Tuesday, 31 May 2016
10 Reasons Small Businesses Should Use The Cloud
from Tom's IT Pro
via CERTIVIEW
Monday, 30 May 2016
Open Source Job Opportunities: DevOps & Cloud Lead The Pack
from Tom's IT Pro
via CERTIVIEW
Friday, 27 May 2016
Citrix Synergy 2016 Highlights: Back From The Brink
from Tom's IT Pro
via CERTIVIEW
Citrix ShareFile EFSS Extends Market Leadership With New Features
from Tom's IT Pro
via CERTIVIEW
Thecus Launches New NAS Devices With Haswell Processors
from Tom's IT Pro
via CERTIVIEW
How To Customize The Desired State Configuration (DSC) Local Configuration Manager (LCM)
from Tom's IT Pro
via CERTIVIEW
CCNP R&S Question of the Week: Directly Connected CDP Devices
In a multi-vendors switch implementation, a network engineer notices that directly connected devices that use CDP are not visible. Which standard protocol could be used to resolve this issue?
A. Local Area Mobility
B. Link Layer Discovery Protocol
C. NetFlow
D. Logical Link Discovery Protocol
Answer: B.
The Link Layer Discovery Protocol (LLDP) is defined in the IEEE 802.1AB standard for link layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities and neighbors on an IEEE 802 local area network, principally wired Ethernet. LLDP functions in a similar way as several proprietary protocols, such as the Cisco Discovery Protocol (CDP).
Related Courses
ROUTE – Implementing Cisco IP Routing v2.0
SWITCH – Implementing Cisco IP Switched Networks v2.0
TSHOOT – Troubleshooting and Maintaining Cisco IP Networks v2.0
Related Certification
CCNP Routing and Switching
CCNP R&S Question of the Week Series
- CCNP R&S Question of the Week: IPv6
- CCNP R&S Question of the Week: BGP Attribute
- CCNP R&S Question of the Week: Gateway of Last Resort
- CCNP R&S Question of the Week: Routing Protocols into OSPF
- CCNP R&S Question of the Week: BPDU Guard
- CCNP R&S Question of the Week: Private VLANs
- CCNP R&S Question of the Week: Blocking to Forwarding State
- CCNP R&S Question of the Week: FTP to HTTP
- CCNP R&S Question of the Week: Alerts
- CCNP R&S Question of the Week: Configuration Sequence
- CCNP R&S Question of the Week: TCP Traffic
- CCNP R&S Question of the Week: IPv4 and IPv6
- CCNP R&S Question of the Week: clear ip route
- CCNP R&S Question of the Week: IPv6 Traffic Filter Impact
- CCNP R&S Question of the Week: EtherChannel
- CCNP R&S Question of the Week: Interface FastEthernet0/1
- CCNP R&S Question of the Week: Directly Connected CDP Devices
from
CERTIVIEW
Thursday, 26 May 2016
Enterprise Mobility Management: Trends And Solutions
from Tom's IT Pro
via CERTIVIEW
Dropbox Expands Further Into The Enterprise With New Partnerships
from Tom's IT Pro
via CERTIVIEW
Enterprise Mobility Management (EMM) 101
from Tom's IT Pro
via CERTIVIEW
Wednesday, 25 May 2016
MuleSoft's Anypoint Platform Creates Application Networks On-Prem And In The Cloud
from Tom's IT Pro
via CERTIVIEW
Best Enterprise SSDs
from Tom's IT Pro
via CERTIVIEW
Red Hat's Ansible 2.1 Offers Azure Support, Network Automation
from Tom's IT Pro
via CERTIVIEW
Salesforce Certification Guide: Overview And Career Paths
from Tom's IT Pro
via CERTIVIEW
CEH v9 Question of the Week: Prevent Future DoS Attacks
Smith is an IT security consultant who has been hired on by an ISP that has recently been plagued by numerous DoS attacks. The ISP did not have the internal resources to prevent future attacks, so they hired Smith for his expertise. Smith looks through the company’s firewall logs and can see from the patterns that the attackers were using reflected DoS attacks. What measures can Smith take to help prevent future reflective DoS attacks against the ISP’s network?
