Tips
Tips
- 
			The role of name resolution in networkingName resolution is essential in converting hostnames and IP addresses for network communications. Here's how the process resolves hostnames, queries servers and finds IP addresses. Continue Reading 
- 
			An introduction to neutral host networks using private 5GEnterprises often use signal boosters and distributed antenna systems to improve carrier signal strength. Neutral host networks over private 5G could disrupt those methods. Continue Reading 
- 
			How to convert binary to decimalIt's helpful for network admins to know how to convert binary to decimal, and vice versa, for IPv4 addressing, subnet masks, default gateways and network IDs. Continue Reading 
- 
			5 network virtualization challenges and how to solve themThe challenges of network virtualization include an overhaul of network architecture, thorough staff training and breaking down knowledge silos among IT departments. Continue Reading 
- 
			How zero trust unifies network virtualizationThe combination of zero trust and network virtualization creates opportunities to strengthen security policies, increase cross-domain collaboration and improve overall visibility. Continue Reading 
- 
			What software-defined LAN means for campus virtualizationLAN virtualization has long encompassed VLANs to segment network traffic. But software-defined LAN is emerging with zero-trust strategies to provide more comprehensive security. Continue Reading 
- 
			20 systemctl commands for system and service managementSystem and service management are vital to ensure customer satisfaction and service delivery. These systemctl commands can help ease those management tasks for admins. Continue Reading 
- 
			How enterprise networks use WAN virtualizationSD-WAN is the most common form of WAN virtualization. But virtual WAN strategies are evolving to include software-defined perimeter and cloud concepts. Continue Reading 
- 
			Network virtualization benefits in the LAN, WAN and data centerBetter traffic performance, scalability and security are some of the network virtualization benefits that enterprises can realize across their network infrastructure. Continue Reading 
- 
			The role of network virtualization and SDN in data centersSDN, zero trust and infrastructure as code are popular forms of network virtualization within the data center, moving away from manual VLANs toward policy-driven virtualization. Continue Reading 
- 
			Carrier network virtualization leads to enterprise servicesStarting with MPLS VPNs and SD-WAN, new carrier network virtualization options, like 5G network slicing, are becoming virtual enterprise network services, and more will follow. Continue Reading 
- 
			How network virtualization worksNetwork virtualization uses abstraction to isolate applications and resources from the physical infrastructure. Benefits include faster provisioning, agility and operational efficiency. Continue Reading 
- 
			6 types of network topologiesNetwork topology is essential to network configuration, as it determines the arrangement of a network and defines how nodes connect. Here are six common types of network topologies. Continue Reading 
- 
			5 basic network commands for Linux and WindowsLinux and Windows use different network commands to run tasks that are common in both environments, such as network connectivity testing. But the commands often share similarities. Continue Reading 
- 
			Common types of enterprise network connectionsThe goal of every network is to connect devices. The connections that form those links -- such as wired cabling and wireless technologies -- are crucial in network infrastructure. Continue Reading 
- 
			Power over Ethernet basics for network architectsPower over Ethernet provides a way to supply electricity to low-power devices through a standard Ethernet cable. Learn about the different standards and PoE types. Continue Reading 
- 
			Zero trust, wireless WAN affect the future of IoT networkingZero-trust security models, wireless WAN evolution and the emergence of pop-up businesses are all helping to fuel innovation in IoT networking capabilities. Continue Reading 
- 
			The pros and cons of Netskope SASENetskope is undoubtedly a leader in the CASB market, but its limited security capabilities and lack of SD-WAN make Netskope an incomplete SASE offering. Continue Reading 
- 
			Is it time to ditch the WAN for other connectivity options?With the prevalence of remote work, cloud applications and internet connectivity, will enterprises ditch the WAN to save money and time? Maybe not everyone. Continue Reading 
- 
			Private 5G deployments to advance in 2022As commercial private 5G deployments begin to advance in 2022, private cellular networks will become a reality for many organizations in the U.S. and around the world. Continue Reading 
