Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
Why can't I access my folders on the server through the VPN?
I need a very basic VPN solution to connect two offices to allow two servers to talk to one another.
What are the differences between PVC, riser and plenum rated cables?
-
What is the differences between a router, a switch and hub?
Can you explain the ICMP ping test?
How can we say TCP is a reliable protocol?
How can I find a good job if I have my CCNA but now experience with Cisco routers?
Network administrator security policies
Some security policy elements that are specific to network administrators.Continue Reading
What are the advantages of 10 Gigabit Ethernet?
Learn about the advantages of using 10 Gigabit Ethernet for your corporate network, in this Ask the Expert response.Continue Reading
Can you assign an IP address ending in .0 or .255?
Learn how to assign an IP address ending in .0 or .255 from networking fundamentals expert Chris Partsenidis in this Q&A.Continue Reading
-
How do I connect my managed switch to a patch panel?
Minimizing Layer 2 problems
Understanding the fundamentals of Spanning Tree Protocol.Continue Reading
Auto-MDIX
How Auto-MDIX can solve the cross-over cable conundrum.Continue Reading
MPLS: Experimental bits and QoS
MPLS experimental bits are used to provide QoS capabilities by utilizing the bits set in the MPLS labels.Continue Reading
Should I try for the CCNA certification or the CCDA certification?
What is a network segment? Is a network segment the same as an Ethernet segment?
Can you help me put together a WLAN proposal?
How do intrusion detection systems work?
Can CAT 6 be used to connect two switches at a distance of 550 meters?
Protocols, Lesson 7: Subnet masks and their effect
Understand the different effects a subnet mask can have.Continue Reading
What type of security is associated with each level of the OSI model?
Protocols, Lesson 9: Subnet routing and communications
Lesson 9 in our protocol series covers the communications side of subnetting.Continue Reading
Connecting two hosts with the same IP address but different subnet masks
Is it possible to communicate two hosts with the same IP address but different subnet mask without adding a router?Continue Reading
Settings for RTS Threshold and Fragmentation Threshold
OSI model: List of some attacks
What are the elements of creating a wireless connection between two buildings?
How do I connect two wired LAN networks with a wireless link?
What is the difference between symmetric and asymmetric bandwidth?
How can I reduce the number of broadcasts on my network?
What are the main challenges facing DNS management today?
What are the main challenges facing DNS management today?Continue Reading
Can you please explain how a DHCP server allocates IP addresses dynamically?
Learn how DHCP works in this Ask the Expert response from our networking fundamentals expert, Chris Partsenidis.Continue Reading
Top 10 'show' commands
A list of the top ten 'show' commands.Continue Reading
The difference between an access point and a bridge
MPLS - Label Switched Paths
A look at some of the details of working with Label Switched Paths (LSPs).Continue Reading
Top 10 things to know about network administration
A list of the most important things network administrators should know.Continue Reading
Router Expert: Understanding reverse telnet and IOS terminal lines
Learn how users interact with the terminal server and its connected devices through the use of reverse telnet, line and group rotaries, and terminal line interfaces.Continue Reading
When I use the Microsoft Windows VPN Client, what kind of VPN tunnel is created?
How can I connect to my VPN to access Outlook and stay away from Webmail?
Deploying both a private and public WLAN
Lisa Phifer answers a reader's request for information about planning and deploying a wireless LAN -- one private and one public.Continue Reading
OSI layers are layers of server software or server hardware?
What are the minimum and maximum sizes of an ICMP packet?
What is the difference between an error and a bug?
Monitor your traffic with MRTG
The Multi Router Traffic Grapher is a free tool that can help you monitor the traffic on your network. Learn more here.Continue Reading
The Network Life Cycle
Each phase of the NLC has its own requirements that can typically be met with a judicious selection of tools and assessment solutions.Continue Reading
Router Expert: Implementing router interface redundancy
While redundancy is simple as a concept, it becomes quite problematic in practice. This tip offers the basic options for router interface redundancy.Continue Reading
Are IP NAT Traversal and VPN Passthrough the same thing?
Learning Guide: Voice over IP basics
This guide contains all the VoIP basics and essentials you will need when implementing an IP telephony network.Continue Reading
OSPF configuration
Nuances of OSPF configuration could impact your network more than you expect.Continue Reading
What is the difference between an IPsec tunnel and a normal tunnel, and what is the bandwidth of eac
Layer 3 MPLS VPNs
A look at some of the details of Layer 3 MPLS VPNs.Continue Reading
Router Expert: Cisco asynchronous serial support
Cisco IOS-based routers support three asynchronous serial interface types: Console, Auxiliary, and asynchronous port modules. This tip compares them.Continue Reading
What are the characteristic of HDLC protocol?
How can I see who is using the most of our Internet bandwidth over our LAN?
Is it possible to determine the NIC speed of a remote workstation on my LAN?
How do I control Internet bandwidth per IP on my LAN?
802.5 Ethernet vs. 802.3 Token Ring
What layer of the OSI model does a hub operate at?
Can features such as VPN pass-through on routers be abused to dump traffic onto a NAT'd LAN?
How do the clients in a WLAN communicate with the AP (Access Point) based on IP in the Network Layer
Combining VPN and WLAN technologies
WLAN security: Beyond the VPN
Wired networks have used virtual private networks (VPNs) to secure transactions across this edge, but this approach has its limitations.Continue Reading
How do I evaluate the performance of a LAN setup?
Restricting access between two LANs
What are the top five companies that are providing enterprise level WLAN products and solutions?
What does the twist in the Cat5 cable do?
How does the sender of a data packet know the IP address of the receiver? Part 1
How many different kinds of LAN cards are there?
What is required to implement SSL with encryption for TN3270 session on CS for OS/390 V2R10?
What determines the speed of a LAN that consists of 10 Mbps and 100 Mbps devices?
What is the maximum length of a cable in a local LAN set up?
Is there a minimum length for a CAT5 patch cable?
What is dual band in WLAN?
Using SSL to secure wireless LAN traffic
Can I route between two subnets using a layer 3 switch?
WLAN security checklist
WLAN security checklistContinue Reading
Standard for bandwidth utilization over WAN circuit
Interframe spacing in wireless network
LAN addressing
LAN addressingContinue Reading
Conflict between LAN and WAN on home network
Wireless LAN requirements
Thinking of going wireless? Find out what you need to consider in planning for a wireless network.Continue Reading
Protecting the LAN from lightning strikes
The importance of the subnet mask