Tips
Tips
-
Cable management software enhances documentation, visibility
Even a timeworn networking discipline like cabling can undergo a renaissance. See how cable management software helps organizations visualize network connectivity. Continue Reading
-
How zero-trust SDP can work with a VPN for remote work
Implementing software-defined perimeter and zero-trust security models with a corporate VPN adds significant layers of user and device verification and authentication. Continue Reading
-
4 ideas for network cable management best practices
When organizing cable clutter, network engineers should follow some common best practices, including the use of cable labels, cable ties and proper documentation. Continue Reading
-
Midband 5G spectrum auctions come to the fore
Midband has become the premier spectrum for 5G use. The FCC's 3.45 GHz auction began in October, following the massive C-band sell-off that ended in January 2021. Continue Reading
-
A guide to Windows DHCP server configuration
The main steps to configure DHCP on Windows Server are installation, Active Directory authorization, creating a scope and DNS registration. Learn about other tasks and best practices. Continue Reading
-
Evaluate the components of Cisco SASE
Cisco's SASE platform, Umbrella, has all the components of a SASE architecture, but it has a lot of integration complexity and a reliance on appliances. Continue Reading
-
Use network standardization to facilitate automation
Network teams can automate and standardize network designs to improve configurations, simplify operations and more easily implement changes within their networks. Continue Reading
-
Get up to speed with enhanced content delivery networks
With enhanced features and new delivery options, CDNs are poised to make greater inroads with enterprises to improve UX across the board. Continue Reading
-
What digital experience monitoring means for network teams
Digital experience monitoring integrates several monitoring tools to provide a comprehensive view into the performance of endpoints, applications and the network. Continue Reading
-
A quick guide to BGP best practices
The use of Border Gateway Protocol is prevalent among ISPs and enterprises. While BGP best practices change for specific use cases, some recommendations are helpful in all scenarios. Continue Reading
-
Static IP vs. dynamic IP addresses: What's the difference?
Static IP addresses are typically used for servers, routers and switches. Dynamic IP addresses, however, are commonly used for workstations, phones and tablets. Continue Reading
-
4 categories of network monitoring
Network teams should routinely monitor the states of their networks. The type of network monitoring strategy used depends on the needs of the organization. Continue Reading
-
Automate network validation for smoother changes
Teams can verify network state before and after network changes to ensure smooth deployment of the changes. Automating those pre- and post-change checks can reduce errors and outages. Continue Reading
-
A review of Cato Networks' SASE Cloud platform
Cato's SASE Cloud lacks some features and may require customers to replace point products to fully benefit from the platform. But Cato aligns with SASE’s cloud-native vision and is a strong contender in the market. Continue Reading
-
How remote work changes the future of network management
The pandemic ushered in a new normal of hybrid workplaces. What's also new is how network teams manage these remote networks, like using zero-trust security models. Continue Reading
-
How to set up a VLAN for enterprise networks
VLANs can secure and prioritize network traffic. To set up VLANs correctly, teams should understand concepts like VLAN tagging and subnets. Continue Reading
-
A deep dive into Fortinet's SASE platform
Despite its strong security foundation, Fortinet's SASE platform lacks a cloud-native strategy and requires teams to stitch the architecture together. Continue Reading
-
Troubleshooting a DHCP server failure
DHCP errors often result from DHCP server failure, a lack of available IP addresses and network failure. But troubleshooting steps vary depending on the error symptoms and causes. Continue Reading
-
Network observability vs. monitoring: What's the difference?
