TechNet Magazine: Networking rss

All TechNet Magazine Topics

  • Security: Managing the Windows Vista Firewall
    Jesper M. Johansson - June 2008
    The recent update to the Windows Vista Firewall offers some impressive new features that make it a compelling choice for the corporate environment. Jesper M. Johansson gives a brief overview of the evolution of the Windows Firewall and delves into enhancements—such as new rules and profiles, domain isolation, and encryption—that will have administrators taking a closer look.

  • The Cable Guy: Troubleshooting NAP Enforcement
    Joseph Davies - April 2008
    Troubleshooting enforcement behaviors in the Network Access Protection platform can be challenging. The Cable Guy explains how NAP health policy evaluation works and how you can troubleshoot the most common issues.

  • Special Coverage: Windows Server 2008: Policy-Driven Network Access with Windows Server 2008
    Ian Hameroff and Amith Krishnan - March 2008
    How do you allow network access to those who need it without sacrificing security? See how new technologies in Windows Server 2008, such as Windows Firewall with Advanced Security and Network Access Protection, let you implement a policy-based approach to help you achieve this goal. Ian Hameroff and Amith Krishnan 62 Configuring Roles with Server Manager A DNS server need not be a print server. One approach Windows Server 2008 takes to improve security and manageability is to simplify server roles so you can easily install only the tools and services you need, and nothing more. Here's an introduction to using Server Manager for configuring roles and simplifying deployments.

  • The Cable Guy: Migrating Your Intranet to IPv6 with ISATAP
    Joseph Davies - March 2008
    Getting ready to move to IPv6? The Cable Guy explains how you can use an IPv6 transition technology to get IPv6 connectivity and migrate to an IPv6-capable intranet.

  • The Cable Guy: IEEE 802.1X Wired Authentication
    Joseph Davies - February 2008
    IEEE 802.1X authentication provides an additional security barrier for access to your intranet. See how Windows Vista and Windows Server 2008 make it a snap to implement IEEE 802.1X authentication for your wired network.

  • The Cable Guy: DNS Enhancements in Windows Server 2008
    Joseph Davies - January 2008
    Windows Server 2008 includes many DNS server enhancements. Take a close look at how these updates make name resolution faster, improve support for IPv6, and add greater flexibility to DNS administration.

  • Networking: Track Down Elusive Network Problems
    Christopher Stoneff - December 2007
    You've got a machine that isn't communicating with other machines for no obvious reason. These tips can help you quickly diagnose and repair the problem.

  • The Cable Guy: Network Policy Server
    Joseph Davies - December 2007
    The Network Policy Server (NPS) service in Windows Server 2008 replaces the Internet Authentication Service used in Windows Server 2003 and brings numerous enhancements, from the ability to enforce system health requirements to improved management capability.

  • Networking: Configure VPN Remote Access with ISA Server 2006
    Alan Maddison - November 2007
    A virtual private network can provide improved connectivity and increased productivity—and it doesn't need to be difficult to implement and manage. Find out how you can use ISA Server 2006 to address two common VPN scenarios.

  • The Cable Guy: Wireless Single Sign-On
    Joseph Davies - November 2007
    Single Sign On offers many advantages for both end users and administrators. Here's a look at how Single Sign On can simplify implementation of wireless authentication for your network.

  • The Cable Guy: The Authenticated Internet Protocol
    Joseph Davies - October 2007
    The Internet Key Exchange protocol and Authenticated Internet Protocol are both used to determine keying material and negotiate security parameters for IPsec-protected communications. Get an in-depth look at how they work.

  • The Cable Guy: Strong and Weak Host Models
    Joseph Davies - September 2007
    A multihomed host provides enhanced connectivity by simultaneously connecting to multiple networks. However, services running on multihomed hosts have an increased vulnerability to being attacked. To help you prevent attack, here’s a look at the various host models of multihomed hosts and how they are supported in Windows.

  • The Cable Guy: IPv6 Autoconfiguration in Windows Vista
    Joseph Davies - August 2007
    There's more to IPv6 than just extending the address space from 32 bits to 128 bits. Here's a look at how IPv6 hosts can automatically configure themselves, even without the use of an address configuration protocol.

  • How IT Works: Troubleshooting RPC Errors
    Zubair Alexander - July 2007
    Ever been confused by cryptic remote procedure call errors? Take a look at some common errors, techniques you can use to identify errors, and solutions to specific problems.

  • The Cable Guy: IPv6 Traffic over VPN Connections
    Joseph Davies - July 2007
    Before implementing IPv6 support on your intranet, you need to understand how it is supported over VPN connections. Here's a detailed look at what you need to know.

  • Security: Exploring The Windows Firewall
    Steve Riley - June 2007
    Mobility has changed computer threats and the techniques that guard against them. As laptops wander outside the perimeter and come back to the network, you need better ways to protect your systems. Find out how you can use Windows Firewall to protect your computers—on the Internet and on your own internal network.

  • The Cable Guy: The Secure Socket Tunneling Protocol
    Joseph Davies - June 2007
    The VPN protocols in Windows XP and Windows Server 2003 don’t work for some configurations. Get an in depth look at the various issues and see how Windows Server “Longhorn” and Windows Vista with Service Pack 1 will use the Secure Socket Tunneling Protocol to solve these problems.

  • The Cable Guy: EAPHost in Windows
    Joseph Davies - May 2007
    The Extensible Authentication Protocol, which is a framework that enables extensibility for authentication methods, has had certain limitations on previous Windows platforms. Examine how the EAPHost architecture in Windows Vista and Windows Server “Longhorn” addresses these limitations.

  • The Cable Guy: Wireless Group Policy Settings for Windows Vista
    Joseph Davies - April 2007
    Discover how you can use Group Policy to centrally configure and distribute wireless network settings to all the computers in your Active Directory network.

  • The Cable Guy: The DHCPv6 Protocol
    Joseph Davies - March 2007
    With an IPv6 network, you don't actually need DHCP to configure addresses, but there can be good reasons to use it. Find out why, and learn how to use DHCPv6 in your environment.

  • The Cable Guy: QoS Support in Windows
    Joseph Davies - February 2007

  • Field Notes: It Just Stops Working
    R'ykandar Korra'ti - February 2007

  • The Cable Guy: TCP Receive Window Auto-Tuning
    Joseph Davies - January 2007

  • Windows Vista: Enterprise Networking with Windows Vista
    Jason Leznek - November 2006
    Since the release of Windows XP, networking has changed drastically—users are more mobile, wireless networking is everywhere, and security threats are more sophisticated. Take a look at the innovations in Windows Vista that make networking simpler, more secure, and easier to manage.

  • Field Notes: Where Did the Net Go?
    R'ykandar Korra'ti - October 2006

  • How IT Works: Decoding TCP/IP
    Don Parker - Spring 2005
    TCP/IP is comprised of a set of protocols including Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Protocol (IP), and Internet Control Message Protocol (ICMP). Most IT professionals understand how these protocols work together to make network communication possible.

  • How IT Works: Domain Name System
    Regis Donovan - Winter 2005
    Without DNS, the Internet would be an ugly place. DNS is one of the services responsible for directing network traffic based on name and numerical IP addresses. Specifically, it's the service that allows users to type in names instead of numbers to locate a Web site or Internet resource.