[image] The Challenge of Monitoring a Distributed NetworkNetwork monitoring

The Challenge of Monitoring a Distributed Network

What exactly makes a network distributed? Is a distributed network fundamentally different from a decentralized network? And if they are different, how do we manage it? Even for those of us comfortable with the basics, actually implementing and…

Steve PetryschukSep 21, 2021
[image] What is QUIC? Everything You Need to KnowNetwork protocols

What is QUIC? Everything You Need to Know

When I hear QUIC, my immediate reaction is, “The QUICk brown fox jumps over the lazy dog.”…

Steve PetryschukSep 14, 2021
[image] The 95th Percentile: How to Manage Capacity Before You Run OutNetwork assessments

The 95th Percentile: How to Manage Capacity Before You Run Out

95th percentile bandwidth metering is a method to determine usage 95% of the time. Learn how to…

Rebecca GrassingSep 7, 2021
[image] The Auvik Guide to Basic Switch ConfigurationSwitches

The Auvik Guide to Basic Switch Configuration

Setting up a network switch on your own can seem like a daunting task. Use this handy guide to…

Lawrence PopaAug 24, 2021
[image] The Auvik Guide to Figuring Out What’s Hogging Your Bandwidth

The Auvik Guide to Figuring Out What’s Hogging Your Bandwidth

Knowing how to tell what users and devices are using high levels of your network bandwidth is key…

Ryan LaFlammeAug 11, 2021
[image] Using DNS Filtering to your Advantage

Using DNS Filtering to your Advantage

DNS filtering is the use of DNS to block or allow access to specific content through the use of…

Steve PetryschukAug 10, 2021
[image] Your Guide to IP Address Management

Your Guide to IP Address Management

IPAM (IP address management) is critical software to help ensure seamless connectivity and much…

Steve PetryschukAug 6, 2021
[image] Preventing Firmware AttacksNetwork management

Preventing Firmware Attacks

Firmware attacks are on the rise, so it is more important than ever to invest in firmware…

Destiny BertucciAug 3, 2021
[image] Classful and Classless Addressing ExplainedNetwork protocols

Classful and Classless Addressing Explained

The advantages of classless addressing far outweigh their complexity. But what are they, and how…

Steve PetryschukJul 27, 2021
[image] What is Hierarchical Network Design?

What is Hierarchical Network Design?

Looking for a network with scale and the highest level of performance? Hierarchical network…

Lawrence PopaJul 20, 2021
[image] Dealing with Rogue DHCP ServersNetwork configuration

Dealing with Rogue DHCP Servers

First, understand what a Rogue DHCP server is, how it works, and how it can threaten your…

Steve PetryschukJul 13, 2021
[image] Observability vs. Monitoring: What’s the Difference?Network management

Observability vs. Monitoring: What’s the Difference?

Monitoring tells you when something is wrong, while observability provides you context as to why.…

Destiny BertucciJun 29, 2021
[image] What is Network Visualization?Network topology & mapping

What is Network Visualization?

Network visualization is a map of connected links, nodes, and other data points to show network…

Steve PetryschukJun 15, 2021
[image] What is Network Optimization? 8 Reliable TechniquesNetwork configuration

What is Network Optimization? 8 Reliable Techniques

Maintaining an optimized network requires a set of tools and techniques to ensure efficient…

Steve PetryschukJun 1, 2021
[image] The What and The Why of TLS InspectionNetwork management

The What and The Why of TLS Inspection

Let’s look at what the process of a secure connection through TLS entails, how it can be used…

Steve PetryschukMay 25, 2021
[image] SNMPv2 vs. SNMPv3: An SNMP Versions Comparison TableNetwork protocols

SNMPv2 vs. SNMPv3: An SNMP Versions Comparison Table

The most significant difference between SNMP v2 and v3 is the level of security for the user on…

Steve PetryschukMay 19, 2021
[image] What is Network Congestion? Common Causes and How to Fix Them

What is Network Congestion? Common Causes and How to Fix Them

Network congestion occurs when a node carries more data than it's designed to handle. Learn how…

Steve PetryschukMay 12, 2021
[image] What is a Backplane? A Network Backplane Throughput PrimerNetwork configuration

What is a Backplane? A Network Backplane Throughput Primer

Understanding what backplane throughput is, and it’s related concepts, can help you better…

Lawrence PopaMay 11, 2021
[image] What is 802.1X Authentication?Network protocols

What is 802.1X Authentication?

