Administrators can access a router for administrative purposes in a variety of ways. For example, as shown in Figure 3-2, a PC running terminal emulation software can telnet into a…
The PIX is a firewall appliance based on a hardened, specially built operating system, PIX OS, minimizing possible OS-specific security holes. The PIX has received ICSA Firewall and IPsec certification…
Cisco Advances Mobility Strategy With new Enterprise ‘Smart Solutions,’ Building on Service Provider Offerings and Enabling ‘Your Way’ Experiences Cisco on Wednesday announced findings from the Cisco IBSG Horizons…
There are five passwords used to secure your Cisco routers: console, auxiliary, telnet (VTY), enable password, and enable secret. Just as you learned earlier in the chapter, the first two…
In order to be proficient in network security, you have to understand the different types of networks since each network type poses different challenges, issues and risks. There are different types…
If you have more than a couple of switches, configuring VLAN’s can be a real pain. To make it easier, Cisco developed VLAN Trunking Protocol (VTP). Now, let’s find out…
Chambers and Rob Lloyd, executive VP of worldwide operations, question Huawei’s innovation. Speaking on Cisco’s third-quarter earnings conference call, Chambers was asked about competition from Huawei — a Chinese networking…
Wireless bridge and access point offer radio link connectivity over a computer network, but they are structurally and functionally designed to serve slightly different purposes. Setting up a vast wireless…
Enterprise cloud adoption is expected to grow significantly in 2012, but some serious obstacles to even wider adoption remain, according to a survey of Cisco Systems customers released at the…
“What differences btw catalyst 4500 and 6500 series? Our company is looking to get a new switch for or core/OC. The switch being replaced is an Enterasys matrix, I don’t…
Starting with the basics, the Cisco network is traditionally defined as a three-tier hierarchical model comprising the core, distribution, and access layers. Cisco both developed their system according to this…
This video demo shows that how to configure InterVLAN routing on a Cisco Catalyst 3550 series switch. Video Demo: How to Configure InterVLAN Routing On Layer 3 Switches? NOTE: VLANs divide…
VLAN (Virtual Local Area Networks) allow network switches to separate traffic based on a logical identifier, known as a VLAN ID. When used in conjunction with a router that supports…
VLAN (Virtual Local Area Network) is a network industry standard configuration that creates a virtual network container for all devices connected to ports or wireless networks included in the VLAN.…
Cisco unveiled the Industrial Ethernet (IE) 2000 switch series, a cornerstone product for the company’s Connected Industries business unit and industrial network offerings. The IE 2000 series is an extension of Cisco’s…
If you want to configure Dynamic Host Configuration Protocol (DHCP) on PC clients, you currently have multiple options to choose for your DHCP server. One of the more common ways…
Launch a serial command line terminal connection with the Cisco 3750, and then configure DHCP to manage a range of IP addresses for the network. The Cisco Catalyst 3750 switch can…
Cisco is making changes to its year-old cloud channel program, the networking company announced at the 2012 Cisco Partner Summit in San Diego this week. In 2011, Cisco launched its…
Cisco announced that it has sold its 50 millionth IP phone, up from 30 million sold through just two years ago. The switching giant—Cisco also said it will make software…
The Catalyst 6500 Supervisor 2T was first touted to resellers and customers in 2009 under NDA. Then suddenly in 2010 the chatter went quiet, and the Nexus 5000 arrived, soon…
Cisco ASA firewall licensing used to be pretty simple, but as features were rolled out as licenses, the scheme became quite complex. The matters are further complicated since different appliances…