Monday, September 12, 2022

Quick Cabling Tip

 Installing and troubleshooting layer 1 is a big part of my job.

I cant tell you how many issues I resolved by simply “getting off my butt”, going for a walk (when possible) and discovering the root cause is at layer 1.


I’ve seen a ton of variations at layer 1. Here is an excerpt of what I’ve seen; dirty fiber, ethernet copper cable wrapped around a MIG welder, ethernet copper cable wrapped around a generator, fiber pinched in a door, female to female coupler coming apart, cable resting on a heater, cabling chewed through by a rodent, poor grounding on outdoor installs, cheap old cables falling apart, bashed in face plates and improperly punched down patch panels.


In this video I show you what took down a wireless access point – chewed cable. Please make sure you protect your cabling with a conduit or whatever is appropriate for the installation environment.



Wednesday, September 7, 2022

4 Tips for TAPs. The Key Usage of Permanent Monitoring

 

1. Think Outside the Network


The network manager frequently receives complaints when things on the network slow down. Usually, more links, bandwidth, and faster routers are requested. Even though the network is generally to blame for complaints, the real offender can be somewhere else.


The world in which we live is application-oriented. Marketing, sales, human resources, payroll, and benefits are all frequently outsourced to specialist third-party applications. Although the network manager has no control over how these applications operate, they can have an impact on how the network functions and how the client experience is felt in general. The user frequently blames the network even if it is lightning-fast and has plenty of capacity available if an application is taking too long to respond to a request.


Network traffic should be continuously monitored as a fix for this problem. The genuine response time problem can be easily identified if the network manager is aware of the applications being used and receives reports on application response times. Although organizations may not have direct control over application quality, with the right monitoring and analysis, they can identify the cause of response problems. Effective monitoring can prevent spending money on issues that do not exist and offer the data required to collaborate with third-party application providers to solve problems and enhance service.


2. Future Planning

Growth is inevitable. The network upgrade from last year already requires an update. BYOD allows employees to work remotely using laptops and cell phones. Demand for networks has increased due to digital change. Even more devices will be connected to the network as a result of IoT and 5G expansion. Engineering for "peak times" has been superseded by a worldwide business model requiring access around-the-clock. An increase in computer speeds, bandwidth, and a variety of other considerations now requires thoughtful planning.

Understanding the past and present is necessary for making future plans. A thoughtful study of what can be anticipated in the future can be developed with the aid of knowledge of past and present traffic patterns. With no predetermined path for future expansion, the goal is just to ease current pressure, which results in a vicious cycle of crisis management.

On the other hand, ongoing observation of traffic patterns, application usage, and device expansion can result in informative analysis that aids in the development of a long-term growth strategy. This kind of intelligent expansion planning helps decrease network bottlenecks and outages, rush charges, and create a clear route forward within established budget and performance criteria.

3. Embrace Your New Normal

This advice is vital. You won't be alert to potentially disastrous anomalies if you don't have visibility into your traffic and know what is typical. A 2022 study in IT Governance found that it takes an average of 287 days to identify a data breach. When organizations did not adapt their IT to cope with the pandemic or make other similar changes, the average cost of a breach was $5.01 million, as compared to the global overall average of $4.24 million. An intriguing observation was that 53% of breaches are found by a third party. All of this suggests that businesses are unable to distinguish between legitimate and malicious traffic.

Organizations can develop patterns and construct metrics to determine what traffic belongs on the network and what traffic has the potential to be harmful by constantly monitoring and recording all network traffic. Today's AI tools even can foresee potential issues before they do damage.

4. GIGO


Garbage In, Garbage Out is a dated computing phrase that applies here. For your network's present and future, the three suggestions listed above are essential. Continuous traffic monitoring and analysis can assist identify issue areas, plan for future expansion, and more rapidly identify potentially fraudulent traffic that could end up costing the organization millions of dollars. Traffic analysis, however, is only as good as the data fed to the tools.

Independent network TAPs offer a fail-safe connection of monitoring links to tools that provide traffic visibility and analysis. TAPs give these instruments perfectly accurate and comprehensive mirror copies of the traffic. TAPs pass all packets, in contrast to SPAN or mirror ports that could erratically drop packets during busy times or fail to pass all of the packets. Additionally, TAPs are network-independent and do not increase internal switch traffic or add latency.

To learn more about network monitoring and visibility, contact Network Critical’s expert team at www.networkcritical.com

Monday, September 5, 2022

DNS Troubleshooting?

 This video covers a troubleshooting scenario where clients experience intermittent performance issues, or as they call it, “stuttering”.


The point of the video is to review some troubleshooting best practices where we ‘validate and verify’ what we are told, document any observations, test and document your results.


