Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
SDN essentials: Why network orchestration and virtualization?
The goal of SDN is dynamic networks, so it's crucial to understand the concepts of network orchestration and virtualization -- the keys to flexibility. Continue Reading
SDN basics: Understanding centralized control and programmability
Network engineers who want to learn about SDN basics must begin with the concepts of centralized control and network programmability. Continue Reading
Do SDN and NFV mean we don't need to buy network hardware anymore?
Learn how the roles and requirements of traditional network hardware will change as SDN and NFV mature. Continue Reading
-
Between Cisco and VMware SDN, which will network engineers choose?
In the Cisco vs. VMware SDN battle, Cisco ACI may win out among network engineers, who are more comfortable with the hardware-centric approach. Continue Reading
How SDN and NFV simplify network service chain provisioning
SDN and NFV simplify service chain provisioning, making it easier and cheaper to spin up applications in enterprise and service provider networks. Continue Reading
VMware adds NSX firewall integration with Palo Alto Networks
VMware NSX integration with Palo Alto Networks applies advanced security policies to network virtualization overlay traffic.Continue Reading
Securing from anywhere: Your mobile device VPN strategy
Virtual private networks have long secured remote users. Learn how a mobile device VPN factors into your security strategy.Continue Reading
Network programming languages Frenetic and Pyretic simplify OpenFlow
OpenFlow can simplify networks, yet the protocol itself is complex. Network programming languages Frenetic and Pyretic streamline OpenFlow SDN.Continue Reading
How many devices can one 802.11n standard access point control?
Expert Mike Jude reveals the technical and theoretical limitations of 802.11n access points as more enterprises upgrade to the new standard.Continue Reading
Rob Cannistra talks OpenFlow development on the Floodlight controller
Marist's Robert Cannistra talks SDN research and current OpenFlow development for the OpenDaylight Floodlight controller.Continue Reading
-
Is virtual networking the link to end-to-end management?
Network virtualization has lagged behind server and storage virtualization, which means “single-pane-of-glass management and monitoring” in the data center is still on the horizon. Although the advent of software-defined networking (SDN) may make ...Continue Reading
Competitors on Cisco SDN strategy: Is hardware really the answer?
Cisco competitors blasted the new Cisco SDN strategy, saying it uses inflexible hardware for software-driven networks and bypasses SDN standards.Continue Reading
WAN aggregation: Why you should consider this application delivery optimization technique
What is WAN aggregation, and how does it work? Our expert explains why all companies should consider this type of application delivery optimization.Continue Reading
Subnet basics: Must you set up Wi-Fi subnets in a single building?
Expert Mike Jude discusses the rationale of creating distinct Wi-Fi subnets in a single building.Continue Reading
Take steps to defend your network using DHCP snooping
Learn how to enable DHCP snooping to secure your network against common breaches including man in the middle attacks and ARP poisoning.Continue Reading
Aruba introduces reliable cloud-based network, Wi-Fi management tools
Aruba introduces reliable cloud-based network options to the enterprise with embedded control in APs and cloud-based Wi-Fi management.Continue Reading
Identifying and mitigating cloud computing vulnerabilities
How successful a cloud provider is in growing its business depends on its ability to dispel customer concerns about data security and privacy.Continue Reading
Mapping your wireless local area network: How to make your WLAN shine
In this essential guide, get acquainted with wireless local area network basics and uncover steps you can take to improve your WLAN infrastructure.Continue Reading
Not all OpenFlow hardware is created equal: Understanding the options
In this Q&A, Ixia's Mike Haugh explains why OpenFlow hardware support varies so much from vendor to vendor.Continue Reading
Six ways hackers try to break Secure Sockets Layer-encrypted data
Security expert Michael Gregg discusses steps enterprises should take to ensure their SSL-encrypted data remains secure.Continue Reading
Overcoming network functions virtualization implementation challenges
Carriers need network functions virtualization implementation prespecification, so they'll look to TM Forum and cloud management models for help.Continue Reading
Magic Quadrant: Network services wanted for wired and wireless networks
Enterprises want sophisticated network services for their wired and wireless networks, according to the Gartner's Magic Quadrant report.Continue Reading
OVSDB (Open vSwitch Database Management Protocol)
The Open vSwitch Database Management Protocol (OVSDB) is an OpenFlow configuration protocol that is designed to manage Open vSwitch implementations.Continue Reading
Where SDN and DPI technology meet: Centralized control and automation
When SDN and DPI technology meet, network engineers can apply monitoring and management policy to the whole network instead of individual components.Continue Reading
Upgrading the network? Don't forget the network security tools
Network security tools -- like firewalls-- must be upgraded when moving to a high-speed enterprise network in order to prevent bottlenecks.Continue Reading
IETF SDN: I2RS uses traditional routing protocols in software networks
