=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TechTarget | Network and Systems Management Feb. 11, 2004 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FROM OUR SPONSOR: Using SLAs to Improve Networked Application Performance? http://searchNetworking.com/r/0,,24296,00.htm?track=NL-314&netqos ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= IN THIS ISSUE | Table of Contents
1. NETWORK AND SYSTEMS MANAGEMENT TIPS - Today's Featured Tip: Buying license management software - Network auditing with dsniff 2.3 - Log monitoring with swatch 2. ESSENTIAL LINKS - Article: Amid acquisition, NetScreen updates SSL VPN - Featured Topic: Do you need IPv6? - Chapter of the Week: 802.11 Wireless LAN Fundamentals - Article: Hardware-upgrade fears stall wireless LAN plans ___________________________________________________________________ *******************>> Sponsored by NetQoS <<******************* NetQoS reports on application response time SLAs from the end user's perspective. Monitor every transaction and quickly isolate the source of performance problems to the network, server or application - without deploying endpoint agents. Have the best of both worlds - troubleshooting and SLAs in one product. To learn more, download the white paper "Improve Network Application Performance through SLAs." http://searchNetworking.com/r/0,,24296,00.htm?track=NL-314&netqos ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP BUYING LICENSE MANAGEMENT SOFTWARE by Barrie Sosinsky In a previous tip I discussed outsourcing license management. Now, outsourcing is not for everyone, but that doesn't mean that license management should be neglected. License management is one aspect of asset management that many managers tend to overlook. That's a shame, because properly applied license management can keep you out of trouble with software vendors and can also save you money. Licensing software can not only tell you what you own, it can tell you what your users use -- and don't use. Learn more about what to look for in license management software: http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci949734,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= NETWORK AUDITING WITH DSNIFF 2.3 | Barrie Sosinsky To audit network traffic you need to employ a program like a sniffer to listen to your traffic and analyze the results. If you've ever used a network monitor such as Windows' or Solaris', then you are familiar with sniffers. Commercial sniffers gather statistics and can work with various threshold and defined events. One collection of tools that has been around a few years is dsniff 2.3 (http://www.monkey.org/~dugsong/dsniff/). This is actually a set of tools that not only audit, but test for network penetration. Read the entire tip here: http://www.searchNetworking.com/tip/1,289483,sid7_gci939442,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= LOG MONITORING WITH SWATCH | Barrie Sosinsky The first step in managing a network is to know exactly what the network is doing. This usually involves the arduous task of combing through extremely long system log files. That's where log-monitoring tools like swatch can help. Read about log-monitoring here: http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci940289,00.html?track=NL-314 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= :::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= AMID ACQUISITION, NETSCREEN UPDATES SSL VPN | Article NetScreen has released an update to its clientless VPN product line. At the same time, Juniper Networks has announced plans to buy the company. If the acquisition goes through, the transition should be smooth for NetScreen customers, an analyst says. Click here for the full story: http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci949704,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= DO YOU NEED IPv6? | Featured Topic The DoD is using it; but does your organization really need it? Many of us scoff at the impending shortage of IP addresses and the need to move to IPv6, but you may want to consider the expanded capabilities the new protocol can bring to your network. Learn more with our articles, links and technical advice. http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci948598,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 802.11 WIRELESS LAN FUNDAMENTALS - MOBILITY | Chapter of the Week This book covers the major components of 802.11 wireless LANs (WLANs). Fundamental concepts such as medium access mechanisms, frame formats, security, and the physical interfaces build the foundation for understanding more advanced and practical concepts. In keeping with this theme, this chapter covers mobility. Mobility is the quality of being capable of movement or moving readily from place to place. 802.11 WLAN devices provide this kind of untethered freedom. But there's more to mobility than the lack of a network cable. Understanding how mobility is implemented in 802.11 arms you with the knowledge you need to support or facilitate mobile applications. This chapter specifically covers the characteristics of roaming, Layer 2 roaming, Layer 3 roaming and an introduction to Mobile IP. Click here to download Chapter 5: http://searchnetworking.techtarget.com/content/0,290959,sid7_gci913144,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= HARDWARE-UPGRADE FEARS STALL WIRELESS LAN PLANS | Article The IEEE is poised to approve the 802.11i WLAN security standard this year, but much of companies' existing hardware will be incompatible, forcing upgrades. This scenario has forced one group to put off its WLAN implementation indefinitely. http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci948806,00.html?track=NL-314 ___________________________________________________________________ **************** CONTACT SEARCHNETWORKING.COM ***************** E-mail us at mailto:[EMAIL PROTECTED] Click here for specific contact information and to meet our editorial team: http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314 To sponsor this or any other TechTarget newsletter e-mail Gabrielle DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED] ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This e-newsletter is published by TechTarget, the most targeted IT media and events company. TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals. Copyright 2004 TechTarget. All rights reserved. _____________________________________________________________________ To unsubscribe from "Network and Systems Management Tip": Go to unsubscribe: http://SearchTechTarget.com/u?cid=476278&lid=522392&track=NL-314 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed. Contact us: TechTarget Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494