Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
How do I set up two or more wireless adapters on the same computer to work together?
Keeping it all separate with VRFs
A Virtual Routing and Forwarding (VRF) instance can deliver separation across both a shared infrastructure and shared devices, ultimately simplifying management. Continue Reading
What certification better compliments the MCSE: CCNA or RHCE?
-
The network administrator's guide to forensic first response
The time between discovery of an incident and the handover of digital evidence is critical for the possibility of successful evidence retrieval. Mishandled evidence, whether to be used in court or solely in house, can damage the integrity of the ... Continue Reading
Placement of the firewall
In this expert response, Puneet Mehta tells us where the placement of the firewall should be architecturally. Continue Reading
Which transmission media are the most secure and the least secure?
How to protect your network from broadcast and multicast storms
What methods are available to protect a network from broadcast and multicast storms?Continue Reading
Security of each level of the OSI model
What kind of security is associated with each level of the OSI model?Continue Reading
Hardening your router in 9 easy steps
For most enterprise LANs, the router has become one of the most critical security appliances in use. Configured properly, it can keep all but the most determined bad guys out, and if you want, it can even keep the good guys in. But an improperly ...Continue Reading
Router Expert: Standard interface configuration for a WLAN proxy server
Our router expert continues his series on building a secure WLAN with a Linux base. This article covers standard interface configuration of the http proxy server.Continue Reading
-
Troubleshooting Windows VPN servers
There are several aspects of the Windows remote access server that can create issues when a VPN client connects. This article focuses on some common trouble spots on the server side and offers steps to help pinpoint the problem.Continue Reading
Can you please explain the following, common Ethernet errors?
In a LAN environment, which is better: Token Ring or Ethernet and why?
What is a collision domain? How does replacing a hub with a switch affect collision?
Since DNS uses UDP instead of TCP, if a packet is lost, there is no automatic recovery?
Can I connect two networks, one wired, one wireless, so that I can access the Internet through the s
Wireless LAN deployment and federal regulations
A look at the bare minimum requirements to keep your WLAN compliant with federal regulations.Continue Reading
Secure WLAN best practices and topology
Expert Michael Martin provides a list of wireless security "dos and don'ts" and a sample topology for a secure WLAN.Continue Reading
I need help adding a central MAC address authentication server to our current WLAN.
What does the term "stackable switches" means?
How can we improve the performance of our LAN?
What is the difference between a managed and an unmanaged switch?
How do I block my users from accessing all but a few authorized Web sites?
Seven steps to ensure project success
The Value Manager recently had a project fall well below expectations. He reviewed what happened and came up with seven key steps for managing technical risk and one golden rule.Continue Reading
How do I connect to my LAN from the Internet?
Router Expert: Filtering with MAC addresses
This month our router expert discuss some strategies for controlling host network access using MAC address filtering.Continue Reading
Focus Windows port scanning with the netscan command
How to use the netscan command to focus Windows port scanning.Continue Reading
What are the basic features of CIDR and what are its advantages and disadvantages compared to IPv6?
Can I connect two computers through Ethernet on a WAN?
Can I connect two computers through Ethernet on a WAN?Continue Reading
What costs I can expect when designing A LAN? How can I keep costs to a minimum?
How do you interpret a bandwidth utilization graph?
What is a LAN and how does it work?
Why can't I access my folders on the server through the VPN?
I need a very basic VPN solution to connect two offices to allow two servers to talk to one another.
What are the differences between PVC, riser and plenum rated cables?
What is the differences between a router, a switch and hub?
Can you explain the ICMP ping test?
How can we say TCP is a reliable protocol?
How can I find a good job if I have my CCNA but now experience with Cisco routers?
Network administrator security policies
Some security policy elements that are specific to network administrators.Continue Reading
What are the advantages of 10 Gigabit Ethernet?
Learn about the advantages of using 10 Gigabit Ethernet for your corporate network, in this Ask the Expert response.Continue Reading
Can you assign an IP address ending in .0 or .255?
Learn how to assign an IP address ending in .0 or .255 from networking fundamentals expert Chris Partsenidis in this Q&A.Continue Reading
How do I connect my managed switch to a patch panel?
Minimizing Layer 2 problems
Understanding the fundamentals of Spanning Tree Protocol.Continue Reading
Auto-MDIX
How Auto-MDIX can solve the cross-over cable conundrum.Continue Reading
MPLS: Experimental bits and QoS
MPLS experimental bits are used to provide QoS capabilities by utilizing the bits set in the MPLS labels.Continue Reading
Should I try for the CCNA certification or the CCDA certification?
What is a network segment? Is a network segment the same as an Ethernet segment?
How do I connect to the console and AUX port of my router?
How do I connect to the console and AUX port of my router?Continue Reading
Can you help me put together a WLAN proposal?
How do intrusion detection systems work?
Can you explain MER Mac encapsulation routing?
