261. | - SMB Networking Environments and Solutions Design Considerations
- Oct 8, 2004
- Designing a networking solution with the intent of bringing it to fruition through implementation is a business transaction. It is in your and the design process's best interest if that transaction is perceived by an SMB as valuable. This chapter will help you do just this.
|
262. | - SSH Security Primer: Client Security
- Feb 16, 2007
- John Tränkenschuh provides a quick survey of SSH client security issues and suggested configurations for the reference SSH distribution, OpenSSH.
|
263. | - SSH Security Primer: Server Security Settings
- Feb 23, 2007
- John Tränkenschuh describes the settings and implementation details important to your OpenSSH server installation. Because an OpenSSH server functions as a VPN gateway as much as a means to transfer files and invoke commands remotely, it's important to get this right.
|
264. | - SSL VPN Design Considerations
- Jun 10, 2008
- This chapter discusses design issues you should consider when you build a Secure Socket Layer (SSL) Virtual Private Network (VPN) solution.
|
265. | - Structuring and Modularizing the Network with Cisco Enterprise Architecture
- Jun 12, 2008
- This chapter introduces a modular hierarchical approach to network design, the Cisco Enterprise Architecture.
|
266. | - Summary of BSCN Router Commands
- Mar 7, 2003
|
267. | - Supercharging Your Cheap Router with Enterprise Features
- Oct 5, 2009
- Did you know you can replace the firmware on your router? Eric Geier describes the highs and lows of aftermarket firmware projects.
|
268. | - Technology Overview: Making the Technology Case for MPLS and Technology Details
- Jan 12, 2007
- Azhar Sayeed and Monique Morrow highlight several available technologies for creating services, providing pros and cons for each option and building a case for multiprotocol label switching (MPLS) as a baseline technology for service creation. They also discuss the MPLS technology details.
|
269. | - Ten Tips and Considerations on Upgrading to Wireless N
- Jun 1, 2009
- Eric Geier provides tips for making your upgrade to 802.11n worth the expense.
|
270. | - Ten Useful and Free Networking Tools
- Oct 13, 2009
- Eric Geier shares 10 free and useful networking tools and utilities.
|
271. | - The Art of Network Architecture: Applying Modularity
- May 12, 2014
- This chapter focuses on why we use specific design patterns to implement modularity, discussing specifically why we should use hierarchical design to create a modular network design, why we should use overlay networks to create virtualization, and the results of virtualization as a mechanism to provide modularity.
|
272. | - The Art of the Data Center: Bahnhof - Stockholm, Sweden
- Oct 9, 2012
- Doug Alger takes a fascinating look at one of the most amazing data centers in the world in this chapter from his book The Art of the Data Center.
|
273. | - The Bad Guys from Outside: Malware
- Apr 29, 2010
- In this chapter, you'll learn how malware works and why it presents such a threat to the enterprise.
|
274. | - The Basic Uses of TCP/IP Route Maps
- Dec 9, 2005
- Route maps are similar to access lists; they both have criteria for matching the details of certain packets and an action of permitting or denying those packets. This chapter explains the basics of Route Maps. Included are sample exercises to help you practice administration and use of Route Maps.
|
275. | - The Basics of the Cisco PIX Firewall
- Feb 15, 2002
- The Cisco PIX firewall is a fairly simple device to configure, but you need to be familiar with the basic commands to install and secure it properly. In this article, Andy Fox covers the six commands needed to secure this firewall.
|
276. | - The Building Blocks in a Cisco NAC Appliance Design
- Jul 8, 2008
- This chapter focuses on the building blocks available with the Cisco NAC Appliance solution.
|
277. | - The Business Case for Storage Networks
- Nov 18, 2004
- This chapter covers the copious reasons for preferring storage networks, from the legal implications of Sarbanes-Oxley to the economy of scale created by their usage. Discover the other advantages storage networks could provide to your business within.
|
278. | - The Business Side of Hosting a Hotspot
- Jan 12, 2007
- Eric Geier explains the benefits of hosting a hotspot, such as generating additional revenue and attracting more people to your business or organization, and the associated costs of doing so. This will help you decide which type of hotspot is best for your particular situation.
|
279. | - The Cisco IOS Firewall Feature Set
- May 1, 2002
- Anu Tewari covers the basic components of the Cisco IOS Firewall Feature Set and tells how it can help a business guard against security breaches.
|
280. | - The Evolution of Evil: Changes in the Use of USB Devices as Delivery Mechanisms for Malicious Code
- Oct 7, 2010
- USB microcontrollers are small, capable of circumventing most malware detection software, and can deliver devastating payloads. Brad Bowers takes a closer look at this new attack vector and reveals some of the challenges IT security professionals face as the use of microcontrollers as an attack platform matures.
|