The IETF SDN strategy relies on centralized management and distributed decision making with traditional network protocols -- departing from OpenFlow.Continue Reading
Unified network management primer
Unified network management tools provide a single user interface from which admins can manage both their wired and wireless network devices.Continue Reading
Unified network management tools: Key features, vendor approaches
Unified network management platform buyers should look for key product features and be aware of three different vendor approaches to the market.Continue Reading
OF-Config (OpenFlow Configuration and Management Protocol)
The OpenFlow Management and Configuration Protocol (OF-Config) is a protocol developed under the Open Networking Foundation used to manage physical and virtual switches in an OpenFlow environment.Continue Reading
Integrating Open vSwitch management into the OpenDaylight controller
OpenDaylight will integrate Open vSwitch management protocol, OVSDB, into its controller for the ability to provision and manage virtual switches.Continue Reading
Virtual overlay networks: Tunneling protocols enable multi-tenancy
Virtual overlay networks use tunneling protocols to extend isolated network segments between servers for multi-tenant data center networks.Continue Reading
Wide area network resiliency best practices
Learn about network resiliency best practices to keep your wide area network (WAN) services running during technical difficulties and outages.Continue Reading
IT service-level agreements and SDN: Assuring virtualization performance
With SDN with network virtualization, service providers can improve server virtualization performance and offer improved service-level agreements.Continue Reading
Rami Rahim on the Juniper SDN strategy and OpenDaylight
Juniper EVP Rami Rahim talks about Juniper's approach to SDN, the EX9200, Contrail and OpenDaylight.Continue Reading
IPv6 cost considerations
Before you make the switch to the new Internet Protcol, it's important to understand these IPv6 cost considerations.Continue Reading
SDN security strategies for network attack prevention
With a deeper level of visibility and granular control, SDN security strategies can better prevent a wide range of network attacks.Continue Reading
"Network management news, advice and technical information" RSS feed is moving!
As of July 1, the "Network management news, advice and technical information" RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://...Continue Reading
SDN promises centralized management, but we've heard this all before
SDN's promises of evolutionary changes to the industry sound eerily familiar to networking security expert Michele Chubirka. Should we believe them?Continue Reading
Understanding the relationship between SDN and NFV
SDN and NFV are not part and parcel to each other, but when the two sets of technology meet they advance each other's capabilities.Continue Reading
In mobile networks, SDN and NFV mean service orchestration
In mobile networks today, it can take months to deploy infrastructure and services, but SDN and NFV allow for orchestration and dynamic provisioning.Continue Reading
SDN and wireless LAN meet for unified network management, at last
If SDN and wireless LANs both run on a controller-centric architecture, why not combine the two for unified wired and wireless network management?Continue Reading
How network functions virtualization will revolutionize architecture
Using NFV, engineers can virtualize devices and services in large networks to make their architectures cost efficient and flexible.Continue Reading
Parsing through the software-defined storage hype
Software-defined storage can be many technologies, but most aim for decoupled software, automated provisioning and non-proprietary systems.Continue Reading
Arista upgrades 7500 for massive leaf-and-spine network architecture
With its new, high-density 10/40/100 GbE 7500E switch, Arista Networks enables customers to build massive leaf-and-spine networks.Continue Reading
Virtualization management: What you need to know about the Nexus 1000v
Cisco's Nexus 1000v platform gives network administrators some familiar tools to oversee virtual networks.Continue Reading
Defining a strategy for using virtual switches in your network
As you plan a strategy to up the number of virtual switches in your network, brush up on distributed and non-distributed virtual switch choices.Continue Reading
OpenFlow configuration protocols: Understanding OF-Config and OVSDB
OpenFlow directs network packet flows, but OpenFlow configuration protocols, OF-Config and OVSDB, form relationships between controllers and switches.Continue Reading
Network security assessment: Test firewalls, IDS in multiple ways
Network administrators need to test internal systems such as firewalls and IPS/IDS devices to ensure their networks are safe.Continue Reading
Quiz: Managing the enterprise network
This five question quiz accompanies Henry Svendblad's presentation series on managing the Enterprise Network. Test your retention of the materials Svendblad covered in his video series on enterprise network management.Continue Reading
Enterprise network management: Understanding the new IT landscape
This video explores the changing IT landscape and focuses on cloud, virtualization and service-based IT models, and managing these technologies in your network.Continue Reading
Managing enterprise networks: How to achieve IT monitoring nirvana
This video offers insight into achieving the desired state for monitoring and managing enterprise networks and explores some of the challenges IT departments may face getting there.Continue Reading