A. Smith needs to tell the ISP to block all UDP traffic coming in on port 1001 to prevent future reflective DoS attacks against their network.
B. Smith should configure the ISP’s firewall so that it blocks FIN packets that are sent to the broadcast address of the company’s internal IP range.
C. Smith should have them configure their network equipment to recognize SYN source IP addresses that never complete their connections.
D. Smith should have the ISP block port 443 on their firewall to stop these DoS attacks.
The correct answer is C.
Attackers send packets to the reflector servers with a source IP address set to their victim’s IP therefore indirectly overwhelming the victim with the response packets. As victim is not expecting these response packets, it will drop the packets thus terminating the connections.
Related Course
Certified Ethical Hacker v9
CEH v9 Question of the Week Series
- CEH v9 Question of the Week: Retina Scanners
- CEH v9 Question of the Week: Employee Behavior
- CEH v9 Question of the Week: CVE-2007-2447
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Web Application Penetration Testing
- CEH v9 Question of the Week: iptables
- CEH v9 Question of the Week: Examine Streams of Packets
- CEH v9 Question of the Week: Scans
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Standard Risk Assessment
- CEH v9 Question of the Week: Penetration Testing
- CEH v9 Question of the Week: SMB Over TCP/IP
- CEH v9 Question of the Week: Block Cipher
- CEH v9 Question of the Week: Prevent Future DoS Attacks
from
CERTIVIEW
Tuesday, 24 May 2016
3 Things You Can Do Now To Prevent Shadow IT
from Tom's IT Pro
via CERTIVIEW
Samsung Brings Two New All-In-One Thin Client Displays To Market
from Tom's IT Pro
via CERTIVIEW
Nutanix' Xpress Hyperconverged Platform Targets SMBs
from Tom's IT Pro
via CERTIVIEW
Monday, 23 May 2016
The Other Windows 10 Shoe Drops For MCSA
from Tom's IT Pro
via CERTIVIEW
River Logic Launches Prescriptive Analytics Cloud Platform Built On Azure
from Tom's IT Pro
via CERTIVIEW
JFrog Security Product Xray To Join Artifactory Family
from Tom's IT Pro
via CERTIVIEW
CCNA Data Center Question of the Week: Layer 3 Switching
Which two Cisco Nexus switches are capable of Layer 3 switching? (Choose two.)
A. Cisco Nexus 7010
B. Cisco Nexus 5020
C. Cisco Nexus 5548
D. Cisco Nexus 2248
E. Cisco Nexus 2232
Answer: A and C.
The Nexus 2200 series are extenders and not switches. They attach to a switch, but have no local switching capability. The first generation 5000 series (5010 and 5020) were layer 2 only. So from the list, only the 7010 and the 5548 are capable of layer 3 forwarding. That is assuming that the 5548 has the layer 3 daughter board installed.
Related Resources
Cisco White Papers
Related Course
CCNA-DC – CCNA Data Center Boot Camp
CCNA Data Center Question of the Week Series
- CCNA Data Center Question of the Week: Active Zone Sets
- CCNA Data Center Question of the Week: Virtual Device Contexts
- CCNA Data Center Question of the Week: VSAN 10
- CCNA Data Center Question of the Week: Destination VIF Field
- CCNA Data Center Question of the Week: Fibre Channel HBA
- CCNA Data Center Question of the Week: Fabric Extender
- CCNA Data Center Question of the Week: Cisco Nexus 7000
- CCNA Data Center Question of the Week: Cisco Unified Fabric
- CCNA Data Center Question of the Week: IEEE Protocols
- CCNA Data Center Question of the Week: Layer 3 Switching
- CCNA Data Center Question of the Week: Layer 1 of the OSI Model
- CCNA Data Center Question of the Week: DSAP Field
- CCNA Data Center Question of the Week: Why Switches Replaced Bridges
- CCNA Data Center Question of the Week: Attributes of a VLAN
- CCNA Data Center Question of the Week: Layer 2 Features
- CCNA Data Center Question of the Week: User Roles
- CCNA Data Center Question of the Week: Return to Exec Prompt
- CCNA Data Center Question of the Week: FabricPath
- CCNA Data Center Question of the Week: Features of OTV
- CCNA Data Center Question of the Week: Layer 3 Switching
from
CERTIVIEW
Friday, 20 May 2016
CCNP R&S Question of the Week: Interface FastEthernet0/1
Interface FastEthernet0/1 is configured as a trunk that permits all VLANs. The following command is configured: monitor session 2 filter vlan 1 – 8, 39, 52
What is the result of the implemented command?
