Packet Pushers Heavy Networking Podcast

Packet Pushers Heavy Networking Podcast

NEW Heavy Networking 624 Podcast: Solving Network Problems With NMIS

The latest Packet Pushers Heavy Networking 624 podcast is out, feat. IT Network experts Keith Sinclair, NMIS founder, joining Greg Ferro from Packet Pushers. They’ll discuss; 
  • NMIS capabilities for network management and monitoring
  • How to disaster proof your Network and operate at maximum efficiency
  • Latest Product features incl. Enterprise Service Monitoring
  • Future proofing your business with Operational Process Automation (OPA) against the great resignation
  • The NMIS product pipeline and how the market is changing
  • Real-world cases on how Opmantek’s solutions can save your team time & resources – Hear more below!

Book a Demo

Listen to the Podcast Now!


Podcast: (47.52 MB)


For all this and more, fill out the form and book in today.
[Case Study] BG Unified Delivers 100% Network Uptime to Clients Using Opmantek

[Case Study] BG Unified Delivers 100% Network Uptime to Clients Using Opmantek

This Case Study covers how we help organizations to deliver 100% network uptime to their clients and show them how to leverage more insights into the projects they’re working on. The following case study details actionable guidance that strengthened Infrastructure, Security, Networking, and Voice technology experts BG Unified’s capabilities. Download the asset below.

Key Points:

Who

The BG Unified Solutions team consists of experts in different technologies like security, voice, load balancers, WAN, WAN optimization, Cloud, and Cisco Technologies. As experts across different technologies, their focus is to provide competitive, affordable and Unified Solutions to our clients.

Challenge

BG Unified is a business that is built upon their clients trusting in the services that are delivered, whether that is infrastructure, backup, email, database or platform as a service, Saurabh Sareen (Sunny), BG Unified Solutions Co-Founder and Managing Director, aims for, and delivers, 100%uptime to his clients.

Situation

“My services include petabytes of storage, over 200 terabytes of RAM, premium DNS and much more. These are premium products that my consumers rely upon, they are highly secured and I don’t tolerate downtime so I do everything I can to ensure that remains true” says Sunny. “Any service we deliver is managed and delivered from multiple locations and this ensures that if any node or cluster goes down, the service remains up,” says Sunny, BG Unified Solutions Co-Founder.

Get the Case Study

Concerned with Log4Shell or Log4J Vulnerability?

Concerned with Log4Shell or Log4J Vulnerability?

Every Christmas for the last while we have been getting security alerts, last year we got the issues with Solarwinds and this year we got Log4Shell/Log4J CVE-2021-44228 with a CVSS score of 10 (the highest score).

 

Is the Log4Shell or Log4J vulnerability an issue for Opmantek?

No. Opmantek products do not use Java or Log4J, see more details here: Opmantek Products and Apache Log4J Vulnerability.

What is the Log4Shell Vulnerability? 

The Log4Shell is a zero-day vulnerability in Log4J, which allows attackers to execute arbitrary Java code on the remote computers, including accessing sensitive information.  The CVSS score is 10, the highest possible score.  You can read more details here: Log4Shell – Wikipedia.

 

What is Apache Log4J?

Apache Log4J is a popular library used by many products written in Java.  It provides a consistent way for applications to log messages including information, debug, errors, etc.  It has become the primary way Java applications do logging and is widely used.

 

How can Opmantek help you find computers that are using Log4J?

Log4J is a Java library which means that there are files installed onto the computer which Java loads when it runs the program.  You can search for these files using Linux commands and determine if the files exist on the server.

 

You can find a handy How-To guide here: Using opConfig to Detect Log4j on a server


The Log4Shell vulnerability is a serious one and should be treated as such.  Opmantek’s software is not vulnerable to Log4Shell, and if you are using Opmantek software you can use opConfig to assist you to find the computers which need to be patched.

 

How to stabilise & audit using network configuration and compliance monitoring

How to stabilise & audit using network configuration and compliance monitoring

What is Network Configuration and Compliance Monitoring

Network Configuration and Compliance Monitoring (or NCCM) is a system that works closely with all devices in a set network, transmitting and receiving data from a wide range of devices to ensure that everything is acting in a compliant manner. In addition to this, NCCM can ensure that your devices are configured correctly, and in the case that they are not, can schedule reconfigurations at a time that is convenient to the user.

Automating NCCM processes is often required because companies often have thousands of devices that cannot be handled manually, making the entire process far simpler and more accurate through automation. One example of an NCCM is Opmantek’s “NMIS”, a network management system designed to offer comprehensive information to network engineers to assist in the diagnosis and resolution of network problems.

