This Week’s Five is a weekly column of five interesting reads from all over the web.
This week we bring you a view of all that has created a strong buzz in the IT Security world! Read on to learn more.
How secure is your BYOD policy?
The Ipsos-Mori survey found that 73 percent of respondents in the United States are downloading personal software and apps onto corporate-owned tablets. These might be productivity-killing apps, cloud-storage apps or worse. But you knew that, right?
How over-sharing is not caring?
Reaching thousands of customers on Facebook by dashing off a quick sentence and hittin…
Cast your vote for ManageEngine Firewall Analyzer which is nominated for the Best Security Information Event Management (SIEM) Solution in the SC Awards 2013 US – Reader Trust Categories.
Visit http://bit.ly/O8hUNn to vote for us. Voting ends Oct. 26!
Your vote will make our day. VOTE TODAY!!
I hope everyone who had attended our joint webinar with Cisco about QoS Design and validation, would have got a better idea on how to design a network with effective QoS policing. For those who missed the Webinar, you can find the video presentation here.
In continuation to our Webinar, this blogs helps you in setting up QoS policies for Live Video Traffic and monitor them using NetFlow Analyzer.
On a network the Video traffic spread in three format:
Video On Demand
Video traffic has very high and extremely variable packets rate with a much higher average maximum transmission unit (MTU) when comparing to Voice.
For classifying the Video traffic to appropriat…
People using NetFlow Analyzer wonder, what these reports DSCP, TOS actually means ? Here is the blog which explain more detail about these fields.
The NetFlow packets exported from the device originally contains ToS value on each flow. From the ToS value, the analyzing software derives the DSCP.
Type of Service (TOS):-
The Type of Service field is present in IP Header and it was originally defined in RFC 791.
The Type of Service octet consists of three fields. The last 3 bits ( 7,6,5) are for the first field, labeled “Precedence” , intended to denote the importance or priority of the datagram. The second field, labeled “TOS” , denotes how the network should make tradeoffs between thro…
Cost-effectiveness is the common term that we are hearing or seeing nowadays and this exists in all forms on the globe, In this tough economic situation the motive of Network Administrator should be optimizing the current infrastructure for future accommodation.
Optimization plays a major role when it comes to distributed network architecture or MPLS network. Most of the complaints from users at each location , Application usage is very slow at business hours, Ofcourse the possible reason might be due to other unwanted traffic consuming large amount of bandwidth over the business critical application.
We will have scenario based explanation to elaborate this problem of Network Administrator:
In most of the Corporate networks, the common problem seen over decades is that application performance worsens during business hours. Network Admin managing the corporate network faces the huge task of finding out what is causing the slowness in accessing the application hosted on a remote data center.
The application performance can degrade due to following reasons:
Application installed server is not good enough (Related Hardware).
Bandwidth availability is less when accessing from remote office
The first point can be troubleshooted using our ManageEngine tools like ManageEngine OpManager and ManageEngine Application Manager. We will concentrate on the 2nd Point which is our focus area, since …
Both Cisco 6500 & 7600 serve as Core devices on a network to distribute large amount of traffic. The high volume of packets and packet rates of traffic on some device links which leads to more utilization of CPU and memory for performing traffic analysis in this scenario. One solution to avoid this problem is sampling. Sampling defines that instead of every packet, 1 out of N packets (where N is the sampling rate) is captured and sent to the NetFlow Analyzer for traffic analytics. Based on the information in 1 packet, the traffic pattern for the rest of the packets is constructed.
The sampling rate is indicated in a header field of NetFlow version 5 (same sampling rate for all i…
Our previous blog was about various alerts in NetFlow Analyzer. In this blog we will discuss the alerting mechanism in NetFlow Analyzer.
Network Administrators managing any corporate network would very well know the average bandwidth utilization of their critical server. A web server hosted on a network is often a target for attackers especially when there is heavy traffic from various offenders, the bandwidth utilization of web server will surpass acceptable threshold levels. The Administrator needs an alert when this anomaly occurs on the network. This is where NetFlow Analyzer Alerting mechanism comes in handy.
In the earlier versions, the IP grouping feature of NetFlow Analyzer was used in which t…
How to identify a network link that is down or abnormality? Simple! An alert in your Bandwidth Monitor’s UI or an instant email to tell you that your network link needs immediate help from you, the network administrator. The alert mechanism is almost one of the top priority feature that is looked for while deciding on a bandwidth monitor.
NetFlow Analyzer is called as a complete bandwidth monitor tool for it can monitor traffic, analyze , generate report and also alert you in case of any abnormality in your network traffic. In this blog we will discuss about the alert features that NetFlow Analyzer as a bandwidth monitor tool has to offer.
NetFlow Analyzer allows you to configure alerts and set threshold va…
To secure your IT network, you need an efficient Firewall. To make the Firewall efficient, you have to tune it properly. But, even when you configure the Firewall to tune the performance, you have to be cautious. Check the configuration changes at every stage. Look out for conflicts. Audit the users involved. Overlooking any of these will lead to a gaping hole in the Firewall, which will in turn make your network prone to vulnerability.
There are enough stories available in the industry. In many companies, because of a critical configuration change, there were instances businesses got disrupted for long hours. Subsequent loss of time to find out what went wrong. So, the sure short way to avoid all these losses a…