A. All VLAN traffic is sent to the SPAN destination interface.
B. Traffic from all VLANs, except 1 to 8, 39 and 52 are sent to the SPAN destination interface.
C. Filtering a trunked SPAN port is not supported.
D. The trunk’s native VLAN must be changed from its default VLAN 1.
E. Traffic from VLANs 1 to 8, 39, and 52 are sent to the SPAN destination port.
Answer: E.
The “monitor session filter” command is used to specify which VLANS are to be port mirrored using SPAN feature.
Related Courses
ROUTE – Implementing Cisco IP Routing v2.0
SWITCH – Implementing Cisco IP Switched Networks v2.0
TSHOOT – Troubleshooting and Maintaining Cisco IP Networks v2.0
Related Certification
CCNP Routing and Switching
CCNP R&S Question of the Week Series
- CCNP R&S Question of the Week: IPv6
- CCNP R&S Question of the Week: BGP Attribute
- CCNP R&S Question of the Week: Gateway of Last Resort
- CCNP R&S Question of the Week: Routing Protocols into OSPF
- CCNP R&S Question of the Week: BPDU Guard
- CCNP R&S Question of the Week: Private VLANs
- CCNP R&S Question of the Week: Blocking to Forwarding State
- CCNP R&S Question of the Week: FTP to HTTP
- CCNP R&S Question of the Week: Alerts
- CCNP R&S Question of the Week: Configuration Sequence
- CCNP R&S Question of the Week: TCP Traffic
- CCNP R&S Question of the Week: IPv4 and IPv6
- CCNP R&S Question of the Week: clear ip route
- CCNP R&S Question of the Week: IPv6 Traffic Filter Impact
- CCNP R&S Question of the Week: EtherChannel
- CCNP R&S Question of the Week: Interface FastEthernet0/1
from
CERTIVIEW
Thursday, 19 May 2016
Dell Releases SCOS 7 For SC Storage Arrays
from Tom's IT Pro
via CERTIVIEW
Wednesday, 18 May 2016
Surviving A Department Of Defense (DoD) Audit: Tips For The IT Pro
from Tom's IT Pro
via CERTIVIEW
DDN's Flashscale Hyperconverged AFA Targets Big Data Analytics, HPC
from Tom's IT Pro
via CERTIVIEW
CEH v9 Question of the Week: Block Cipher
Which of the following encryptions are not based on a block cipher?
A. AES (Rijndael)
B. DES
C. Blowfish
D. RC4
The correct answer is D.
RC4 (Rivest Cipher 4) is a stream cipher. In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying transformation that is specified by a symmetric key. Block ciphers are important elementary components in the design of many cryptographic protocols, and are widely used to implement encryption of bulk data.
Notable block ciphers:
- Lucifer / DES
- IDEA
- RC5
- Rijndael / AES
- Blowfish
Related Course
Certified Ethical Hacker v9
CEH v9 Question of the Week Series
- CEH v9 Question of the Week: Retina Scanners
- CEH v9 Question of the Week: Employee Behavior
- CEH v9 Question of the Week: CVE-2007-2447
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Web Application Penetration Testing
- CEH v9 Question of the Week: iptables
- CEH v9 Question of the Week: Examine Streams of Packets
- CEH v9 Question of the Week: Scans
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Standard Risk Assessment
- CEH v9 Question of the Week: Penetration Testing
- CEH v9 Question of the Week: SMB Over TCP/IP
- CEH v9 Question of the Week: Block Cipher
from
CERTIVIEW
Tuesday, 17 May 2016
Swiftpage's New Act! Outlook Add-In Streamlines CRM Use
from Tom's IT Pro
via CERTIVIEW
How To Fill In PDF Forms Using PowerShell
from Tom's IT Pro
via CERTIVIEW
LogicWorks For AWS Releases Cloud Patrol Automation And Security Solution
from Tom's IT Pro
via CERTIVIEW
Monday, 16 May 2016
Can You Get A Computer Science Degree Without Gen-Ed Requirements?
from Tom's IT Pro
via CERTIVIEW
CCNA Data Center Question of the Week: Features of OTV
Which three are features of Cisco OTV? (Choose three.)
