• Modify configuration for port security

    Dear All, Presently we have configured port security as below switchport mode access switchport port-security switchport port-security violation restrict switchport port-security mac-address sticky switchport port-security mac-address sticky 000a Now we need to modify the above configuration to...

    Vptechie70 pointsBadges:
  • LAN connectivity problem with Compaq notebook

    I have a Compaq EVO n1020v notebook. This works fine in our office LAN and sometimes it does not at all. Office LAN is a workgroup with ICS enabled in win 2K server. If I check the IP of the notebook it shows the IP of the LAN but never connects to the internet, can't access LAN...

    BinooDas123410 pointsBadges:
  • Statefull firewalls

    Okay, let me start of with I "Googled" my question but I didn't really get a good answer. So I'm going to give it a shot here. Can someone please explain to me what is statefull firewalls, and whats the different between statefull and not-statefull firewalls?

    Tafiela55 pointsBadges:
  • Network based security information system

    I want a lot of information on the title as I have a project on it. Can someone help me get started?

    toluwase5 pointsBadges:
  • What’s the one network security tool that you can’t live without?

    With security breaches becoming more frequent, expert Michael Gregg looks at network security tools that no tester should be without. We would like to know....what's the one network security tool that you can't live without?

    Michael Tidmarsh35,630 pointsBadges:
  • Network based security information system

    I would like to know the framework for different network-based security information systems. Any help would be much appreciated.

    aribidesi15 pointsBadges:
  • How to port forward and map IP on SonicWALL TZ 180?

    Currently on my company we are trying to configure our Sonic firewall to map an external IP to internal with a port open. This is for our security cameras setup in which we are trying to view them from another network. Can some one help me please I need to get this done ASAP. Our Sonic firewall is...

    Ricardo5736590 pointsBadges:
  • How does IPSec Passthrough enable packet transfer through a router?

    I have configured a remote access IPSec VPN with UDP encapsulation enabled which passes through a broadband router which in turn has IPSEC Passthrough enabled. The remote access tunnel works fine with the IPSEC Passthrough enabled. However, if the Passthrough option is disabled the tunnel is not...

    NetworkingATE1,545 pointsBadges:
  • Security Knowledge in Practice implementation

    Hello, I am currently a student at the University of Advancing Technology and I am learning about security implementation frameworks this week. I was looking into a framework named Security Knowledge in Practice (SKiP) and I noticed some things about the framework and I wonder if anyone who has...

    f4ktu4l5 pointsBadges:
  • What do you see happening in the networking industry in 2013?

    Network security, data center networks, campus LANs, software-defined networking...these are just some of the major topics that are making waves in the networking industry. The SearchNetworking team recently asked several industry analysts for their networking predictions for 2013. How about you?...

    Michael Tidmarsh35,630 pointsBadges:
  • set up a secure workgroup on a shared internet connection

    I have a customer with about ten computers running a mixture of windows xp, vista and 7, they share files and printers by using a workgroup network and have recently moved into a new office in a large building which shares internet access with other un-connected businesses via network sockets which...

    computertony5 pointsBadges:
  • vpn through s-box firewall of checkpoint

    i'm try to create a vpn from the internet to my "small buisness server 2003" that act as vpn server without any luck, if i try to connect to my server from the internal network it's work just fine, iv'e mapped the correct ports according to the microsoft article that say to forward port 1723 and 47...

    Drorbenyosef5 pointsBadges:
  • Data lost from all Systems in the network

    We have 40 systems in the network all in domain with symantec virus protection installed and updated. from last five days we are facing problem in all systems, one by one all systems data was lost. some thing lost in systmes some where PST file lost some where D Drive data some where all drive...

    Salamatalisalari5 pointsBadges:
  • Limiting access to VPN users

    Hi, I am using VPN concentrator 3500. Please let me know how to limit access to certain users that have a VPN account on the VPN Concentrator on certain server when they VPN in. Looking forward to hearing from you, With thanks and regards, Helal

    Helalahad0 pointsBadges:
  • Locking down network settings to local admins

    How can the network settings be locked down even to local administrators. We track users based on IP and we don't want to compromise our results or skew them with people monkeying around.

    TeachMeIT975 pointsBadges:
  • Detecting rogue DHCP servers

    How can we automatically detect rogue DHCP servers like a user bringing in a wireless router from home and connecting it to our network?

    TeachMeIT975 pointsBadges:
  • ACL configuration

    hey, I want to create standard acl to allow all network to flow from 172.16.10.0 0.0.0.255 to 172.16.20.0 0.0.0.255 and 172.16.30.0 0.0.0.255 but i don’t want network to flow from 172.16.20.0 0.0.0.255 to 172.16.30.0 0.0.0.255 and vice versa, so I created the following acl, access-list standard...

    Bryan155 pointsBadges:
  • Changing passwords after network breach

    How can we force all users to change their passwords following a network breach? Windows Server 2008 AD.

    NewnanIT1,110 pointsBadges:
  • Network password recovery

    How can I recover my network password?

    Cbreaux5 pointsBadges:
  • Separating commodity Internet from the financial and core systems

    Is it a good idea to separate an entperprise's commodity Internet from its financial database network (as in two physically separate networks)? Our current setup is that they're together (though protected by firewalls) -- meaning there is a way for someone to get into the commodity and with enough...

    drlove5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following