All
jeff

Wildcard Mask Filters Within Scrutinizer

While working with users, I’ve noticed scenarios where filtering traffic based on a CIDR or an IP range just isn’t enough control. I wanted...

traci

Extreme NetFlow Configuration for S-Series, N-Series, and K-Series

We’ve seen a lot of coverage regarding the growth of Extreme Networks lately. Between their recent acquisition of Brocade and Avaya, it would appear...

users are the weakest link

“Users are the weakest link” is an excuse

Users are the weakest link. How many times have you heard that? Better question, how many times have you said it yourself? We can...

mikelp

Internet Use Policies: Do Your Employees Even Know What is Acceptable?

I bet you’ve ordered something online at work. It may have been pizza for your lunch or flowers for Mother’s Day (…the day before—hey,...

joanna

Ixia IPFIX Reporting and Analysis

Recently, we decided to deploy an Ixia CloudLens instance in our lab to see what we could report on using Ixia’s IPFIX. Once I...

You can’t stop Malware claims Yahoo CEO

Despite the hundreds of billions spent by companies over the last several years, malware continues to infect our networks, sabotage our systems and steal...

scottr

Configuring Flexible NetFlow to Monitor Network Activity

Over the past few weeks, I have taken a number of support calls from customers who were looking for help with their Cisco router...

annam

How to Configure NetFlow on Cisco UCS via GUI

Today, I will be talking about Cisco UCS NetFlow configuration via GUI, including its limitations and differences compared to the configuration via CLI. I...

microphone

There Are A Thousand Apps Listening

Let’s consider a hypothetical scenario. An entity you know nothing about has the power to listen to everything you say, and you have no...