Quantcast
Channel: CB5 Blog - Networking
Browsing all 20 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Using and Installing the Telnet Client

Using and Installing the Telnet Client                 Telnet is one of the greatest network troubleshooting tools available to us. Unfortunately the telnet client is not installed inherently anymore...

View Article


Taking a Long Network Capture

                It is often needful to take a long and persistent network capture to collect data from a server or set of servers. Often you are looking for a problem and cannot predict its occurrence....

View Article


Considering Network Teaming?

Fault Tolerance and Network Teaming                 Anyone who has called Microsoft for help with a networking problem has likely heard the question: "Are you using network teaming?" I have often heard...

View Article

Enabling DNS "Secure Only" Updates

Enabling DNS Secure Only UpdatesPrerequisites / Suggestions                This article is aimed to help start us on the right track to enabling DNS security in our organization in a way to best...

View Article

Image may be NSFW.
Clik here to view.

PING vs NSLookup

Have you ever noticed that ping and nslookup give different results when resolving a name? This happened to me many, many times and it caused me some frustration before I made the effort to understand...

View Article


What is a Network Client?

What is a Network Client?                Whether you are administering a network, troubleshooting a problem, or designing a solution it is invaluable to understand the role that your device plays in...

View Article

Image may be NSFW.
Clik here to view.

Follow the Bouncing Packet

 FtBP: PrerequisitesPart 1/8                 One understanding that I think has helped me a great deal in troubleshooting problems, and designing networks and services is the evolution of a network...

View Article

Image may be NSFW.
Clik here to view.

Follow the Bouncing Packet: Packet Formation

FtBP: Packet FormationPart 2/8Packets on the wire (purposely repeated)                As we go through this series we will go over some examples to help understand the progression of a network packet...

View Article


Image may be NSFW.
Clik here to view.

Follow the Bouncing Packet: Switching

FtBP: SwitchingPart 3/8                 In our last discussion we covered the formation of a network packet in preparation to send that packet on the wire. Today we will cover the packet's travel...

View Article


Image may be NSFW.
Clik here to view.

Follow the Bouncing Packet: Routing

FtBP: RoutingPart 4/8                 In a previous discussion (Part 2) we covered the formation of a network packet in preparation to send that packet on the wire. Today we will cover the packet's...

View Article

Image may be NSFW.
Clik here to view.

Follow the Bouncing Packet: Firewalls

FtBP: FirewallsPart 5/8                 Last time we talked about how a router will direct a network packet, today we will discuss how a packet gets assessed by a network firewall in determining...

View Article

Image may be NSFW.
Clik here to view.

Follow the Bouncing Packet: VPN Tunnel

FtBP: VPN TunnelsPart 6/8                 Last time we talked about how a firewall will handle a network packet, today we will discuss how a packet gets across a VPN Tunnel. Here is where we left off...

View Article

Image may be NSFW.
Clik here to view.

Follow the Bouncing Packet: NAT and PAT

FtBP: NAT and PATPart 7/8                 Last time we talked about how a network packet transverses a VPN tunnel, today we will discuss how a NAT device works. Here is where we left off last time with...

View Article


Image may be NSFW.
Clik here to view.

Follow the Bouncing Packet: End to End, B to A

FtBP: End-to-End, B-to-APart 8/8                 Last time we talked about how a network packet changes through a NAT device, and we finished off the transit of our network packet to Computer B. Today...

View Article

How to Find a Network Adapter in the Registry

                Many times I have found it needful to be able to find what adapters are loaded on a server, whether they are not showing up in device manager, I wanted to validate whether network...

View Article


Tackling IPSEC

Tackling IPSECPurpose                IPSEC is one of the most useful and sometimes most confusing protocols in modern technology. It seems that to understand IPSEC and its appliance you have to teach...

View Article

Setting up a Solid NLB Cluster

Setting up a Solid NLB ClusterPurpose                I often run across failing NLB clusters, and administrator with many questions. Like with many technologies, I find NLB to best be kept simple, it...

View Article


Network Ports and Sockets

Network Ports and SocketsPurpose                To begin to understand how a computer communicates on the modern network you need to understand network ports and sockets in TCP/IP. This is probably the...

View Article

Network Bandwidth vs. Network Latency

Network Bandwidth vs. Network LatencyPurpose                It has always been curious to me that we accept a statement of bandwidth only from our ISPs, when latency is just as important. I may be able...

View Article

Image may be NSFW.
Clik here to view.

DNS Command Line and GUI Scenarios Clarified

How's it goin' team? Eric here again. It's been a while since I've blogged, so I figured I'd write one based on some scenarios during a recent customer visit. I was on-site with a customer that added...

View Article
Browsing all 20 articles
Browse latest View live