• Connect Cisco 2800 to 2 ISPs, and internal networks through switch module.

    Greetings.. I am considering what equipment I need for my project. I have to load balance between two connections to the same ISP. The question I have is simply, if I can use a Cisco 2811 router, using the fa0/0 - 1 to connect to the ISP and use the internal switch module for my networks ? I have...

    Netsmurf5 pointsBadges:
  • How to reset the CMOS using jumpers

    Dell latitude C640

    Pintpast40 pointsBadges:
  • Shared folder management

    I would like to know how to prevent users from moving shared folder in the file server (MS win Server 2003 R2). Removing the delete permissions from the shared folders is not good solution because when the users create a new folder / file within that share, they will not be able to rename it...

    Yutallica5 pointsBadges:
  • Performance of Cisco 3750 Layer 3 switch

    Hi guys, I have a cisco 3750 series L3 switch. It can currently handle 3GB of L2 traffic with no problem, but when faced with 40MB of L3 traffic, CPU utilization shot so high that I can't even telnet to the switch. Could anyone enlighten me please? Thanks in advance!!

    Bluezerk15 pointsBadges:
  • FIREWALL Cisco PIX525

    I'm thinking about using a CISCO PIX525(replacing the present PIX515) as a device for my firewall protection. What is the best common practice in the industry for setting up this device and publishing my VPN IP range?

    Soteria5 pointsBadges:
  • Checkpoint VPN-1 SecureClient cannot receive mail from exhange (VISTA Outlook 2007)

    My question is related to checkpoint vpn client vista and exchange server. I can connect to the network using the vpn client, map drives remotely connect to machines but i cannot receive mail through the exchange server. I did a search on the web for similar problems and i found out that this is a...

    Laoman5 pointsBadges:
  • SFTP

    I beleive someone has a document how to configure sftp on the iseries. is is possible for someone to email me this document. fitzj@quinn-group.com

    Cavan1235 pointsBadges:
  • Cisco ASA 5505 Limit IP that can send mail to the Internal network

    We have a spam blocker that sits on the Internet and forwards clean mail to our Exchange server. The MX record points to this IP, but we are still getting a lot of spam that never passes through our spam blocker. I have confirmed that it is not an internal spambot. Question: How do I configure the...

    Edctech45 pointsBadges:
  • VLAN11

    i have internet lint (ethernet cabli consist of 16 vali IP),this cable is configured on VLAN when i had connect this cable to asus switch or micronet switch i have no any ping and i can not to assign any these ip to another pc but when i had connected this cable on the isa server its work. tell me...

    Daemi5 pointsBadges:
  • Restricting users from accessing network resources unless logged into domian

    We are using server 2003. 1.I want to restrict users from getting access to network resources if they are not logged in with their domain user account. 2.ALso i want to stop the sending and receving of mails if they are not part of domain. (usually they login as local users and access...

    Pree70 pointsBadges:
  • ISA, group policies

    hi PCJunkie, Wow, Tnx tnx lot, it work out. i need your help more, v using ISA 2004, there is no document for the network, I recently joind in this company also i new to isa. everybody using internet and i want to block some users, my director is using direct connectivity, somedays back i blocked...

    Cool3045 pointsBadges:
  • Tracking sensitive table access

    How can I track the number of Read's users perform on specific tables on an iSeries?

    LarryH6015 pointsBadges:
  • Defense in depth and unified threat management appliances

    Experts tout unified threat management appliances as an ideal antimalware, intrusion prevention and content filtering firewall for midmarket companies. But doesn't this counter the long-standing security practice of defense-in-depth? With a one vendor, platform, and management console, aren't we...

    SearchMidmarketSecurityATE150 pointsBadges:
  • BitLocker and Business versions of Windows

    BitLocker drive encryption is intriguing and important, but it's available only in Vista and Win 7 Ultimate and Corporate editions. Since these are the most expensive versions of the OS, most smaller companies use the Business version of Windows--what are some encryption options for them? As a...

    SearchMidmarketSecurityATE150 pointsBadges:
  • Network access controls and 802.1X

    Is 802.1x the best option for implementing network access controls (NAC)? What are the advantages and disadvantages of 802.1x? What are some other options; and can you compare and contrast the advantages of those against 802.1x?

    SearchMidmarketSecurityATE150 pointsBadges:
  • Easy Questions – I’m new!

    1) How do I create an email signature for one of my accounts? 2)Is there anyway to stop notifications every time I receive an email, and also to prevent them from going into my "message" box? In other words, I only want to see emails when I open up that specific email browser.

    Kdh7855 pointsBadges:
  • OWA in DMZ or not?

    Hi. I run a 2003SP2 Exchange environment with a single Exchange server and a single OWA server in a DMZ. Over the years I've had to open more and more holes between the two networks as I've added features, etc. Someone told me I should bring the OWA server back behind the firewall and only open...

    Guysmiley5 pointsBadges:
  • Unemployed due to the economy (2009) help!!!

    Hi, can you please provide your personal advice and perspective, I presently possess a Master’s degree in Management Information Systems from a reputable institution. I have worked for a fortune 500 health insurance provider for the past 12 years in various semi-technical roles e.g. Desktop...

    Bobafett5 pointsBadges:
  • VMware vSphere Fault Tolerance

    Would the fault tolerance feature in vSphere work as a disaster recovery solution? Thanks. Moderator Note: This is a submitted question

    BrentSheets6,925 pointsBadges:
  • Audit policy change Eventid 644

    Hi i noticed the username doing the change is always the computer account even if it is changed by a user account. How could we se which user account did it?

    Ditchdog5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following