Traditional network monitoring is useful for collecting data about network issues. But network observability can add further insights into network health and end-user experience. Continue Reading
-
BGP vs. OSPF: When to use each protocol
BGP and OSPF are two of the most common routing protocols. While BGP excels with dynamic routing for large networks, OSPF offers more efficient path choice and convergence speed. Continue Reading
-
How to use iPerf3 to test network bandwidth
In this in-depth tip, learn how to use iPerf3, a network testing tool to measure throughput and benchmark your WAN links to ensure effectivity. Continue Reading
-
How to calculate network bandwidth requirements
Figuring out how to calculate bandwidth requirements is vital to ensuring your network runs smoothly, and it's best to use the correct formula from the beginning. Continue Reading
-
The pros and cons of Palo Alto Networks' SASE platform
Palo Alto Networks is commonly mentioned in SASE discussions. While the vendor has strong security capabilities, it also brings integration complexities and PoP limitations. Continue Reading
-
How to pick the best network security service provider
Managed security service providers have different levels of expertise. Be sure to match your organization's security needs with the right network security provider. Continue Reading
-
5 steps to achieve network infrastructure modernization
All networks may be different, but companies have similar goals when they look to upgrade their network infrastructures. Assessing current designs is just the first step. Continue Reading
-
The migration to enterprise network as a service
Enterprise network as a service is becoming a popular consumption model for networking functions. But, as with any emerging technology, it's important to weigh the options carefully. Continue Reading
-
Enterprise RF spectrum management best practices
Effective spectrum management requires coordination from company departments to follow certain policies before introducing wireless devices to the enterprise. Continue Reading
-
How to secure your home Wi-Fi network in 7 steps
When securing your home Wi-Fi, update devices regularly, change passwords consistently, turn off unused services and inspect outdoor network equipment. Continue Reading
-
Hybrid network vs. hybrid network infrastructure
Hybrid networks and hybrid network infrastructure blend different kinds of equipment, geographic locations, network ownership and technology disciplines. Continue Reading
-
Routed optical networking tactic could be game changer
A new routing architecture could help eliminate management and service headaches stemming from routing IP traffic on optical networks. Continue Reading
-
How to prepare networks for the return to office
Network teams should evaluate their UC strategies, VPN capacity and even air conditioning requirements as employees start to return to office environments. Continue Reading
-
Network-as-a-service business model options take shape
As network as a service gains traction, enterprises and service providers must consider multiple deployment models. SD-WAN, SASE, SDN and policy management could all play a role. Continue Reading
-
Ansible vs. Terraform vs. Vagrant: What's the difference?
Ansible, Terraform and Vagrant are common infrastructure automation platforms with specific use cases, benefits and drawbacks. But choosing a platform doesn't need to be confusing. Continue Reading
-
8 remote access security risks and how to prevent them
Enterprises face myriad remote access security concerns, but training and clear communication can help them bolster their security programs for the long term. Continue Reading
-
4 attributes key to network-as-a-service model
For a network-as-a-service model to work for the enterprise, it needs to offer four key attributes: an application-specific, elastic, secure and personalized VPN. Continue Reading
-
Wi-Fi 6 vs. Wi-Fi 6E: Spectrum, not hype, is key difference
The extended spectrum of Wi-Fi 6E sounds promising. But, when assessing Wi-Fi 6 vs. Wi-Fi 6E, organizations should pay close attention to radio frequency characteristics. Continue Reading
-
Network capacity planning best practices for return to office
As workers grow comfortable enough to return to the office, network teams will need to plan in advance to make sure the network is ready and ensure proper performance. Continue Reading
-
Wi-Fi 6 rollout requires careful review of network devices
Wi-Fi 6 is just one part of the overall enterprise network. Organizations need to evaluate several network components to ensure a smooth Wi-Fi 6 deployment. Continue Reading
-
Common network vulnerabilities and how to prevent them
It's not possible to eliminate all network vulnerabilities, but network teams can implement best practices to limit potential attacks and protect their networks. Continue Reading
-
SASE options for the branch of one -- work from anywhere
More than ever, enterprises need to support individual employees that make up a branch of one. These setups require reliable connectivity, application performance and security. Continue Reading
-
Modern network infrastructure design taps security, flexibility
As workers return to office settings, organizations may have to update their on-premises network infrastructure design to improve scalability and connectivity. Continue Reading
-
How cloud-based network monitoring tools expand visibility
Organizations have become even more distributed and virtual in the wake of COVID-19. Cloud-based network monitoring is well suited to keep tabs on network performance. Continue Reading
-
Best practices for VPN traffic monitoring
VPNs are still a critical part of many enterprise remote access strategies. Networks teams that monitor VPN traffic should look at factors like application usage and overhead. Continue Reading
-
5 basic steps for effective cloud network security
In hybrid infrastructures, old network security systems won't work. Enterprises must adopt effective cloud network security strategies to keep their assets safe. Continue Reading
-
Perform a network health check with network testing
Network engineers can use myriad network testing approaches to ensure their networks are efficient and reliable. The key is incorporating them into a regular maintenance cycle. Continue Reading
-
Why 5G will redefine WWAN and SD-WAN
The nexus of 5G, WWAN and SD-WAN promises to usher in an array of custom tools and services for enterprises. Continue Reading
-
Key tasks in a network maintenance checklist
Network technologies and devices might change over time, but certain maintenance tasks, such as data backup and device inventory, will always be essential for network teams. Continue Reading
-
NOC performance metrics for optimal operation
NOC best practices include using standardized network designs and automation. But don't forget to identify performance metrics that help track and measure operational success. Continue Reading
-
5 steps to conduct network penetration testing
Enterprises that want to ensure competent network security strategies should look at how they can implement penetration testing, considering red teams and physical pen tests. Continue Reading
-
5 benefits of Wi-Fi 6 for enterprise networks
In a perfect world, Wi-Fi 6 could introduce several benefits to business networks. But real-world conditions could curb the wireless technology's true potential. Continue Reading
-
Open RAN architecture gives operators options, challenges
Open RAN architecture could give telecom operators more flexibility as they deliver enterprise-grade 5G services. But making the RAN a virtual function takes careful planning. Continue Reading
-
How to build a private 5G business case
As you build a private 5G business case, be sure to include private 5G's benefits and challenges, as well as how to prove its ROI. Here's everything you need to know. Continue Reading
-
7 steps for a network and IT security foundation
Enterprises should make it a habit to review their IT security systems, following steps that include network segmentation, multifactor authentication and security education. Continue Reading
-
How to secure remote access for WFH employees in 4 steps
The global pandemic caused mayhem on network security environments. Enterprises need to bring rigor back to their systems and tighten security for remote workers. Continue Reading
-
Weighing the advantages of private 5G vs. carrier 5G
Considering private 5G vs. carrier 5G for your interior networking? No single option fits all, but here are some factors you should consider. Continue Reading
-
SASE hype includes SD-WAN, but does it need to?
