• How to make this DMZ routing work?

    Currently we have the DMZ ACL in the ASA firewall. One interface that was assigned as DMZ was connected to the core switch and within a VLAN. The server that was untagged to this DMZ VLAN will have the DMZ ACL applied to the inbound/outbound traffic.  This was quite simple setup.  This issue now...

    springman95 pointsBadges:
  • Application Access Control Management

    Is there an enterprise wide software management program that can manage access to our web-based applications, vendor specific programs located thru out the entire company, and our MS applications, including MS Outlook? In other words, we would like to control all of the various software programs...

    NBf9910 pointsBadges:
  • Open IT Forum: Security Worst-Cases

    Have you had rogue employees deploying to the cloud without your knowledge, that is, until something went wrong? Share your worst-case experiences including how you rectified the situation. We want to hear your security horror stories to help other members and potential rogue employees avoid the...

    MelanieYarbrough6,345 pointsBadges:
  • Using online backups for corporate disaster recovery capability

    Has anyone got any experience of using (3rd party supplied) online backups as a way of creating a DR capability.  If they have, what potential risks were faced and mitigated?  

    Patch0115 pointsBadges:
  • Career path in IT

    I am fresh graduate in field of IT majoring in Data Communications. My seriors told me to select a career path in either in Networking ,Database, Systems or Application Programming. I have selected Networking and prepared for CCNA exam. However, lots of books combine between networking and systems...

    1364784570 pointsBadges:
  • Juniper Netscreen 25 & Cisco 2900 Vlan Trunk

    I have Juniper Netscreen 25 and a Cisco 2900 switch with which I’m simply trying to set up a ‘router on a stick’ scenario and I can’t seem get the trunk working. On the Cisco 2900 I’ve done the following: Created 3 vlans: 10, 20 & 30, assigned 5 ports to each vlan, set fa0/20 as the trunk...

    MindOnion25 pointsBadges:
  • What’s the suitable protection level for internet-connected desktop?

    What is the suitable protection level for an internet connected desktop nowadays? Is it antivirus, antispyware and antispam? Or is it more/less?

    MelanieYarbrough6,345 pointsBadges:
  • CCNA and Masters degree

    last year i completed my BCA. i'm intrested in CCNA security right now i'm not doing any education so what should i do do Post graduation or do CCNA security. i'm not intrested in programming and i have completed MCSA.

    Pjoshi2465 pointsBadges:
  • Inter VLAN

    i have 1 switch that i had install vlan 1 and vlan 2. i also have 1 router to connect to the switch through the server. how to make vlan 1 and vlan 2 can access each other? please help me. i'm still new in networking field..

    Skh35 pointsBadges:
  • layer 2/3 switches

    When I am trying to put the default gateway in layer 2 switches with ip default-gateway xxxxx commnd it ok. But If I'm trying to put the default-gateway in 3560(layer 3) switches with ip default-gateway xxxxxxx command its giving me error that invalid command

    Jadu50 pointsBadges:
  • Cisco Catalyst and Juniper VLANs

    i have two vlans configured into a juniper netscreen (a screenOS device). I have connected a catalyst to the nic i have configured the vlans on. I need an example configuration to shoot into the cisco to be able to ping both juniper vlan addresses from the cisco

    Renatogallo10 pointsBadges:
  • Feedback on experience with User Profile Manager from Forensit

    As seems to be the case for many people in educational or other public access environments, technicians are having issues dealing with user profiles in Windows 7. The user profile manager in the Advanced system settings in control panel only removes one user profile at a time and this is not...

    Skenny175 pointsBadges:
  • Contest Bounties: Last chance to win an iPad!

    The end of the iPad contest is drawing near - next Wednesday, February 16th to be exact - and we want to see more of you in the final drawing. In order to help push you over the 500 knowledge point requirement, we assembled some last chance bounties to get you in the running: 1. Tweet about...

    MelanieYarbrough6,345 pointsBadges:
  • How to limit max amount of connections per ip on cisco 2811 router

    I wish to limit max 100 tcp connections per internal ip address. Thanks

    Hywl515 pointsBadges:
  • VLAN setup advice

    We have a network with Windows Servers, Windows Clients, Mac servers and Mac Clients. We have HP Pro Curve’s 4000M and a ProCurve 6108 as our switches. Should we setup VLANs? Can it be beneficial?

    NewnanIT1,110 pointsBadges:
  • Configuring Cisco and HP Switches

    Can an HP ProCurve switch be configured to work with a Cisco switch? Say a for example 3750 or 6506.  By work I mean, be able to use VLANs create on Cisco side to work on HP side.  Also, for a Cisco trunk to work with on an HP switch.

    Jdleon85 pointsBadges:
  • Addressing specific IPS from HP Pro Curve or only by port numbers?

    Can we address specific IPS from our hp pro curve 4000m or only by port numbers? If only by port can we set a VLAN for a specific machine to always be in it and apply priority rules to the VLAN?

    Troubleshooter24755 pointsBadges:
  • Assigning wireless encryption

    What methods of assigning wireless encryption codes to our users do we have? I want the process to be automated where they connect to the network and see a web page where they can log in and retrieve their codes. What options do I have?

    TeachMeIT975 pointsBadges:
  • Mobile encryption / security

    I'm looking for companies developing next generation mobile security and encryption. Any suggestions?  Thank you, Matt

    Mattperrini15 pointsBadges:
  • Which certs should I take first?

    Hi everyone, completely new here so.. Here goes my question. I'm currently taking a diploma of Cyber and Digital Security, which covers on networking and ethical hacking (all very lightly). After this Diploma, I'm planning to head more into the network and security side (following the steps of my...

    Benjilee5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following