NetCraftsmen, A BlueAlly Company

NetCraftsmen, a BlueAlly Company

[email protected]
888-804-1717
  • Company
    • About Us
    • Team
    • Partners
    • Careers
    • News
  • Services
    • Consulting Projects
    • Managed Services
    • Outsourced IT Services
  • Technologies
    • Cloud
    • Automation
    • Security
    • Network
    • Compute
    • Storage
    • Collaboration
  • Industries
    • Healthcare
    • Finance
    • Energy
    • Government
  • Resources
    • Blog – Business
    • Blog – Technology
    • Success Stories
    • Library
  • Contact

Search Results for syslo

Blog
07 // 14 // 17
The Art of Network Design
How do you learn how to do network design well? NetCraftsmen does Network Assessments, as well as other types of assessments. We frequently get asked about design skills and sources [...]
Read More
Blog
06 // 09 // 17
Troubleshooting Lessons Learned
Over the years, I’ve done my share of troubleshooting. Sometimes it’s quick, sometimes … not. Along the way, I’ve learned to never underestimate my ability to assume something or overlook [...]
Read More
Too Much of a Good Thing: Troubleshooting High CPU on Core Nexus 7K
Blog
11 // 11 // 16
Too Much of a Good Thing: Troubleshooting High CPU on Core Nexus 7K
Something a bit different came up in troubleshooting the past week, something I’d like to share briefly in case it bites you. Symptom: High CPU on core Nexus 7K in [...]
Read More
Network Monitoring Top Performance Items to Watch Part 2
Blog
08 // 11 // 16
Network Monitoring: Top Performance Items to Watch, Part 2
We’ve been discussing the many things that could be killing your network’s performance – often quietly and without your knowledge. Last time, we covered the value of using the right [...]
Read More
Network Monitoring: Top Performance Items to Watch, Part 1
Blog
07 // 28 // 16
Network Monitoring: Top Performance Items to Watch, Part 1
What’s eating your network? What is (quietly) killing performance? What performance items should you be watching, but probably are not? I’m a big fan of appropriate network management data, with [...]
Read More
What Network Management Could Learn from Google Maps
Blog
05 // 19 // 16
What Network Management Could Learn from Google Maps
I’ve been enjoying working with a fairly large company with some excellent staff, reviewing network and UC management tools, processes, and gaps. All that network management tool immersion has triggered [...]
Read More
Blog
06 // 11 // 14
IOS ACL Logging Knobs and Process Switching
Edited by Marilyn Outerbridge A very cheap and effective way to perform rudimentary packet-header capturing in IOS is to use the log/log-input keyword at the end of an ACE. This is very easily done. This blog will use the following simple topology for the demonstrations. Basic ACL Logging (Default Settings)…
Read More
Blog
03 // 05 // 14
What Features Does the Nexus 9K Support?
Ever since I heard that the Nexus 9K has 50% less code, I've been wondering what features were removed from the code. So I did my best to figure it out, since I haven't seen a detailed features list from Cisco yet (early days and all that). I've also noticed…
Read More
What Is POAP and Why Aren't You Using It?
Blog
03 // 03 // 14
What Is POAP and Why Aren’t You Using It?
I get the strangest looks when I talk about POAP and ask people "Why Aren't You Using It?" Admittedly, it doesn't help that I like to pronounce acronyms like words, and POAP comes out sounding like "Pope" or perhaps "Poe-App". Perhaps it will help if I mention that POAP is…
Read More
Network Security Number 1
Blog
09 // 28 // 12
Security Mistakes That Leave You Vulnerable To Compromise #2 Failure to Record Data Flow Information
Here is my list of the top ten security mistakes that IT staff makes.  These mistakes leave your network vulnerable to attack and compromise. Mistake #2:  Failure to record flow information. 
Read More
Blog
09 // 06 // 12
Deny Equals Permit in NX-OS QoS ACLs
I was looking over the NX-OS QoS configuration information, and noted that the documentation states that the permit and deny ACL keywords are ignored for the purposes of matching in QoS class-maps. Really truly? I have found that that using both permit and deny statements in ACLs is a common…
Read More
Terry Slattery
Blog
11 // 16 // 11
Designing a Logging Solution
just found out about a great tutorial on designing logging solutions by Marcus Ranum. Marcus has been doing network security work for a long time and is well known in the network security industry. I have previously referenced some of his work in my blog Handling Network Events (syslog and…
Read More

Posts navigation

Older posts
Newer posts
This website uses cookies and other tracking technologies (also known as pixels or beacons) to aid your experience (such as viewing videos), as well as “performance cookies” to analyze your use of this website and to assist with marketing efforts. If you click the "Accept All Cookies" button or continue navigating the website, you agree to having those first and third-party cookies set on your device. If you do not wish to accept cookies from this website, you can choose to not allow cookies from this website by updating your browser preferences. For more information on how we use Cookies, please read our Privacy Policy.
ACCEPT COOKIES
Services
  • Consulting Projects
  • Managed Services
  • Outsourced IT Services
Technologies
  • Cloud
  • Automation
  • Security
  • Network
  • Compute
  • Storage
  • Collaboration
Industries
  • Healthcare
  • Finance
  • Energy
  • Government
Resources
  • Blog – Business
  • Blog – Technology
  • Success Stories
  • Library
Company
  • About Us
  • Team
  • Partners
  • Careers
  • News
Contact Us
888.804.1717 [email protected] 7134 Columbia Gateway Drive Suite 100 Columbia, MD 21046
Subscribe to our Newsletter
  • Linked In
  • Twitter

© 2025 NetCraftsmen, a BlueAlly Company

Privacy Policy