A. Control plane-based MAC learning
B. Dynamic encapsulation
C. MAC address learning based on flooding
D. Pseudo wires and tunnels
E. Complex dual-homing
F. Native automated multihoming
Answer: A, B and F.
Per Cisco: OTV introduces the concept of “MAC routing,” which means a control plane protocol is used to exchange MAC reachability information between network devices providing LAN extension functionality. This is a significant shift from Layer 2 switching that traditionally leverages data plane learning, and it is justified by the need to limit flooding of Layer 2 traffic across the transport infrastructure. As emphasized throughout this document, Layer 2 communications between sites resembles routing more than switching. If the destination MAC address information is unknown, then traffic is dropped (not flooded), preventing waste of precious bandwidth across the WAN.
OTV also introduces the concept of dynamic encapsulation for Layer 2 flows that need to be sent to remote locations. Each Ethernet frame is individually encapsulated into an IP packet and delivered across the transport network. This eliminates the need to establish virtual circuits, called Pseudowires, between the data center locations. Immediate advantages include improved flexibility when adding or removing sites to the overlay, more optimal bandwidth utilization across the WAN (specifically when the transport infrastructure is multicast enabled), and independence from the transport characteristics (Layer 1, Layer 2 or Layer 3).
Finally, OTV provides a native built-in multi-homing capability with automatic detection, critical to increasing high availability of the overall solution. Two or more devices can be leveraged in each data center to provide LAN extension functionality without running the risk of creating an end-to-end loop that would jeopardize the overall stability of the design. This is achieved by leveraging the same control plane protocol used for the exchange of MAC address information, without the need of extending the Spanning-Tree Protocol (STP) across the overlay.
Related Resources
Cisco White Papers
Related Course
CCNA-DC – CCNA Data Center Boot Camp
CCNA Data Center Question of the Week Series
- CCNA Data Center Question of the Week: Active Zone Sets
- CCNA Data Center Question of the Week: Virtual Device Contexts
- CCNA Data Center Question of the Week: VSAN 10
- CCNA Data Center Question of the Week: Destination VIF Field
- CCNA Data Center Question of the Week: Fibre Channel HBA
- CCNA Data Center Question of the Week: Fabric Extender
- CCNA Data Center Question of the Week: Cisco Nexus 7000
- CCNA Data Center Question of the Week: Cisco Unified Fabric
- CCNA Data Center Question of the Week: IEEE Protocols
- CCNA Data Center Question of the Week: Layer 3 Switching
- CCNA Data Center Question of the Week: Layer 1 of the OSI Model
- CCNA Data Center Question of the Week: DSAP Field
- CCNA Data Center Question of the Week: Why Switches Replaced Bridges
- CCNA Data Center Question of the Week: Attributes of a VLAN
- CCNA Data Center Question of the Week: Layer 2 Features
- CCNA Data Center Question of the Week: User Roles
- CCNA Data Center Question of the Week: Return to Exec Prompt
- CCNA Data Center Question of the Week: FabricPath
- CCNA Data Center Question of the Week: Features of OTV
from
CERTIVIEW
Friday, 13 May 2016
CCNP R&S Question of the Week: EtherChannel
Which set of configurations will result in the member ports on switch 1 and 2 to bundling into an EtherChannel?
A. Switch1(inf-range)# channel-group 1 mode active
Switch2(inf-range)# channel-group 1 mode auto
B. Switch1(inf-range)# channel-group 1 mode desirable
Switch2(inf-range)# channel-group 1 mode passive
C. Switch1(inf-range)# channel-group 1 mode on
Switch2(inf-range)# channel-group 1 mode auto
D. Switch1(inf-range)# channel-group 1 mode desirable
Switch2(inf-range)# channel-group 1 mode auto
Answer: D.
With Etherchannel negotiations, the protocol configuration fallowing to try to bring up a channel:
PaGP: Auto to Auto – no channel
Auto to Desirable – channel
Desirable to Desirable – channel
LACP: Passive to Passive – no channel
Passive to Active – channel
Active to Active – channel
No protocol (ON):
On to On is the only valid combination, anything else will cause the member links to fail.
