NetCraftsmen, A BlueAlly Company

NetCraftsmen, a BlueAlly Company

[email protected]
888-804-1717
  • Company
    • About Us
    • Team
    • Partners
    • Careers
    • News
  • Services
    • Consulting Projects
    • Managed Services
    • Outsourced IT Services
  • Technologies
    • Cloud
    • Automation
    • Security
    • Network
    • Compute
    • Storage
    • Collaboration
  • Industries
    • Healthcare
    • Finance
    • Energy
    • Government
  • Resources
    • Blog – Business
    • Blog – Technology
    • Success Stories
    • Library
  • Contact

Latest Posts

Carole Warner Reece
Blog
09 // 23 // 11
Network Management talk for C-MUG Oct 2011
Coming up for the October 26, 2011 Cisco Mid-Atlantic User Group (C-MUG) session, Terry Slattery will be discussing some network management topics. He plans to talk about the basics of [...]
Read More
Blog
09 // 16 // 11
Protecting Switches Against Layer 2 Loops
Can a Layer 2 loop happen in your campus network? You may say, I am running Spanning Tree Protocol (STP), and it is designed to maintain a loop-free layer 2 [...]
Read More
Page
09 // 14 // 11
Protecting a Cisco Catalyst 6500 Switch Against Layer 2 Loops
Introduction Should you be concerned about a Layer 2 loop in your campus network? My answer is absolutely. In this article, I explain why you should take steps in protecting [...]
Read More
Blog
09 // 14 // 11
Cisco Voice Gateway Protocol Choices: H323 vs SIP vs MGCP
I am a regular face on the Cisco Support Community (CSC) forums and I recently saw a question that is constantly resurfacing on the forum. The question? "Should I use MGCP or H.323 for gateway protocol?" I suppose SIP can be thrown in there as well. I have a canned…
Read More
Blog
09 // 12 // 11
Cisco CUCM and VCS Integration: H.323 Voice Gateways
This is a quick blog on configuring Cisco IOS H.323 VoIP dial peers to facility call path (and DTMF relay) between PSTN parties and the Cisco Video Communications Server (VCS). Specifically, when the call is tandem routed by the Cisco Unified Communications Manager (CUCM).
Read More
Blog
09 // 08 // 11
Security Mistakes That Leave You Vulnerable To Compromise #8: Not Compartmentalizing Public Devices

Here is my list of the top ten security mistakes that IT staff makes.  These mistakes leave your network vulnerable to attack and compromise. Mistake #8:  Not compartmentalizing public devices.

Read More
Cisco
Blog
09 // 07 // 11
Cisco Mobile Client Update
I recently fielded a request from a customer to provide guidance on what it would mean to move away from Cisco Wireless IP Phones and adopt Cisco mobile client applications on smart phones. I was a little out of date. I deployed CUMA and Unified Mobile Communicator for a customer…
Read More
Blog
08 // 31 // 11
A Network Management Architecture, Part 4
This is the fourth and final post of a series on the network management architecture used by NetCraftsmen. The architecture is shown below, consisting of seven elements. In this post, [...]
Read More
Blog
08 // 31 // 11
SMTP Considerations for Unity Connection Single Inbox (i.e., Unified Messaging)
Hello, my name is Hailey and this is my blog.  It’s been a whole lot of days since my last post.  Now that we have that out of the way…let us proceed to the latest installment of “Hailey’s Amazing Blog”.  Today I'm going to focus on Unity Connection. Specifically, I…
Read More
Blog
08 // 30 // 11
More on RSA Breach and APT
A lot of the discussions I’ve been reading have revolved around whether the attack “qualifies” as an “Advanced Persistent Threat,” and therefore whether the term APT has any real meaning [...]
Read More
Blog
08 // 30 // 11
More on the RSA Breach and APT
A lot of the discussion I see has revolved around whether the attack “qualifies” as an Advanced Persistent Threat, and therefore whether the term APT has any real meaning or [...]
Read More
Blog
08 // 29 // 11
Security Mistakes That Leave You Vulnerable to Compromise #9: Not Blocking Administrative Protocols.

Here is my list of the top ten security mistakes that IT staff makes.  These mistakes leave your network vulnerable to attack and compromise. Mistake #9:  Not blocking administrative protocols.

Read More

Posts navigation

Older posts
Newer posts
This website uses cookies and other tracking technologies (also known as pixels or beacons) to aid your experience (such as viewing videos), as well as “performance cookies” to analyze your use of this website and to assist with marketing efforts. If you click the "Accept All Cookies" button or continue navigating the website, you agree to having those first and third-party cookies set on your device. If you do not wish to accept cookies from this website, you can choose to not allow cookies from this website by updating your browser preferences. For more information on how we use Cookies, please read our Privacy Policy.
ACCEPT COOKIES
Services
  • Consulting Projects
  • Managed Services
  • Outsourced IT Services
Technologies
  • Cloud
  • Automation
  • Security
  • Network
  • Compute
  • Storage
  • Collaboration
Industries
  • Healthcare
  • Finance
  • Energy
  • Government
Resources
  • Blog – Business
  • Blog – Technology
  • Success Stories
  • Library
Company
  • About Us
  • Team
  • Partners
  • Careers
  • News
Contact Us
888.804.1717 [email protected] 7134 Columbia Gateway Drive Suite 100 Columbia, MD 21046
Subscribe to our Newsletter
  • Linked In
  • Twitter

© 2025 NetCraftsmen, a BlueAlly Company

Privacy Policy