Much of the hype around Secure Access Service Edge features the importance of SD-WAN with SASE, but do the two need each other to thrive? Research says probably not. Continue Reading
-
How to monitor home network traffic for added security
When addressing home network monitoring, track all connected devices, and take advantage of open source tools, like packet capture, to sniff out malicious traffic. Continue Reading
-
The tradeoffs and cost of network redundancy
Network redundancy costs vary depending on enterprise use cases, but the determining tradeoff usually depends on how long a company can sustain network downtime. Continue Reading
-
How the SolarWinds vulnerability affects networking
The SolarWinds attack resulted in a bevy of network vulnerabilities, like masked traffic and backdoor access. Network teams should take the time to review their security strategies. Continue Reading
-
10 network security tips in response to the SolarWinds hack
From perimeter protection to persistent patching, enterprises should regularly review, update and test their network security plans, especially in response to the SolarWinds hack. Continue Reading
-
Considerations for SASE management and troubleshooting
SASE opens new territory for network and security management and troubleshooting. Ultimately, teams should look for system usability and visibility into traffic flows and policies. Continue Reading
-
SASE challenges include network security roles, product choice
Secure Access Service Edge blends network and security functions. While this integration has its benefits, enterprises still need to address some SASE challenges. Continue Reading
-
Myths and realities of a Wi-Fi 6 upgrade
Despite the promise of high data rates, longer client battery life and more efficient radio techniques, enterprises need to weigh Wi-Fi 6's limitations. Continue Reading
-
How to calculate SASE return on investment and costs
SASE return on investment will vary for each organization, depending on use cases and architecture requirements. But the metrics used to determine ROI and cost factors are the same. Continue Reading
-
Top 5 SASE use cases balance network connectivity, security
Secure Access Service Edge can enhance network performance and security controls for remote sites. Discover some of the other top SASE use cases and deployment options. Continue Reading
-
Setting up and using a home VLAN to segment network traffic
Virtual LANs can help homeowners segment their network traffic for enhanced control and security. Network analyst John Fruehe takes you inside his home VLANs. Continue Reading
-
Software-defined home offerings drive remote productivity
Say hello to software-defined home, a 'branch of one' package that combines professional-grade Wi-Fi, security, SD-WAN and centralized management for remote workers. Continue Reading
-
With SASE, security and networking tech come together
SD-WAN, SASE or some combination of the two -- which approach will deliver the best and most secure network connectivity in your organization going forward? Continue Reading
-
Cloud automation use cases for managing and troubleshooting
Cloud automation use cases highlight the benefits these tools can provide to companies evaluating how best to manage and troubleshoot their cloud connections. Continue Reading
-
Implementing an SDP architecture for added network security
A key component of a software-defined perimeter requires client authentication before connection, while also making a network's internals invisible to outsiders. Continue Reading
-
What network managers need to know about SaaS optimization
When strategizing SaaS optimization tactics, network management teams should consider their traffic steering preferences and geographically dispersed access points. Continue Reading
-
How service mesh enables microservices networking
As microservices applications grow more popular, IT teams need to enable reliable networking between them for proper communication. That's where service mesh comes in. Continue Reading
-
How to use ChatOps to automate network tasks
Integrating team collaboration chat systems with network automation results in the ability to automate tedious workflows, enabling faster problem resolution and streamlined operations. Continue Reading
-
Why networks should apply security by design principles
Security by design incorporates security and risk management directly into network architecture, using segmentation and Agile infrastructure design. Continue Reading
-
How and why to implement Wi-Fi QoS
Quality of service, as network pros know, prioritizes apps as they cross the network. But Wi-Fi QoS needs to be considered, too, in relation to the overall network. Continue Reading
-
How COVID-19 will reshape 2021 enterprise network spending
COVID-19 has shifted enterprise network spending. Campus LAN traffic may never be the same, but companies are earmarking funds to better support the remote workforce. Continue Reading
-
How to ensure a scalable SASE architecture
Don't assume all SASE architecture is the same, especially when it comes to scalability. Enterprises should consider distance to vendor PoPs, office locations and agent onboarding. Continue Reading
-
How to build a resilient network design
Everything fails eventually, even in networking. Enterprises can prepare for network failure by building resilience and redundancy into their network infrastructure design. Continue Reading
-
What's involved in VPN maintenance and management?
