[image] Dealing with Rogue DHCP ServersNetwork configuration

Dealing with Rogue DHCP Servers

First, understand what a Rogue DHCP server is, how it works, and how it can threaten your network. Then, techniques to prevent them.

Steve PetryschukJul 13, 2021
[image] What is Network Optimization? 8 Reliable TechniquesNetwork configuration

What is Network Optimization? 8 Reliable Techniques

Maintaining an optimized network requires a set of tools and techniques to ensure efficient…

Steve PetryschukJun 1, 2021
[image] What is a Backplane? A Network Backplane Throughput PrimerNetwork configuration

What is a Backplane? A Network Backplane Throughput Primer

Understanding what backplane throughput is, and it’s related concepts, can help you better…

Lawrence PopaMay 11, 2021
[image] Network Design and Best PracticesNetwork configuration

Network Design and Best Practices

Trying to learn more about network design and best practices? Auvik explains how to design a…

Steve PetryschukApr 7, 2021
[image] 5 Steps to Configure Cisco AnyConnect VPN

5 Steps to Configure Cisco AnyConnect VPN

Follow these 5 simple steps to configure Cisco AnyConnect VPN on ASA firewalls for your network.

Kevin DooleyMar 2, 2021
[image] Configuring and Troubleshooting Multicast ProtocolsNetwork configuration

Configuring and Troubleshooting Multicast Protocols

There are two important protocols required to get your network to forward multicast packets.…

Kevin DooleyNov 10, 2020
[image] How to Configure Syslog on a Cisco DeviceNetwork configuration

How to Configure Syslog on a Cisco Device

Every modern network device has at least some syslog capabilities. Learn all you need to know…

Kevin DooleyJun 2, 2020
[image] Next Time You Configure or Update Your Network Interfaces Use This ChecklistNetwork configuration

Next Time You Configure or Update Your Network Interfaces Use This Checklist

Our checklist covers the key things you’ll want to consider the next time you’re configuring…

Ray PatelApr 23, 2019
[image] Network Segmentation: What It Is & How It WorksNetwork management

Network Segmentation: What It Is & How It Works

Network segmentation—breaking a network into smaller chunks—improves network visibility,…

Steve PetryschukApr 9, 2019
[image] Why CloudFlare’s Latest Product Launch May Pose a Risk to Your Clients’ NetworksNetwork management

Why CloudFlare’s Latest Product Launch May Pose a Risk to Your Clients’ Networks

CloudFlare's new DNS service, launched Apr 1, has the potential to cause big network issues for…

Ray PatelApr 10, 2018
[image] Auvik Use Case: Automatically Manage Network Configuration Backups

Auvik Use Case: Automatically Manage Network Configuration Backups

Stuff happens—and not all of it can be predicted or avoided. But no matter what causes network…

Jennifer TribeNov 28, 2017
[image] Network Configuration Management: The Benefits & ImportanceNetwork configuration

Network Configuration Management: The Benefits & Importance

Configuration management is one of those network management topics people often neglect. It’s…

Kevin DooleyJun 27, 2017
[image] How to Configure IPv6 on Cisco Devices

How to Configure IPv6 on Cisco Devices

In this followup to What Every Network Admin Should Know About IPv6, network engineer Kevin…

Kevin DooleyMay 19, 2015
[image] What Every Network Admin Should Know About IPv6

What Every Network Admin Should Know About IPv6

IPv6 comes pre-enabled on a lot of network devices — that’s dangerous unless you’re in…

Kevin DooleyMay 12, 2015
[image] Network Basics: Configuring Interfaces

Network Basics: Configuring Interfaces

As a network administrator, you'll likely configure interfaces more than any other thing. Learn…

Ethan BanksJun 5, 2014
[image] Configuring Syslog and SNMP on a Cisco Device

Configuring Syslog and SNMP on a Cisco Device

There are two common ways to get management information about your network devices to a central…

Kevin DooleyApr 16, 2014
[image] Configuring SSH on a Cisco Device

Configuring SSH on a Cisco Device

SSH (Secure Shell) is a command line interactive interface, similar to Telnet, but encrypted.…

Kevin DooleyMar 26, 2014
Hi! Looks like you have JavaScript disabled. Please turn it on so you can see and interact with everything on our site.