- 
			NetOps automation ideas and examplesNetOps teams can hone their automation experience using these automation ideas that range from simple read/write tasks to complex automated processes. Continue Reading 
- 
			The benefits of network infrastructure as codeNetwork infrastructure as code uses DevOps methodology to create structured practices for configuration changes and establish pre- and post-change testing and validation. Continue Reading 
- 
			How to secure NetOps initiatives using Agile methodologyAs more NetOps teams implement Agile methods, network and security testing must be part of a holistic approach that involves developers, networking and security teams working together. Continue Reading 
- 
			NetOps meets DevOps concepts to tackle network problemsNetOps and DevOps are converging, due to increased use of infrastructure as code to automate enterprise networks. Shared concepts include structured coding practices and automated testing. Continue Reading 
- 
			Configure DHCP failover for Windows ServerDHCP is a critical service, and network admins should take the time to create fault tolerance. Windows Server makes it easy to configure both failover and load balancing. Continue Reading 
- 
			The rise of the NetOps engineerThe need for NetOps engineers with network automation and software development skills is rising with the continued drive to create more flexible networks. Find out what it takes. Continue Reading 
- 
			Business benefits of an Agile networking approachEnterprises that embed an Agile approach in their networking strategies could see benefits like better network performance, enhanced data security and faster rollouts of network services. Continue Reading 
- 
			A review of Zscaler SASE architectureZscaler has a strong cloud-native architecture for secure internet access. But it doesn't deliver SD-WAN or converge internet access and WAN security, leaving it with only part of a SASE platform. Continue Reading 
- 
			How NetOps differs from traditional network operationsWhen comparing NetOps and conventional network operations, network teams focus on automating repeatable tasks that correct problems rather than introducing new ones manually. Continue Reading 
- 
			Why NetOps is a bridge to AIOpsAs IT infrastructure grows more complex, NetOps teams should identify ways to ensure their networks remain operational and perform at peak levels. One option is AIOps. Continue Reading 
- 
			7 steps of an SD-WAN implementationOrganizations interested in implementing SD-WAN need to collect site profiles and requirements, analyze their options, perform tests and evaluate the results. Continue Reading 
- 
			Integrating zero-trust practices into private 5G networksOne of the first steps in deploying a technology is protecting it from potential security threats. Learn how to secure a private 5G network with zero-trust security practices. Continue Reading 
- 
			Intro to encapsulation and decapsulation in networkingEncapsulation adds information to a packet as it travels to its destination. Decapsulation reverses the process by removing the info, so a destination device can read the original data. Continue Reading 
- 
			Will 5G replace Wi-Fi? No, but maybe in some use casesGeographically remote locations, large public venues and manufacturing sites are a few of the key areas in which business 5G technology could provide real benefits. Continue Reading 
- 
			How to implement network segmentation for better securityFor a network segmentation strategy to be effective and improve security, network teams need to create detailed security policies, identify each resource and use allowlists. Continue Reading 
- 
			What's happening with standalone 5G?Standalone 5G is the next major update for 5G technology. Learn about the benefits SA 5G will bring and find out when operators will begin deploying it worldwide. Continue Reading 
- 
			How IT can provide home Wi-Fi help for remote workersWhen assisting home-based workers with their Wi-Fi woes, be sure to assess their internet connectivity and even consider deploying access points to their homes. Continue Reading 
- 
			Explore 9 essential elements of network securityNetwork security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other. Continue Reading 
- 
			5 trends in enterprise networking that defined 2021In 2020, enterprises shifted to remote work due to the pandemic. The trend continued in 2021, along with four other networking trends that defined the year and will extend into 2022. Continue Reading 
- 
			DHCP client configuration for Linux, Windows and macOSNetwork and system admins can use command-line and GUI tools to configure DHCP clients in Linux, Windows and macOS. Here's a breakdown of which commands to use for each OS. Continue Reading 
