Tips
Tips
-
How NetOps differs from traditional network operations
When comparing NetOps and conventional network operations, network teams focus on automating repeatable tasks that correct problems rather than introducing new ones manually. Continue Reading
-
Why NetOps is a bridge to AIOps
As IT infrastructure grows more complex, NetOps teams should identify ways to ensure their networks remain operational and perform at peak levels. One option is AIOps. Continue Reading
-
5G Advanced features include accurate timing, AI support
5G Advanced is the latest specification of 5G. Some capabilities it can deliver include enhanced massive MIMO, enabling 5G with AI and accurate location positioning. Continue Reading
-
7 steps of an SD-WAN implementation
Organizations interested in implementing SD-WAN need to collect site profiles and requirements, analyze their options, perform tests and evaluate the results. Continue Reading
-
10 basic network management interview questions and answers
Job interviews should be a two-way conversation. Here are some common network management interview questions for both hiring managers and job applicants. Continue Reading
-
Integrating zero-trust practices into private 5G networks
One of the first steps in deploying a technology is protecting it from potential security threats. Learn how to secure a private 5G network with zero-trust security practices. Continue Reading
-
Intro to encapsulation and decapsulation in networking
Encapsulation adds information to a packet as it travels to its destination. Decapsulation reverses the process by removing the info, so a destination device can read the original data. Continue Reading
-
Will 5G replace Wi-Fi? No, but maybe in some use cases
Geographically remote locations, large public venues and manufacturing sites are a few of the key areas in which business 5G technology could provide real benefits. Continue Reading
-
How to implement network segmentation for better security
For a network segmentation strategy to be effective and improve security, network teams need to create detailed security policies, identify each resource and use allowlists. Continue Reading
-
What's happening with standalone 5G?
Standalone 5G is the next major update for 5G technology. Learn about the benefits SA 5G will bring and find out when operators will begin deploying it worldwide. Continue Reading
-
5 principles of the network change management process
Network change management includes five basic principles, including risk analysis and peer review. These best practices can help network teams limit failed network changes and outages. Continue Reading
-
How IT can provide home Wi-Fi help for remote workers
When assisting home-based workers with their Wi-Fi woes, be sure to assess their internet connectivity and even consider deploying access points to their homes. Continue Reading
-
Explore 9 essential elements of network security
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other. Continue Reading
-
5 trends in enterprise networking that defined 2021
In 2020, enterprises shifted to remote work due to the pandemic. The trend continued in 2021, along with four other networking trends that defined the year and will extend into 2022. Continue Reading
-
DHCP client configuration for Linux, Windows and macOS
Network and system admins can use command-line and GUI tools to configure DHCP clients in Linux, Windows and macOS. Here's a breakdown of which commands to use for each OS. Continue Reading
-
Automation, cloud lead as influential data center trends
Recent data center trends, such as AIOps and automation, have been geared toward simplifying network management. Here are the trends and challenges teams faced over the past year. Continue Reading
-
Cable management software enhances documentation, visibility
Even a timeworn networking discipline like cabling can undergo a renaissance. See how cable management software helps organizations visualize network connectivity. Continue Reading
-
How zero-trust SDP can work with a VPN for remote work
Implementing software-defined perimeter and zero-trust security models with a corporate VPN adds significant layers of user and device verification and authentication. Continue Reading
-
4 ideas for network cable management best practices
When organizing cable clutter, network engineers should follow some common best practices, including the use of cable labels, cable ties and proper documentation. Continue Reading
-
Midband 5G spectrum auctions come to the fore
Midband has become the premier spectrum for 5G use. The FCC's 3.45 GHz auction began in October, following the massive C-band sell-off that ended in January 2021. Continue Reading
-
A guide to Windows DHCP server configuration
The main steps to configure DHCP on Windows Server are installation, Active Directory authorization, creating a scope and DNS registration. Learn about other tasks and best practices. Continue Reading
-
Evaluate the components of Cisco SASE
Cisco's SASE platform, Umbrella, has all the components of a SASE architecture, but it has a lot of integration complexity and a reliance on appliances. Continue Reading
-
Use network standardization to facilitate automation
Network teams can automate and standardize network designs to improve configurations, simplify operations and more easily implement changes within their networks. Continue Reading
-
Get up to speed with enhanced content delivery networks
With enhanced features and new delivery options, CDNs are poised to make greater inroads with enterprises to improve UX across the board. Continue Reading
-
What digital experience monitoring means for network teams
Digital experience monitoring integrates several monitoring tools to provide a comprehensive view into the performance of endpoints, applications and the network. Continue Reading
-
A quick guide to BGP best practices
The use of Border Gateway Protocol is prevalent among ISPs and enterprises. While BGP best practices change for specific use cases, some recommendations are helpful in all scenarios. Continue Reading
-
Static IP vs. dynamic IP addresses: What's the difference?
