Does anyone have experience with/opinions on Linksys VPN router connection versus Cisco MPLS configuration? Any details or advice would be greatly appreciated.
Answer Question | February 7, 2011 4:24 PM
Cisco, Linksys, MPLS, MPLS VPN, Network security, Network security appliances, Network Security Management, VPN connectivity, VPN routers
We use Active Directory, DHCP, network printers, software and file servers. We want to add two more branches to our network, so users get IP addresses by DHCP and assigned to AD server. How can we create them like remote branches without giving same subnet to remote users? We want VPN connection on our router [...]
Answer Question | August 16, 2011 4:21 PM
Active Directory, Active Directory interoperability, DHCP, Network security, Network security appliances, Network Security Management, VPN, VPN connectivity, VPN security
How do I extend 2 vlans over a WAN link. I’m using 2 routers and simulated the WAN by connecting 2 paradyne modems back to back with a cross cable. both routers are seeing each other. switch-> router1->modem->modem->router2->workstations. I need to be able to see the vlans on router 2 and to run applications on [...]
Answer Question | February 28, 2011 8:25 PM
InterVLAN Routing, VLAN, VLAN configuration, WAN
I am looking to set up a whole new network infrastructure for an Investment Bank – DATA and VOICE – covering ALL of their devices – onsite and remote. Does FINRA or anyone for that matter a publish a comprehensive guide with rules and regulations?
Answer Question | December 14, 2010 5:20 PM
Compliance, FINRA compliance, Infrastructure management, Infrastructure services, Network infrastructure
How can we place expirations on user accounts? We want to make temporary Windows Server 2008 Active Directory accounts for technicians in our data center. We want them to expire in one hour from first login. Is this possible?
Answer Question | December 10, 2010 5:33 PM
Active Directory, Active Directory Account Lockout, Network security, Windows Network Administration, Windows Server 2008, Windows Server 2008 Active Directory, Windows Server 2008 Administration
How can we segment a piece of our Windows network so users from the same subnet can not access it but people on that side of the network and a different subnet can. Currently they can communicate freely between each other.
Answer Question | February 9, 2011 5:18 PM
Network Access Policy, Network management, Network security, Subnet, Subnetting, Windows Network Administration, Windows networking
hello , almost i disconnect any computer in my lan by making ip access list in core switch but alway ip in changed for any computer so i try to make mac access list to disconnect any computer depending on it’s mac address but in cisco devices there isn’t any ability to make this can you help me please [...]
Answer Question | February 9, 2011 10:25 AM
CCNA Wireless Certification, Cisco, Cisco switches, IP address, LAN
I am B.tech graduate and i am working in a BPO as a Tech Agent from 28 Months, i would like to join SUN SOLARIS certification course, i wanted to know howz scope for Solaris Administrators, was it really a good idea to join Sun Solaris ??? Can anyone help me out ????
Answer Question | June 26, 2012 6:44 AM
IT careers, Networking, Solaris, Sun Solaris
Is there a central security server for wifi that will only allow corporate clients or employees on the network automatically based on mac address?
Answer Question | February 9, 2011 3:28 PM
MAC address, MAC address authentication, Network security, Network security appliances, Network Security Management, Security hardware, Server Security, Wifi
On a windows 2008 ad network how do we create a backup dns server? Can we have it answer queries automatically if the first one is not available? Is replication automatic?
Answer Question | June 27, 2011 3:19 PM
Active Directory, Active Directory backup, Backup Server, DNS, DNS Backup, DNS server, Network Backup, Windows Server 2008, Windows Server 2008 Active Directory
What are SNMP traps and how can they be used for network monitoring in our new data center?
Answer Question | December 9, 2010 3:04 PM
Data Center management, Network Monitor, Network monitoring, Network Monitoring Tools, Network security, Network Security Management, SNMP, SNMP monitoring
we have SQL 2008, and looking for tools to monitor sql and get sql diagrams. do you know any good tools?
Answer Question | December 16, 2010 10:51 PM
Network Monitoring Tools, Network security, SQL 2008, SQL Server 2008, SQL Server administration
Do you have a checklist or a favorite set of server hardening tools in your arsenal? Share with us what you think are the most important considerations when creating a server security baseline. Be sure to include what hardware and software you’re using! Helpful suggestions and innovative ideas will you earn you a whopping 100 [...]
Answer Question | December 13, 2010 3:27 PM
Network security, Network Security Management, Network Security Policies, Open IT Forum, Server Hardware, Server Security
If the administrator password for an Active Directory box is lost what is the process for recovering it? Can it be done?
Answer Question | December 9, 2010 2:48 PM
Active Directory, Active Directory Administration, Active Directory security, Network security, Password recovery
Is there free encryption software for our corporate laptops? Does it offer remote wiping capabilities?
Answer Question | May 22, 2011 2:45 PM
Encryption, Encryption Software, Network security, Network Security Policies, Remote access, Security, Security management
We have an intranet site on our windows 2003 network. How can we setup DNS so that when typing intranet it redirects to our webserver?
Answer Question | December 9, 2010 2:39 PM
DNS, DNS management, Intranet, Web servers, Windows Network Administration, Windows networking, Windows Server 2003
Can we encrypt or lock a bat file from being read as it has passwords in it?
Answer Question | December 10, 2010 6:33 PM
bat files, Encrypted files, Encryption Software, Network security, Network Security Management, Password policy, Password Protection
I currently have citrix installed on my home computer so I can access my work computer but how can I access my home computer from work?
Answer Question | January 24, 2011 4:53 PM
Citrix, Citrix Connectivity, Citrix Deployment, Citrix Program Neighborhood Agent, Remote access
What is the technology that would allow a call from a cell phone to be routed to a transmission device that triggers a loud beeping sound. For example, using a cell phone to call a number that calls a database, and then triggers an external receiver that is attached to one’s keychain for example?
Answer Question | March 25, 2011 5:36 AM
Cellular, Cellular networks, Database, Routing, Routing and Remote Access, SIP
how to simulate CSMA/CD protocol with C# or any language?
Answer Question | January 12, 2011 12:48 AM
C#, CSMA/CD, Programming Languages