup applications.
190.
Troubleshooting Cisco Secure ACS on Windows
Jun 16, 2006
Cisco Secure Access Control Server, which is known as CS ACS, fills the server-side requirement of the Authentication, Authorization, and Accounting (AAA) client server equation. For many security administrators, the robust and powerful AAA engine, along with CS ACS's ability to flexibly integrate with a number of external user databases, makes the CS ACS software the first and sometimes only choice for an AAA server-side solution. This chapter explores CS ACS in detail and walks you through troubleshooting steps. The chapter focuses on the approach required to troubleshoot any issue efficiently, either with the CS ACS software itself or with the whole AAA process.
191.
Building Resilient IP Networks: The Access Module
Jun 9, 2006
This chapter focuses on Ethernet switching technology, specifically Layer 2 network resiliency and how it should be built to provide a solid foundation for the Layer 3 network.
192.
Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
Jun 9, 2006
This chapter will focus on using a concentrator to terminate other types of remote access sessions, including PPTP, L2TP over IPsec, and WebVPN. The remainder of this chapter will focus on the configuration of the concentrator to support these types of remote access VPN implementations.
193.
Penetration Testing and Network Defense: Performing Host Reconnaissance
Jun 2, 2006
Malicious hackers also value reconnaissance as the first step in an effective attack. For them, seeing what is on the "other side of the hill" is crucial to knowing what type of attack to launch. Although penetration testers might not always have the luxury of time that a malicious hacker might have, they do recognize the value of reconnaissance. This chapter will help you develop network reconnaissance skills to help you protect your network from intrusion.
194.
Wireless LAN Design
Jun 2, 2006
This chapter discusses wireless LAN (WLAN) technology and describes how it improves mobility. After introducing WLANs as strategic assets to corporate networks, WLAN standards and components are discussed. The security and management of WLANs are explored, followed by design considerations for WLANs.
195.
Intrusion Prevention: Signatures and Actions
May 26, 2006
Attack signatures have been around for long enough that the definition should be universally understood, but that's not the case. Simply put, an IPS signature is any distinctive characteristic that identifies something. Using this definition, all IPS products use signatures of some kind, regardless of what the product descriptions claim. To find something and stop it, you must be able to identify it, and for you to identify it, it must display a distinct characteristic. This chapter introduces you to the concept of signatures.
196.
Home Network Router Security Secrets
Apr 7, 2006
Ever delve inside your home network routers and use the hidden security settings that can lock down a network nice and tight? Most people never do. Andy Walker reveals 10 secrets on how to easily access your router's security settings.
197.
A Student-Hacker Showdown at the Collegiate Cyber Defense Competition
Mar 31, 2006
Students-turned-IT managers faced off against experienced hackers at the Mid-Atlantic Regional Collegiate Cyber Defense Competition. Seth Fogie witnessed this real-world competition and reports on its unexpected twists, turns, and even drama.
198.
Trash Your Pocket PC Synchronization Cable and Go Wireless
Feb 10, 2006
Do you daydream about new ways to be wireless? Kulvir Bhogal shows you how to synchronize your wirelessly-enabled Pocket PC with your PC over your wireless network — with no strings attached!
199.
MPLS Traffic Engineering
Jan 13, 2006
MPLS Traffic Engineering (MPLS TE) is a growing implementation in today's service provider networks. MPLS adoption in service provider networks has increased manifold due to its inherent TE capabilities. This chapter provides you with information on the operation and configuration of MPLS TE on Cisco routers.
200.
CCNP Exam Prep: Traditional Spanning Tree Protocol
By David Hucaby
Dec 22, 2005
This chapter discusses the theory and operation of the STP with an eye toward passing the CCNP BCMSN Exam. More specifically, the original, or traditional, STP is covered, as defined in IEEE 802.1D.

Page: < Prev 8 9 10 11 12 Next >