Blog
Network Firewall Security: Monitoring Firewalls 101
Configuring your firewall security manager is essential to maintaining the health and safety of your network. Learn the key routines for this critical task.
What is an ARP Table?
Let's peer under the hood of how ARP tables help us see data similar to the "show arp" or "arp-a"…
How to Monitor Router Traffic: 6 Router Monitoring Tips
Router traffic monitoring gives IT admins real-time insight into any potential network hazards.…
Network Design and Best Practices
Trying to learn more about network design and best practices? Auvik explains how to design a…
Network Integration: Moving from Reactive to Proactive with Mature Processes
Learn how network integration can help you identify and solve problems quickly and move from…
The Future of IT Events: Conferences in a Post-Pandemic World
Is this the new future for conferences? Will conferences ever go back to normal? Is normal even a…
What Is a Network Diagram?
What is a network diagram and why is it important for your business? Learn more about the…
The Importance of Network Documentation
The importance of network documentation becomes very clear when you have to sit down and…
What Is the OSI Model?
The OSI network model is an important conceptual reference used in network design and management.…
7 Best Network Infrastructure Mapping Tools
Network infrastructure mapping helps you maintain up-to-date maps for quickly diagnosing…
Networking Automation Software: Pros & Cons For 2021
As network growth increases—and complexity along with it—we’ll need efficient and scalable…
![[image] Network Throughput vs Bandwidth and How to Measure It](https://907162.smushcdn.com/2195243/wp-content/uploads/2021/03/network-throughput-1800x1200-1-800x400.jpg?lossy=0&strip=1&webp=1)
Network Throughput vs Bandwidth and How to Measure It
Learn everything you need to know about network throughput from the experts at Auvik Networks.…
Securing Your DNS
Why does DNS security matter, and what are some security options available to help protect your…
![[image] How to Draw Network Diagrams](https://907162.smushcdn.com/2195243/wp-content/uploads/2015/09/effective-network-diagram-1800x1200-1-800x400.jpg?lossy=0&strip=1&webp=1)
How to Draw Network Diagrams
Good network diagrams aren't hard to make, yet they're distressingly rare. Even network engineers…
![[image] 5 Steps to Configure Cisco AnyConnect VPN](https://907162.smushcdn.com/2195243/wp-content/uploads/2021/03/configure-cisco-anyconnect-1800x1200-1-800x400.jpg?lossy=0&strip=1&webp=1)
5 Steps to Configure Cisco AnyConnect VPN
Follow these 5 simple steps to configure Cisco AnyConnect VPN on ASA firewalls for your network.
![[image] 11 Network Traffic Terms to Know](https://907162.smushcdn.com/2195243/wp-content/uploads/2021/02/network-traffic-terms-1800x1200-1-800x400.jpg?lossy=0&strip=1&webp=1)
11 Network Traffic Terms to Know
Monitoring network traffic is important—but first you need to understand the basic terms and…
What Are the Types of Network Devices?
Understanding the types of network devices is vital to effective network management. Here, we…
Layer 2 vs Layer 3 Network Switches: What’s the Difference?
What's the difference between Layer 2 and Layer 3 network switches and how critical are they to a…
What Is Cloud Networking?
Cloud networking taps into network resource availability in the cloud and complements or replaces…
6 Best Network Traffic Monitor Software Options
Some network monitoring solutions have clear usability gaps, but we found some great choices.…
What Are Network Address Translation and Port Address Translation?
NAT—network address translation—is an important tool for both conserving IP addresses and…
What Is Network Security?
Network security is a variety of different resources, behaviors, software, hardware components,…
11 Types of Networks: Understanding the Differences
Different types of networks enable different business and personal goals. Knowing how one network…
Incident Communication Is a Key Part of Resolving Network Issues
Before you turn completely to resolving a network issue, there’s another important aspect to…
10 Best Network Monitoring Tools for 2021
Your networks should be safely monitored with the most reliable tools available on the market.…
Network Discovery Software: Pros & Cons for 2021
You can’t manage what you can’t see—when it comes to the network, you need full visibility…
Evolving Your IT Skills in a SaaS World
Here's how to evolve your IT skills as the adoption of SaaS—and XaaS (everything as a…
Networks at Risk Due to Widespread Gaps in Basic Network Management Activities: Report
The Network Field Report 2021, a new study from Auvik Networks, reveals how in-house IT…
The Pros and Cons of VPN Split Tunneling
Should you use VPN split tunneling? Here's what you need to know to decide.
4 Predictions About What’s in Store for IT in 2021
IT predictions from market intelligence & research firms Computer Economics, IDC, Forrester &…
The Top 10 Auvik Blog Posts of 2020
In 2020, we published 53 blog posts about technical topics, career-building resources, and…
The Top 8 Frankly IT Podcast Episodes of 2020
What were people listening to in 2020? These 8 Frankly IT podcast episodes were the most…
How COVID-19 Changed Our Internet Habits in 2020
COVID-19 has us all spending more time in front of screens & has changed the way we use networks…
A Beginner’s Guide to Microsoft Power BI & Network Reports
Microsoft Power BI is a business intelligence tool that helps you visualize & analyze data from…
Nifty Gifty 2020 Is Back to Bring Some Holiday Cheer
For seven business days from Nov 30 through Dec 8, 2020, you’ll unwrap a cool daily gift from…
Are Network Blind Spots Endangering Your Business?
