Integration with the Operational Ecosystem
In every product conversation and demonstration, we are always at pains to point out that we discover and curate an incredible wealth of network data in our platform. That data is then available for you to query and visualise through the Web UI. And we…
10 ways to make your network run more smoothly
If I were to say that you could:
– Identify BGP peering instability;
– Spot Single Points of Failure;
– Verify end-to-end QoS
– Track down OSPF area inconsistencies
– Align FHRP and Spanning Tree
– Troubleshoot multicast forwarding
– Look for firewall bypass scenarios
– Identify 802.1X configuration issues
– Find end-of-life equipment
– Spot where users are having wireless woes
and without having to write Python scripts, Ansible playbooks and DIY, what would you say?
Curing Wireless Woes
As more organisations adapt their working practices to cope with an unpredictable office situation, so wireless networking becomes ever more important to allow access to networked services. Pervasive mobility is the name of the game with hot-desking and working from home being the requirements for…
Managing Network End of Life
Managing the lifecycle of your network equipment is a vital part of maintaining the security of your IT environment. Being able to verify that the equipment which underpins your IT is supportable, maintainable and replaceable should it fail is fundamental. But so few organisations really…
Declaration of Intent!
After presenting IP Fabric at Networking Field Day 23, a number of Twitter threads started probing at the idea of Intent-Based Networking (IBN) – is it simply a marketing term that vendors use to sell more gear or does it have a deeper meaning? And…
Can You Handle the Truth?
A lively debate sparked up after Networking Field Day 23, where we presented IP Fabric to a panel of delegates and hundreds of eager online viewers. Could we class our solution as a “Source of Truth” for the network? The conclusion was “Yes”. And “No”….
Verifying 802.1X configuration
Why 802.1X? There was a time when networks were secure islands, used to connect PCs to services they consumed and each other. The network was protected from the outside world by a perimeter firewall: there was only one way in and out. With the explosion…
Stopping Firewall Bypass Attempts
A network user – a senior manager in the business, in the process of writing a heavy report – knocks on the door of the security team’s office. He has an urgent request, to access a server that sits behind a firewall. He speaks to…
Troubleshooting Multicast Traffic Flows
Just what is multicast? How do you set up your network to handle multicast? And how do you troubleshoot it if it fails? Let’s start from the beginning. Unicast Forwarding Typical IP packet forwarding is considered “unicast” – a communication is broken up into IP…
Aligning Spanning Tree and FHRP in the campus LAN
The “typical” site LAN In most networks, a site LAN consists of a number of interconnected Ethernet switches in a regular partial mesh pattern. The topology typically enables high availability of the networked applications. We create redundant links which are not typically used but are…