=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TechTarget | Network and Systems Management June 2, 2004 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FROM OUR SPONSORS: Free White Paper: Application & Network Performance http://ttarget.adbureau.net/adclick/CID=000052140000000000000000
Automate Network Troubleshooting with HP OpenView http://ttarget.adbureau.net/adclick/CID=000052150000000000000000 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= IN THIS ISSUE | Table of Contents 1. NETWORK AND SYSTEMS MANAGEMENT TIPS - Featured Tip: Naming conventions - Forensic analysis, the CSI of security - Cool Internet utilities 2. ESSENTIAL LINKS - Crash Course: SSL VPNs - Call quality issues hamper VoWi-Fi - Sprint: Success hinges on converged network - Chapter of the Week: Troubleshooting Virtual Private Networks ___________________________________________________________________ ******************>> Sponsored by Shunra Software <<*************** Free White Paper: Application & Network Performance Will your applications work for remote end-users? Learn how to detect and avoid network-related problems in distributed applications, using a virtual environment, before deployment. Download your copy of "The Network Matrix" White Paper here: http://ttarget.adbureau.net/adclick/CID=000052140000000000000000 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP NAMING CONVENTIONS Barrie Sosinsky One of the fun parts of having a network is being able to name all of the computers and devices that populate your surroundings. Although it's fun, it is also one of those issues that can be vexing and a source of contention. Your goal in naming your systems is to have a user be able to differentiate one type of device from another, and also to be able to locate that device. Before the extensive use of directory services, it was important that the name convey a sense not only of what the device was, but where it was and, perhaps, who administered that device. So you might see names like W2KEECHI32 indicating that this was a Windows 2000 Enterprise server number 32 in the Chicago office. But you can get more creative than that, as long as you follow some basic rules. http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci968019,00.html?track=NL-314&ad=484042 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FORENSIC ANALYSIS, THE CSI OF SECURITY | Bryan Sartin Thousands of IT administrators struggle day in and day out to ensure the safety and security of customer data, confidential employee information and irreplaceable company assets. It's a significant job even in the smallest companies with threats changing constantly and systems continuing to become more complex. Truth is, even with considerable advanced planning and extensive preparation, a security breach may still occur. And the concept of damage control is no longer enough. In addition to rapidly rectifying a problem, administrators need to know how and why something happened and take corrective action so that it doesn't happen again. http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci967570,00.html?track=NL-314&ad=484042 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= COOL INTERNET UTILITIES | Tom Lancaster Often times, what appears to be internal network congestion is really just an overall Internet issue. When this happens, there are a few sites that you can consult to investigate the problem. In this tip, I want to let you know about a couple of my favorite troubleshooting sites. I think these are occasionally very useful for network administrators. http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci966407,00.html?track=NL-314&ad=484042 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= :::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: ********************>> Sponsored by HP OpenView <<***************** Automate Network Troubleshooting with HP OpenView IT system & network managers can now easily diagnose the root cause of network downtime or bottlenecks by quickly identifying where the problem occurs. HP OpenView solutions speed the resolution process & increase productivity of IT staff. Click the link for the Route Analytics white paper from EMA. http://ttarget.adbureau.net/adclick/CID=000052150000000000000000 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= CRASH COURSE: SSL VPNs | Featured Topic A growing number of companies see SSL VPNs as a simpler, cheaper way to give mobile workers remote access to corporate data. Find out if one is right for your network. http://searchnetworking.techtarget.com/featuredTopics/0,290043,sid7,00.html?track=NL-314&ad=484042 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= CALL QUALITY ISSUES HAMPER VOWI-FI | | News Exclusive A Burton Group analyst says without the proper quality of service measures, voice over Wi-Fi traffic is forced to fight for bandwidth, resulting in poor call quality. http://searchnetworking.techtarget.com/qna/0,289202,sid7_gci967694,00.html?track=NL-314&ad=484042 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= SPRINT: SUCCESS HINGES ON CONVERGED NETWORK | News Exclusive A top Sprint executive says the company is combining its various networks in order to offer users a consistent experience, regardless of where they are or how they connect. http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci967331,00.html?track=NL-314&ad=484042 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TROUBLESHOOTING VIRTUAL PRIVATE NETWORKS| Chapter of the Week MPLS VPNs are relatively complex, but by adopting an end-to-end, step-by-step approach, troubleshooting can be relatively fast and efficient. This chapter focuses on the process of troubleshooting MPLS VPNs and breaks troubleshooting down into two basic elements: troubleshooting route advertisement between the customer sites, and troubleshooting the LSP across the provider backbone. http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci967526,00.html?track=NL-314&ad=484042 ___________________________________________________________________ **************** CONTACT SEARCHNETWORKING.COM ***************** E-mail us at mailto:[EMAIL PROTECTED] Click here for specific contact information and to meet our editorial team: http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314&ad=484042 To sponsor this or any other TechTarget newsletter e-mail Gabrielle DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED] ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This e-newsletter is published by TechTarget, the most targeted IT media and events company. TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals. Copyright 2004 TechTarget. All rights reserved. _____________________________________________________________________ To unsubscribe from "Network and Systems Management Tip": Go to unsubscribe: http://SearchTechTarget.com/u?cid=484042&lid=522392&track=NL-314 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed. Contact us: TechTarget Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494