Tips
Tips
-
What are the elements of modern network security architecture?
Modern network security is a mix of several elements, including secure access service edge, virtualization technologies, segmentation and zero-trust models. Continue Reading
-
What's shaping the future of wireless networking technology?
Cloud-managed Wi-Fi, radio spectrum expansion and the hybrid workplace are some of the converging developments that are modernizing wireless networks. Continue Reading
-
How to interact with network APIs using cURL, Postman tools
Network engineers can use cURL and Postman tools to work with network APIs. Use cases include getting interface information and manipulating device configuration data. Continue Reading
-
Modular network design benefits and approaches
Modular network design is a strategic way for enterprises to group network building blocks in order to streamline network maintenance, additions and troubleshooting. Continue Reading
-
9 ways to make network modernization work
More cloud computing, container networking and network capacity are some of the ways businesses could modernize their networks. AI and automation can help, too. Continue Reading
-
Python interpreter vs. IDE: What network engineers should know
When using Python for network automation, network engineers often work with interpreters and integrated development environment tools to test modules and debug code. Continue Reading
-
7 factors to consider in network redundancy design
Network pros should consider multiple factors when adding redundancy to network design, including network equipment, protocols, backup, processing and subnet connections. Continue Reading
-
Review the components of VMware SASE Platform
VMware SASE Platform provides many strong networking and security capabilities, but it comes in an offering that feels like many individual products packaged together. Continue Reading
-
The pros and cons of VPNs for enterprises
VPNs use different protocols and encryption to protect data and prevent unauthorized users from accessing company resources. But those protocols come with their own benefits and challenges. Continue Reading
-
6 steps for rapid geographic network segmentation
When segmenting network operations in certain parts of the world, modular network design and geographic domain definition are two vital elements to consider. Continue Reading
-
SD-WAN and MPLS costs more complementary than clashing
An SD-WAN vs. MPLS cost comparison is not always an either-or decision. Organizations often implement both technologies to enhance network traffic performance. Continue Reading
-
SD-WAN vs. VPN: How do they compare?
When comparing SD-WAN and VPN, enterprises choosing between the two technologies should consider factors like cost, management and routing intelligence. Continue Reading
-
Use cases of digital twins for networks
Network engineers can use digital twins for design, testing, security and maintenance. But limitations with vendor specificity and a lack of standards hinder wider adoption for now. Continue Reading
-
Self-healing networks goals, benefits and how they work
With help from automation and AI, self-healing networks promise to detect, remediate and even predict network problems. But can these systems be trusted? Continue Reading
-
5 common SD-WAN challenges and how to prepare for them
SD-WAN technology has its fair share of risk factors, some of which include cost reduction and management. Find out how your IT team can prepare for these challenges. Continue Reading
-
How to build an SD-WAN RFP to evaluate vendors
There are key questions that belong in your SD-WAN request for proposal. Use them to better assess vendor features and capabilities, architecture, cost savings and PoCs. Continue Reading
-
How network perimeters secure enterprise networks
Network perimeters serve as essential network security to block unwanted traffic. Find out how they differ from the network edge and how they help secure enterprise networks. Continue Reading
-
5 steps to migrate from MPLS to SD-WAN
To migrate from MPLS to SD-WAN, you need a plan. Use these five steps as a guideline to avoid MPLS contract disasters, unexpected costs and delayed installation. Continue Reading
-
Follow these 9 steps for SD-WAN testing before deployment
Before an SD-WAN implementation, you'll want to run the system through a battery of tests to check for things like failover, packet delivery and traffic segregation. Continue Reading
-
Configure NIC teaming in Windows Server
NIC teaming maximizes network bandwidth and provides redundancy benefits. These steps guide users through NIC teaming configuration in Windows Server with GUI and PowerShell. Continue Reading
-
Top 9 SD-WAN benefits for businesses
Make the case for an SD-WAN implementation, and explore the benefits and main use cases for SD-WAN in enterprises, beyond traditional hybrid WANs. Continue Reading
-
White box networking use cases and how to get started
Rising cloud costs have prompted organizations to consider white box switches to lower costs and simplify network management. Here's what to know about white box networking. Continue Reading
-
SD-WAN comparison chart: 10 vendors to assess
This SD-WAN vendor comparison chart is a useful starting point to evaluate information about deployment options, pricing, security, cloud connectivity and more. Continue Reading
-
