Back in May 2002, Cisco Systems announced new software for its 12000 series routers, Globally Resilient IP (GRIP). GRIP is meant to eliminate data loss on the network even if there are circuit failures or human errors. Not a bad trick if they can do it.
Documenting Your Network
Undocumented networks are extremely common. Many times this is related more to the difficulty of keeping the documentation up to date rather than to the difficulty of the documentation process itself. Many LAN Administrators had big dreams at one time of keeping elaborate drawings detailing every last aspect of the network. However, networks tend to change too frequently for such drawings to stay current. In spite of the difficulty, having a well documented network can help you solve problems quickly when they arise and is vital to the overall security of your network. In this article, we’ll discuss some alternative documentation methods that are more practical in the ever changing world of networks.
The Network Router as Unsung Hero
Greater intelligence in routers could enable them to look inside a data packet and, for example, determine the content of a packet, according to IDC research manager Paul Strauss.
A Linux Fax Server for a Windows Network
Introduction
The firm I work for had a fax system integrated in the corporate e-mail platform, Microsoft Exchange, for sending and receiving. One day after a software upgrade, the system broke. We needed to find something with the equivalent functionality but with the following conditions:
Defense In Depth – A Layered Approach Network Security
External information access from partners and employees is a very important aspect in the design of security. Corporations need to be assured that their critical servers are safe from different internet threats. Additionally, because the Web is worldwide, it is impossible to create a global agreement on what traffic is inappropriate and how that traffic should be regulated. A major problem IT departments face is how to defend critical servers from hostile network traffic and network addresses. How do we add layers of security to protect our internet servers and internal systems?
Network Forensics
During the Gulf War, computer hackers in Europe broke into a UNIX computer aboard a warship in the Persian Gulf. The hackers thought they were being tremendously clever — and they were — but they were also being watched.
Network Denial of Service Attacks. Can you hack it?
These days there are significant increases in network-based attacks and among them is the dreaded Denial-of-Service attack, which can leave your systems either unusable or unreachable. Although these attacks don’t make the news as often as they did when Yahoo.com was taken down by a massive Distributed Denial of Service attack, they are still prevalent.
Network Security with -proc-sys-net-ipv4
In additional to firewall rulesets, the /proc filesystem offers some significant enhancements to your network security settings. Unfortunately, most of us are unaware of anything beyond the vague rumors and advice we’ve heard about this beast. In this article, we’ll review some of the basic essentials of the /proc/sys/net/ipv4 filesystem necessary to add to the overall network security of your Linux server.
Introduction To Network Attacks
As a network administrator, it is important that you understand the nature of potential attacks on computer security. We’ll briefly describe the most important types of attacks so that you can better understand precisely what the Linux IP firewall will protect you against. You should do some additional reading to ensure that you are able to protect your network against other types of attacks. Here are some of the more important methods of attack and ways of protecting yourself against them: Unauthorized access
Simple Network Troubleshooting
I know that working from the command line can be intimidating to those of us who have always had a nice graphical interface to use. I am convinced, however, once you see how easy to use and effective the following tools are, you will be hooked. Even if you are an old pro, read on. You may find a use for one of these tools that you had not before considered.