Networking Update: Cisco buys Ubiquisys, strategies for analyzing VoFi
In this week's roundup, bloggers discuss Cisco's acquisition of Ubiquisys and offer strategies for VoFi analysis and engineering firewall policies.Continue Reading
ISSU (in-service software upgrade)
An ISSU (in-service software upgrade) is a technique for updating software on a network device without taking that device offline and thereby disrupting network services.Continue Reading
Use business service management to optimize application performance
To optimize application performance in the network, many companies are using business service management software and tools to automate IT services.Continue Reading
SSL certificate management: A practical guide
Certificate management is faced by many but understood by few. This guide provides a refresher of the basics and covers common tasks.Continue Reading
How data center network fabric and SDN intersect
SDN and data center network fabrics both enable converged networking and the ability to manage many switches as one. Where do the two intersect?Continue Reading
Dell and Object Management Group to launch an SDN standards body
Dell hopes SDN standards from the Object Management Group will ensure open and fair competition -- unlike those from other SDN standards bodies.Continue Reading
Application performance monitoring tools: Three vendor strategies
Application performance monitoring tools match user transaction time to network flow information to identify problems. But APM tools differ widely.Continue Reading
Centralized vs. decentralized SDN architecture: Which works for you?
Two SDN architecture models -- centralized and decentralized -- have much in common, but key differences center on the use of the OpenFlow protocol.Continue Reading
Network functions virtualization primer: Software devices take over
With network functions virtualization (NFV), engineers replace network devices with software on basic servers for flexibility and cost reduction.Continue Reading
Software defined networking security enables granular policy control
Software defined networking introduces network programmability and granular traffic management, which could contribute to enhanced SDN security.Continue Reading
Implementing Cisco ASA tools for effective network traffic monitoring
This chapter on controlling network access explains how to implement Cisco ASA tools to ensure effective network traffic monitoring.Continue Reading
The importance of WLAN testing: From planning to documentation
This chapter on WLAN testing covers WLAN test planning and documentation and crucial testing methods for performance, security and signal coverage.Continue Reading
Infoblox launches DNS firewall and network security management
Network control vendor Infoblox expands into security with a DNS firewall and a firewall management product, and adds a branch Trinzic box.Continue Reading
Balancing wireless LAN troubleshooting strategies for BYOD
Security is only half the challenge when it comes to supporting a BYOD WLAN. The rest depends on WLAN troubleshooting to handle personal device drain.Continue Reading
Juniper SDN strategy targets BGP and XMPP-based control, service chains
Juniper's SDN strategy focuses on centralizing the management and services planes of the network, and it partially centralizes the control plane.Continue Reading
Application performance management should include packet capture
Expert Jesse Rothstein explains the importance and challenges of packet capture abilities in application performance management (APM) solutions.Continue Reading
Got IP address management problems? Think DNS, DHCP, IPAM trifecta
If your network has gotten too complicated for basic IP address management, it may be time to consider a DNS, DHCP, IPAM tool combination.Continue Reading
40 Gigabit Ethernet: The migration begins
Experts and early adopters of 40 Gigabit Ethernet share successes and pitfalls.Continue Reading
How to manage service providers on your own
IT professionals who handle global networks need to know how to manage service provider relationships. This article explains how to be your own MSP.Continue Reading
Floodlight primer: An OpenFlow controller
In software-defined networks, engineers use Floodlight controllers to manage physical and virtual devices -- and each traffic flow running between them.Continue Reading
Big data initiative essentials: Adopting analytics strategies
This guide contains what you need to know for devising big data initiatives and analytics strategies.Continue Reading
Why IT professionals hesitate to invest in an SDN strategy
Network management may drive software-defined networking investment
Cisco Nexus switches: Layer 2 configuration strategies
In this chapter, you'll learn the basics of Cisco Nexus switches and configuration of Layer 2 networking.Continue Reading
Survey: Firewall rules sprawl makes firewall policy management a mess
Bloated firewall rules are making security unmanageable and audits a nightmare, according to a survey by firewall management vendor Athena.Continue Reading
IPsec transport mode: How it works
This article explains what virtual private network (VPN) IPsec transport mode is and how it works, using diagrams, illustrations and easy-to-understand language.Continue Reading
IPsec tunnel mode: How it works
Learn what IPsec tunnel mode is and how it works across your virtual private network (VPN).Continue Reading
Wireless sniffing best practices using Wireshark
Wireless sniffing using Wireshark lets engineers troubleshoot poor performance and connectivity problems, as well as analyze traffic activity on the network.Continue Reading
How can I allow and restrict user access on my VPN client?