So even though this looked like a DNS issue, after troubleshooting, it ended up being a routing issue. As I mentioned at the end of the video, you should always perform a “routing audit” to document, confirm and learn where packets route in your environment.



Monday, August 29, 2022

What Are Application Dependency Tools and Why Do You Need Them? (Gilad David Maayan)

 

What Is Application Dependency Mapping?

Application Dependency Mapping (ADM) is the process of building a map of application components deployed in a network and their interactions with other components or applications. The goal is to provide complete visibility of application topology, to prevent operational, security, and compliance risks.


Modern dependency mapping tools can identify and map all application instances, communication channels, ports, and services in the IT ecosystem. In a cloud environment, they make it easy to define, visualize, and modify virtual private clouds (VPCs), subnets, and security groups. These tools show an easy-to-read visual map of application dependencies, which can be used in application troubleshooting, migration planning, and incident response.


Why Is It Critical to Manage Dependencies on a Network?

In the past, software dependencies were difficult to manage and required manually downloading and installing or importing required libraries. Package managers, introduced in all popular programming languages, made this process much easier and promoted widespread use of dependencies. Almost every software project imports libraries and utilities that help perform commonplace tasks.

Because software dependencies are so widely used, they also create risks for software projects and the organizations that manage them:

  • When using software dependencies, there is no guarantee the developer of the component has properly written, tested, and maintained it.

  • Dependencies are critical for network security. Software dependencies could contain dangerous security vulnerabilities, and even if they are currently safe, they can become out of date and become exposed to vulnerabilities in the future.

  • Many organizations do not have a dependency management capability and so development teams are blind to the dependency structure of their projects.

  • Transitive dependencies can contain multiple chained dependencies or even circular dependencies, which can be difficult to manage manually.

  • Updating one dependency can break the whole chain, leading to severe maintenance issues in a software project.

  • Most of the dependencies used in modern software projects are open source third-party libraries, which makes dependency management more complex.

All these challenges make it critical to adopt systems that can manage the entire lifecycle of software dependencies.


Application Dependency Use Cases


Business Mapping

Business mapping offers a comprehensive understanding of all servers and applications on the network, including communications and dependencies. It enables organizations to accurately assess their infrastructure, identify all systems, and retire and consolidate assets.


Change Management

Modern business systems are highly complex, including many interconnections. As a result, even a minimal change can cause far-reaching consequences. Changes in technologies and processes can cause a trickle-down effect that impacts application performance, regardless of whether the changes are small or big.

Organizations must monitor and address changes quickly to ensure they do not cause downtime or other issues. Application dependency mapping enables organizations to visualize each change, its potential impact on the infrastructure, and the upstream and downstream application consequences the change might cause.


Root Cause Analysis

Organizations should strive to minimize the time from incident to resolution, as rapid identification enables faster mitigation. System failure and poor performance can quickly lead to increased churn as customers become frustrated from the poor experience. An application dependency map can help quickly detect problems, including bottlenecks, delays, service issues, and failed connections.


Proactive Incident Response

Application dependency mapping can indicate the systems and applications that might be impacted during attacks and system outages. It enables organizations to create effective incident response plans and simulations.

Additionally, it makes it easier to plan ahead, utilize techniques like micro-segmentation and micro-perimeters, or transfer data to secure locations in advance. It enables organizations to identify at-risk areas and improve disaster recovery and backup strategies to limit compliance and governance impacts.


Application Dependency Techniques

Here are three common data dependency mapping techniques:

Manual Mapping

Most data systems are too complicated to track manually, but you can use it as a starting point for small data systems you do not expect to grow. You can use various programming languages with manual mapping, including C++, SQL, Java, and XSLT. However, manual mapping requires lengthy upfront work, which is less effective than schema or automated mapping.


Schema Mapping

Schema mapping tools compare data sources to a target schema and generate connections. After creating a data map, the tool generates code to load this data. However, this is not a purely automated process.

Developers need to manually assess the software to verify the information provided by the tool is correct and then make changes as needed. This technique is usually referred to as a semi-automated strategy because it relies on manual work for double-checking the tool’s work before moving forward.


Automated Mapping

Automated solutions enable you to map dependencies without any coding experience. You can drag and drop lines between various databases to map out relationships, making this a user-friendly and relatively fast task. However, you still need to check the accuracy of the data because there is still a chance of human error.


Conclusion

Application dependency mapping is critical for ensuring the security and compliance of applications deployed across the enterprise. When tackling a new application migration project, look for an ADM solution that can identify issues and potential risks in your network architecture and help you implement reliable migration strategies. With an automated service update, it provides ongoing visibility into the IT environment's health.

Popular post