Network blind spots are the things you can't see and don't know about — and they can be deadly…
3 Key Trends From the 2020 Network Vendor Diversity Report
In the 2020 Network Vendor Diversity report, we analyzed a sample of 30,000 networks, compared…
Configuring and Troubleshooting Multicast Protocols
There are two important protocols required to get your network to forward multicast packets.…
![[image] The Big -aaS List of As-a-Service Offerings](https://907162.smushcdn.com/2195243/wp-content/uploads/2016/08/aas-as-a-service-offerings-1800x1200-1-800x400.png?lossy=0&strip=1&webp=1)
The Big -aaS List of As-a-Service Offerings
If your head is spinning with all those cloud acronyms, don’t worry—you’re not the only…
![[image] 5 Reasons to Add Network Monitoring to Your 2021 IT Budget](https://907162.smushcdn.com/2195243/wp-content/uploads/2020/10/network-monitoring-budget-1800x1200-1-800x400.png?lossy=0&strip=1&webp=1)
5 Reasons to Add Network Monitoring to Your 2021 IT Budget
Allocating money in your IT budget for network monitoring in 2021 may be more important than…
What Is Multicast Networking and How Does It Work?
Multicast networking is based on the concept that a single packet can be sent by a server & it…
Reducing Mean Time to Resolution With Auvik
You can streamline troubleshooting, shrink mean time to resolution & spare network users from…
Planning for a Post-Pandemic World as an IT Leader
IT will play a critical role in helping companies adapt to work post-pandemic. Prepare yourself…
![[image] The Employee Offboarding Checklist for IT Pros](https://907162.smushcdn.com/2195243/wp-content/uploads/2020/09/employee-offboarding-checklist-1800x1200-1-800x400.png?lossy=0&strip=1&webp=1)
The Employee Offboarding Checklist for IT Pros
Somebody leaving? Keep your network & data secure! Use this handy employee offboarding checklist…
Special IP Address Ranges and When to Use Them
There are several special IP address ranges that have specific purposes. Network engineer Kevin…
5 Great Reasons to Store and Analyze Centralized Logs
Whether log events point to issues with hardware, applications, capacity, or security issues,…
![[image] An Introduction to Subnetting](https://907162.smushcdn.com/2195243/wp-content/uploads/2020/09/subnetting-primer-1800x1200-1-800x400.png?lossy=0&strip=1&webp=1)
An Introduction to Subnetting
You don't need that subnet calculator! Not when you have this handy guide to subnetting using…
How to Use the Triple-A Framework to Optimize Your IT Services
Operationally mature IT teams use the triple-A framework—assess, adapt, automate—to focus…
Getting Started With Syslog in Auvik
Auvik centralizes syslog data for all your network devices, allowing you to search & filter to…
6 Essential First Steps When Managing a New Network
Where do you start when you're managing a new network and are looking to make a stellar first…
![[image] The No Sweat Guide to Effective Switch Management](https://907162.smushcdn.com/2195243/wp-content/uploads/2014/08/effective-switch-management-1800x1200-1-800x400.png?lossy=0&strip=1&webp=1)
The No Sweat Guide to Effective Switch Management
Switches are a critical network link & switch management is an important job. Learn how to choose…
Implementing a Bring Your Own Device Policy In Your Organization
A bring your own device policy is more important than ever since users can bring unsecured…
sFlow vs NetFlow: What’s the Difference?
Two of the most common flow protocols you’ll run into are NetFlow and sFlow, and these are some…
Making Co-managed IT Work In the Real World (From Pros Who’ve Walked the Walk)
Simplex-IT CEO Bob Coppedge & Christian Health Ministries CIO Bryan Schultz discuss what has made…
The MSP Summer Treat Wave Is Back for Another Year of Summer Giveaways
Auvik has teamed up with 9 of our friends in the channel to bring you 10 days of free summer…
Managing IT Risk When Everyone’s Working Remote
Top IT & cybersecurity experts share their advice for leaders scrambling to contend with a new…
Why a Zero-Trust Network Is More Desirable—and Achievable—Than Ever
The cybersecurity landscape has changed a lot thanks to the increase in cloud-based services, and…
3 Reasons to Use Auvik’s Remote Management Features
You can't always be on site to troubleshoot every network issue that pops up. With Auvik’s…
![[image] 4 Time Management Strategies to Boost Your IT Team’s Productivity](https://907162.smushcdn.com/2195243/wp-content/uploads/2020/06/time-management-strategies-it-1800x1200-1-800x400.png?lossy=0&strip=1&webp=1)
4 Time Management Strategies to Boost Your IT Team’s Productivity
The IT workload can quickly become overwhelming. The trick is managing your team’s time so the…
10 Computer Networking Books Every Network Manager Should Read
Get a fresh perspective on general networking, network management, network monitoring, security,…
How to Configure Syslog on a Cisco Device
Essentially every modern network device has at least some syslog capabilities. Here's how to…
How to Troubleshoot Network Connectivity Issues With Auvik
Network connectivity issues can be some of the worst to troubleshoot. But with Auvik, problems…
10 Low-Cost or Free Cybersecurity Training Resources
Want to advance your career or make the most of your team’s professional development budget?…
How to Keep IT Infrastructure Fresh and Fit for Purpose
Old, unused network devices create security risks, eat up IT time, and bloat operating costs.…