Network Operations

9K

Solutions

23

Articles & Videos

11K

Contributors

Network Operations includes asset management, help-desk supervision, security and user policies, infrastructure administration and anything else that affects the operation of your network. Discussions will include those of best practices in platforms, configurations, performance, security and accounting.

Share tech news, updates, or what's on your mind.

Sign up to Post

Can you please suggest best IT security vulnerability reporting software like hackerone which will be also cost effective.
0
How Do You Stack Up Against Your Peers?
How Do You Stack Up Against Your Peers?

With today’s modern enterprise so dependent on digital infrastructures, the impact of major incidents has increased dramatically. Grab the report now to gain insight into how your organization ranks against your peers and learn best-in-class strategies to resolve incidents.

Can you please suggest the enterprise level Firewall monitoring solution

Thanks
Naresh
0
looking for a good web filtering
I currently have websense (now forcepoint), I like that is hosted but we areneeding to renew and was wondering if there are others out there that are better such as > blue coat > Baracuda, etc.
0
what is the difference between nagios and centreon, are they technically both the same
0
How to monitor services on your network and why?
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized in this video is NetCrunch network monitor, available at adremsoft.com.
0
Network monitoring: how to automate fixing common network or server issues?
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network. This brief tutorial shows where to find this feature in NetCrunch network monitor and gives you real-case scenarios where Automatic Corrective Actions can be utilized to automate fixing common network or server problems.
0
NetCrunch network monitor live walk-through
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philosophy behind our unique policy-based approach, as well as to see the user interface of NetCrunch 9.3.
0
Hi, the title said it all. Can anyone draft me some pros and cons of stacking switches?

And is it possible to simulate this techniques in GNS3, Packet Tracer or something else?
0
How to see a live map of your network in NetCrunch network monitor
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to find this feature.
0
What makes NetCrunch network monitoring system unique?
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special.

  • It's completely agentless, but does let you create an agent, if you desire.
  • It offers powerful scalability on a single machine and requires only 4GB of RAM and 4 cores, which can be on a VM.
  • It's rule-based: it has monitoring packs, which are sets of rules for alerts. These can be applied by policy to any number grouping of nodes. This makes monitoring larger networks a breeze.
  • It has a pending alerts view, which shows you all the current problems that you have in your network instead of making you dig through the event log.
  • It's great at presenting live data. Your data can be shown on dashboards, live widgets or on custom views. On top of that, it's optimised for a multi-screen NOC room setting.
  • It supports all major operating systems and SNMP. There's also an extension protocol, that lets you write your own scripts and fit data in.
  • It comes with an embedded database so there's no requirement for additional administration or licensing.
  • There's no limit on a size or length of time to keep your performance data.
  • It runs on Windows and is very stable. Some of our clients are running version 5, which is over 7 years old!
  • It has simple, node-based licensing - just count the number of nodes you have. There's no limit on the number of elements, counters or sensors.
0
Free Tool: Path Explorer
LVL 8
Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Network monitoring: why having a policy is the best policy?
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this video is NetCrunch network monitor, available at adremsoft.com.
0
Network monitoring: why having a policy is the best policy?
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this video is NetCrunch network monitor, available at adremsoft.com.
0
Hi,

I am working on a tenable nessus audit file for ibm aix.

What i am trying to achieve is 2 compliance check on the /etc/hosts.equiv file:

1. To find all UID less that 100 and UID not equals to the default system user ids (0,1,2,3,4,5)

2. To find all GID less that 100 and GID not equals to the default system group ids (0,1,2,3,4,5)

<custom_item>
type: CMD_EXEC
description: "UID less than 100 and not system default UID"
cmd: ""
expect: ""
</custom_item>

<custom_item>
type: CMD_EXEC
description: "GID less than 100 and not system default GID"
cmd: ""
expect: ""
</custom_item>

I am really new to working with tenable and also new to aix.

Really apperciate if anyone can help me out with what i should put for the cmd and expect statement on how to make the compliance check work.

Thanks really apperciate it!