What is the difference between TCP/IP and IP protocol?
VPLS, a new Layer 2 MPLS VPN technology
A new Layer 2 MPLS VPN technology that provides similar reliablity and QoS as MPLS VPN, but in a more simplified way. But beware, it does have it's limitations.Continue Reading
Can CAT 6 be used to connect two switches at a distance of 550 meters?
Protocols, Lesson 7: Subnet masks and their effect
Understand the different effects a subnet mask can have.Continue Reading
What type of security is associated with each level of the OSI model?
Protocols, Lesson 9: Subnet routing and communications
Lesson 9 in our protocol series covers the communications side of subnetting.Continue Reading
MPLS - Preparing an RFP (Dos and Don'ts)
A look at the things to include in an RFP, a request for proposal for VPN service.Continue Reading
Connecting two hosts with the same IP address but different subnet masks
Is it possible to communicate two hosts with the same IP address but different subnet mask without adding a router?Continue Reading
Settings for RTS Threshold and Fragmentation Threshold
Preventing Layer 2 security threats
Layer 2 switched environments, typically found in enterprise customer wiring closets, can be easy targets for network security attacks.Continue Reading
OSI model: List of some attacks
What are the elements of creating a wireless connection between two buildings?
How do I connect two wired LAN networks with a wireless link?
What is the difference between symmetric and asymmetric bandwidth?
How can I reduce the number of broadcasts on my network?
What are the main challenges facing DNS management today?
What are the main challenges facing DNS management today?Continue Reading
Run your VoIP calls over a VPN for enhanced security
A look at using a VPN to enhance VoIP security.Continue Reading
Can you please explain how a DHCP server allocates IP addresses dynamically?
Learn how DHCP works in this Ask the Expert response from our networking fundamentals expert, Chris Partsenidis.Continue Reading
Top 10 'show' commands
A list of the top ten 'show' commands.Continue Reading
How do I connect our seven offices to a VPN using DSL lines?
The difference between an access point and a bridge
Where to connect a switch -- Patch panel versus ports around the office
Is it possible to connect my switch directly to my patch panel rather than connecting the switch to the various ports around my office?Continue Reading
MPLS - Label Switched Paths
A look at some of the details of working with Label Switched Paths (LSPs).Continue Reading
Top 10 things to know about network administration
A list of the most important things network administrators should know.Continue Reading
Router Expert: Understanding reverse telnet and IOS terminal lines
Learn how users interact with the terminal server and its connected devices through the use of reverse telnet, line and group rotaries, and terminal line interfaces.Continue Reading
When I use the Microsoft Windows VPN Client, what kind of VPN tunnel is created?
Which networking courses, such as MCSE, CCNA, etc., are best to learn the basics?
How can I connect to my VPN to access Outlook and stay away from Webmail?
Deploying both a private and public WLAN
Lisa Phifer answers a reader's request for information about planning and deploying a wireless LAN -- one private and one public.Continue Reading
OSI layers are layers of server software or server hardware?
What are the minimum and maximum sizes of an ICMP packet?
What is the difference between an error and a bug?
Monitor your traffic with MRTG
The Multi Router Traffic Grapher is a free tool that can help you monitor the traffic on your network. Learn more here.Continue Reading
WLAN implementation tutorial -- Capacity planning: Step 1
For WLAN implementation, make sure you have Step 1 down -- capacity planning, not just coverage.Continue Reading
How can we increase our VPN connection speed?
We recently purchased a new software R&D system to allow our offices in New Jersey and Canada to link up. In order to secure the data we setup VPN's for every computer connecting to the server at the main office. Everyone who connects using a VPN ...Continue Reading
The Network Life Cycle
Each phase of the NLC has its own requirements that can typically be met with a judicious selection of tools and assessment solutions.Continue Reading
Router Expert: Implementing router interface redundancy
While redundancy is simple as a concept, it becomes quite problematic in practice. This tip offers the basic options for router interface redundancy.Continue Reading
Are IP NAT Traversal and VPN Passthrough the same thing?
How much do the CCIE exams cost?1
Learning Guide: Voice over IP basics
This guide contains all the VoIP basics and essentials you will need when implementing an IP telephony network.Continue Reading
OSPF configuration
Nuances of OSPF configuration could impact your network more than you expect.Continue Reading
What is the difference between an IPsec tunnel and a normal tunnel, and what is the bandwidth of eac
Layer 3 MPLS VPNs
A look at some of the details of Layer 3 MPLS VPNs.Continue Reading
Router Expert: Cisco asynchronous serial support
Cisco IOS-based routers support three asynchronous serial interface types: Console, Auxiliary, and asynchronous port modules. This tip compares them.Continue Reading
What are the characteristic of HDLC protocol?
How can I see who is using the most of our Internet bandwidth over our LAN?
Is it possible to determine the NIC speed of a remote workstation on my LAN?
How do I control Internet bandwidth per IP on my LAN?