Does anyone have experience using UnTangle in their small business? Looking for a general overall security product with firewall, spam, filters, etc. Free or opensource most preferable.
Answer Question | December 16, 2010 5:42 PM
Network security, Network Security Management, OpenSource, OpenSource Software, Security software, Untangle
Im interested to learn networking with c#. Plz suggest me a good book for network programming using csharp
Answer Question | September 6, 2011 12:11 PM
C#, IT Books, Networking, Visual Studio, Visual Studio 2010
We are currently using Retrospect (windows version) to do both nightly backups and regular archiving of our production server. The routine archiving consists of an average of 200GB of DATA on several tapes in one catalog. We find that Retrospect may not be the most robust solution for such large data sets. However we are [...]
Answer Question | February 18, 2011 7:53 PM
Archiving, Backup and restore, Data archiving, Data backup solutions, LTO, LTO4, Retrospect
How do you subnet in IPv6? I know most subnets are all /64′s, but I need to be able to assign larger blocks to labs to they can then, in turn subnet their blocks. I keep looking at the bits and the hex, but I am not quite getting how to define and organize the [...]
Answer Question | February 29, 2012 6:17 PM
IPv6, subnet IPv6, WAN
What is the difference in ARP and RARP when it comes to IPv6?
Answer Question | February 7, 2011 6:14 PM
Arp, ARP and RARP, IPv6 ARP, IPv6 RARP, RARP, WAN
We wonder where we could a most exhaustive list of hosts, hardware, and appliactions compatible with IPv6. For example, we know that Linux OS and a kernel with a version older than 2.4 are compatible with IPv6 (if activated). Windows Vista and Seven are also compatible with IPv6. Our aim is to establish a group [...]
Answer Question | December 30, 2010 6:12 PM
IPv6, IPv6 compatibility, IPv6 hardware, IPv6 hardware compatibility, WAN
I hear a lot about IPv4 and IPv6, but what happened to IPv1, IPv2, IPv3, and IPv5?
Answer Question | April 18, 2013 6:08 PM
IPv1, IPv2, IPv3, IPv4, IPv5, IPv6, WAN
LAN “A” connected to IP encryptor and connected to LAN “B” with also has an IP encryptor. i.e. we have IPsec VPN from “A” to “B” through MPLS VPN. Can I then connect LAN “A” to LAN “C” that is without IP encryptor via MPLS VPN. How do I configure the IP encryptor at LAN [...]
Answer Question | March 17, 2011 3:24 PM
Encryption, IP encryptor, IPsec, IPsec VPN, MPLS, Network security, Router configuration
I’m compiling a list of the best books on network security. What are some of your favorites, perhaps with a brief description? All contributors to the list will receive 100 knowledge points!
Answer Question | December 17, 2010 3:13 PM
IT Books, Network security, Network Security Management, Open IT Forum, Security management
Just wondering if it is generally a policy to disable macros from Word, etc. Is there a safe macros list or should they all be disabled? How would I go about doing this across the network?
Answer Question | December 15, 2010 2:26 PM
Macros, Network Policies, Network security, Network Security Management, Network Security Policies
My firewall has been receiving and blocking PING’s from the following IP address: 10.40.16.145. This address being a non-public IP address, I’m a bit confused. First, how does this data traverse the Internet when the originating IP address is not a standard public address? Is there any way to determine the true originating address? If [...]
Answer Question | February 7, 2011 8:49 PM
Firewalls, IP address, IP address conflicts, Network security
What’s new out there in securing a virtual network? I’ve done some research and found ALTOR but they’ve been purchased by Juniper so their product may soon be intergrated with their routers and switches. I’m looking for a defense in depth solution to my question.
Answer Question | February 9, 2011 6:35 PM
Network security, Network Security Management, Security hardware, Security products, Virtualization
We’ve gotten your opinions on network security from the hardware and software side, but now we want to know what you’re doing for compliance. From what your compliance policies are to the creative ways you raise awareness about those policies, share your stories and you might get 100 knowledge points in time for the final [...]
Answer Question | December 17, 2010 5:48 PM
Compliance, compliance management, Network security, Network Security Management, Network Security Policies, Open IT Forum, Security compliance
Please can anyone offer any guidance or know what are the best products in the market place for encrypting/securing corporate laptops, preferably the solution should include hard disk wiping.
Answer Question | December 14, 2010 4:49 PM
Encryption, Encryption Software, Hard disks, hard drive wiping, Laptop Security, Network security, Network Security Management, Network Security Policies
Does anyone know how may I get files with the same beginings as abc*.* in different directories inside of the main directory using mget. Any help would be appreciated
Answer Question | December 14, 2010 2:38 AM
FTP, General Directories, MGET
From the back of the book: “A comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. Understand and implement current, state-of-the-art network security technologies to ensure secure communications through the network infrastructure.” Help out around IT Knowledge Exchange and learn how to effectively secure your network with this great [...]
Answer Question | December 19, 2010 6:35 PM
Cisco, Disaster Recovery, Giveaways, IT Books, Network security, Network Security Management, RAID 5, RAID Array, SMTP, VLAN, WAN
Running Windows XP Pro SP3. Haven’t changed my settings, but they are now grayed out and the firewall is off. Ideas?
Answer Question | December 15, 2010 4:31 PM
Firewalls, Network security, Windows firewall, Windows XP Professional, Windows XP Professional SP3
Does anyone have experience with/opinions on Linksys VPN router connection versus Cisco MPLS configuration? Any details or advice would be greatly appreciated.
Answer Question | February 7, 2011 4:24 PM
Cisco, Linksys, MPLS, MPLS VPN, Network security, Network security appliances, Network Security Management, VPN connectivity, VPN routers
We use Active Directory, DHCP, network printers, software and file servers. We want to add two more branches to our network, so users get IP addresses by DHCP and assigned to AD server. How can we create them like remote branches without giving same subnet to remote users? We want VPN connection on our router [...]
Answer Question | August 16, 2011 4:21 PM
Active Directory, Active Directory interoperability, DHCP, Network security, Network security appliances, Network Security Management, VPN, VPN connectivity, VPN security
How do I extend 2 vlans over a WAN link. I’m using 2 routers and simulated the WAN by connecting 2 paradyne modems back to back with a cross cable. both routers are seeing each other. switch-> router1->modem->modem->router2->workstations. I need to be able to see the vlans on router 2 and to run applications on [...]
Answer Question | February 28, 2011 8:25 PM
InterVLAN Routing, VLAN, VLAN configuration, WAN