- 
			Automation, cloud lead as influential data center trendsRecent data center trends, such as AIOps and automation, have been geared toward simplifying network management. Here are the trends and challenges teams faced over the past year. Continue Reading 
- 
			How zero-trust SDP can work with a VPN for remote workImplementing software-defined perimeter and zero-trust security models with a corporate VPN adds significant layers of user and device verification and authentication. Continue Reading 
- 
			Midband 5G spectrum auctions come to the foreMidband has become the premier spectrum for 5G use. The FCC's 3.45 GHz auction began in October, following the massive C-band sell-off that ended in January 2021. Continue Reading 
- 
			A guide to Windows DHCP server configurationThe main steps to configure DHCP on Windows Server are installation, Active Directory authorization, creating a scope and DNS registration. Learn about other tasks and best practices. Continue Reading 
- 
			Evaluate the components of Cisco SASECisco's SASE platform, Umbrella, has all the components of a SASE architecture, but it has a lot of integration complexity and a reliance on appliances. Continue Reading 
- 
			Get up to speed with enhanced content delivery networksWith enhanced features and new delivery options, CDNs are poised to make greater inroads with enterprises to improve UX across the board. Continue Reading 
- 
			What digital experience monitoring means for network teamsDigital experience monitoring integrates several monitoring tools to provide a comprehensive view into the performance of endpoints, applications and the network. Continue Reading 
- 
			A quick guide to BGP best practicesThe use of Border Gateway Protocol is prevalent among ISPs and enterprises. While BGP best practices change for specific use cases, some recommendations are helpful in all scenarios. Continue Reading 
- 
			Static IP vs. dynamic IP addresses: What's the difference?Static IP addresses are typically used for servers, routers and switches. Dynamic IP addresses, however, are commonly used for workstations, phones and tablets. Continue Reading 
- 
			4 categories of network monitoringNetwork teams should routinely monitor the states of their networks. The type of network monitoring strategy used depends on the needs of the organization. Continue Reading 
- 
			Automate network validation for smoother changesTeams can verify network state before and after network changes to ensure smooth deployment of the changes. Automating those pre- and post-change checks can reduce errors and outages. Continue Reading 
- 
			A review of Cato Networks' SASE Cloud platformCato's SASE Cloud lacks some features and may require customers to replace point products to fully benefit from the platform. But Cato aligns with SASE’s cloud-native vision and is a strong contender in the market. Continue Reading 
- 
			How remote work changes the future of network managementThe pandemic ushered in a new normal of hybrid workplaces. What's also new is how network teams manage these remote networks, like using zero-trust security models. Continue Reading 
- 
			A deep dive into Fortinet's SASE platformDespite its strong security foundation, Fortinet's SASE platform lacks a cloud-native strategy and requires teams to stitch the architecture together. Continue Reading 
- 
			Network observability vs. monitoring: What's the difference?Traditional network monitoring is useful for collecting data about network issues. But network observability can add further insights into network health and end-user experience. Continue Reading 
- 
			BGP vs. OSPF: When to use each protocolBGP and OSPF are two of the most common routing protocols. While BGP excels with dynamic routing for large networks, OSPF offers more efficient path choice and convergence speed. Continue Reading 
- 
			How to use iPerf3 to test network bandwidthIn this in-depth tip, learn how to use iPerf3, a network testing tool to measure throughput and benchmark your WAN links to ensure effectivity. Continue Reading 
- 
			How to calculate network bandwidth requirementsFiguring out how to calculate bandwidth requirements is vital to ensuring your network runs smoothly, and it's best to use the correct formula from the beginning. Continue Reading 
- 
			The pros and cons of Palo Alto Networks' SASE platformPalo Alto Networks is commonly mentioned in SASE discussions. While the vendor has strong security capabilities, it also brings integration complexities and PoP limitations. Continue Reading 
- 
			How to pick the best network security service providerManaged security service providers have different levels of expertise. Be sure to match your organization's security needs with the right network security provider. Continue Reading 