Related Courses
ROUTE – Implementing Cisco IP Routing v2.0
SWITCH – Implementing Cisco IP Switched Networks v2.0
TSHOOT – Troubleshooting and Maintaining Cisco IP Networks v2.0
Related Certification
CCNP Routing and Switching
CCNP R&S Question of the Week Series
- CCNP R&S Question of the Week: IPv6
- CCNP R&S Question of the Week: BGP Attribute
- CCNP R&S Question of the Week: Gateway of Last Resort
- CCNP R&S Question of the Week: Routing Protocols into OSPF
- CCNP R&S Question of the Week: BPDU Guard
- CCNP R&S Question of the Week: Private VLANs
- CCNP R&S Question of the Week: Blocking to Forwarding State
- CCNP R&S Question of the Week: FTP to HTTP
- CCNP R&S Question of the Week: Alerts
- CCNP R&S Question of the Week: Configuration Sequence
- CCNP R&S Question of the Week: TCP Traffic
- CCNP R&S Question of the Week: IPv4 and IPv6
- CCNP R&S Question of the Week: clear ip route
- CCNP R&S Question of the Week: IPv6 Traffic Filter Impact
- CCNP R&S Question of the Week: EtherChannel
from
CERTIVIEW
Thursday, 12 May 2016
TwistLock Announces Runtime Security Solution For Docker Containers
from Tom's IT Pro
via CERTIVIEW
Wednesday, 11 May 2016
ZeroStack Platform Launches Partner Program
from Tom's IT Pro
via CERTIVIEW
Windows 10 For IT Pros: Tutorials, Tips & Tricks
from Tom's IT Pro
via CERTIVIEW
CEH v9 Question of the Week: SMB Over TCP/IP
NetBIOS over TCP/IP allows files and/or printers to be shared over the network. You are trying to intercept the traffic from a victim machine to a corporate network printer. You are attempting to hijack the printer network connection from your laptop by sniffing the wire.
Which port does SMB over TCP/IP use?
A. 443
B. 179
C. 445
D. 139
The correct answer is C.
Port 445 – Microsoft-DS SMB file sharing
- Port 443 – Hypertext Transfer Protocol over TLS/SSL (HTTPS)
- Port 179 – Border Gateway Protocol (BGP)
- Port 139 – NetBIOS Session Service
Related Course
Certified Ethical Hacker v9
CEH v9 Question of the Week Series
- CEH v9 Question of the Week: Retina Scanners
- CEH v9 Question of the Week: Employee Behavior
- CEH v9 Question of the Week: CVE-2007-2447
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Web Application Penetration Testing
- CEH v9 Question of the Week: iptables
- CEH v9 Question of the Week: Examine Streams of Packets
- CEH v9 Question of the Week: Scans
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Standard Risk Assessment
- CEH v9 Question of the Week: Penetration Testing
- CEH v9 Question of the Week: SMB Over TCP/IP
from
CERTIVIEW
Tuesday, 10 May 2016
Biscom Secure File Transfer Update Brings UI Improvements And More
from Tom's IT Pro
via CERTIVIEW
Docker Includes Container Scanning And Benchmarking In Latest Security Releases
from Tom's IT Pro
via CERTIVIEW
Dell Announces Major Release To Database Replication Tool SharePlex
from Tom's IT Pro
via CERTIVIEW
7 Obvious Security Precautions Companies Forget to Take
It seems that even with all the examples of breaches and compromises caused by the lack of company security across the last two decades, organizations continue to move forward with a “same as it ever was” mentality. Organizations aren’t learning from others’ mistakes.
I predict that in 2016, hackers will continue to compromise organizations’ systems in ways that could have been prevented with common sense security solutions or by stress-testing their own implementations.
Here are seven obvious, but often forgotten, security measures you should have in place:
- Don’t leave default configurations, settings, or other account credentials on your computer or other device.
- Update to the most current product versions and patches.
Testing should always be performed to ensure productivity and functionality, but staying on older versions is usually less secure.
- Separate different categories of data into different storage containers.
