What is the difference in ARP and RARP when it comes to IPv6?
Answer Question | February 7, 2011 6:14 PM
Arp, ARP and RARP, IPv6 ARP, IPv6 RARP, RARP, WAN
We wonder where we could a most exhaustive list of hosts, hardware, and appliactions compatible with IPv6. For example, we know that Linux OS and a kernel with a version older than 2.4 are compatible with IPv6 (if activated). Windows Vista and Seven are also compatible with IPv6. Our aim is to establish a group [...]
Answer Question | December 30, 2010 6:12 PM
IPv6, IPv6 compatibility, IPv6 hardware, IPv6 hardware compatibility, WAN
I hear a lot about IPv4 and IPv6, but what happened to IPv1, IPv2, IPv3, and IPv5?
Answer Question | April 18, 2013 6:08 PM
IPv1, IPv2, IPv3, IPv4, IPv5, IPv6, WAN
LAN “A” connected to IP encryptor and connected to LAN “B” with also has an IP encryptor. i.e. we have IPsec VPN from “A” to “B” through MPLS VPN. Can I then connect LAN “A” to LAN “C” that is without IP encryptor via MPLS VPN. How do I configure the IP encryptor at LAN [...]
Answer Question | March 17, 2011 3:24 PM
Encryption, IP encryptor, IPsec, IPsec VPN, MPLS, Network security, Router configuration
I’m compiling a list of the best books on network security. What are some of your favorites, perhaps with a brief description? All contributors to the list will receive 100 knowledge points!
Answer Question | December 17, 2010 3:13 PM
IT Books, Network security, Network Security Management, Open IT Forum, Security management
Just wondering if it is generally a policy to disable macros from Word, etc. Is there a safe macros list or should they all be disabled? How would I go about doing this across the network?
Answer Question | December 15, 2010 2:26 PM
Macros, Network Policies, Network security, Network Security Management, Network Security Policies
My firewall has been receiving and blocking PING’s from the following IP address: 10.40.16.145. This address being a non-public IP address, I’m a bit confused. First, how does this data traverse the Internet when the originating IP address is not a standard public address? Is there any way to determine the true originating address? If [...]
Answer Question | February 7, 2011 8:49 PM
Firewalls, IP address, IP address conflicts, Network security
What’s new out there in securing a virtual network? I’ve done some research and found ALTOR but they’ve been purchased by Juniper so their product may soon be intergrated with their routers and switches. I’m looking for a defense in depth solution to my question.
Answer Question | February 9, 2011 6:35 PM
Network security, Network Security Management, Security hardware, Security products, Virtualization
We’ve gotten your opinions on network security from the hardware and software side, but now we want to know what you’re doing for compliance. From what your compliance policies are to the creative ways you raise awareness about those policies, share your stories and you might get 100 knowledge points in time for the final [...]
Answer Question | December 17, 2010 5:48 PM
Compliance, compliance management, Network security, Network Security Management, Network Security Policies, Open IT Forum, Security compliance
Please can anyone offer any guidance or know what are the best products in the market place for encrypting/securing corporate laptops, preferably the solution should include hard disk wiping.
Answer Question | December 14, 2010 4:49 PM
Encryption, Encryption Software, Hard disks, hard drive wiping, Laptop Security, Network security, Network Security Management, Network Security Policies
Does anyone know how may I get files with the same beginings as abc*.* in different directories inside of the main directory using mget. Any help would be appreciated
Answer Question | December 14, 2010 2:38 AM
FTP, General Directories, MGET
From the back of the book: “A comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. Understand and implement current, state-of-the-art network security technologies to ensure secure communications through the network infrastructure.” Help out around IT Knowledge Exchange and learn how to effectively secure your network with this great [...]
Answer Question | December 19, 2010 6:35 PM
Cisco, Disaster Recovery, Giveaways, IT Books, Network security, Network Security Management, RAID 5, RAID Array, SMTP, VLAN, WAN
Running Windows XP Pro SP3. Haven’t changed my settings, but they are now grayed out and the firewall is off. Ideas?
Answer Question | December 15, 2010 4:31 PM
Firewalls, Network security, Windows firewall, Windows XP Professional, Windows XP Professional SP3
Does anyone have experience with/opinions on Linksys VPN router connection versus Cisco MPLS configuration? Any details or advice would be greatly appreciated.
Answer Question | February 7, 2011 4:24 PM
Cisco, Linksys, MPLS, MPLS VPN, Network security, Network security appliances, Network Security Management, VPN connectivity, VPN routers
We use Active Directory, DHCP, network printers, software and file servers. We want to add two more branches to our network, so users get IP addresses by DHCP and assigned to AD server. How can we create them like remote branches without giving same subnet to remote users? We want VPN connection on our router [...]
Answer Question | August 16, 2011 4:21 PM
Active Directory, Active Directory interoperability, DHCP, Network security, Network security appliances, Network Security Management, VPN, VPN connectivity, VPN security
How do I extend 2 vlans over a WAN link. I’m using 2 routers and simulated the WAN by connecting 2 paradyne modems back to back with a cross cable. both routers are seeing each other. switch-> router1->modem->modem->router2->workstations. I need to be able to see the vlans on router 2 and to run applications on [...]
Answer Question | February 28, 2011 8:25 PM
InterVLAN Routing, VLAN, VLAN configuration, WAN
I am looking to set up a whole new network infrastructure for an Investment Bank – DATA and VOICE – covering ALL of their devices – onsite and remote. Does FINRA or anyone for that matter a publish a comprehensive guide with rules and regulations?
Answer Question | December 14, 2010 5:20 PM
Compliance, FINRA compliance, Infrastructure management, Infrastructure services, Network infrastructure
How can we place expirations on user accounts? We want to make temporary Windows Server 2008 Active Directory accounts for technicians in our data center. We want them to expire in one hour from first login. Is this possible?
Answer Question | December 10, 2010 5:33 PM
Active Directory, Active Directory Account Lockout, Network security, Windows Network Administration, Windows Server 2008, Windows Server 2008 Active Directory, Windows Server 2008 Administration
How can we segment a piece of our Windows network so users from the same subnet can not access it but people on that side of the network and a different subnet can. Currently they can communicate freely between each other.
Answer Question | February 9, 2011 5:18 PM
Network Access Policy, Network management, Network security, Subnet, Subnetting, Windows Network Administration, Windows networking
hello , almost i disconnect any computer in my lan by making ip access list in core switch but alway ip in changed for any computer so i try to make mac access list to disconnect any computer depending on it’s mac address but in cisco devices there isn’t any ability to make this can you help me please [...]
Answer Question | February 9, 2011 10:25 AM
CCNA Wireless Certification, Cisco, Cisco switches, IP address, LAN