Before an organization's VPN is up and running, IT teams must address four important aspects of VPN maintenance and management to keep abreast of transforming security concerns. Continue Reading
-
How and when to establish enterprise 5G partnerships
Enterprises that buy 5G public services, procure network slices or build their own private 5G networks need to establish the right partnerships for mobile services, equipment and software. Continue Reading
-
Home SD-WAN will redefine next-generation WAN
The need for home-office SD-WAN won't end when the pandemic does. Learn how best to provide this essential tech to your organization's at-home employees. Continue Reading
-
Best practices to maintain VPN security
Enterprises looking to maintain VPN security should focus on proper endpoint security and authentication, VPN server security and documentation for security policies. Continue Reading
-
Benefits of intent-based networking for modern networks
Intent-based networking can benefit network teams working remotely with increased workloads due to COVID-19. Benefits include reduced human error and automated manual tasks. Continue Reading
-
3 SD-WAN cloud connectivity options to explore
Enterprises can connect their SD-WAN infrastructure to cloud providers' platforms using three methods: back-to-back access, private PoP connections and internet VPN. Continue Reading
-
3 DDoS mitigation strategies for enterprise networks
Enterprises can choose from three major approaches to mitigate DDoS attacks on their networks: Buy from an ISP, do it themselves or use a CDN service. Continue Reading
-
The benefits of building a network automation lab
Network teams can build network automation labs to create a safe environment to test and validate automation tasks before running them in production networks. Continue Reading
-
How to select and set up SD-WAN and DIA
When evaluating different options for SD-WAN and direct internet access, IT teams can't forget to consider application performance, network uptime and support for each option. Continue Reading
-
How to secure a home network for remote workforces
Remote workers rarely achieve the same network security at home that offices provide. Yet, with the right tools, remote workers can efficiently learn how to secure a home network. Continue Reading
-
How to set up a new business network
Building a new network can be complicated, but IT teams can ease the design process and future management by choosing the right architecture and documenting each decision. Continue Reading
-
Gain SD-branch benefits through automation, orchestration
SD-branch technology is evolving, but don't put off learning about what this tool can do now and the advantages it will deliver in the near future. Continue Reading
-
What to know about VPN termination
Network teams make several decisions when designing a secure VPN. One of those is where in the network, logically, they will terminate the VPN tunnels. Continue Reading
-
Network traffic pattern shifts reflect COVID-19 changes
The novel coronavirus pandemic spurred initial changes in network traffic patterns, but other trends are playing important roles in perpetuating permanent traffic shifts. Continue Reading
-
How to build a network monitoring business case
As network teams construct a business case for a new network monitoring tool, they should include a cost comparison of alternative tools and a strong defense for the selected tool. Continue Reading
-
Network engineer career advice amid the COVID-19 pandemic
As COVID-19 dramatically affects the global economy, people may ask, 'What's next for my career?' No one is sure, but these tips can help network engineers feel and stay secure. Continue Reading
-
Pair programming pros and cons for network automation
Pair programming is an Agile software development technique that reduces bugs and produces better software. Can pair programming work between networking experts and programmers? Continue Reading
-
Remote access best practices emphasize security, ease of use
COVID-19 has forced companies to determine the best way to keep remote employees supported. Not sure which way to proceed? Consider these remote access best practices. Continue Reading
-
Remote work infrastructure requires on-prem network changes
Demilitarized zone, network access control and VPN termination points are some of the on-premises components that need to be addressed in a remote work infrastructure. Continue Reading
-
The pros and cons of SD-WAN and remote access
SD-WAN could be a compelling option for enterprises that require remote access for mission-critical jobs. But IT teams should be aware of cost, training and implementation barriers. Continue Reading
-
5 needed product features to fix network management issues
Virtualization and public cloud monitoring are among five top network management issues facing companies as they assess tools designed to oversee increasingly complex networks. Continue Reading
-
How ISPs and operators ensure network quality in a pandemic
COVID-19 has caused a spike in remote workers, increased internet usage and traffic surges. Here's how ISPs and telecom operators plan for continuity and quality during the pandemic. Continue Reading