General Networking

All General Networking Articles

Showing 261-280 of 329

Sort by Date | Title

261.
SMB Networking Environments and Solutions Design Considerations
Oct 8, 2004
Designing a networking solution with the intent of bringing it to fruition through implementation is a business transaction. It is in your and the design process's best interest if that transaction is perceived by an SMB as valuable. This chapter will help you do just this.
262.
SSH Security Primer: Client Security
Feb 16, 2007
John Tränkenschuh provides a quick survey of SSH client security issues and suggested configurations for the reference SSH distribution, OpenSSH.
263.
SSH Security Primer: Server Security Settings
Feb 23, 2007
John Tränkenschuh describes the settings and implementation details important to your OpenSSH server installation. Because an OpenSSH server functions as a VPN gateway as much as a means to transfer files and invoke commands remotely, it's important to get this right.
264.
SSL VPN Design Considerations
Jun 10, 2008
This chapter discusses design issues you should consider when you build a Secure Socket Layer (SSL) Virtual Private Network (VPN) solution.
265.
Structuring and Modularizing the Network with Cisco Enterprise Architecture
Jun 12, 2008
This chapter introduces a modular hierarchical approach to network design, the Cisco Enterprise Architecture.
266.
Summary of BSCN Router Commands
Mar 7, 2003
267.
Supercharging Your Cheap Router with Enterprise Features
Oct 5, 2009
Did you know you can replace the firmware on your router? Eric Geier describes the highs and lows of aftermarket firmware projects.
268.
Technology Overview: Making the Technology Case for MPLS and Technology Details
Jan 12, 2007
Azhar Sayeed and Monique Morrow highlight several available technologies for creating services, providing pros and cons for each option and building a case for multiprotocol label switching (MPLS) as a baseline technology for service creation. They also discuss the MPLS technology details.
269.
Ten Tips and Considerations on Upgrading to Wireless N
Jun 1, 2009
Eric Geier provides tips for making your upgrade to 802.11n worth the expense.
270.
Ten Useful and Free Networking Tools
Oct 13, 2009
Eric Geier shares 10 free and useful networking tools and utilities.
271.
The Art of Network Architecture: Applying Modularity
May 12, 2014
This chapter focuses on why we use specific design patterns to implement modularity, discussing specifically why we should use hierarchical design to create a modular network design, why we should use overlay networks to create virtualization, and the results of virtualization as a mechanism to provide modularity.
272.
The Art of the Data Center: Bahnhof - Stockholm, Sweden
Oct 9, 2012
Doug Alger takes a fascinating look at one of the most amazing data centers in the world in this chapter from his book The Art of the Data Center.
273.
The Bad Guys from Outside: Malware
Apr 29, 2010
In this chapter, you'll learn how malware works and why it presents such a threat to the enterprise.
274.
The Basic Uses of TCP/IP Route Maps
Dec 9, 2005
Route maps are similar to access lists; they both have criteria for matching the details of certain packets and an action of permitting or denying those packets. This chapter explains the basics of Route Maps. Included are sample exercises to help you practice administration and use of Route Maps.
275.
The Basics of the Cisco PIX Firewall
Feb 15, 2002
The Cisco PIX firewall is a fairly simple device to configure, but you need to be familiar with the basic commands to install and secure it properly. In this article, Andy Fox covers the six commands needed to secure this firewall.
276.
The Building Blocks in a Cisco NAC Appliance Design
Jul 8, 2008
This chapter focuses on the building blocks available with the Cisco NAC Appliance solution.
277.
The Business Case for Storage Networks
Nov 18, 2004
This chapter covers the copious reasons for preferring storage networks, from the legal implications of Sarbanes-Oxley to the economy of scale created by their usage. Discover the other advantages storage networks could provide to your business within.
278.
The Business Side of Hosting a Hotspot
Jan 12, 2007
Eric Geier explains the benefits of hosting a hotspot, such as generating additional revenue and attracting more people to your business or organization, and the associated costs of doing so. This will help you decide which type of hotspot is best for your particular situation.
279.
The Cisco IOS Firewall Feature Set
May 1, 2002
Anu Tewari covers the basic components of the Cisco IOS Firewall Feature Set and tells how it can help a business guard against security breaches.
280.
The Evolution of Evil: Changes in the Use of USB Devices as Delivery Mechanisms for Malicious Code
Oct 7, 2010
USB microcontrollers are small, capable of circumventing most malware detection software, and can deliver devastating payloads. Brad Bowers takes a closer look at this new attack vector and reveals some of the challenges IT security professionals face as the use of microcontrollers as an attack platform matures.