Remove Gateway Remove Protocol Remove Topology
article thumbnail

Reinforcing Networks: Advancing Resiliency and Redundancy Techniques

Kentik

Routing protocols and their impact on network resilience: The roles of IGP and BGP Let’s first dive into how routing protocols, particularly Interior Gateway Protocols (IGP) and Border Gateway Protocol (BGP) , can influence network resilience and help reduce the need for complete redundancy.

Network 97
article thumbnail

Multi-Cloud Made Simple: Announcing Kentik Observability Enhancements for AWS and Google Cloud

Kentik

Two exciting new capabilities help you quickly answer any question about your multi-cloud network: Kentik Cloud users can now collect, analyze, and visualize flow logs generated on AWS Transit Gateways. Centralized logs from AWS Transit Gateways don’t require access to flow logs for every attached VPC.

Cloud 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Certification Internet service via iPerf3

Network Engineering

These CPEs connect over a fiber-optic last-mile to the nearest Provider Edge (PE), where the gateway is configured. Attached is a topology diagram illustrating the proposed setup. Are GRE tunnels the best solution in this scenario, or would another tunneling or routing protocol be more effective?

article thumbnail

Strategies for Managing Network Traffic from a Remote Workforce

Kentik

When more of the workforce shifts to working remotely, it puts new and different strains on the infrastructure across different parts of the network, especially where VPN gateways connect to the network edge. This configuration is known as a “split-tunnel” configuration and is set up by rules to exclude specific ports, protocols, or networks.

VPN 69
article thumbnail

Resilience and Redundancy in Networking

Kentik

This includes the ability to: Dynamically adjust to changes in network topology Detect and respond to outages Route around faults in order to maintain connectivity and service levels. While redundancy is a significant contributor to network resilience, other mechanisms, protocols, and methods can also contribute to overall network resilience.

Network 52
article thumbnail

Securing Your Network Against Attacks: Prevent, Detect, and Mitigate Cyberthreats

Kentik

Cyberthreat strategies have evolved in step with modern cloud networks, often using cheap, virtualized cloud resources to exploit the threat surface topology I briefly described above. Protocol-based. These attacks overwhelm network infrastructure resources, targeting layer 3 and layer 4 communication protocols.

Network 94
article thumbnail

How to Configure Static Routes on Cisco

NW Kings

Unlike dynamic routes, learned through dynamic routing protocols such as OSPF (Open Shortest Path First) or EIGRP (Enhanced Interior Gateway Routing Protocol), static routes require the network administrator to specify the next hop or destination IP address. This feature in networks predicts and stabilizes the topology.

Routers 52