Static IP addresses are typically used for servers, routers and switches. Dynamic IP addresses, however, are commonly used for workstations, phones and tablets. Continue Reading
-
4 categories of network monitoring
Network teams should routinely monitor the states of their networks. The type of network monitoring strategy used depends on the needs of the organization. Continue Reading
-
Automate network validation for smoother changes
Teams can verify network state before and after network changes to ensure smooth deployment of the changes. Automating those pre- and post-change checks can reduce errors and outages. Continue Reading
-
A review of Cato Networks' SASE Cloud platform
Cato's SASE Cloud lacks some features and may require customers to replace point products to fully benefit from the platform. But Cato aligns with SASE’s cloud-native vision and is a strong contender in the market. Continue Reading
-
How remote work changes the future of network management
The pandemic ushered in a new normal of hybrid workplaces. What's also new is how network teams manage these remote networks, like using zero-trust security models. Continue Reading
-
How to set up a VLAN for enterprise networks
VLANs can secure and prioritize network traffic. To set up VLANs correctly, teams should understand concepts like VLAN tagging and subnets. Continue Reading
-
A deep dive into Fortinet's SASE platform
Despite its strong security foundation, Fortinet's SASE platform lacks a cloud-native strategy and requires teams to stitch the architecture together. Continue Reading
-
Troubleshooting a DHCP server failure
DHCP errors often result from DHCP server failure, a lack of available IP addresses and network failure. But troubleshooting steps vary depending on the error symptoms and causes. Continue Reading
-
Network observability vs. monitoring: What's the difference?
Traditional network monitoring is useful for collecting data about network issues. But network observability can add further insights into network health and end-user experience. Continue Reading
-
BGP vs. OSPF: When to use each protocol
BGP and OSPF are two of the most common routing protocols. While BGP excels with dynamic routing for large networks, OSPF offers more efficient path choice and convergence speed. Continue Reading
-
A guide to network lifecycle management
Network pros should follow a network lifecycle to monitor, manage and implement changes in their networks, regardless of whether it's a plan, build and manage framework or PPDIOO. Continue Reading
-
How to use iPerf3 to test network bandwidth
In this in-depth tip, learn how to use iPerf3, a network testing tool to measure throughput and benchmark your WAN links to ensure effectivity. Continue Reading
-
How to calculate network bandwidth requirements
Figuring out how to calculate bandwidth requirements is vital to ensuring your network runs smoothly, and it's best to use the correct formula from the beginning. Continue Reading
-
The pros and cons of Palo Alto Networks' SASE platform
Palo Alto Networks is commonly mentioned in SASE discussions. While the vendor has strong security capabilities, it also brings integration complexities and PoP limitations. Continue Reading
-
How to pick the best network security service provider
Managed security service providers have different levels of expertise. Be sure to match your organization's security needs with the right network security provider. Continue Reading
-
5 steps to achieve network infrastructure modernization
All networks may be different, but companies have similar goals when they look to upgrade their network infrastructures. Assessing current designs is just the first step. Continue Reading
-
The migration to enterprise network as a service
Enterprise network as a service is becoming a popular consumption model for networking functions. But, as with any emerging technology, it's important to weigh the options carefully. Continue Reading
-
Enterprise RF spectrum management best practices
Effective spectrum management requires coordination from company departments to follow certain policies before introducing wireless devices to the enterprise. Continue Reading
-
How to secure your home Wi-Fi network in 7 steps
When securing your home Wi-Fi, update devices regularly, change passwords consistently, turn off unused services and inspect outdoor network equipment. Continue Reading
-
Hybrid network vs. hybrid network infrastructure
Hybrid networks and hybrid network infrastructure blend different kinds of equipment, geographic locations, network ownership and technology disciplines. Continue Reading
-
Routed optical networking tactic could be game changer
A new routing architecture could help eliminate management and service headaches stemming from routing IP traffic on optical networks. Continue Reading
-
How to prepare networks for the return to office
Network teams should evaluate their UC strategies, VPN capacity and even air conditioning requirements as employees start to return to office environments. Continue Reading
-
How to set up a home network -- a 7-step guide
From understanding hardware components to managing network performance and security, this guide teaches networking newbies how to set up a home network. Continue Reading
-
Network-as-a-service business model options take shape
As network as a service gains traction, enterprises and service providers must consider multiple deployment models. SD-WAN, SASE, SDN and policy management could all play a role. Continue Reading
-
Ansible vs. Terraform vs. Vagrant: What's the difference?
