Network Administration & Support

All Network Administration & Support Articles

Showing 1-12 of 12

Sort by Date | Title

1.
Using Static IP Addresses on Your Network
Sep 14, 2009
Eric Geier helps you discover ways to convert from dynamic to static addresses on your network.
2.
Overcoming Transport and Link Capacity Limitations Through WAN Optimization
Jun 19, 2008
This chapter examines how WAN optimization capabilities overcome performance barriers created by WAN conditions.
3.
Structuring and Modularizing the Network with Cisco Enterprise Architecture
Jun 12, 2008
This chapter introduces a modular hierarchical approach to network design, the Cisco Enterprise Architecture.
4.
On the Job with a Network Manager
Jan 12, 2007
Alexander Clemm presents a number of scenarios to give an impression of the types of activities that are performed by people who run networks for a living. He also provides an overview of some of the tools network managers have at their disposal to help them do their jobs.
5.
Backup Basics Part 3: General Tips for a Backup Strategy
Jul 14, 2006
Knowing how to configure backup applications and select backup media is half the battle of designing a successful backup strategy. The other half is choosing how and when to back up the specific pieces of data that are stored on your servers, share points, and workstations. In this final article of his series on backup basics for new technicians and administrators, Ryan Faas offers some suggestions to help you make these important decisions.
6.
Backup Basics Part 2: Demystifying Backup Media
Jun 30, 2006
In part two of a three-part series on backup basics, Ryan Faas continues to demystify backup options for new technicians and server/systems administrators. This time, the topic is choosing the media in which to store your backups. Find out the pros and cons of tape, hard drives, and RAID arrays; using network storage; and archiving using CDs or DVDs.
7.
Backup Basics Part 1: Demystifying Server and Workstation Backup Methods
Jun 16, 2006
Understanding the options for backing up servers and workstations is important for any technician or system/server administrator. But for new IT staff, all the details about how backups work and how to configure them can be confusing. In this first article in a three-part series, Ryan Faas demystifies the various types of backups that can be performed on servers and workstations using most backup applications.
8.
An Overview of the syslog Protocol
Dec 1, 2005
This chapter presents an overview of the syslog protocol and shows you how to deploy an end-to-end syslog system. You'll learn about the syslog architecture as well as the issues in deploying syslog servers in Linux and Windows OSs with a focus on their relevance in a Cisco environment.
9.
Make the Right Call: Cisco's AVVID
Jun 21, 2002
Robert Richardson discusses the pros and cons of Cisco's AVVID — what the industry's been talking about all along for pure IP convergence: smart IP phones plugged into an Ethernet network full of conventional switches and routers. Plenty of issues need to be ironed out, though.
10.
VPNs and VPN Technologies
Jan 4, 2002
This sample chapter defines virtual private networks (VPNs) and explores fundamental Internet Protocol Security (IPSec) technologies.
11.
Configuring the Cisco PIX Firewall for CA Site-to-Site
Dec 28, 2001
This sample chapter explains how to configure Cisco Secure PIX Firewall certificate authority (CA) support for Internet Protocol Security (IPSec). The chapter shows you each major step of the configuration, including support tasks, IKE, and IPSec.
12.
Securing the Corporate Network
Dec 21, 2001
Authenticate your dial-in users using your local database, and make sure your AAA is in place-- that's authentication, authorization, and accounting.