Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

493 Results Found

Results per page: 10 40 80

BranchCache Reduces Traffic between HQ and Branch Offices

Article | Aug. 20, 2010

Windows Software Update Services (WSUS) is commonly used to distribute security patches and updates for Windows operating systems and Microsoft applications. WSUS is a web application that runs within Internet Information Services (IIS) on Windows Server. When client...

Time of Day Call Routing

Article | Aug. 17, 2010

I recently came across an opportunity to use a relatively new feature in Cisco Unified Communications Manager (CUCM). Suppose you are the telecom administrator at a community hospital. During business hours, the Facilities Department is staffed and team members simpl...

Using ASDM with Minimum User Privileges

Article | July 30, 2010

Occasionally as I'm teaching a Cisco training class, I get an idea for a blog post and it happened again this week. The Securing Networks with ASA Fundamentals curriculum is mostly based on the Adaptive Security Device Manager (ASDM). While the class describes the us...

Remote Desktop on Windows 7 now has AERO

Article | July 15, 2010

Windows Vista introduced AERO, a desktop experience that had four major elements; Windows Flip, Windows Filmstrip, AERO Glass transparency and fully realized thumbnail views on the Taskbar. Windows 7 added several new features to AERO, including AERO Snap, AERO Shake...

MPLS – Part 10

Article | June 16, 2010

Welcome back! Previously, we decided that in order for a Layer-3 MPLS VPN to function correctly, the ingress PE is going to need to push two labels onto each data packet. Let’s say that we have a data packet going from site A2 to site A3, using the topology shown in...

Allow or Disallow All IPSec Traffic through the Firewall?

Article | June 02, 2010

The subject of this week’s post was actually prompted by a question from a former colleague.  Soon after the PIX Firewall added support for IPSec Virtual Private Networks, a command was added to the command-line, sysopt connection permit-ipsec. This command was subse...

Enabling  the Active Directory Recycle Bin in Windows 2008 R2

Article | May 17, 2010

Even in professionally managed network environments it is still possible for mistakes to happen. If an Active Directory object such as a user or computer account is accidentally deleted  network access will be lost. Worker productivity will decline until the account...

MPLS – Part 6

Article | May 11, 2010

We have three major issues that we need to deal with in order to successfully use routers within a WAN provider’s cloud: Multiple routing tables in RAM Excessive latency Address-space collisions Let’s assume that we have a WAN provider with two customers, “A” an...

Detailed File Share Auditing allows you to monitor access to Windows 7 file shares

Article | May 04, 2010

Windows 7 can be a good file server on very small workgroup networks. Although Windows 7 is limited to only 10 concurrent client connections as a file server it can do a good job making files accessible over a network. Windows 7 shares a great deal of code with Windo...

QOS Bandwidth vs Bandwidth Remaining

Article | April 14, 2010

Learn how to calculate QOS Bandwidth Percent vs Bandwidth Remaining Percent using a Cisco-defined formula. Read on for answers and examples from the experts at Global Knowledge!