Ansible, Terraform and Vagrant are common infrastructure automation platforms with specific use cases, benefits and drawbacks. But choosing a platform doesn't need to be confusing. Continue Reading
-
8 remote access security risks and how to prevent them
Enterprises face myriad remote access security concerns, but training and clear communication can help them bolster their security programs for the long term. Continue Reading
-
4 attributes key to network-as-a-service model
For a network-as-a-service model to work for the enterprise, it needs to offer four key attributes: an application-specific, elastic, secure and personalized VPN. Continue Reading
-
Wi-Fi 6 vs. Wi-Fi 6E: Spectrum, not hype, is key difference
The extended spectrum of Wi-Fi 6E sounds promising. But, when assessing Wi-Fi 6 vs. Wi-Fi 6E, organizations should pay close attention to radio frequency characteristics. Continue Reading
-
Network capacity planning best practices for return to office
As workers grow comfortable enough to return to the office, network teams will need to plan in advance to make sure the network is ready and ensure proper performance. Continue Reading
-
Wi-Fi 6 rollout requires careful review of network devices
Wi-Fi 6 is just one part of the overall enterprise network. Organizations need to evaluate several network components to ensure a smooth Wi-Fi 6 deployment. Continue Reading
-
Common network vulnerabilities and how to prevent them
It's not possible to eliminate all network vulnerabilities, but network teams can implement best practices to limit potential attacks and protect their networks. Continue Reading
-
SASE options for the branch of one -- work from anywhere
More than ever, enterprises need to support individual employees that make up a branch of one. These setups require reliable connectivity, application performance and security. Continue Reading
-
Modern network infrastructure design taps security, flexibility
As workers return to office settings, organizations may have to update their on-premises network infrastructure design to improve scalability and connectivity. Continue Reading
-
How cloud-based network monitoring tools expand visibility
Organizations have become even more distributed and virtual in the wake of COVID-19. Cloud-based network monitoring is well suited to keep tabs on network performance. Continue Reading
-
Best practices for VPN traffic monitoring
VPNs are still a critical part of many enterprise remote access strategies. Networks teams that monitor VPN traffic should look at factors like application usage and overhead. Continue Reading
-
5 basic steps for effective cloud network security
In hybrid infrastructures, old network security systems won't work. Enterprises must adopt effective cloud network security strategies to keep their assets safe. Continue Reading
-
Perform a network health check with network testing
Network engineers can use myriad network testing approaches to ensure their networks are efficient and reliable. The key is incorporating them into a regular maintenance cycle. Continue Reading
-
Why 5G will redefine WWAN and SD-WAN
The nexus of 5G, WWAN and SD-WAN promises to usher in an array of custom tools and services for enterprises. Continue Reading
-
Key tasks in a network maintenance checklist
Network technologies and devices might change over time, but certain maintenance tasks, such as data backup and device inventory, will always be essential for network teams. Continue Reading
-
NOC performance metrics for optimal operation
NOC best practices include using standardized network designs and automation. But don't forget to identify performance metrics that help track and measure operational success. Continue Reading
-
5 steps to conduct network penetration testing
Enterprises that want to ensure competent network security strategies should look at how they can implement penetration testing, considering red teams and physical pen tests. Continue Reading
-
5 benefits of Wi-Fi 6 for enterprise networks
In a perfect world, Wi-Fi 6 could introduce several benefits to business networks. But real-world conditions could curb the wireless technology's true potential. Continue Reading
-
Open RAN architecture gives operators options, challenges
Open RAN architecture could give telecom operators more flexibility as they deliver enterprise-grade 5G services. But making the RAN a virtual function takes careful planning. Continue Reading
-
How to build a private 5G business case
As you build a private 5G business case, be sure to include private 5G's benefits and challenges, as well as how to prove its ROI. Here's everything you need to know. Continue Reading
-
7 steps for a network and IT security foundation
Enterprises should make it a habit to review their IT security systems, following steps that include network segmentation, multifactor authentication and security education. Continue Reading
-
A work-from-home reimbursement policy for network tech
A work-from-home reimbursement plan should drive better network and internet connectivity rates for remote workers and not just offset employees' existing bills. Continue Reading
-
How to secure remote access for WFH employees in 4 steps
The global pandemic caused mayhem on network security environments. Enterprises need to bring rigor back to their systems and tighten security for remote workers. Continue Reading
-
Top tips to provide IT support for remote workers
To support employees working from home, network teams should carefully monitor VPN traffic, review firewall rules and rely on remote access support software. Continue Reading
-
Weighing the advantages of private 5G vs. carrier 5G
Considering private 5G vs. carrier 5G for your interior networking? No single option fits all, but here are some factors you should consider. Continue Reading
-
SASE hype includes SD-WAN, but does it need to?
