General Networking

All General Networking Articles

Showing 241-260 of 329

Sort by Date | Title

241.
Planning the Cisco CallManager Implementation
Sep 24, 2004
Planning, designing, and implementing a Cisco IP Telephony solution is a much more manageable task if you carefully consider each step outlined in this chapter before moving on to each subsequent step.
242.
Preparing for the CCNP ONT Exam: IP Quality of Service
Dec 7, 2007
243.
Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
Sep 20, 2011
Eric Geier shows you how to protect your privacy when logging on to online accounts that don't always use secure connections, like Facebook, MySpace, Twitter, and Amazon.
244.
Protecting Your Network from the Wi-Fi Protected Setup Security Hole
Mar 12, 2012
Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.
245.
Q&A with Cisco Senior Network Consultant Akhil Behl, Author of Securing Cisco IP Telephony Networks
Sep 18, 2012
Learn more about Cisco Press author Akhil Behl and the new book Securing Cisco IP Telephony Networks.
246.
Q&A with Shannon McFarland, Co-Author of IPv6 for Enterprise Networks
Apr 15, 2011
Meet the co-author of Cisco Press’s release, IPv6 for Enterprise Networks, a book dedicated to IPv6 deployment for the enterprise. Co-author Shannon McFarland discusses the focus of the book, what makes it unique, and why you have a lot of work to do.
247.
Q&A with the Authors of "AAA Identity Management Security"
Feb 7, 2011
The authors of AAA Identity Management Security discuss the book and its features.
248.
Recovering and Securing Your Wi-Fi Encryption Keys
Jun 4, 2010
Have you forgotten the WEP or WPA key or passphrase for your Wi-Fi? Eric Geier helps you discover how to recover or reset and secure your network password.
249.
Securing Overlay Transport Virtualization (OTV) with Cisco TrustSec (CTS)
Apr 25, 2013
Ron Fuller shows just how easy it is to take advantage of MACSEC and AES128 bit encryption on your Cisco Nexus 7000 series switches.
250.
Securing the Cisco Security Monitoring, Analysis, and Response System
Jul 3, 2008
This chapter describes recommendations for securing MARS appliances, both physically and electronically.
251.
Securing the Corporate Network
Dec 21, 2001
Authenticate your dial-in users using your local database, and make sure your AAA is in place-- that's authentication, authorization, and accounting.
252.
Securing Your Wi-Fi Hotspot Sessions
Mar 30, 2010
Eric Geier shares tips to keep your email, documents, and computer safe while using Wi-Fi hotspots.
253.
Security in Tcl Scripts for Cisco IOS
Aug 10, 2010
This chapter provides an introduction to PKI infrastructure and goes on to cover the use of digital signatures to sign a Tcl script, a scenario for Tcl script-failure, and scaling Tcl script distribution.
254.
Set Up Multiple SSIDs and VLANs on a DD-WRT Router
Jul 19, 2011
DD-WRT is arguably the most popular firmware replacement or upgrade for select wireless routers. Eric Geier walks you through creating a second SSID, segregating it from the main SSID, making two of the LAN ports on the back of the router connect to just the new SSID, and leaving the other two LAN ports connected to the main SSID.
255.
Setting Up a Wi-Fi Hotspot Using m0n0wall
Mar 9, 2007
Need to set up a Wi-Fi hotspot that requires your patrons to authenticate? Sounds too expensive? On the contrary. Kulvir Singh Bhogal shows you how to set up the hotspot on the dirt-cheap.
256.
Setting Up FreeNAS for a Central File Server: Part 1
Aug 26, 2009
Eric Geier shows how to set up a NAS or network drive for free by using the open source FreeNAS program.
257.
Seven Troubleshooting Tips for Wireless N Networks
Oct 1, 2009
Are your wireless N connections not getting the speeds, performance, or range you hoped for? Eric Geier helps you get your money's worth.
258.
Should I Be Interested in MPLS Traffic Engineering?
Jan 3, 2003
259.
Signaling System No. 7: The Role of SS7
Aug 13, 2004
Although it is transparent, Signaling System No. 7 plays a role in the lives of virtually every individual in developed countries. Find out how this system is vital to quality of service in chapter by Lee Dryburgh and Jeff Hewett.
260.
SIP Trunking Design and Implementation Considerations
Mar 21, 2010
This chapter highlights many of the network design and implementation considerations you should work through while planning or installing a SIP trunk for production purposes in your network.