Want to understand network access control, and authentication 802.1X at the base layer? This…

Steve PetryschukApr 27, 2021
[image] How to Find IP Addresses on a Network and Monitoring their UsageNetwork monitoring

How to Find IP Addresses on a Network and Monitoring their Usage

Learn how to find all IP addresses on your network with just a few commands, then map the devices…

Steve PetryschukApr 21, 2021
[image] How to Find and Fix IP Address ConflictsTroubleshooting

How to Find and Fix IP Address Conflicts

IP address conflict resolution 101 - /ipconfig release, /ipconfig renew. If that doesn't work,…

Lawrence PopaApr 20, 2021
[image] Secure IT Operations (On Demand)Cybersecurity

Secure IT Operations (On Demand)

As an IT pro, what keeps you awake at night?  🆘  Security breaches?  🆘  Network…

Rebecca GrassingApr 16, 2021
[image] Network Firewall Security: Monitoring Firewalls 101Firewalls

Network Firewall Security: Monitoring Firewalls 101

Configuring your firewall security manager is essential to maintaining the health and safety of…

Steve PetryschukApr 13, 2021
[image] What is an ARP Table?Network protocols

What is an ARP Table?

Let's peer under the hood of how ARP tables help us see data similar to the "show arp" or "arp-a"…

Steve PetryschukApr 10, 2021
[image] How to Monitor Router Traffic: 6 Router Monitoring TipsNetwork management

How to Monitor Router Traffic: 6 Router Monitoring Tips

Router traffic monitoring gives IT admins real-time insight into any potential network hazards.…

Destiny BertucciApr 9, 2021
[image] Network Design and Best PracticesNetwork configuration

Network Design and Best Practices

Trying to learn more about network design and best practices? Auvik explains how to design a…

Steve PetryschukApr 7, 2021
[image] What Is a Network Diagram?Network topology & mapping

What Is a Network Diagram?

What is a network diagram and why is it important for your business? Learn more about the…

Kevin DooleyMar 26, 2021
[image] The Importance of Network DocumentationNetwork management

The Importance of Network Documentation

The importance of network documentation becomes very clear when you have to sit down and…

Destiny BertucciMar 24, 2021
[image] What Is the OSI Model?Network management

What Is the OSI Model?

The OSI network model is an important conceptual reference used in network design and management.…

Steve PetryschukMar 23, 2021
[image] 7 Best Network Infrastructure Mapping ToolsNetwork topology & mapping

7 Best Network Infrastructure Mapping Tools

Network infrastructure mapping helps you maintain up-to-date maps for quickly diagnosing…

Steve PetryschukMar 19, 2021
[image] Networking Automation Software: Pros & Cons For 2021Network management

Networking Automation Software: Pros & Cons For 2021

As network growth increases—and complexity along with it—we’ll need efficient and scalable…

Steve PetryschukMar 17, 2021
[image] Network Throughput vs Bandwidth and How to Measure It

Network Throughput vs Bandwidth and How to Measure It

Learn everything you need to know about network throughput from the experts at Auvik Networks.…

Steve PetryschukMar 16, 2021
[image] Securing Your DNSCybersecurity

Securing Your DNS

Why does DNS security matter, and what are some security options available to help protect your…

Steve PetryschukMar 9, 2021
[image] How to Draw Network Diagrams

How to Draw Network Diagrams

Good network diagrams aren't hard to make, yet they're distressingly rare. Even network engineers…

Kevin DooleyMar 8, 2021
[image] 5 Steps to Configure Cisco AnyConnect VPN

5 Steps to Configure Cisco AnyConnect VPN

Follow these 5 simple steps to configure Cisco AnyConnect VPN on ASA firewalls for your network.

Kevin DooleyMar 2, 2021
[image] 11 Network Traffic Terms to Know

11 Network Traffic Terms to Know

Monitoring network traffic is important—but first you need to understand the basic terms and…

Steve PetryschukFeb 23, 2021
[image] What Are the Types of Network Devices?Network management

What Are the Types of Network Devices?

Understanding the types of network devices is vital to effective network management. Here, we…

Steve PetryschukFeb 17, 2021
[image] Layer 2 vs Layer 3 Network Switches: What’s the Difference?Switches

Layer 2 vs Layer 3 Network Switches: What’s the Difference?

What's the difference between Layer 2 and Layer 3 network switches and how critical are they to a…

Steve PetryschukFeb 16, 2021
[image] What is Cloud Networking?Cloud

What is Cloud Networking?

Cloud networking taps into network resource availability in the cloud and complements or replaces…

Steve PetryschukFeb 12, 2021
[image] 6 Best Network Traffic Monitor Software OptionsNetwork monitoring

6 Best Network Traffic Monitor Software Options

Some network monitoring solutions have clear usability gaps, but we found some great choices.…

Destiny BertucciFeb 10, 2021
[image] What are Network Address Translation and Port Address Translation?Network management

What are Network Address Translation and Port Address Translation?

NAT—network address translation—is an important tool for both conserving IP addresses and…

Kevin DooleyFeb 9, 2021
[image] What is Network Security?Cybersecurity

What is Network Security?

