What is QUIC? Everything You Need to Know
When I hear QUIC, my immediate reaction is, “The QUICk brown fox jumps over the lazy dog.” That sentence has been ingrained in me since my first typing classes decades ago! I doubt the creators of...
View ArticleHow to Configure Syslog on a Cisco Device
Going beyond the question of what is sylog and why it’s used, this article digs into how to configure syslog on network devices. The explanations and examples will be a bit Cisco IOS specific, mainly...
View ArticleNetwork Basics: What Is SNMP and How Does It Work?
Ever found yourself wondering, “What exactly is SNMP?” Well, here’s your crash course. SNMP stands for Simple Network Management Protocol, and it’s not your average protocol. It’s a powerful tool that...
View ArticleNetwork Basics: What is Link Aggregation & How Does it Work?
Link aggregation is a way of bundling a bunch of individual (Ethernet) links together so they act as a single logical link. A fundamental for effective switch management, if you have a switch with a...
View Article6 Common Spanning Tree Mistakes and How to Avoid Them
Let me start by saying that spanning tree is a Good Thing. It saves you from loops, which will completely shut down a network. But it has to be configured properly to work properly. I can’t count the...
View ArticleSNMPv2 vs. SNMPv3: An SNMP Versions Comparison Table
By 2024 there’ll be an estimated 83 billion connected devices on our networks. All these devices, made by a wide variety of vendors, use different types of software, making everything more complicated...
View ArticleSpecial IP Address Ranges and When to Use Them
By even casual observation, you’ll likely have noticed that there are several IP address ranges that are special, including: 10.0.0.0/8 (10.0.0.0 – 10.255.255.255) 172.16.0.0/12 (172.16.0.0 –...
View ArticleHow to Adjust TCP Window Size to Improve Network Performance
The TCP/IP protocol sometimes shows its age. It was invented in an era when networks were very slow and packet loss was high. So one of the main considerations in early protocol design was...
View ArticleDetailed Guide to Basic Switch Configuration
Though I’m a big believer in the importance of network configuration management, even I’ll admit that network switch configuration from a command-line interface (CLI) is still one of the most...
View Article51 Types of As-a-Service Offerings
The cloud is here—and so are its acronyms. Since software as a service (SaaS) hit the world in 2001, the “as a service” model has been extended to just about everything you can think of. Along the...
View Article11 Types of Networks: Understanding the Differences
As the number of connected personal and IoT devices skyrockets across the world, the demand for high-speed, high-performance networks continues to climb and transform how people and businesses...
View ArticlePacket Errors, Packet Discards, and Packet Loss: What’s the Difference?
Packet loss, packet error, and packet discard—they all seem to blur together. But these terms are not actually interchangeable. So how do you tell them apart? Before we jump into packet loss...
View ArticleHow to Set Up Cisco AnyConnect for Your VPN
With more and more folks working remotely or in hybrid settings, there’s an increasing call for IT departments and MSPs to configure Cisco AnyConnect VPNs on ASA firewalls. But Cisco documentation can...
View ArticleWhat is Multicast Networking and How Does It Work?
Multicast networking refers to a method of sending data from one source device to multiple destination devices simultaneously. Instead of sending multiple copies of the data stream to each recipient...
View ArticleNetwork Observability: Mastering Infrastructure Data for Smarter IT
If you want to know exactly what’s on your network and how it’s all connected in real time, then network observability is the answer. Network observability pulls data from sources across your network...
View ArticleWhat is Network Visibility? A Complete Guide
Network visibility includes gaining insight into connected devices, applications, data flows and user behaviors. Comprehensive visibility enables early threat detection, performance optimizations,...
View ArticleNetwork Traffic Monitoring in 2024: Discover the Top 7 Solutions
Gaining visibility into data flows has become essential for infrastructure teams in today’s complex environments spanning cloud and on-premises. But with massive traffic across hybrid networks,...
View Article9 Healthcare IT Trends to Watch in 2024
On some of the best and worst days of our lives, we rely on the people, processes, and technology of the healthcare system to take care of us at our most vulnerable. This is why healthcare IT is...
View ArticleSNMP Ports: Everything You Need to Know for Efficient Network Management
Simple Network Management Protocol (SNMP) is a widely used network monitoring and management protocol. It allows you to keep track of the status and performance of the devices on your network, like...
View ArticleWhat is Endpoint Detection and Response (EDR) Software?
Organizations are rapidly adopting endpoint detection and response software to address the challenge and strengthen their overall network infrastructure security. Why? In large part because endpoints...
View Article