Cisco Certified 20 Years

Container Networking 101: Docker Networking

If there’s one thing a networking person should probably know about containers, it is of course container networking. I’ve been self-educating on the topic, and I’m finding container networking a complex topic, with variations depending on the tools in use (I’d like a scorecard summary!). For what it’s worth, some blogs I’ve seen indicate that […]

Continue Reading
sd wan vs wan acceleration

WAN Optimization vs SD WAN Networks. Today’s Challenges & Difficulties for WAN Optimization

Enterprises have been successfully running WAN optimization appliances at their many distributed sites for years. The devices have done a good job of helping businesses squeeze as much capacity as possible out of their WAN links and to improve performance across low-bandwidth, long-distance network circuits. WAN optimizers were a boon to telecom budgets when network […]

Continue Reading
Cisco Certified 20 Years

Fifty Shades of Cloud

Networking professionals need to become aware of networking within the cloud(s), and from cloud to users and customers. Cloud here could mean public cloud or SaaS. “Within the cloud(s)” might be between different cloud providers, or between VPCs (Virtual Private Clouds) on one provider. We need to provide good performance and reliability to internal and […]

Continue Reading
new cisco certification paths Feb 2020

Major Cisco Certification Changes – New Cisco CCNA, CCNP Enterprise, Specialist, DevNet and more from Feb. 2020

Cisco announced a major update to their CCNA, CCNP and CCIE certification program at Cisco Live last week, with the changes happening on the 24th  February 2020.   CCNA and CCENT Certification The 10 current CCNA tracks (CCNA Routing and Switching, CCNA Cloud, CCNA Collaboration, CCNA Cyber Ops, CCNA Data Center, CCNA Industrial, CCNA Security, […]

Continue Reading
Cisco Certified 20 Years

Making ACI Configurations Consistent

This posting is a small update to the Cisco ACI section in my previous blog titled About Network Design Principles. How can one achieve consistency of ACI configuration? Why is this a concern? In doing network assessments, I frequently compare configurations. I use a “golden config” and NotePad++ (Windows) or DiffMerge (Mac) for side-by-side comparison […]

Continue Reading
netflow analyzer traffic

NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration & Optimization Windows – Linux

In our previous article we explained how a Netflow Analyzer can help you gain visibility into your user traffic, application traffic and data flows while at the same time analyze traffic patterns, detect unusual traffic, verify bandwidth availability, detect Quality of Service (QoS) problems and a lot more. In this article we will introduce Network Analyzer […]

Continue Reading
Six Tips to Help with Your Next Configuration Audit

Six Tips to Help with Your Next Configuration Audit

In the modern enterprise, configuration audits are central to managing an efficient and up-to-date network. Configuration audits – whether functional or physical – help NetOps ensure that their increasingly complex, multi-system, multi-standard enterprise is validated properly and running like a top. Here are six tips for making your next configuration audit error free and easier […]

Continue Reading
netflow analyzer intro

Netflow: Monitor Bandwidth & Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more

Monitoring network traffic & bandwidth usage via Netflow is mandatory for any type and size network. Gaining visibility into user traffic, application traffic and data flows allows network engineers, administrators and security specialists detect bottlenecks – network congestion, unusual traffic patterns, monitor SLA agreements with providers, verify bandwidth availability, detect Quality of Service (QoS) issues, […]

Continue Reading
Cisco Certified 20 Years

Does Security Belong Near Endpoints?

For a while now, I’ve been mulling over security architectures. I’ve started wondering if security really belongs on or near endpoints (users, servers, VMs). And are firewalls obsolete? We need to make a distinction here. I rarely see edge firewalls as a problem. Internet speeds are just generally not that challenging for firewalls. Currently, anyway, […]

Continue Reading
how to secure your sd-wan

How To Secure Your SD-WAN. Comparing DIY, Managed SD-WAN and SD-WAN Cloud Services

With so much enterprise network traffic now destined for the cloud, backhauling traffic across an expensive MPLS connection to a data center to apply security policy no longer makes sense. Software-defined WANs (SD-WAN) promise lower transport costs with direct, higher-performing connections to cloud and Internet resources. But what are the security implications of moving traffic […]

Continue Reading