Cisco Network Technology

All Cisco Network Technology Articles

Showing 281-300 of 367

Sort by Date | Title

281.
Securing the Corporate Network
Dec 21, 2001
Authenticate your dial-in users using your local database, and make sure your AAA is in place-- that's authentication, authorization, and accounting.
282.
Securing Wireless Networks
Jul 2, 2008
This chapter discusses wireless security, including a checklist for securing Wi-Fi.
283.
Securing Your Wi-Fi Hotspot Sessions
Mar 30, 2010
Eric Geier shares tips to keep your email, documents, and computer safe while using Wi-Fi hotspots.
284.
Security Advocacy and Awareness: Creating A Secure Culture
Nov 24, 2004
All your efforts at securing your network are for naught if your users don't cooperate. This article will provide you with the tools you need to create a secure culture for your organization.
285.
Security Features on Switches
Jul 4, 2008
This chapter describes Layer 2 security basics and security features on switches available to combat network security threats.
286.
Security Financials: The Core Element of Security Business Proposals
Jun 10, 2005
Security financials help business managers to understand how and why an IT security project costs what it does, which helps business management to understand why funds need to be allocated for IT security, and helps IT to justify their spending. This article explains the benefits of security financials, and what should be in them.
287.
Security in Tcl Scripts for Cisco IOS
Aug 10, 2010
This chapter provides an introduction to PKI infrastructure and goes on to cover the use of digital signatures to sign a Tcl script, a scenario for Tcl script-failure, and scaling Tcl script distribution.
288.
Set Up Multiple SSIDs and VLANs on a DD-WRT Router
Jul 19, 2011
DD-WRT is arguably the most popular firmware replacement or upgrade for select wireless routers. Eric Geier walks you through creating a second SSID, segregating it from the main SSID, making two of the LAN ports on the back of the router connect to just the new SSID, and leaving the other two LAN ports connected to the main SSID.
289.
Setting Up a Wi-Fi Hotspot Using m0n0wall
Mar 9, 2007
Need to set up a Wi-Fi hotspot that requires your patrons to authenticate? Sounds too expensive? On the contrary. Kulvir Singh Bhogal shows you how to set up the hotspot on the dirt-cheap.
290.
Setting Up FreeNAS for a Central File Server: Part 1
Aug 26, 2009
Eric Geier shows how to set up a NAS or network drive for free by using the open source FreeNAS program.
291.
Seven Troubleshooting Tips for Wireless N Networks
Oct 1, 2009
Are your wireless N connections not getting the speeds, performance, or range you hoped for? Eric Geier helps you get your money's worth.
292.
Should I Be Interested in MPLS Traffic Engineering?
Jan 3, 2003
293.
Signaling System No. 7: The Role of SS7
Aug 13, 2004
Although it is transparent, Signaling System No. 7 plays a role in the lives of virtually every individual in developed countries. Find out how this system is vital to quality of service in chapter by Lee Dryburgh and Jeff Hewett.
294.
SIP Trunking Design and Implementation Considerations
Mar 21, 2010
This chapter highlights many of the network design and implementation considerations you should work through while planning or installing a SIP trunk for production purposes in your network.
295.
SMB Networking Environments and Solutions Design Considerations
Oct 8, 2004
Designing a networking solution with the intent of bringing it to fruition through implementation is a business transaction. It is in your and the design process's best interest if that transaction is perceived by an SMB as valuable. This chapter will help you do just this.
296.
SSH Security Primer: Client Security
Feb 16, 2007
John Tränkenschuh provides a quick survey of SSH client security issues and suggested configurations for the reference SSH distribution, OpenSSH.
297.
SSH Security Primer: Server Security Settings
Feb 23, 2007
John Tränkenschuh describes the settings and implementation details important to your OpenSSH server installation. Because an OpenSSH server functions as a VPN gateway as much as a means to transfer files and invoke commands remotely, it's important to get this right.
298.
SSL VPN Design Considerations
Jun 10, 2008
This chapter discusses design issues you should consider when you build a Secure Socket Layer (SSL) Virtual Private Network (VPN) solution.
299.
Structuring and Modularizing the Network with Cisco Enterprise Architecture
Jun 12, 2008
This chapter introduces a modular hierarchical approach to network design, the Cisco Enterprise Architecture.
300.
Summary of BSCN Router Commands
Mar 7, 2003