Network security is a variety of different resources, behaviors, software, hardware components,…

Steve PetryschukFeb 5, 2021
[image] 11 Types of Networks: Understanding the DifferencesNetwork topology & mapping

11 Types of Networks: Understanding the Differences

Different types of networks enable different business and personal goals. Knowing how one network…

Steve PetryschukFeb 3, 2021
[image] 10 Best Network Monitoring Tools for 2021Network monitoring

10 Best Network Monitoring Tools for 2021

Your networks should be safely monitored with the most reliable tools available on the market.…

Destiny BertucciJan 29, 2021
[image] Network Discovery Software: Pros & Cons for 2021Network management

Network Discovery Software: Pros & Cons for 2021

You can’t manage what you can’t see—when it comes to the network, you need full visibility…

Steve PetryschukJan 27, 2021
[image] Evolving Your IT Skills in a SaaS WorldCloud

Evolving Your IT Skills in a SaaS World

Here's how to evolve your IT skills as the adoption of SaaS—and XaaS (everything as a…

Steve PetryschukJan 26, 2021
[image] The Pros and Cons of VPN Split TunnelingCybersecurity

The Pros and Cons of VPN Split Tunneling

Should you use VPN split tunneling? Here's what you need to know to decide.

Kevin DooleyJan 12, 2021
[image] A Beginner’s Guide to Microsoft Power BI & Network ReportsNetwork monitoring

A Beginner’s Guide to Microsoft Power BI & Network Reports

Microsoft Power BI is a business intelligence tool that helps you visualize & analyze data from…

Annette HynesDec 8, 2020
[image] Are Network Blind Spots Endangering Your Business?Network management

Are Network Blind Spots Endangering Your Business?

Network blind spots are the things you can't see and don't know about — and they can be deadly…

Alex HoffNov 24, 2020
[image] Configuring and Troubleshooting Multicast ProtocolsNetwork configuration

Configuring and Troubleshooting Multicast Protocols

There are two important protocols required to get your network to forward multicast packets.…

Kevin DooleyNov 10, 2020
[image] 5 Reasons to Add Network Monitoring  to Your 2021 IT Budget

5 Reasons to Add Network Monitoring to Your 2021 IT Budget

Allocating money in your IT budget for network monitoring in 2021 may be more important than…

Steve PetryschukOct 27, 2020
[image] What Is Multicast Networking and How Does It Work?Network management

What Is Multicast Networking and How Does It Work?

Multicast networking is based on the concept that a single packet can be sent by a server & it…

Kevin DooleyOct 20, 2020
[image] Reducing Mean Time to Resolution With AuvikAuvik

Reducing Mean Time to Resolution With Auvik

You can streamline troubleshooting, shrink mean time to resolution & spare network users from…

Steve PetryschukOct 13, 2020
[image] Security for Humans – FIT 071Cybersecurity

Security for Humans – FIT 071

Struggling to get users to comply with your IT security practices? You might be going about it…

Jennifer TribeOct 1, 2020
[image] The Employee Offboarding Checklist for IT Pros

The Employee Offboarding Checklist for IT Pros

Somebody leaving? Keep your network & data secure! Use this handy employee offboarding checklist…

Annette HynesSep 29, 2020
[image] Special IP Address Ranges and When to Use ThemNetwork management

Special IP Address Ranges and When to Use Them

There are several special IP address ranges that have specific purposes. Network engineer Kevin…

Kevin DooleySep 22, 2020
[image] 5 Great Reasons to Store and Analyze Centralized LogsNetwork monitoring

5 Great Reasons to Store and Analyze Centralized Logs

Whether log events point to issues with hardware, applications, capacity, or security issues,…

Rod LewisSep 15, 2020
[image] Subnetting: What it is and how it Works

Subnetting: What it is and how it Works

You don't need that subnet calculator! Not when you have this handy guide to subnetting using…

Kevin DooleySep 8, 2020
[image] Getting Started With Syslog in AuvikTroubleshooting

Getting Started With Syslog in Auvik

Auvik centralizes syslog data for all your network devices, allowing you to search & filter to…

Enam RabbaniAug 25, 2020
[image] Making the Move to Windows Virtual Desktop – FIT 068Cloud

Making the Move to Windows Virtual Desktop – FIT 068

Should you move to virtual desktops? Nerdio’s Joseph Landes joins us to look at the trend, the…

Jennifer TribeAug 20, 2020
[image] How to Manage a Network: 10 Essential Steps to TakeNetwork management

How to Manage a Network: 10 Essential Steps to Take

Managing a new network? Check out this list of 10 easy to follow steps from the experts at Auvik…

Steve PetryschukAug 18, 2020
[image] The No Sweat Guide to Effective Switch Management

The No Sweat Guide to Effective Switch Management

Switches are a critical network link & switch management is an important job. Learn how to choose…

Ethan BanksAug 11, 2020
[image] Implementing a Bring Your Own Device Policy in Your OrganizationCybersecurity

Implementing a Bring Your Own Device Policy in Your Organization

A bring your own device policy is more important than ever since users can bring unsecured…

Kevin DooleyAug 4, 2020
[image] sFlow vs NetFlow: What’s the Difference?Network protocols

sFlow vs NetFlow: What’s the Difference?

Two of the most common flow protocols you’ll run into are NetFlow and sFlow, and these are some…

Andrés TapiaJul 28, 2020
Hi! Looks like you have JavaScript disabled. Please turn it on so you can see and interact with everything on our site.