- 
			5 steps to achieve network infrastructure modernizationAll networks may be different, but companies have similar goals when they look to upgrade their network infrastructures. Assessing current designs is just the first step. Continue Reading 
- 
			The migration to enterprise network as a serviceEnterprise network as a service is becoming a popular consumption model for networking functions. But, as with any emerging technology, it's important to weigh the options carefully. Continue Reading 
- 
			Enterprise RF spectrum management best practicesEffective spectrum management requires coordination from company departments to follow certain policies before introducing wireless devices to the enterprise. Continue Reading 
- 
			How to secure your home Wi-Fi network in 7 stepsWhen securing your home Wi-Fi, update devices regularly, change passwords consistently, turn off unused services and inspect outdoor network equipment. Continue Reading 
- 
			Hybrid network vs. hybrid network infrastructureHybrid networks and hybrid network infrastructure blend different kinds of equipment, geographic locations, network ownership and technology disciplines. Continue Reading 
- 
			Routed optical networking tactic could be game changerA new routing architecture could help eliminate management and service headaches stemming from routing IP traffic on optical networks. Continue Reading 
- 
			How to prepare networks for the return to officeNetwork teams should evaluate their UC strategies, VPN capacity and even air conditioning requirements as employees start to return to office environments. Continue Reading 
- 
			Network-as-a-service business model options take shapeAs network as a service gains traction, enterprises and service providers must consider multiple deployment models. SD-WAN, SASE, SDN and policy management could all play a role. Continue Reading 
- 
			4 attributes key to network-as-a-service modelFor a network-as-a-service model to work for the enterprise, it needs to offer four key attributes: an application-specific, elastic, secure and personalized VPN. Continue Reading 
- 
			Network capacity planning best practices for return to officeAs workers grow comfortable enough to return to the office, network teams will need to plan in advance to make sure the network is ready and ensure proper performance. Continue Reading 
- 
			Wi-Fi 6 rollout requires careful review of network devicesWi-Fi 6 is just one part of the overall enterprise network. Organizations need to evaluate several network components to ensure a smooth Wi-Fi 6 deployment. Continue Reading 
- 
			Common network vulnerabilities and how to prevent themIt's not possible to eliminate all network vulnerabilities, but network teams can implement best practices to limit potential attacks and protect their networks. Continue Reading 
- 
			SASE options for the branch of one -- work from anywhereMore than ever, enterprises need to support individual employees that make up a branch of one. These setups require reliable connectivity, application performance and security. Continue Reading 
- 
			Modern network infrastructure design taps security, flexibilityAs workers return to office settings, organizations may have to update their on-premises network infrastructure design to improve scalability and connectivity. Continue Reading 
- 
			How cloud-based network monitoring tools expand visibilityOrganizations have become even more distributed and virtual in the wake of COVID-19. Cloud-based network monitoring is well suited to keep tabs on network performance. Continue Reading 
- 
			Best practices for VPN traffic monitoringVPNs are still a critical part of many enterprise remote access strategies. Networks teams that monitor VPN traffic should look at factors like application usage and overhead. Continue Reading 
- 
			5 basic steps for effective cloud network securityIn hybrid infrastructures, old network security systems won't work. Enterprises must adopt effective cloud network security strategies to keep their assets safe. Continue Reading 
- 
			Perform a network health check with network testingNetwork engineers can use myriad network testing approaches to ensure their networks are efficient and reliable. The key is incorporating them into a regular maintenance cycle. Continue Reading 
- 
			Why 5G will redefine WWAN and SD-WANThe nexus of 5G, WWAN and SD-WAN promises to usher in an array of custom tools and services for enterprises. Continue Reading 
- 
			Key tasks in a network maintenance checklistNetwork technologies and devices might change over time, but certain maintenance tasks, such as data backup and device inventory, will always be essential for network teams. Continue Reading 
- 