3 important SD-WAN security considerations and features
Device onboarding, control plane security and data plane security are three crucial SD-WAN security considerations enterprises should research when choosing an SD-WAN vendor. Continue Reading
-
The role of automation in SD-WAN
API integration, machine learning and AIOps are vital to achieve the benefits of SD-WAN automation, which include better network performance and faster operations. Continue Reading
-
4 ways to reduce network power consumption
A heavy reliance on the network can increase energy use across businesses. Here are some best practices network teams can follow to reduce power consumption. Continue Reading
-
Vendor SD-WAN labs offer hands-on testing and learning
Software-defined WANs can be confusing. Fortunately, networking vendors offer SD-WAN labs to help organizations learn about the technology. Continue Reading
-
Compare 6 major network certifications
Network certifications can span networking fundamentals to product-specific knowledge. Evaluate six certifications, and weigh factors like job roles, cost, prerequisites and skills. Continue Reading
-
Evaluate Wi-Fi mapping tools and best practices
As Wi-Fi is now a critical component of enterprise network connectivity, Wi-Fi mapping helps teams evaluate their wireless coverage. Learn the basics of Wi-Fi mapping. Continue Reading
-
How cloud-managed Wi-Fi simplifies policy and AP controls
Cloud-managed Wi-Fi provides IT groups with several benefits, including policy enforcement, network management and consistent AP configuration across multiple sites. Continue Reading
-
A guide to network APIs and their use cases
An API enables communication between two applications, while a network API provides communication between the network infrastructure -- and its protocols -- and applications. Continue Reading
-
Wireless network capacity planning and requirements
When planning wireless network capacity needs, tally your total endpoints, monitor application bandwidth usage and consider future growth. Continue Reading
-
How to use Nmap to scan a network for documentation
Nmap might be more common for security tasks, but it's also useful for network documentation and inventory. Follow these best practices to make the most of Nmap scan results. Continue Reading
-
An overview of wireless WAN
Hybrid work, modernized cellular networks, and the convergence of 5G and software-defined networking are driving factors in the maturation of wireless WAN. Continue Reading
-
Ensure network resilience in a network disaster recovery plan
A network disaster recovery plan doesn't always mean network resilience. Learn how factors like funding, identifying potential risks and constant updates make a difference. Continue Reading
-
How to set up a business Wi-Fi network
A Wi-Fi network is a business necessity, but setting it up takes skill and effective troubleshooting. Learn how to make Wi-Fi work and keep it running smoothly. Continue Reading
-
5 most valuable wireless network certifications
Wireless networking skills are in high demand. Having a top-notch wireless network certification can help networking newbies and pros stand out among job candidates. Continue Reading
-
A history of wireless for business and a look forward
This history of enterprise wireless takes you from WLAN development inside the enterprise to cellular data services outside the walls to make wireless-first a possibility. Continue Reading
-
LEO satellite communications come to Earth
Apple, T-Mobile and others are kicking off early satellite communications projects. Direct satellite communications should become available on some new midband 5G phones in 2024. Continue Reading
-
3 types of wireless site surveys and how to conduct them
Network teams can avoid signal coverage issues by performing different wireless site surveys as they evaluate new spaces, set up sites and operate the network. Continue Reading
-
16 PowerShell commands for network troubleshooting
These 16 Windows PowerShell cmdlets, including Get-NetIPAddress and Test-Connection, help network administrators troubleshoot their network environments. Continue Reading
-
Troubleshoot wireless network connection problems in 10 steps
When troubleshooting wireless network issues, several scenarios can emerge. But valuable end-user insights can help network administrators root out problems. Continue Reading
-
How Wi-Fi 6, WWAN and 5G make all-wireless offices possible
Wireless technology has evolved extensively in recent years to support end-user demands and the possibility of wireless-first network connectivity for business offices. Continue Reading
-
What's the difference between 802.11ac vs. 802.11ax?
The difference between 802.11ac and 802.11ax is significant. The two wireless standards differ notably in features such as AP capacity, spatial streams and data rates. Continue Reading
-
The 4 different types of wireless networks
The four types of wireless networks -- wireless LAN, wireless MAN, wireless PAN and wireless WAN -- differ when it comes to size, range and connectivity requirements. Continue Reading
-
How to set up a VPN for enterprise use
VPNs are nearly ubiquitous, but does your organization know how to deploy one? Learn about use cases, requirements, deployment options and best practices for VPN deployment. Continue Reading
-
CBRS vs. Wi-Fi: What's the difference?
