NetCraftsmen, A BlueAlly Company

NetCraftsmen, a BlueAlly Company

[email protected]
888-804-1717
  • Company
    • About Us
    • Team
    • Partners
    • Careers
    • News
  • Services
    • Consulting Projects
    • Managed Services
    • Outsourced IT Services
  • Technologies
    • Cloud
    • Automation
    • Security
    • Network
    • Compute
    • Storage
    • Collaboration
  • Industries
    • Healthcare
    • Finance
    • Energy
    • Government
  • Resources
    • Blog – Business
    • Blog – Technology
    • Success Stories
    • Library
  • Contact

Blog

Terry Slattery
Blog
07 // 28 // 09
Freaky Network Outages
One of our customers recently had a network outage, but for a very unusual reason:  Someone burned a mattress near a fiber run and the heat melted the fiber. That’s [...]
Read More
Blog
07 // 25 // 09
Troubleshooting Cisco NAC AD SSO
    When deploying Cisco NAC for desktop computers, it is imperative minimize the impact to the end user experience as much as possible.  This helps to ensure that the NAC deployment does not get derailed by user complaints.  One way to minimize the impact is to implement Active Directory…
Read More
Blog
07 // 23 // 09
Data Center and Network Architectural Standards
I’ve been learning all I can about VMWare, vSphere, and Cisco 1000v, along with soaking up Cisco’s ideas of data center virtualization. And reading up on cloud computing. Meanwhile, I’m [...]
Read More
Blog
07 // 20 // 09
Links to My Articles for the CCIE Flyer

I've done some articles for the CCIE Flyer, run by Emmanuel Conde.  I thought it might be useful to provide you these links in case you want to review them.

Read More
Terry Slattery
Blog
07 // 20 // 09
The Importance of Good Network Hygiene
Just as good personal hygiene is a prime contributor to personal health, good network hygiene is a major contributor to overall network health.  Pete Welcher introduced me to the concept [...]
Read More
Blog
07 // 17 // 09
Bandwidth, VLANs, and 10 G Links
In the middle of a deployment, Jim Marinelli and I discovered a small surprise (to us, anyway). Recent SXH or SXI code, possibly VSS in the mix. (I’d like to [...]
Read More
Blog
07 // 17 // 09
Using Cisco NAC Appliance to enforce FDCC configuration
OMB has mandated the Federal Desktop Core Configuration (FDCC) security configuration.  NIST has a detailed set of configuration settings in an Excel spreadsheet that can be downloaded from http://fdcc.nist.gov.  I'd like to provide an example how Cisco NAC can easily help to enforce the FDCC security configuration for a Windows…
Read More
Blog
07 // 16 // 09
CCDE Practical Tips
As I prepare for another quixotic attempt at the CCDE practical, I have collected a set of test taking tips. These tips are based on talking to exam administrators, reading all the materials, studying the demo tests, and mostly, attending the preparation session given at this year's Networkers.   Of course,…
Read More
Blog
07 // 16 // 09
Creating Custom Alerts in RTMT

Creating custom alerts using Cisco's Real Time Monitoring Tool (RTMT) is not really straight forward.  At least not in the documentation.  However, it is actually quite simple.

Read More
Blog
07 // 15 // 09
Why do I have return receipts in my voicemail when I call into Unity?
Read receipt, delivery receipt, and non-delivery receipt.  Generically, they are called return receipts and, by default, Unity treats these Exchange return receipts as voicemail messages and delivers them to the voicemail queue.  When you access Unity via the TUI, you have to listen to any return receipt messages before you…
Read More
Blog
07 // 14 // 09
Considerations for Dial Plan Class of Restrictions: Blocking Patterns in NANP, Part 1
Class of Restriction (COR) is the concept where a station or line is restricted from calling certain called destinations based on business rules.  For instance, restricting common area phones from calling long distance or international locations.  There are several tiers to a properly designed COR enabled dial plan.  One such…
Read More
Terry Slattery
Blog
07 // 13 // 09
Monitoring Critical Devices & Interfaces
How do you monitor the critical components of your infrastructure?  Let’s say that your core consists of 75 key devices, plus the links that interconnect them.  It makes sense to [...]
Read More

Posts navigation

Older posts
Newer posts
This website uses cookies and other tracking technologies (also known as pixels or beacons) to aid your experience (such as viewing videos), as well as “performance cookies” to analyze your use of this website and to assist with marketing efforts. If you click the "Accept All Cookies" button or continue navigating the website, you agree to having those first and third-party cookies set on your device. If you do not wish to accept cookies from this website, you can choose to not allow cookies from this website by updating your browser preferences. For more information on how we use Cookies, please read our Privacy Policy.
ACCEPT COOKIES
Services
  • Consulting Projects
  • Managed Services
  • Outsourced IT Services
Technologies
  • Cloud
  • Automation
  • Security
  • Network
  • Compute
  • Storage
  • Collaboration
Industries
  • Healthcare
  • Finance
  • Energy
  • Government
Resources
  • Blog – Business
  • Blog – Technology
  • Success Stories
  • Library
Company
  • About Us
  • Team
  • Partners
  • Careers
  • News
Contact Us
888.804.1717 [email protected] 7134 Columbia Gateway Drive Suite 100 Columbia, MD 21046
Subscribe to our Newsletter
  • Linked In
  • Twitter

© 2025 NetCraftsmen, a BlueAlly Company

Privacy Policy