			NOC performance metrics for optimal operationNOC best practices include using standardized network designs and automation. But don't forget to identify performance metrics that help track and measure operational success. Continue Reading 
- 
			5 steps to conduct network penetration testingEnterprises that want to ensure competent network security strategies should look at how they can implement penetration testing, considering red teams and physical pen tests. Continue Reading 
- 
			5 benefits of Wi-Fi 6 for enterprise networksIn a perfect world, Wi-Fi 6 could introduce several benefits to business networks. But real-world conditions could curb the wireless technology's true potential. Continue Reading 
- 
			Open RAN architecture gives operators options, challengesOpen RAN architecture could give telecom operators more flexibility as they deliver enterprise-grade 5G services. But making the RAN a virtual function takes careful planning. Continue Reading 
- 
			How to build a private 5G business caseAs you build a private 5G business case, be sure to include private 5G's benefits and challenges, as well as how to prove its ROI. Here's everything you need to know. Continue Reading 
- 
			7 steps for a network and IT security foundationEnterprises should make it a habit to review their IT security systems, following steps that include network segmentation, multifactor authentication and security education. Continue Reading 
- 
			How to secure remote access for WFH employees in 4 stepsThe global pandemic caused mayhem on network security environments. Enterprises need to bring rigor back to their systems and tighten security for remote workers. Continue Reading 
- 
			Weighing the advantages of private 5G vs. carrier 5GConsidering private 5G vs. carrier 5G for your interior networking? No single option fits all, but here are some factors you should consider. Continue Reading 
- 
			SASE hype includes SD-WAN, but does it need to?Much of the hype around Secure Access Service Edge features the importance of SD-WAN with SASE, but do the two need each other to thrive? Research says probably not. Continue Reading 
- 
			How to monitor home network traffic for added securityWhen addressing home network monitoring, track all connected devices, and take advantage of open source tools, like packet capture, to sniff out malicious traffic. Continue Reading 
- 
			The tradeoffs and cost of network redundancyNetwork redundancy costs vary depending on enterprise use cases, but the determining tradeoff usually depends on how long a company can sustain network downtime. Continue Reading 
- 
			How the SolarWinds vulnerability affects networkingThe SolarWinds attack resulted in a bevy of network vulnerabilities, like masked traffic and backdoor access. Network teams should take the time to review their security strategies. Continue Reading 
- 
			10 network security tips in response to the SolarWinds hackFrom perimeter protection to persistent patching, enterprises should regularly review, update and test their network security plans, especially in response to the SolarWinds hack. Continue Reading 
- 
			Considerations for SASE management and troubleshootingSASE opens new territory for network and security management and troubleshooting. Ultimately, teams should look for system usability and visibility into traffic flows and policies. Continue Reading 
- 
			SASE challenges include network security roles, product choiceSecure Access Service Edge blends network and security functions. While this integration has its benefits, enterprises still need to address some SASE challenges. Continue Reading 
- 
			Myths and realities of a Wi-Fi 6 upgradeDespite the promise of high data rates, longer client battery life and more efficient radio techniques, enterprises need to weigh Wi-Fi 6's limitations. Continue Reading 
- 
			How to calculate SASE return on investment and costsSASE return on investment will vary for each organization, depending on use cases and architecture requirements. But the metrics used to determine ROI and cost factors are the same. Continue Reading 
- 
			Top 5 SASE use cases balance network connectivity, securitySecure Access Service Edge can enhance network performance and security controls for remote sites. Discover some of the other top SASE use cases and deployment options. Continue Reading 
- 
			Setting up and using a home VLAN to segment network trafficVirtual LANs can help homeowners segment their network traffic for enhanced control and security. Network analyst John Fruehe takes you inside his home VLANs. Continue Reading 
- 
			Software-defined home offerings drive remote productivitySay hello to software-defined home, a 'branch of one' package that combines professional-grade Wi-Fi, security, SD-WAN and centralized management for remote workers. Continue Reading