Link: https://www.ibm.com/support/knowledgecenter/ssw_aix_71/com.ibm.aix.security/passwords_etc_passwd_file.htm
0
I am setting up a linux server on a small network for people to access their files, each windows computer will have local login.
I will create logins on the linux server that will be for each individual on the network.
I will map each computer with the appropriate folders that belong to those users.
How can I handle it if someone else needs to use someone else's computer and would like to access their personal files?
Should I have 2 logins, one belonging to the user of that system and a guest of some sort but how can they get to their files easily without needing me to map the drive for them? I need simple because these are not very technical people.

thanks
0
What are the gaps / items in my outsourcing vendor (for hosting & Datacentre) that I ought to
look out for?  I'm sort of auditing them
0
Hi,

We are looking for recommendations for a network level internet filter.
At the moment, we are using OpenDNS or draytek content filter, but neither are particularly robust.

Our main requirement is that it be a network filter in the true sense, in that there is no need to install an agent on the end-user device or have to deploy proxy settings. The above filters work at the router level.

Another nice feature, but not as essential, would be to have granular controls, rather than one policy for all.

Does anyone have any recommendations?

Thanks!
0
I have five stack cisco 3750 switch in the network, and I will like to learn how to configure them.
first thing first, how can I connect to network from my pc or network so I can see the structure built?
0
I have a nexus switch that will sit behind a firewall, but during the setup configuration I am asked to configure out of band (mgmt0) management configuration (yes/no):

What shall I type "yes" or "no"?
0
Dear Experts,

The nexus switch is asking me for some configuration questions and just want to know what does it mean.

Configure Copp system profile (strict/moderate/lenient/dense): ?

What to select and what is Copp profile?

Thanks
0
NFR key for Veeam Backup for Microsoft Office 365
LVL 1
NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

is it common for IT departments to offer SLA's to internal employees of the same business? I totally understand it if your selling a service to a customer, but wasn't sure if its common to have internal SLA's with the various employees and departments within the same business? If you do have internal SLA's, is this per application, or more generic? I understand most places will have SLA for resolving calls with internal employees, but wasn't sure if its common for more top level categories such as availability / performance?
0
We have been trying to setup a tunnel between two routers.
  Routers 1 is connected to  Switch 1 through interface GigabitEthernet0/1 using a tunnel with source a subinterface (gig0/1.723).   Router 2 is connected to this Switch 1 through port 8 with an ethernet cable.  However the tunnel line protocol remains down.   Could this be a recursive problem.  What can we do?

I am attaching a file with the sections form each device that we changed.
0
Hi, I would appreciate any help on this issue.

Cisco switch 3750 that is connected to a CenturyLink home modem\wifi-router (192.168.0.1\255.255.255.0)
PC1: 192.168.0.4 \ 255.255.255.0 \ 192.168.0.61- connected to cisco. (fa3/0/5) - vlan1 = default
PC2: 172.24.164.200 \ 255.255.255.0 \ 172.24.164.1- connected to cisco. (fa3/0/6) - vlan 172

PC1 can ping PC2 & 8.8.8.8
PC2 can ping to PC1 but not to 8.8.8.8. also, can NOT ping to 192.168.0.1
I would like that PC's from vlan 172 (PC2)  will be able to 'talk' with the 192 (PC1)  network (its works now) + to be able to ping to 8.8.8.8 as well.

cisco  logs attached.
sh-ip-int-br.txt
sh-run.txt
sh-vlan.txt
0
Hello experts,

A customer of mine currently has an ASA 5506 endpoint in their central office and a remote office with an IOS router (running IOS 15.4).  They have extended ACLs deployed in a very standard way that dictate what traffic is and is not allowed through the IPSec tunnel linking the 2 offices.  All working nicely.

However- they now want to switch to using MAC addresses to filter the tunnel traffic rather than IP addresses.  I have no experience of filtering layer 2 traffic in this way so if anyone has an example they are willing to share I would be very grateful.
0
hi team
I have couple of question on packet loss
1.  what all steps we need to take for packet loss
2. what are avialbale tools for checking packet loss
3. what are possibilities  of packet loss
4. what are the parameters to check packet loss
0
Does anyone have a working config for this?
srxconfig.txt
0

Network Operations

9K

Solutions

23

Articles & Videos

11K

Contributors

Network Operations includes asset management, help-desk supervision, security and user policies, infrastructure administration and anything else that affects the operation of your network. Discussions will include those of best practices in platforms, configurations, performance, security and accounting.