The most recent content from our members.
The evolution in mobile technology has changed the way we work. Gone are the days when work was only done on personal computers. Even laptops have slowly paved way to trendy mobile phones and tablets. With a new and sophisticated device hitting the market on a daily basis with better technological supremacy, employees are…
Access control through whitelists can limit unwarranted users from gaining access to an organization’s network. But once it is found that users belong to the network, additional authorization determines what services they have access to. Even then, the possibility of a threat or a breach from a rogue within is something…
Well, it’s true! Normally tough network admin Vernon, here, is one such soul who had to check himself into IT Group Therapy. Unruly users taking advantage and indulging in malicious network activity was too much for him to handle. They sent the poor chap right off his rocker! • Endless Nagging - For more network bandwidth…
Most network admins might have faced a “finding Waldo” situation – where Waldo is an unknown device that sometimes appears in your reports or logs: in your ‘ACL Deny’ logs as using non-business applications, in your NetFlow report as a bandwidth hog, as a problematic server in the cluster, as an unapproved NAS device in…
Suspicious devices on your network? How can you track them down? You basically have two options: the easy way (my personal favorite) or the hard way. Option 1: The Hard Way The hard way involves pings, traceroutes, and ARP tables before you can actually locate and disconnect the device/user. It can be a very frustrating…
Someone in your organization is downloading high bandwidth material. You are aware of unusual spikes in bandwidth consumption, and have experience reading traffic monitoring statistics provided by your flow collection and analysis system. So you will eventually become bothered enough to dig deeply and correlate data from…
Locating users and devices in a wireless network just got easier with today's release of version 2.5 of User Device Tracker. Now you can track users and devices within a wireless network with support for wireless thin access points. This new product capability can enhance network security for any business, educational,…
Are you still crawling around your wiring closet trying to trace a rogue network device or user to a switch port? Regardless of whether your tracking users and devices in a wiring closet that looks like this… or like this.... the process can be tedious and maddening without the right tools. Almost all network admins and…
I would like to be able to add a USER field in Custom Reports to be able to keep track of changes that were made by multiple administrators.
Hello, we are currently evaluating the NCM suite. Everything works like it should but there is a small problem with the user tracking/arp cache functionality. All found MAC addresses are assigned to the router with the VLAN gateway address. But what we really need is an allocation between MAC addresses and Switchports. For…
It looks like you're new here. Sign in or register to get started.