This week I helped out some guys that were doing a bake-off of several of the new 802.11n WAPs. It was a pretty interesting set of tests and we were able to meet all of our objectives using the SolarWinds Engineer's Toolset and in some cases some pretty intuitive thinking to get around limitations with the manageability of the devices. Anyhow, as we were working on the test plan it occurred to me that there is probably some value in writing a bit about how to effectively evaluate network hardware and/or hosting a webinar on the topic.
I'd like to hear some input on it before investing too much on the topic...
I got into a conversation today about monitoring OSPF neighbor state changes so I thought I'd talk about it a little here and ask all of you if this is something that you're specifically interested in.
As most of you know, OSPF is the most commonly deployed Interior Gateway Protocol (IGP) within medium and large enterprises today. When managing an OSPF network, one of the most important things to monitor is changes to the OSPF neighbor states. This is exactly what it sounds like - monitoring how each router within the OSPF network sees other routers within the network. Some of these state changes are a normal part of the operation of OSPF, but many times a state change is indicative of a problem on the network. There are several ways to monitor these state changes, but typically it's done with either SNMP based polling and/or SNMP traps.
A really good reference for learning more about OSPF neighboring can be found here:
Is this something that you monitor today? If so, how? If not, would you like to?
We're working on some new reports for Orion/NetFlow that will provide some visibility into effectiveness of your WAN optimization devices and tactics. If you'd be interested in testing, drop me a line...
Also, anyone out there familiar with the WAN optimization products from Citrix?
Lately I've had cause to look into methods for doing a deeper analysis of NetFlow and Syslog data. While reports and graphs are good, sometimes you need to do a more exhaustive search than what is available via traditional methods. For instance, what if you suspected you were being attacked from within via some obscure protocol. Now assume that you need to search multiple databases, across several months of time. Being able to conduct a search for both syslog messages and netflow data associated with that port and/or any suspected hosts would be really helpful.
There are a couple of products out there that sort of provide "Google like" searches and indexing of this type of data. Lately I've been thinking about this as an add-on or feature of Orion.
If you've got an opinion on this, I'd love to hear it...
I'm working on a webinar geared specifically at the challenges of managing networks within the government sector and/or within the DoD.
I could use some help. If you've got any good ideas drop me a line and I'll swipe a shirt for you from the marketing department :)