How to Protect Router Password?

Administrators can access a router for administrative purposes in a variety of ways. For example, as shown in Figure 3-2, a PC running terminal emulation software can telnet into a router. The Telnet connection is considered to be using a…
Cisco PIX Firewall Basics

The PIX is a firewall appliance based on a hardened, specially built operating system, PIX OS, minimizing possible OS-specific security holes. The PIX has received ICSA Firewall and IPsec certification as well as Common Criteria EAL4 evaluation status. PIX firewalls…
Cisco on Huawei: ‘Imitation isn’t Innovation’

Chambers and Rob Lloyd, executive VP of worldwide operations, question Huawei’s innovation. Speaking on Cisco’s third-quarter earnings conference call, Chambers was asked about competition from Huawei — a Chinese networking rival — and didn’t pull any punches. Chambers’ comments highlight…

Wireless bridge and access point offer radio link connectivity over a computer network, but they are structurally and functionally designed to serve slightly different purposes. Setting up a vast wireless network for a corporate office space requires the installation of…

Cisco expands technology portfolio for small businesses to enable customers to get the most out of mobility and cloud solutions. New product portfolio creates the right network to allow small businesses and their solution providers to boost productivity through the…
How to Configure PPP on Cisco Router?

What is PPP? Point-to-Point connection is one of the most common types of WAN connection. PPP connections are used to connect LANs to service provider WANs, and to connect LAN segments within an organization network. A LAN-to-WAN point-to-point connection is…