Antivirus, Application security, Authentication, backdoors, Biometrics, Current threats, cybersecurity, Data breach, Data-security, Digital certificates, Disaster recovery planning, Encryption, filtering, Firewall, Firewalls, Forensics, Hacking, Identity & Access Management, Incident response, Information security, Intrusion management, ISA Server, IT security, malware, McAfee, Microsoft patches, Microsoft Security, Password, Patch management, patching, PEN testing, Platform Security, Risk management, Secure Coding, Security management, Security Program Management, Security tokens, Single sign-on, Spyware, SSL, SSL/TLS, Symantec, Trojans, User Permissions, Veritas, Viruses, vulnerability management, Web security, Windows Security, worms VIEW ALL TAGS
im designing a network for a small business. There are three departments in the business retail sales - 80 employees, sale support - 10 employees, accounts - 15 employees. I've decided to use star topology. It will have one router connecting to many switches. I was thinking of using multiple 48...
Setting up a small network - I have a 16 port switch all computers are accessing the internet through. Can I set up a network on this configuration as is?
I have a number of 'identical' 3750-E 48 port switches, running same IOS version 12.2.44. We've reset the switches to factory defaults (erase start-config; delete flash:vlan.dat; reload) and tried to allocate the max of big buffers (buffers big permanent 20480). On some of the switches this...