Drawing a good network diagram isn’t hard to make, but it can be distressingly rare. Even network engineers with years of experience often draw network diagrams that are jumbled and hard to understand.
Because the world continues to work from home this year, I’ve had to configure Cisco AnyConnect VPNs on ASA firewalls for clients a few times. Unfortunately, the documentation from Cisco is extremely confusing, and I’ve seen a lot of organizations that do it wrong (by which I mean insecurely). The process itself is quite simple, though, so let’s go through the steps you’ll need to configure Cisco AnyConnect for your VPN.
Every industry loves its terms and jargon. Stop me if you’ve heard this one before: “I’ve always said that one of my core competencies is getting the most bang for my buck out of the sweat equity I put in during my 9-to-5.” Sure, the sentence doesn’t really make any sense, but it sounds good enough when you say it. And that’s just the point jargon tends to make. The IT industry is no different.
The term network device covers a lot of ground. Anything from a simple unmanaged switch to a dial-up modem to a UTM (unified threat management) appliance can fit the bill. Additionally, the lines between what category different networking devices fall into can get fuzzy because in many cases a single device performs multiple functions. Here, to help you sort through that fuzziness, we tackle the concept of network devices from the ground up.
A network switch is a fundamental piece of any network, so it’s critical that you as an IT professional understand the role of a switch in a properly functioning network. And to best understand the difference between Layer 2 switches and Layer 3 switches, you also need to know the difference between Layer 2 and Layer 3 in the OSI networking model.
The future is bright for the cloud. In 2019, 90% of companies were already in the cloud and this impressive amount is expected to jump another 4% in 2021. And it gets even more interesting. By 2024, more than 45% of IT spending will edge out legacy networks and replace them with the cloud. As this reality unfolds, the result will be a long-term change in enterprise IT and supplier landscapes. It also means that knowing the cloud is part of the new normal of IT. What’s helping to drive these trends?
Understanding how data flows across your network is a must for effective network management. But with network perimeters becoming more dynamic than ever before and nodes spread across the cloud, home offices, and corporate data centers, gaining the visibility you need is a challenge. There are plenty of network traffic monitor software options available that can help you address these challenges, but how do you know which is best for you?
Network address translation (NAT) is very simple in concept. As packets pass through some network device—typically a firewall, router, or load balancer—either the source or destination IP address is changed. Then packets returning in the other direction are translated back to the original addresses. In some cases both are changed at once, which is called “twice NAT” in some documentation.
Have you ever been in the middle of a breach remediation? While the first priority is handling the initial breach, after it’s resolved the priorities quickly change to mitigating future attacks. You prepare a detailed report with specific actions to take, products to consider, and changes to make to overall policies. And then a senior executive in the company asks, “Is there something I can buy to make all this go away? Some piece of software to install?
As the number of connected personal and IoT devices skyrockets across the world, the demand for high-speed, high-performance networks continues to climb and transform how people and businesses connect. Over the years, this technological growth has triggered the development of different types of networks to meet shifting demands, and it’s likely that with future technological advancement, more network topologies will continue to emerge.