This whitepaper aims to help you better understand switch-based Access Control Lists (ACLs) by exploring what they are used for and how to best utilize them on IOS-based Catalyst devices. View now to learn more!
The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
A switch is a Layer 2 network device that forwards Ethernet frames based on the destination media access control (MAC) address. A switch has RJ-45 ports for connection and the intelligence to read MAC addresses to make forwarding decisions. The purpose of the switch is to quickly and accurately forward frames toward the destination.
This paper will examine the challenges of using network firewalls and VLANs for security within the corporate network and introduce the many advantages of cross-platform server isolation as an alternative in protecting servers.
Discover how you can realize the benefits of virtualization without sacrificing security in this whitepaper that outlines five best practices to utilize to protect your virtual environment.
Read how the Greater Toronto Airports Authority adopted Cisco Catalyst 6500 switches in the wiring closet and throughout the network to enable the convergence of data, voice, and video, and provide virtualization to support a Common Use environment.
Server virtualization can quickly result in excessively complex network ports if you don't have a plan. This white paper explores the factors that can lead to GbE port bloat, including physical server connection paradigms and security procedures.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines