Friday, March 12, 2010

Cisco DHCP Configuration

Dynamic Host Configuration Protocol (DHCP) is a protocol used by networked devices to obtain information required to operate on an Internet Protocol network.

When a DHCP client is first switched on, it sends a broadcast packet on the network with a DHCP request. If there is a DHCP server exists in the network, this request will be picked up by the DHCP server. The DHCP server will allocate an IP address to the PC, from one of the pools of addresses it managed.

DHCP clients use a broadcast packet to find a DHCP server, so if a client is on one side of a router, and the server on the other, normally these broadcast packets will be filtered out. Many routers today include support for DHCP- forwarding, but it is not enabled by default.

Many system administrators do not realize that DHCP service can be enabled in Cisco devices. In this article, we will show the method on configuring DHCP on a Cisco router.

Thursday, March 11, 2010

Windows Clustering

Clustering is the connection of multiple computers together in such a way that to the outside world, the cluster appears to be a single system. Each computer in a cluster is referred to as a node.

Business suffers when work stops because of critical service is offline. A properly installed and configured cluster provides continued operation during hardware failure, software failure, and/or planned maintenance. Ability to recover from failed server hardware and failed software is the main benefit of clustering.

Windows Server 2003 clustering consists of two different technologies: Server Cluster and Network Load Balancing (NLB). Each of these technologies can be used to provide high availability for different types of services.

Wednesday, March 10, 2010

The Fewer Services Your System Runs, The Better

It is only a matter of time before an unsecured system becomes contaminated and losing valuable data. In addition, poorly secured system that is compromised can be used for a number of illegal activities. It was reported that several major Internet sites were disabled by attacks that were launch through the use of thousands of these devices. To enhance security and free system resources on the system we need to disable any services that are not required.

Every running, but unused, service on a machine is an unnecessary security vulnerability. Users may not even be aware that many of these services are running. Whether it is a Windows PC, router, switch, Linux machine or network enables device, the out-of-the-box configurations must be altered to meet the security needs of most businesses with an Internet presence.