Visit soundtraining.net to learn more about soundtraining.net's business skills training programs for IT professionals, plus accelerated technical training programs for IT professionals in the areas of Cisco, Microsoft, and Linux products. For a free copy of Don's article, "Ten Ways to Delight Your End-User", visit the soundtraining.net resource library.
Pptp And Http Port Forwarding With Static Nat On A Cisco Router Copyright (c) 2008 Don R. CrawleyRecently, a student at one of our seminars asked about port forwarding on a router. She wanted to allow PPTP clients to connect from the outside to a VPN server on the inside. In this article, I'll explain how to do it along with a quick look at using static NAT to forward packets to a web server.Port Forwarding on a Cisco RouterSometimes we have internal...... Similar Editorial : Overview of HTTP by Chris Inga. | Source : Computer Networking
Configure Nat Using Port Address Translation On A Cisco Router Copyright (c) 2008 Don R. CrawleyNetwork Address Translation, better known simply as NAT, allows an outside address to represent a single or many inside addresses. There are several forms of NAT, but one of the most common is called NAT overloading, Port Address Translation, or simply PAT. PAT provides a many-to-one mapping with many inside private addresses mapped to one outside public address....... Similar Editorial : Modem or ADSL router by Daniele Di Gregorio. | Source : Computer Networking
Eight Base Commands Of Cisco Asa Security Appliance Copyright (c) 2008 Don R. CrawleyThere are literally thousands of commands and sub-commands available to configure a Cisco security appliance. As you gain knowledge of the appliance, you will use more and more of the commands. Initially, however, there are just a few commands required to configure basic functionality on the appliance. Basic functionality is defined as allowing inside hosts to...... Similar Editorial : Popular Linux Help Commands by Clyde Boom. | Source : Spyware Adware Free Removal
Managing Access-control Lists On Cisco Asa & Pix Firewalls Copyright (c) 2008 Don R. CrawleyAccess Control Lists (ACLs) are sequential lists of permit and deny conditions applied to traffic flows on a device interface. ACLs are based on various criteria including protocol type source IP address, destination IP address, source port number, and/or destination port number.ACLs can be used to filter traffic for various purposes including security, monitoring...... Similar Editorial : Managing Stress by Lorraine Pirihi. | Source : Spyware Adware Free Removal
Remotely Manage Windows Systems From The Command Line Copyright (c) 2008 Don R. CrawleyIt seems like nearly every operating system has a lot of hidden tools; little gems that, if you know about them, make your life a lot easier by solving problems or helping your work more efficiently. Anyone who has attended one of my seminars knows I'm all about centralizing system management using tools like SSH, Webmin, Group Policy, Zenworks, Dameware, pt360,...... Similar Editorial : Important Aix Command by koushal. | Source : Wheeled Computer Cases
What You Just Said Just say what you mean and get on with things or, as author Meryl Runion says in her book Power Phrases, Say what you mean, mean what you say, and dont be mean when you say it. Crawley... Similar Editorial : 3d Screensavers For Windows by Denis Burenkov.