=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TechTarget | Network and Systems Management
Feb. 11, 2004
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FROM OUR SPONSOR:
Using SLAs to Improve Networked Application Performance?
http://searchNetworking.com/r/0,,24296,00.htm?track=NL-314&netqos 
___________________________________________________________________
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
IN THIS ISSUE | Table of Contents

1. NETWORK AND SYSTEMS MANAGEMENT TIPS
   - Today's Featured Tip: Buying license management software
   - Network auditing with dsniff 2.3
   - Log monitoring with swatch

2. ESSENTIAL LINKS
   - Article: Amid acquisition, NetScreen updates SSL VPN
   - Featured Topic: Do you need IPv6?
   - Chapter of the Week: 802.11 Wireless LAN Fundamentals
   - Article: Hardware-upgrade fears stall wireless LAN plans
___________________________________________________________________ 
*******************>> Sponsored by NetQoS <<*******************

NetQoS reports on application response time SLAs from the end user's
perspective. Monitor every transaction and quickly isolate the source
of performance problems to the network, server or application -
without deploying endpoint agents. Have the best of both worlds -
troubleshooting and SLAs in one product. To learn more, download the
white paper "Improve Network Application Performance through SLAs."
http://searchNetworking.com/r/0,,24296,00.htm?track=NL-314&netqos 
___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP


BUYING LICENSE MANAGEMENT SOFTWARE
by Barrie Sosinsky

In a previous tip I discussed outsourcing license management. Now,
outsourcing is not for everyone, but that doesn't mean that license
management should be neglected. License management is one aspect of
asset management that many managers tend to overlook. That's a shame,
because properly applied license management can keep you out of
trouble with software vendors and can also save you money.  Licensing
software can not only tell you what you own, it can tell you what
your users use -- and don't use.

Learn more about what to look for in license management software:
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci949734,00.html?track=NL-314

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
NETWORK AUDITING WITH DSNIFF 2.3 | Barrie Sosinsky
 
To audit network traffic you need to employ a program like a sniffer
to listen to your traffic and analyze the results. If you've ever
used a network monitor such as Windows' or Solaris', then you are
familiar with sniffers. Commercial sniffers gather statistics and can
work with various threshold and defined events. One collection of
tools that has been around a few years is dsniff 2.3
(http://www.monkey.org/~dugsong/dsniff/). This is actually a set of
tools that not only audit, but test for network penetration.
 
Read the entire tip here: 
http://www.searchNetworking.com/tip/1,289483,sid7_gci939442,00.html?track=NL-314

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
LOG MONITORING WITH SWATCH | Barrie Sosinsky
 
The first step in managing a network is to know exactly what the
network is doing. This usually involves the arduous task of combing
through extremely long system log files. That's where log-monitoring
tools like swatch can help.
 
Read about log-monitoring here: 
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci940289,00.html?track=NL-314
  

___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
:::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: 
___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
AMID ACQUISITION, NETSCREEN UPDATES SSL VPN | Article

NetScreen has released an update to its clientless VPN product line.
At the same time, Juniper Networks has announced plans to buy the
company. If the acquisition goes through, the transition should be
smooth for NetScreen customers, an analyst says.

Click here for the full story:
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci949704,00.html?track=NL-314
  

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
DO YOU NEED IPv6? | Featured Topic

The DoD is using it; but does your organization really need it? Many
of us scoff at the impending shortage of IP addresses and the need to
move to IPv6, but you may want to consider the expanded capabilities
the new protocol can bring to your network. Learn more with our
articles, links and technical advice.
http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci948598,00.html?track=NL-314
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
802.11 WIRELESS LAN FUNDAMENTALS - MOBILITY | Chapter of the Week 

This book covers the major components of 802.11 wireless LANs
(WLANs). Fundamental concepts such as medium access mechanisms, frame
formats, security, and the physical interfaces build the foundation
for understanding more advanced and practical concepts. In keeping
with this theme, this chapter covers mobility. Mobility is the
quality of being capable of movement or moving readily from place to
place. 802.11 WLAN devices provide this kind of untethered freedom.
But there's more to mobility than the lack of a network cable.
Understanding how mobility is implemented in 802.11 arms you with the
knowledge you need to support or facilitate mobile applications. This
chapter specifically covers the characteristics of roaming, Layer 2
roaming, Layer 3 roaming and an introduction to Mobile IP.   

Click here to download Chapter 5:
http://searchnetworking.techtarget.com/content/0,290959,sid7_gci913144,00.html?track=NL-314
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
HARDWARE-UPGRADE FEARS STALL WIRELESS LAN PLANS | Article

The IEEE is poised to approve the 802.11i WLAN security standard this
year, but much of companies' existing hardware will be incompatible,
forcing upgrades. This scenario has forced one group to put off its
WLAN implementation indefinitely.
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci948806,00.html?track=NL-314


___________________________________________________________________
****************  CONTACT SEARCHNETWORKING.COM   *****************

E-mail us at mailto:[EMAIL PROTECTED]

Click here for specific contact information and to meet our editorial
team:
http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314

To sponsor this or any other TechTarget newsletter e-mail Gabrielle
DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED]

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This e-newsletter is published by TechTarget, the most targeted IT
media and events company. TechTarget offers magazines, Web sites,
e-newsletters, Webcasts and conferences for enterprise IT
professionals.
Copyright 2004 TechTarget. All rights reserved.
_____________________________________________________________________

To unsubscribe from "Network and Systems Management Tip":

Go to unsubscribe: http://SearchTechTarget.com/u?cid=476278&lid=522392&track=NL-314
  
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.
 
Contact us:
TechTarget
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to