All Network Operations

How to Detect DNS Data Breaches

The Domain Name System (DNS) is used to resolve human-readable hostnames like www.plixer.com into machine-readable IP addresses like 67.225.210.22. DNS also provides other information...

How to Set the Interface Utilization Threshold

Thresholds are an advanced feature available to all Scrutinizer users. When applied correctly, they can be used to automatically send notification of potential problems on...

Configure Cisco ISE NetFlow

EDIT 5/30/18: There is a newer version of this article available. In order to configure Cisco ISE NetFlow, we’re going to take advantage of...

Detecting DDoS With Netflow

In the past few months, I’ve noticed that the number of support calls we’re taking for help using our NetFlow Analyzer for detecting DDOS...

Cisco DMVPN Configuration

In my previous blog, I discussed what Cisco IWAN is, and the benefits it brings to multi-branch offices connected to an MPLS WAN. Today’s...

Cyber Incident Response Plan (Part 3)

Every day we see more and more stories about security breaches across the globe. With there being so many new cyber security threats coming...

Fortiswitch IPFIX Configuration

Today I want to talk a little about the Fortiswitch IPFIX configuration on the Fortiswitch-500. As of version 4.0 MR1 the Fortiswitch-500 can export...

Arista sFlow Configuration

Lately I’ve spoken to a few people in the field that are using Arista switches to get visibility into their networks using sFlow and...

IWAN NetFlow Support

For a while now we have had IWAN NetFlow support built into our network incident response system, which collects and reports on NetFlow, IPFIX,...

Understanding Netflow Traffic Volume

Seeing how much traffic is going over an interface is an integral part of every network professional’s daily routine. This information can be used...