Citizens Broadband Radio Service enables private LTE networks and supports enterprise WAN deployments. But that doesn't mean Wi-Fi is going away anytime soon. Continue Reading
-
The future of VPNs in the enterprise
VPNs have been the workhorse of online connectivity. Enhancements to software and processing power in end devices will transform how companies use the technology going forward. Continue Reading
-
How to perform VLAN troubleshooting
Common VLAN issues include physical connectivity problems, duplex mismatches, forwarding loops, unicast flooding and Layer 3 configuration errors. These troubleshooting steps can help. Continue Reading
-
Best practices for network documentation and auditing
Network documentation helps enterprises resolve problems more quickly and create more reliable networks. But documentation needs to include various components to be effective. Continue Reading
-
What is zero-trust network access? ZTNA basics explained
Zero-trust network access is touted as the solution to replace the VPN. As the potential future of network security, learn more about ZTNA, including its benefits and challenges. Continue Reading
-
What to include in a network disaster recovery plan checklist
A network disaster recovery plan should include components like documentation, emergency contacts, step-by-step procedures, provider and vendor details, backup info and more. Continue Reading
-
How to build a zero-trust network in 4 steps
While network teams are responsible for deploying the elements of a zero-trust network, security teams should also be involved in developing the overall zero-trust framework. Continue Reading
-
4 tips for network capacity planning and provisioning
To avoid network overprovisioning, teams should review baselines and roadmaps, assess limitations and consider business strategy changes when focusing on network capacity planning. Continue Reading
-
Tips to prepare for a network disaster recovery audit
Enterprises can audit their network disaster recovery plans to ensure thorough protection and preparation. Consider factors like documentation, management support and audit type. Continue Reading
-
DNS server troubleshooting for Linux and Windows
Steps in DNS server troubleshooting include checking the DNS status, looking at zone configurations and evaluating logs. Follow these best practices for Windows and Linux servers. Continue Reading
-
New data center demands reshape enterprise app delivery
Discover how modern application delivery controllers and web application firewalls can improve network provisioning processes and help secure distributed workloads. Continue Reading
-
How does SD-access work?
SD-access is a combination of two elements: SDN and the access edge. The result is a network with a centralized management system and improved security policies. Continue Reading
-
VXLAN vs. VLAN: What's the difference?
VLANs offer security and traffic management benefits but have limitations in routing and scale. VXLANs address those challenges by creating a Layer 3 network overlay. Continue Reading
-
Understanding the FTP PORT command
FTP uses control and data channels, each using a separate TCP port. Port 21 is for the control channel, and port 20 is for the data channel. Learn how these two channels are used. Continue Reading
-
Private 5G in a box simplifies deployment, mobility
Vendors are offering private 5G in a box -- a condensed and streamlined form of standalone 5G -- to simplify the complexity of typical private 5G deployments. Continue Reading
-
Wi-Fi sensing has the potential to be disruptive
With help from AI and machine learning, Wi-Fi sensing detects movement in the Wi-Fi environment. While it sounds promising, the technology still has a long way to go. Continue Reading
-
What an AI-driven network looks like
Log analysis and wireless management are common AI use cases in networking. Future applications could include chatbot alerts, digital experience monitoring and traffic engineering. Continue Reading
-
Troubleshoot name resolution on Windows, Linux and macOS
Network administrators can troubleshoot name resolution using a variety of methods, including ping, nslookup and PowerShell cmdlets. Here are some troubleshooting best practices. Continue Reading
-
Best practices for DIY network automation
Many network pros write their own automation scripts. These best practices help teams implement coding and tool set standardization, proper change management and immutability. Continue Reading
-
BGP vs. EIGRP: What's the difference?
BGP is an exterior gateway protocol optimized for routing between large networks. EIGRP is an interior gateway protocol that is well suited for routing within smaller networks. Continue Reading
-
A guide to distributed network architectures
Distributed network architectures have become popular because of their adaptability, reliability and scalability. But every new technology also has its challenges. Continue Reading
-
The role of name resolution in networking
Name resolution is essential in converting hostnames and IP addresses for network communications. Here's how the process resolves hostnames, queries servers and finds IP addresses. Continue Reading
-
An introduction to neutral host networks using private 5G
Enterprises often use signal boosters and distributed antenna systems to improve carrier signal strength. Neutral host networks over private 5G could disrupt those methods. Continue Reading
-
How to convert binary to decimal
It's helpful for network admins to know how to convert binary to decimal, and vice versa, for IPv4 addressing, subnet masks, default gateways and network IDs. Continue Reading
-
5 network virtualization challenges and how to solve them
The challenges of network virtualization include an overhaul of network architecture, thorough staff training and breaking down knowledge silos among IT departments. Continue Reading
-
How zero trust unifies network virtualization
The combination of zero trust and network virtualization creates opportunities to strengthen security policies, increase cross-domain collaboration and improve overall visibility. Continue Reading
-
What software-defined LAN means for campus virtualization
LAN virtualization has long encompassed VLANs to segment network traffic. But software-defined LAN is emerging with zero-trust strategies to provide more comprehensive security. Continue Reading
-
