=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TechTarget | Network and Systems Management Dec. 10, 2003 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FROM OUR SPONSOR: SearchNetworking.com Career Center http://searchNetworking.com/r/0,,18808,00.htm?track=NL-314 ___________________________________________________________________ IN THIS ISSUE | Table of Contents
1. NETWORK AND SYSTEMS MANAGEMENT TIPS - Today's Featured Tip: Log monitoring with swatch - Don't patch that cable - Institute packet shaping 2. ESSENTIAL LINKS - Poll: Do the terms "master" & "slave" on equipment offend you? - Networking Column: Security - Managing the unmanageable - Chapter of the Week: Network Device Security - Maximize uptime, protect your ROI and learn what downtime costs ___________________________________________________________________ *******>> Sponsored by SearchNetworking.com Career Center <<******* Searching for career resources? Visit the recently launched SearchNetworking.com Career Center powered by Dice and find training, certification and resume resources along with over 27,000 IT job openings to search through. Get e-mails when a listing matches your search criteria, have your profile automatically sent to Dice.com member companies, access a host of career resources and tips and much more. http://searchNetworking.com/r/0,,18808,00.htm?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP LOG MONITORING WITH SWATCH Barrie Sosinsky The first step in managing a network is to know exactly what the network is doing. This usually involves the arduous task of combing through extremely long system log files. That's where log-monitoring tools like swatch can help. Read the entire tip here: http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci940289,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= DON'T PATCH THAT CABLE by Barrie Sosinsky Network management is more than just observing the network with one of the many network management products and then reacting when something goes wrong. There are also proactive things you can do to make your network run better, with less downtime. This tip discusses one of those things. It sounds simple, but when faced with a long troubleshooting session, often the simple things you can do are preferable. Read more: http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci916477,00.html?track=NL-314 You might also want to see this relevant webcast: Maximize uptime - protect your ROI and learn what downtime costs. It's available below. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= INSTITUTE PACKET SHAPING | Barrie Sosinsky Packet shaping network traffic involves setting policies for network usage that prioritize one type of communication over another. For example, you can assign your messaging traffic a higher priority than your data backup traffic, and thus it will appear that your messaging system has a higher bandwidth available to it. Packet shaping products can be either software products or software combined with a router or switch that monitors and classifies your network traffic. Read more about packet shaping here: http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci899465,00.html?track=NL-314 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= :::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= QUICK POLL | SearchNetworking.com Reader Survey Los Angeles County recently asked technology vendors to eliminate the terms "master" and "slave" from equipment where one device or procedure controls another, because they may be considered offensive. Do you think the terms are offensive? Vote here: http://searchnetworking.techtarget.com/news?track=NL-314 This topic has hit a nerve with our members. Read the latest from your peers on this topic in our sound off discussions: http://discussions.techtarget.com/webx?230@@.1dcfeec1!action=postNew&setContentUrl=1 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= NETWORKING COLUMN BY CARRIE HIGBIE | SearchNetworking.com SECURITY - MANAGING THE UNMANAGEABLE Picture yourself in a sea of consultants and technical end-users with all of the responsibility for securing their machines, networks and servers. Imagine files (and viruses) being brought in from customer sites, and just think of what may be leaving your business in the way of intellectual property and customer lists. Does the above image have you running for the nearest beach that serves drinks with little umbrellas? This column by site expert Carrie Higbie provides you with an entertaining look at network security and security policies. http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci939532,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= CHAPTER OF THE WEEK | SearchNetworking.com NETWORK SECURITY: THE COMPLETE REFERENCE Chapter 10 - Network Device Security This chapter focuses on using routers and switches to increase the security of the network as well as providing appropriate configuration steps for protecting the devices themselves against attacks. Cisco routers are the dominant platform in use today, so where examples are provided, the Cisco platform will be discussed. This does not mean that Cisco is the only platform available - routers and switches from leading companies, such as Juniper Networks, Foundry Networks, and Extreme Networks, perform similar if not identical functions. (This excerpt is reprinted with permission by The McGraw-Hill Companies, copyright 2003. All rights reserved.) Download the chapter: http://searchnetworking.techtarget.com/content/0,290959,sid7_gci913144,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= WEBCAST PLAYBACK | SearchNetworking.com TITLE: Maximize uptime - protect your ROI and learn what downtime costs WHEN: AVAILABLE 24/7 SPEAKER: Carrie Higbie, Network Applications Market Manager, The Siemon Company With only 5% of a typical IT budget invested in infrastructure, it can be easy for most networking professionals to skimp on infrastructure maintenance and upgrades, but this can be a costly mistake. According to Gartner, 71% of network downtown can be attributed to infrastructure failure, which can lead to weakened productivity and hundreds of thousands of dollars in lost revenue. Join us for this exclusive webcast and listen to SearchNetworking.com expert, Carrie Higbie, explain the essential steps you must take today, to protect your networking investments in the future. This presentation includes actual audit data and cost saving measures to assure protection of your entire IT investments. Tune in now and learn how to perform an essential infrastructure checkup: http://searchNetworking.com/r/0,,22042,00.htm?track=NL-314 ___________________________________________________________________ **************** CONTACT SEARCHNETWORKING.COM ***************** E-mail us at mailto:[EMAIL PROTECTED] Click here for specific contact information and to meet our editorial team: http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314 To sponsor this or any other TechTarget newsletter e-mail Gabrielle DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED] ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This newsletter is published by TechTarget, the most targeted IT media. http://www.techtarget.com?track=NL-314 Copyright 2003 TechTarget. All rights reserved. ____________________________________________________________________ To unsubscribe from "Network and Systems Management Tip": Reply to this e-mail with REMOVE in the Subject line - OR - Go to unsubscribe: http://SearchTechTarget.com/u?cid=473403&track=NL-314 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.