Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

What is an Access Control List (ACL)?

A commonly used tool at the Cisco command line is the access control list (ACL). At their simplest, access control lists are collections of IP addresses that are used by a router, switch, or a firewall to identify network traffic that must be handled in a special way. Cisco and other network vendors use ACLs for many different purposes. This article focuses on IOS access control lists as used on Cisco routers, although much of this discussion applies to Cisco switches as well.

Transforming Education and Government IT and Cloud Environments

State, local government, and educational institutions have unique IT requirements and regulations that traditional commercial organizations don’t face. From specific IT budgeting processes to strict compliance, public sector organizations are constantly forced to maximize every IT resource in their complex IT environments.

SNMP monitoring solution: Significant monitoring insights in a click

Simple Network Management Protocol (SNMP) is a networking protocol that aids in the transfer of data among devices, thereby managing and monitoring devices present in the internet protocol network. Networks have an array of devices connected to them, and new devices get introduced to them as trends in technology evolve. These new devices are often used to simplify complex processes but end up complicating simple networks.

The Importance of Network Insights in Achieving Full End-To-End Observability

When we talk about observability, we tend to focus first and foremost on the metrics, logs, and traces that you can collect from applications – such as request rates, error rates, and request duration. Infrastructure-level metrics, like CPU and memory utilization, might factor into the discussion as well. Here’s a third category of critical observability insights that teams tend to overlook: the network.

Cloud 66 Feature Highlight: Web Application Firewalls (WAF)

(Network Features - Part 2 of 3.) Web Application Firewalls (WAF) WAF is an HTTP-level firewall that protects your application against well-known attacks and exploits. Using WAF, you can block traffic to your applications from certain origins and detect and block specific attacks from reaching your application.

How to measure the performance of a website

If you’re a person who works from home, you almost certainly have to deal with occasional internet connection issues. More often than complete outages, you’re likely dealing with occasional slowness. And you know from experience that any one of dozens of devices and services along the path can cause latency.

Beyond Zero Trust: What is Continuous Security Validation?

Continuous security (or control) validation helps me explain network security with one of my favorite analogies. Network security is like jiu-jitsu. You have no idea how strong your defenses are if you’re not rolling (sparring) regularly. Let’s take a closer look at continuous security validation, and explain why, just like jiu-jitsu, you need to keep your system in practice to keep it sharp.