Which degree is better to do on the basis of scope and skills?
Answer Question | September 20, 2010 4:01 PM
Computer engineering, IT careers, IT certification and training, Network security, Network Security Management, Software engineering, Software Engineers
We have a network with Windows Servers, Windows Clients, Mac servers and Mac Clients. We have HP Pro Curve’s 4000M and a ProCurve 6108 as our switches. Should we setup VLANs? Can it be beneficial?
Answer Question | February 14, 2011 3:38 PM
HP ProCurve, Mac, ProCurve Switch 4000, Virtual LAN, VLAN, VLAN Setup, Windows, Windows Server
Slow Login process from xp client to windows2008 Domain,How to speed up?
Answer Question | October 30, 2010 2:51 PM
Network speed, Windows Login, Windows Server 2008, Windows Server 2008 Domain, Windows XP
I am not a network guy and would like to know how can I setup the below two configurations and its pros and cons. networking component :- WAN: cisco 2970 * 1 Load balancer: F5 switch 1600 * 2 Private subnet: Cisco 2950 * 2 My situation is like that, my F5 switch 1600 will [...]
Answer Question | September 20, 2010 5:34 AM
Cisco, Cisco 2950, Cisco Routers, Cisco switches, Ethernet connection, Linux administration and management, Networking, WAN, Wide Area Networks
How do I create an ACL for: Allow inbound HTTP requests to the www.yzcorp server. Add info: The www.yzcorp.com website at 10.0.1.2 is registered with the public DNS system at IP address 220.127.116.11 permit tcp any 18.104.22.168 eq www is not working.
Answer Question | December 16, 2010 1:21 PM
Access Control List, ACL, ACL Manager, Active Directory, Cisco, Packet Tracer, Security in 2010, Servers
How can we use Windows 2008’s Network Access Control to limit intern’s computers from getting to the Internet? Where is this feature setup and do we need a client on the computers or does AD take care of this?
Answer Question | August 31, 2011 3:14 PM
NAC, Network Access Control, Security in 2010, Windows, Windows Server 2008, Windows Server 2008 R2, Windows Server 2008 R2 Support
How can I set up a NAS device on my network? Will the users access files directly on it? Do we need to set security here or will the device be an extension of one of my Windows servers using it’s security? What is common practice?
Answer Question | September 21, 2010 3:11 PM
NAS, Network Access Storage device, Network Attached Storage, Network Drive, Security in 2010, Windows
Hi, I’m a beginner with Call Manager 7 and need some help. this is a Hotel in Spain. The Director wants to block all the rooms extensions. when the reception makes the customer check in, I have to change the CSS (calling search space) on the Directory number. CSS Block to CSS Allow. So they [...]
Answer Question | May 23, 2012 11:49 AM
Call Manager, Cisco, Cisco Call Manager, CSS, ISDN Configuration
i completed my MCA in Osmania University 2009, now am thinking to choose a path in networking. i have a little bit knowledge in networking. can u suggest any thing on dis?? shall i proceed r not??
Answer Question | November 20, 2010 6:30 AM
IT career development, IT career planning, IT careers, MCA, Networking careers
I’m about to create a project using VB.net and Microsoft SQL Server. It’s not difficult when i’m running it on 1 single computer. The problem is, this application should be located in 1 server and accessible through the network. Is there something different i have to do, or i only need to add the connection [...]
Answer Question | September 22, 2010 2:08 AM
Networking in 2010, SQL Server, VB .NET, VB.NET, Visual Basic, Visual Basic .NET
In honor of security month here at IT Knowledge Exchange, we’re giving away resources to help you pass the CompTIA Security+ exam with flying colors! What do you have to do to get this great resource? All you need to do is ask or answer two Security in 2010 questions*. Put the links to the [...]
Answer Question | September 20, 2010 8:59 PM
CompTIA, CompTIA certification, CompTIA Security+, IT career development, IT certification, IT certification and training, Security in 2010
I want to send out an email including a pdf layout with links. How does that work. I have already figured out that “create” and then “object” will insert my pdf, but the links don’t work
Answer Question | September 17, 2010 8:57 PM
Linksys, Linksys SPA2102, Lotus Notes 6.5, Lotus Notes attachments, PDF
Running Exchange 2005 is there a way to block specific IP ranges from our smtp server? Spammers keep trying to send spam and brute force passwords locking users out.
Answer Question | September 17, 2010 5:07 PM
Attacker IP blocking, Exchange, Exchange 2005, Exchange security, IP blocking, IP range, Security in 2010, SMTP
What exactly is Network Access Control in Windows 2008 R2? How can we implement it?
Answer Question | November 23, 2010 4:48 PM
NAC, Network Access Control, Security in 2010, Windows Server 2008, Windows Server 2008 R2, Windows Server 2008 R2 Support
I am attempting to run a tracert to a valid address. At the end of the traceroute I see the same hop multiple times. I am attaching the last few hops from the trace to display what I am seeing. 10 22 ms 19 ms 24 ms 22.214.171.124 11 * * * Request timed out. [...]
Answer Question | September 16, 2010 12:32 PM
Juniper, Packet Tracer, Routers, Traceroute, Tracert
hi, I have two internet connections cum LANs in two departments of office, each having same ISP, hub and 4 PCs. Now I want to connect both LANs only for local file sharing, without disturbing their own seperate internet connections. i want that all 8 computers can share files but an internet connction will support [...]
Answer Question | January 13, 2011 8:43 AM
LAN, Local area networks, Network routing, Networking, Windows XP
Hi, I would like to implement an extendard access-list on a router A which allows IP access to a host in router B. e.g. host A from network A can only access host B fom network B. No one else can access host A from the network except host B -vicer versa- I woul like [...]
Answer Question | September 15, 2010 1:11 AM
Extended Access-list, IP address, Network access, Network Access Policy, Routers, Security in 2010
Back when I was starting in the IT field, I went for my CCNA as well as MCSA and A+. Since I haven’t been activiely look at certifications, I’m curious to see what the current certification trend is. What is currently the most sought after cert? Thanks!
Answer Question | November 9, 2010 7:10 PM
CCNA Certification, IT career development, IT certification, IT certification and training, Open IT Forum
We have a user on our 2003 AD network that needs to be able to access their PC remotely using remote desktop. They are not a local administrator. How can I make this work? Is this a safe practice?
Answer Question | November 26, 2010 2:25 PM
Active Directory, Active Directory 2003, Local Administrator Rights, Remote access, Remote Access Privileges, Remote access security, Security in 2010
Hi, I am Jeeva. Our company going to open new branch which is 20KM far away from old office. Both office, there are nearly 75 to 100 computers there. We want to share our data and access two networks as one. Whether I use Routers or VPN connections or MPLS( Managed private leased lines). If [...]
Answer Question | February 14, 2011 4:56 AM
Branch Office networks, MPLS, Router configuration, VPN design