Much of the hype around Secure Access Service Edge features the importance of SD-WAN with SASE, but do the two need each other to thrive? Research says probably not. Continue Reading
-
Long-term remote work empowers SD-WAN for home offices
Organizations have long relied on VPNs to connect remote workers with company resources. But SD-WAN could also be a viable option for certain employees working from home. Continue Reading
-
How to monitor home network traffic for added security
When addressing home network monitoring, track all connected devices, and take advantage of open source tools, like packet capture, to sniff out malicious traffic. Continue Reading
-
The tradeoffs and cost of network redundancy
Network redundancy costs vary depending on enterprise use cases, but the determining tradeoff usually depends on how long a company can sustain network downtime. Continue Reading
-
How the SolarWinds vulnerability affects networking
The SolarWinds attack resulted in a bevy of network vulnerabilities, like masked traffic and backdoor access. Network teams should take the time to review their security strategies. Continue Reading
-
10 network security tips in response to the SolarWinds hack
From perimeter protection to persistent patching, enterprises should regularly review, update and test their network security plans, especially in response to the SolarWinds hack. Continue Reading
-
Considerations for SASE management and troubleshooting
SASE opens new territory for network and security management and troubleshooting. Ultimately, teams should look for system usability and visibility into traffic flows and policies. Continue Reading
-
SASE challenges include network security roles, product choice
Secure Access Service Edge blends network and security functions. While this integration has its benefits, enterprises still need to address some SASE challenges. Continue Reading
-
Myths and realities of a Wi-Fi 6 upgrade
Despite the promise of high data rates, longer client battery life and more efficient radio techniques, enterprises need to weigh Wi-Fi 6's limitations. Continue Reading
-
How to calculate SASE return on investment and costs
SASE return on investment will vary for each organization, depending on use cases and architecture requirements. But the metrics used to determine ROI and cost factors are the same. Continue Reading
-
Top 5 SASE use cases balance network connectivity, security
Secure Access Service Edge can enhance network performance and security controls for remote sites. Discover some of the other top SASE use cases and deployment options. Continue Reading
-
Setting up and using a home VLAN to segment network traffic
Virtual LANs can help homeowners segment their network traffic for enhanced control and security. Network analyst John Fruehe takes you inside his home VLANs. Continue Reading
-
How SASE convergence affects network and security roles
Most enterprises have siloed departments, but SASE's convergence of network and security functions could disrupt those constructs and drive more communication between teams. Continue Reading
-
Software-defined home offerings drive remote productivity
Say hello to software-defined home, a 'branch of one' package that combines professional-grade Wi-Fi, security, SD-WAN and centralized management for remote workers. Continue Reading
-
How to calculate a subnet mask from hosts and subnets
IP addressing and subnetting are important and basic elements of networks. In this article, learn how to calculate a subnet mask based on the required number of subnets and hosts. Continue Reading
-
With SASE, security and networking tech come together
SD-WAN, SASE or some combination of the two -- which approach will deliver the best and most secure network connectivity in your organization going forward? Continue Reading
-
Cloud automation use cases for managing and troubleshooting
Cloud automation use cases highlight the benefits these tools can provide to companies evaluating how best to manage and troubleshoot their cloud connections. Continue Reading
-
Implementing an SDP architecture for added network security
A key component of a software-defined perimeter requires client authentication before connection, while also making a network's internals invisible to outsiders. Continue Reading
-
What network managers need to know about SaaS optimization
When strategizing SaaS optimization tactics, network management teams should consider their traffic steering preferences and geographically dispersed access points. Continue Reading
-
How service mesh enables microservices networking
As microservices applications grow more popular, IT teams need to enable reliable networking between them for proper communication. That's where service mesh comes in. Continue Reading
-
How to use ChatOps to automate network tasks
Integrating team collaboration chat systems with network automation results in the ability to automate tedious workflows, enabling faster problem resolution and streamlined operations. Continue Reading
-
Why networks should apply security by design principles
Security by design incorporates security and risk management directly into network architecture, using segmentation and Agile infrastructure design. Continue Reading
-
How and why to implement Wi-Fi QoS
Quality of service, as network pros know, prioritizes apps as they cross the network. But Wi-Fi QoS needs to be considered, too, in relation to the overall network. Continue Reading
-
The top 5 benefits of SASE to enhance network security
A cloud-based distributed architecture, centralized management and endpoint-specific security policies are just some of the benefits of Secure Access Service Edge. Continue Reading
-
How COVID-19 will reshape 2021 enterprise network spending
COVID-19 has shifted enterprise network spending. Campus LAN traffic may never be the same, but companies are earmarking funds to better support the remote workforce. Continue Reading