The latest Intelligent Routing Platform v4.2.7 has just been released. This update...

This article gives some insights on how to set up a network traffic analysis and alerting system based on NetFlow....
Software-Defined Networking (SDN) in a Wide Area Network (WAN) - SD-WAN is a technology that simplifies management of...
Bring Your Own Device (BYOD) is a practice that allows users to bring their personal devices such as tablets or...
So far, we have discussed NetFlow configuration for network devices from various vendors such as Cisco, Juniper,...
Our previous article discusses flow-based SSH compromise detection. A force attack against SSH hosts consists of scan,...
Secure Shell (SSH) provides a secure channel over an unsecured network in a client-server model. SSH is typically used...
The Internet we know nowadays cannot properly operate without using the Domain Name System (DNS). DNS syncs up domain...
Simple Network Management Protocol (SNMP) is a well-known standardized application layer protocol, originally...
Duplication of NetFlow occurs when the NetFlow records about the same flow are exported multiple times to a NetFlow...
In our previous article we have discussed the alternative way to get flow statistics using a NetFlow generator. One of...
What is a NetFlow Generator? A NetFlow generator is a dedicated network appliance or software running on a PC and...
This is the second part of the post dedicated to NetFlow configuration. In the first part, we’ve discussed the...
One of our recent blog posts dedicated to NetFlow technology provides the necessary knowledge needed to understand...
Flow-based (NetFlow, IPFIX, NetStream) and packet-based (sFlow) network monitoring technologies enable network...
Network monitoring is a systematic effort to monitor parameters of a computer network in order to detect issues that...
The typical fully-meshed iBGP configuration of routers can become very difficult to manage in large networks. Because...