Ensuring your environment is secure as you intended
In a world where security is getting more and more complex, how do you know what you’re doing is accomplishing what you want? Is that firewall rule actually stopping your applications or IP from reaching the outside world? Is your well-crafted micro segmentation policy dynamically…
Enriching your network tooling
In our last post, we discussed the complexity of the operational tooling ecosystem that we use to maintain and support networks. In particular we looked into the following areas: Configuration Performance Monitoring Event Management IT Service Management CMDB We discussed the gaps between the existing…
Mind the gaps in your network tooling!
The network is a distributed system whose raison d’etre is to deliver applications to your users in a reliable and timely way. In order to keep your network up and functioning, manageable and supportable, adaptable and secure, you need to maintain a set of tools…
Integration with the Operational Ecosystem
In every product conversation and demonstration, we are always at pains to point out that we discover and curate an incredible wealth of network data in our platform. That data is then available for you to query and visualise through the Web UI. And we…
10 ways to make your network run more smoothly
If I were to say that you could:
– Identify BGP peering instability;
– Spot Single Points of Failure;
– Verify end-to-end QoS
– Track down OSPF area inconsistencies
– Align FHRP and Spanning Tree
– Troubleshoot multicast forwarding
– Look for firewall bypass scenarios
– Identify 802.1X configuration issues
– Find end-of-life equipment
– Spot where users are having wireless woes
and without having to write Python scripts, Ansible playbooks and DIY, what would you say?
Curing Wireless Woes
As more organisations adapt their working practices to cope with an unpredictable office situation, so wireless networking becomes ever more important to allow access to networked services. Pervasive mobility is the name of the game with hot-desking and working from home being the requirements for…
Declaration of Intent!
After presenting IP Fabric at Networking Field Day 23, a number of Twitter threads started probing at the idea of Intent-Based Networking (IBN) – is it simply a marketing term that vendors use to sell more gear or does it have a deeper meaning? And…
Can You Handle the Truth?
A lively debate sparked up after Networking Field Day 23, where we presented IP Fabric to a panel of delegates and hundreds of eager online viewers. Could we class our solution as a “Source of Truth” for the network? The conclusion was “Yes”. And “No”….
Verifying 802.1X configuration
Why 802.1X? There was a time when networks were secure islands, used to connect PCs to services they consumed and each other. The network was protected from the outside world by a perimeter firewall: there was only one way in and out. With the explosion…
Stopping Firewall Bypass Attempts
A network user – a senior manager in the business, in the process of writing a heavy report – knocks on the door of the security team’s office. He has an urgent request, to access a server that sits behind a firewall. He speaks to…