Your browser is incompatible with this site. Upgrade to a different browser like Google Chrome or Mozilla Firefox to experience this site.
1064 Results Found
Wi-Fi networks have been misunderstood by much of the IT community since their inception. Even the reasons for this misunderstanding are kind of hard to understand. The result has been that myths about 802.11 (better known as Wi-Fi) networks have grown almost as fast as the technology itself. In this web seminar, we'll examine 11 common Wi-Fi myths and explore ways to use correct information to make your networks scalable, secure and satisfying for your users.
In Routing Tables part one, we covered the basic purpose of a routing table and how an end device or intermediate device such as a router or multilayer switch can route based off its table. We also viewed different routing tables and how they are used to find a given...
In ACLs - Part 1 we learned the basics of access lists, including the facts that ACLs: Are created in global config mode End with an implicit “deny any” (which can be overridden) Must be placed into service somewhere to have any effect Thus, the commands: Rout...
The triple constraints model has been one of the main staples for teaching project management for as long as I can remember. The model is generally represented by a triangle with Scope on the horizontal leg, Time on the left leg, Cost or Resources on the right leg an...
Cisco Switches and Routers running the Internet Operating System (IOS) have many things in common. Configuring these devices of course, is a skill that is sharpened the more you touch the device. During this post, our discussion will primarily focus on the basic comm...
In my last post we discussed basic terminal access. The commands that I reviewed were for accessing the console port or vty lines of a Cisco router or switch. Network administrators should configure banners for legal and liability purposes. Now, we will see how to co...
Telepresence is a set of technologies that allow video conferencing in such a way that the user feels as if they are actually at the remote site. Cisco sells a variety of platforms in the telepresence space supporting up to three 65” high definition video displays,...
In our last blog series we discussed multiple access commands that can be configured on a router or a switch. These commands included cosmetic commands such as logging synchronous and exec-timeout that can be configured on the console port. We also discussed configur...
If you create presentations using the notes feature in PowerPoint, you probably have found yourself wanting to print multiple slides on one page (handouts) with the notes associated with those slides displayed on the same page. This layout can often help you better p...
Having discussed general ACL rules and syntax, let’s now turn to the differences between standard and extended ACLs. As you might recall, numbered ACLs fall into several ranges: 1 – 99: Standard IP 100 – 199: Extended IP 1300 - 1999: Standard IP (expanded rang...