For example, a customer’s billing data should be separate from their login credentials, which should also be separate from their profile settings, preferences and activity history.
- Encrypt stored user data and provide communication encryption.
- Log all activity and events, including system events, software activities and user activities.
- Separate OS files from data storage on distinct storage devices.
- Secure your website against injection attacks, including Structured Query Language (SQL) injection.
To do this, filter input against length requirements while pattern matching against a known list of malicious signatures, and escaping metacharacters. Metacharacters are characters assigned a special meaning by a programming language or execution environment.
These and other standard security concepts are well established, but not as widely adopted as they should be. As new organizations come online, expand their Internet presence, or roll out new products, they often make the same security mistakes as many others did before them.
As consumers, we’ve become created a lax security culture. We have established the trend that we will purchase new products in spite of flaws and failures. Often the early adopters of a new product are more like beta testers than typical consumers, willing to live with and work around problems just for the sake of getting the new thing in their hands. But that doesn’t mean we have to continue to be willing beta testers.
We should only purchase products and use services that have a strong proven track record when it comes to security. One way encourage better products on the market, and deter hackers, is to push for more transparency. Organizations should publish their security standards, thus allowing us to review their practices and make informed decisions about who is doing the better job at protecting our information. This idea is already established in the digital certificate marketplace through a certificate authority’s publication of its certificate practices statements (CPS). A similar strategy or publishing security practices should be applied across most or all of IT-related industries. Perhaps if we, as consumers, demand transparency and stronger security features from our vendors and suppliers, maybe 2016 will be the year that cybersecurity takes a huge leap forward.
Read more cybersecurity tips and precautions in the white paper Cybersecurity Predictions for 2016.
from
CERTIVIEW
Monday, 9 May 2016
How To Make Windows 10 Look Like Other Windows Versions
from Tom's IT Pro
via CERTIVIEW
Microsoft Doubles Down On Cloud With New Career Center And Training
from Tom's IT Pro
via CERTIVIEW
CCNA Data Center Question of the Week: FabricPath
Which two Cisco data center devices can support FabricPath? (Choose two.)
A. Cisco Nexus 5500 Series Switches
B. Cisco Nexus 1000V
C. Cisco Nexus 7000 Series Switches
D. Cisco Nexus 4900 Series Switches
E. Cisco MDS 9500 Series directors
Answer: A and C.
From the list of devices, only the 5500 and 7000 series support FabricPath, though now the 6000 series do as well.
Related Resources
Cisco White Papers
Related Course
CCNA-DC – CCNA Data Center Boot Camp
CCNA Data Center Question of the Week Series
- CCNA Data Center Question of the Week: Active Zone Sets
- CCNA Data Center Question of the Week: Virtual Device Contexts
- CCNA Data Center Question of the Week: VSAN 10
- CCNA Data Center Question of the Week: Destination VIF Field
- CCNA Data Center Question of the Week: Fibre Channel HBA
- CCNA Data Center Question of the Week: Fabric Extender
- CCNA Data Center Question of the Week: Cisco Nexus 7000
- CCNA Data Center Question of the Week: Cisco Unified Fabric
- CCNA Data Center Question of the Week: IEEE Protocols
- CCNA Data Center Question of the Week: Layer 3 Switching
- CCNA Data Center Question of the Week: Layer 1 of the OSI Model
- CCNA Data Center Question of the Week: DSAP Field
- CCNA Data Center Question of the Week: Why Switches Replaced Bridges
- CCNA Data Center Question of the Week: Attributes of a VLAN
- CCNA Data Center Question of the Week: Layer 2 Features
- CCNA Data Center Question of the Week: User Roles
- CCNA Data Center Question of the Week: Return to Exec Prompt
- CCNA Data Center Question of the Week: FabricPath
from
CERTIVIEW
Friday, 6 May 2016
How To Install Remote Server Administration Tools (RSAT) In Windows 10
from Tom's IT Pro
via CERTIVIEW
Alcatel-Lucent Enterprise Announces New Products At Interop
from Tom's IT Pro
via CERTIVIEW
Open Source Keynote Panel At Interop
from Tom's IT Pro
via CERTIVIEW
Accelerated Launched HERO 9400-UA Network Appliance
from Tom's IT Pro
via CERTIVIEW