Ensuring IT networks have true visibility to performance All too often we have conversations with organisations that say that their current toolset provides them with what they need. However, invariably we have follow up discussions around untraceable performance degradation or … Read More
Single Pain of Glass
DHCP Fingerprinting is a technique for identifying the requester of a DHCP lease. This process is linked to getting an IP address on a network. DHCP Fingerprinting is performed through the analysis of the DHCP exchanged frames and their content. … Read More
Quick video highlighting how users can work with on-site and cloud solutions easily. Automated DDI is there to take away the modern problems of multi-cloud and mixed server environments.
An Approach to a Unified DDI Environment Preamble Whilst this technical write up around why a specific DDI (DNS, DHCP & IP Address Management) was chosen is a couple of years old we are seeing network refreshes starting to occur … Read More
Locate the Source of Packet Loss with a Network Analyser Packet loss is usually difficult to troubleshoot, especially when only armed with open source tools like Wireshark. Sure power users of Wireshark can be extremely effective however for the average … Read More
According to the new conditions ( https://www.ekahau.com/legal/ekahau-end-user-license-agreement) on the Ekahau site which was revised on April 9th, 2019, there could be some challenges to come with the way users license their Ekahau Survey installations. 2. Grant of License. Subject to … Read More
Wi-Fi Lifecycle Support What a great event. So many good speakers and our presentation at the Sydney Wi-Fi Design Day (#wifidesignday) seemed to go down well. Everything from WPA3 standards to Wi-Fi6 and associated demos, the Design Day this year … Read More
How can you troubleshoot your network issues and improve its security with a limited budget and a laptop?
Network issues and security problems can happen at any point, particularly when you are not prepared to respond appropriately and fast. To investigate these issues, you’ll need access to your network for 100% visibility of what is causing the problem. … Read More
With the increasing reliance on wireless with Wave-2 802.11ac and now 802.11ax (or Wi-Fi 6 as it is being called) there is a good migration checklist for organisations who need Wi-Fi environments to perform and not just exist. This original … Read More