Rainer Enders explains how to allow certain users to access a VPN client while restricting others.Continue Reading
One bank's mobile device management software and remote desktop combo
Needham Bank IT director James Gordon couldn't turn away personal devices, so he combined mobile device management software and remote desktop for secure access.Continue Reading
How do I disable VPN passthrough? What are the pros and cons to disabling it?
In this Ask the Expert response, Rainer Enders explains how to disable VPN passthrough and what the benefits and drawbacks are.Continue Reading
Myth vs. Reality: Cloud-managed Wireless LAN
New cloud-managed wireless LAN services have many users wondering whether Wi-Fi management as a service is dependable. Wireless expert Lisa Phifer goes on a myth-busting mission.Continue Reading
Network Innovation Award: Cisco Prime for service-centric management
Cisco Prime is the winner of the SearchNetworking.com Network Innovation Award for management. Cisco Prime integrates network, endpoint and application-level information.Continue Reading
Cisco SecureX strategy gets boost with application-aware firewall
Under new leadership, the networking giant's security group relaunched Cisco SecureX with several new products, including an application-aware firewall.Continue Reading
How to optimize voice over WAN
Enterprises must learn how to architect their wide area networks in order to optimize voice over WAN environments.Continue Reading
How to use iPerf to measure throughput
Learn how to use iPerf, a network testing tool to measure throughput and benchmark your WAN links.Continue Reading
Testing FCoE and data center bridging at UNH’s InterOperability Lab
In this video Mikkel Hagen, a testing manager with UNH-IOL tells SearchNetworking.com about the work that UNH-IOL provides and the testing it is doing with data center bridging and Fibre Channel over Ethernet (FCoE) products.Continue Reading
How to calculate the cost of VPN links
Do you need to upgrade the bandwidth of your virtual private network (VPN)? Calculating link capacity will help control the cost of VPN links.Continue Reading
WAN optimization Magic Quadrant: Bandwidth management is an old hat
WAN optimization has evolved beyond bandwidth management, according to Gartner's new Magic Quadrant: Enterprises need cloud and mobile optimization.Continue Reading
Testing VDI network performance to avoid application meltdown
Ensuring VDI network performance is central to providing a good VDI user experience, so engineers must start by testing the impact of VDI on bandwidth and traffic flow.Continue Reading
Private cloud network VLAN problems: Is OpenFlow the answer?
In order to create dynamic private cloud networks, engineers will turn to software-defined networking and control planes that integrate virtual and physical switching.Continue Reading
How secure is a PPTP VPN in comparison with other types of VPNs?
In this Ask the Expert response, VPN expert Rainer Enders discusses the lack of safety associated with PPTP and offers these safer VPN solutions.Continue Reading
Mobile network management apps: Monitoring on the go
Kratos Network Solutions present network management app, DopplerVUE
Paessler AG’s iPRTG v3.0 application bids mobile network management
Extreme Networks Inc. offers mobile network management app portfolio
Solarwinds Orion NPM network management app gives network insight
iSpace and iSpace Pro put Juniper on the mobile network management map
Mobile network management applications offer monitoring on the go
As smartphone and tablet devices in the enterprise grow, vendors are developing mobile network management apps for iOS and Android, offering accessible views into the network.Continue Reading