Thursday, August 4, 2022

Blast From the Past.. Big Game Hunting

 This was one of my rants about the dilemma analysts face when they buy a tool and can't find any errors. This is over 10 years old and funny how this issue still exists.

https://youtu.be/S-HctjOJznQ

Tuesday, August 2, 2022

The Key to Strong Network Infrastructure

 

Developing your network architecture is similar to constructing a building. Start with the foundation and work your way up. The foundation of your network is, of course, visibility. First, you need to access all the traffic flowing through the network. The emphasis will be on network TAPs as the fundamental component in this discussion because they are independent of network switches and can observe all data moving across the links. All of the traffic on those links in both directions will be available after the TAPs have been installed in the network links. Notice that introducing TAPs won't affect the availability or dependability of the network. TAPs consequently become the cornerstone for visibility.


Although this bottom-up plan sounds obvious, oftentimes the plan starts on the top floor of the building. The network architects and planners frequently have the higher-level applications offered by the network tools on their minds. Without much consideration for how they will be connected to the network, the tools are budgeted for and purchased. When this occurs, networks frequently follow a rabbit-hole-like evolution where one purchase corrects or improves an operation from a prior purchase. All of the tools are functional, though perhaps not as effectively or cheaply as they could be. Starting with the end in mind is crucial, but it's also critical to consider how the changes will impact the network ecosystem.


One of the fundamental tasks of network management is monitoring. The manager can observe what is happening and look for potential bottlenecks and areas where traffic might be improved. For instance, a bandwidth issue is frequently an application performance issue. There are specialized tools to assist in locating and fixing these problems. Information security and network protection are also crucial challenges. Threats are not only ongoing, but they also constantly changing. It is clear that before choosing certain technologies, maintaining and safeguarding networks takes some strategy and a blueprint.


A smart place to start is by planning TAP connectivity to links. Network TAPs can have numerous ports and won't slow down or disturb the network. Not all ports need to be active at deployment time. As a result, framing your visibility approach has become much simpler with a TAP basis. Traffic monitoring tools can provide crucial information once ports are installed, allowing additional decision-making. Now that connectivity, monitoring, and effective traffic allocation to prospective instruments are in place, other elements of the plan can be constructed. Upgrading applications, compliance, performance, and security tools will take less time and cause minimal network disruption.


Visibility foundation is the key to a strong and larger network strategy and defense against malicious attacks. For the network to operate efficiently, daily analytics and management require a comprehensive visibility approach. While there are many specialized tools required to understand and protect network traffic, they can be deployed efficiently with the proper foundation. For more information, ask the experts at Network Critical.

Thursday, July 28, 2022

Packet Pub Quiz Video Answer - Proper TCP SYN Response

 First thing I want to do is thank everyone who came out to the virtual pub quiz events at www.coreitpros.com/quiz.


I thought it would be helpful to pick some questions, explain the answers and possibly show you a few tips or tricks along the way. The statement in the quiz was “The appropriate response to a TCP SYN is ____” and the correct answer is SYN ACK.


I think the word “appropriate” may have thrown some people off. When I say appropriate I mean a successful connection because the connection request might fail.


In this video I will show you how to prove or disprove the answer.



Tuesday, July 26, 2022

Real-Time Network Visibility Improves Data Protection Policies.

 Is well known that organizations need security and monitoring tools to detect potential threats and immediately alert the security team on suspicious activity that could indicate a data theft attempt. However, to do it effectively, network visibility solutions are needed to analyze the traffic in real-time.




Optimize your security with real-time visibility of your traffic.

A TAP (Test Access Point), also referred to as an Ethernet or network TAP, is a straightforward device that copies every bit of traffic that moves between two network endpoints. This dependable technology supports inline security technologies including web application firewalls (WAF), intrusion prevention systems (IPS), and advanced threats protection (ATP). When deploying these devices, it is essential to make sure that traffic keeps flowing even if the devices are offline in order to maintain access to the crucial business services.


Therefore, Inline Bypass TAP is the first layer of defense needed to protect your network against attacks. Supporting failsafe technology and heartbeat functionality, Network Critical’s Bypass TAPs will provide complete visibility into the network traffic and optimize your traffic analysis and security tool performance. You can now, remove single points of tool failure by providing multiple layers of resiliency with the Bypass Technology. Network Critical’s V-Line TAP can be deployed in different modes that adjust to the company’s needs. Read more at www.networkcritical.com/bypass-taps.


Companies of all sizes can safeguard their data by continuously monitoring traffic as it passes through the network. Security leaders can use these insights to effectively handle sensitive data and get ready for new and emerging compliance standards.

We all rely on vast volumes of personal information to secure the success of our consumers and companies, whether we are a retailer, financial institutions, utility, government organizations, or manufacturers. The first step in protecting your sensitive data, and treating it accordingly is knowing where it is, where it comes from, and where it is going.


Learn more about network traffic visibility at https://www.networkcritical.com/network-visibility and become an expert on your network!


Friday, July 22, 2022

Packet Pub Quiz Answer Video - LLMNR only runs over IPv6

 First thing I want to do is thank everyone who came out to the virtual pub quiz events at www.coreitpros.com/quiz.


I thought it would be helpful to pick some questions, explain the answers and possibly show you a few tips or tricks along the way.


The statement in the quiz was “LLMNR only runs over IPv6” and the correct answer is FALSE. LLMNR runs over both IPv4 and IPv6, but don’t take my word for it.

In this video I will show you how to prove or disprove the answer.



Popular post