OSPF Path Cost Consistency
What does OSPF do for me? Open Shortest Path First (OSPF) is a standards-based routing protocol for IPv4. It is used to advertise paths to a network prefix between routers. As a router receives advertisements for prefixes, so it creates a representation of the network…
Verify end-to-end QoS
Verifying Quality of Service is a complex task when delivering applications across a large network. It involves a detailed understanding of the behaviour of many different devices, often from different vendors. This post shows how IP Fabric can help with this onerous task. Quality of…
How to manage network security according to Cobit certification with IP Fabric platform
The Cobit stands for “Control Objectives for Information and Related Technology”. Primarily it was mainly focused on auditing, specifically helping financial auditors navigate IT environments. Now it is the leading framework for the governance and management of enterprise IT. It includes breadth of tools, resources and guidance. Its main value is in leveraging proven practices to inspire IT innovation and fuel business success.
Network Discovery Part 3 – it’s all about the documentation
Network documentation is a very complex and thorough topic – there are many guidelines, theories and even books that can help us with the process of creating and maintaining proper documents describing the network. The concept and execution may vary, but the purpose of the documentation should be unique – to represent the current state and settings of the network and all of the respective components.
IP Fabric Technical Product Demo
Today we will go through a quick demonstration of the IP Fabric platform and its main features. The IP Fabric platform is the network management system that helps companies to empower network engineers and teams to discover, verify, and document large scale networks within minutes.
How to manage network security according to ISO 27001 certification with IP Fabric platform
International standard or ISO 27001 certification is helping organizations to better understand network and security area administration. It also defines models for increasing network and security resilience and other features. To begin with, the network infrastructure has become more and more important for many organizations….
How to Automate Your Network Security Audit in Minutes
A network security audit is a systematic evaluation of the security of a company’s information systems or network intermediary devices. The secureness of the network is evaluated using a few different sets of criteria, including measuring how well the devices conform to a set of…
Low Level Design document on the fly
Documentation is a critical part of any project or technical environment. If we don’t jot down some important information along the way, we end up repeatedly asking the same basic questions over and over again, completely draining our team members. We’ve heard from many team…
Export security policies from Juniper SRX
Juniper SRX is a wonderful firewall device with a lot of rich features. However sometimes the complexity of security policies may grow greatly with multiple embedded addresses or application objects, more virtual routing and forwarding instances, route leaks and so on. It can come to…
Instant Business-Level Network Analysis Reports
Overall state of the network often must be presented in condensed form to managers and non-it personnel. How can you create the reports focusing mostly on the risk and impact of the network state to users and applications?