20 systemctl commands for system and service management
System and service management are vital to ensure customer satisfaction and service delivery. These systemctl commands can help ease those management tasks for admins. Continue Reading
-
How enterprise networks use WAN virtualization
SD-WAN is the most common form of WAN virtualization. But virtual WAN strategies are evolving to include software-defined perimeter and cloud concepts. Continue Reading
-
Network virtualization benefits in the LAN, WAN and data center
Better traffic performance, scalability and security are some of the network virtualization benefits that enterprises can realize across their network infrastructure. Continue Reading
-
The role of network virtualization and SDN in data centers
SDN, zero trust and infrastructure as code are popular forms of network virtualization within the data center, moving away from manual VLANs toward policy-driven virtualization. Continue Reading
-
Carrier network virtualization leads to enterprise services
Starting with MPLS VPNs and SD-WAN, new carrier network virtualization options, like 5G network slicing, are becoming virtual enterprise network services, and more will follow. Continue Reading
-
How network virtualization works
Network virtualization uses abstraction to isolate applications and resources from the physical infrastructure. Benefits include faster provisioning, agility and operational efficiency. Continue Reading
-
6 types of network topologies
Network topology is essential to network configuration, as it determines the arrangement of a network and defines how nodes connect. Here are six common types of network topologies. Continue Reading
-
5 basic network commands for Linux and Windows
Linux and Windows use different network commands to run tasks that are common in both environments, such as network connectivity testing. But the commands often share similarities. Continue Reading
-
Common types of enterprise network connections
The goal of every network is to connect devices. The connections that form those links -- such as wired cabling and wireless technologies -- are crucial in network infrastructure. Continue Reading
-
Power over Ethernet basics for network architects
Power over Ethernet provides a way to supply electricity to low-power devices through a standard Ethernet cable. Learn about the different standards and PoE types. Continue Reading
-
Zero trust, wireless WAN affect the future of IoT networking
Zero-trust security models, wireless WAN evolution and the emergence of pop-up businesses are all helping to fuel innovation in IoT networking capabilities. Continue Reading
-
The pros and cons of Netskope SASE
Netskope is undoubtedly a leader in the CASB market, but its limited security capabilities and lack of SD-WAN make Netskope an incomplete SASE offering. Continue Reading
-
Is it time to ditch the WAN for other connectivity options?
With the prevalence of remote work, cloud applications and internet connectivity, will enterprises ditch the WAN to save money and time? Maybe not everyone. Continue Reading
-
Private 5G deployments to advance in 2022
As commercial private 5G deployments begin to advance in 2022, private cellular networks will become a reality for many organizations in the U.S. and around the world. Continue Reading
-
NetOps automation ideas and examples
NetOps teams can hone their automation experience using these automation ideas that range from simple read/write tasks to complex automated processes. Continue Reading
-
The benefits of network infrastructure as code
Network infrastructure as code uses DevOps methodology to create structured practices for configuration changes and establish pre- and post-change testing and validation. Continue Reading
-
How to secure NetOps initiatives using Agile methodology
As more NetOps teams implement Agile methods, network and security testing must be part of a holistic approach that involves developers, networking and security teams working together. Continue Reading
-
NetOps meets DevOps concepts to tackle network problems
NetOps and DevOps are converging, due to increased use of infrastructure as code to automate enterprise networks. Shared concepts include structured coding practices and automated testing. Continue Reading
-
Configure DHCP failover for Windows Server
DHCP is a critical service, and network admins should take the time to create fault tolerance. Windows Server makes it easy to configure both failover and load balancing. Continue Reading
-
The rise of the NetOps engineer
The need for NetOps engineers with network automation and software development skills is rising with the continued drive to create more flexible networks. Find out what it takes. Continue Reading
-
Business benefits of an Agile networking approach
Enterprises that embed an Agile approach in their networking strategies could see benefits like better network performance, enhanced data security and faster rollouts of network services. Continue Reading
-
A review of Zscaler SASE architecture
Zscaler has a strong cloud-native architecture for secure internet access. But it doesn't deliver SD-WAN or converge internet access and WAN security, leaving it with only part of a SASE platform. Continue Reading
-
How NetOps differs from traditional network operations
When comparing NetOps and conventional network operations, network teams focus on automating repeatable tasks that correct problems rather than introducing new ones manually. Continue Reading
-
Why NetOps is a bridge to AIOps
As IT infrastructure grows more complex, NetOps teams should identify ways to ensure their networks remain operational and perform at peak levels. One option is AIOps. Continue Reading
-
7 steps of an SD-WAN implementation
Organizations interested in implementing SD-WAN need to collect site profiles and requirements, analyze their options, perform tests and evaluate the results. Continue Reading
-
Integrating zero-trust practices into private 5G networks
One of the first steps in deploying a technology is protecting it from potential security threats. Learn how to secure a private 5G network with zero-trust security practices. Continue Reading
-
Intro to encapsulation and decapsulation in networking
Encapsulation adds information to a packet as it travels to its destination. Decapsulation reverses the process by removing the info, so a destination device can read the original data. Continue Reading