![]()
Network and Systems Management
|
![]() |
![]()
![TechTarget]()
|
![]() |
![]() |
![]() |
![]() |
![]() |
Issue Sponsored By:
> Shunra Software
![]()
IN THIS ISSUE:
>
Net management with Microsoft's SUS
>
Unifying WLAN and LAN analysis
>
Protocol analysis timestamps
>
OSI model refresher course
>
Cisco's switching updates focus on high availability, PoE
>
802.11 Learning Guide
>
Chapter of the Week: DoS protection
![]() |
![]() |
|
![]() |
![AD]() |
![]() |
Free META Group White Paper
Ideal for Network and Systems Managers, this white paper from the META Group discusses a new approach to optimizing complex IT applications for the network. Includes tips to help companies successfully deploy distributed applications in production, and reduce downtime and operational expenses.
Click here for your FREE copy.
|
|
|
![]() |
![]() |
![Network and Systems Management Tips]()
![]()
Net management with Microsoft's SUS
[Barrie Sosinsky]
If you are contemplating the rollout of Windows XP Service Pack 2 it may be time for you to investigate some of the lower hanging fruits of Microsoft's Dynamic Systems Initiative. DSI is a portfolio of products and services that are to be integrated together to enable easier network management done with fewer management tools.
Unifying WLAN and LAN analysis
[J. Scott Haugdahl]
With "big iron" vendors like Cisco and Nortel setting the trend of fully integrating WLANs into the enterprise LAN, IT engineers are feeling the need for analysis tools that also span both realms with appropriate feature sets. This need is being driven by the evolving complexity of WLANs as well as the heightened security exposure in today's LANs. Find out what characteristics you should look for in a unified
WLAN/LAN analysis tool.
Protocol analysis timestamps
[Tom Lancaster]
Most network managers have access to a device or software that lets them capture packets off their network and decode them. And almost every network manager wishes they were a little more skilled at reading the trace files these tools produce. One element of these files that can be of value is the timestamps. This tip discusses the three time displays and how to use them to diagnose network issues.
![Essential Links]()
![]()
OSI model refresher course
The OSI model is the conceptual backbone of most enterprise networks, but do you remember all the details? Read our rundown of the OSI model and what all those layers do.
Cisco's switching updates focus on high availability, PoE
Cisco is rounding out its switching portfolio with a pair of new supervisors, as well as LAN access interface modules and other devices, making high availability and PoE-enabled products more affordable.
MORE INFO:
Learn about Cisco's related security and management releases
See how to simplify and standardize your device configurations
802.11 Learning Guide
802.11 is perhaps the fastest-changing network protocol around. We've gathered a wealth of information to get you up-to-speed quickly on the various specifications.
Chapter of the Week: DoS protection
Chapter 17 of 'Cisco Router Firewall Security' by Richard Deal explores the basics of dealing with DoS attacks. When you are experiencing a DoS attack, one of the first things you need to do is find out the actual kind of DoS attack that is affecting your network. As you will see, a variety of options are available to you, including examining the CPU utilization of your routers, using ACL statements with logging parameters, and
using NetFlow. This chapter offers solutions, including TCP Intercept, CBAC and rate limiting. (Reproduced from the book 'Cisco Router Firewall Security,' ISBN 1587051753, Copyright 2004, Cisco Systems, Inc. Reproduced by permission of Pearson Education, Inc., 800 East 96th Street, Indianapolis, IN 46240. Written permission from Pearson Education, Inc. is required for all other uses. Visit www.ciscopress.com for a detailed description and to learn how to purchase this title.)
|
![]() |
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
|
![]() |
![]() |
|
![]() |
|
![]() |
|