Change detection and rectification

When dealing with a device configuration, there are relatively few commands that you need to be aware of to know exactly how it is set up. In theory, by remembering these and applying them to a new device, it should act identically to the previous one. When these configurations change and nobody is informed, however, it can become incredibly difficult to replace the device should it become faulty.

By implementing effective change detection, which discovers any configuration adjustments in a device, you can stay on top of all of your device configurations and replace them with ease. Additionally, you can receive alerts to let you know of every configuration change, and how many times the configuration has changed. This change detection can be used with products such as “opConfig”, which processes and records configuration changes across entire networks.

Device configuration changes

The configuration backups are all saved without restriction, so reverting to any previous configuration is incredibly simple. Your NCCM can keep hourly backups of your configuration settings, allowing you to revert a previous device, router or switch to a previous version when the device was working as intended. This will either resolve the issue or inform you that the issue is likely with the hardware in use (in which case you can simply install new hardware with the successful configuration in place).

Servers and network scanning

In addition to tracking the configuration of your devices, it’s also possible to use an NCCM as a performance tracking tool. By performing automated network management, the system is also taking in significant amounts of data, including the levels of packet loss within servers over a set period of time. This can help you in an audit to establish whether the performance of a particular server is degrading. If the performance declines, you can compare this data with configuration changes to ensure that your network is using the optimal settings, and resolve the issue without having to go through a more thorough investigation of your network. The data is already collected and ready to be analysed.

Try Opmantek’s products

If you’re interested in Opmantek’s range of products and would like to learn more, listen to Packet Pushers’ episode with Keith Sinclair, or contact us today. We are proud to offer effective solutions to IT departments, providing meaningful and actionable data to assist in the troubleshooting process.

[Case Study] Nextlink Takes Network Management to the Next Level with Opmantek

[Case Study] Nextlink Takes Network Management to the Next Level with Opmantek

This Case Study covers how we take organizations from reactive to proactive with the ability to scale and leverage more insights into the projects they’re working on. The following case study details actionable guidance that strengthened internet service provider Nextlink’s Network Management capabilities and took them to the next level. Download the asset below.

Key Points:

Who

Nextlink Internet is an internet service provider delivering high-speed internet and voice services throughout Texas, Oklahoma, Kansas and Nebraska. Since 2012, Nextlink has become one of the largest wireless internet service providers in the nation. 

Challenge

Nextlink wanted to improve the stability of its automated provisioning system as well as its network. Nextlink’s previous monitoring system would send an alarm if one of the previously configured rules was triggered, but it didn’t provide the solution that they were looking for.

Situation

“Our fast-paced operations are growing every day, so we need something that can grow with us,” said Jordan Long, Director of Network Operations, Nextlink. “We wanted something that would not just assist with our operations center, but an automated solution that would monitor for issues throughout our platform, automate the troubleshooting tasks and make configuration changes when an alarm was raised. We also wanted a solution that could share data about our operations to drive new projects.”

Get the Case Study

Why Configuration & Compliance Management Is Crucial

Why Configuration & Compliance Management Is Crucial

Network security is of paramount concern for all businesses in 2021 and beyond, one facet of network security that should be at the forefront of most organizations is Configuration and Compliance Management.

Creating and enforcing configuration and compliance management ensures that all your network devices are configured to meet your organisation’s standards and requirements. It also encapsulates all connected devices and helps identify potential risks.

The average cost of a cybercrime attack on an Australian business is $276,323. It then takes a company an average of 23 days to recover from an attack, this stresses the importance of having configuration and compliance in place. Simple processes for opConfig involve backing up all configuration data of your network devices, comparing configuration between your devices, and creating events when configuration changes. When it comes to recuperating from an attack or fixing the problem caused by a breach, heavy losses of time and money are a continual variable amongst many businesses, these are reduced by using opConfig if they occur at all.

Unauthorised devices, installing non-compliant software, or user errors are just a few ways of how systems can be compromised. From Open-AudIT to monitor new devices on a network or non-authorised software installation to using opConfig to monitor default passwords enabled, these risks can be reduced.

 

Early warnings are paramount to network security

Early warnings are essential for network security. If you can detect a security or compliance breach early, it’s easier to stop and prevent damage. But most companies don’t have the tools they need to do this effectively. Despite this, Opmantek senior engineer Mark Henry said many IT systems were running with low-scale early warning solutions.

“Generally speaking, a lot of the customers that we talked to, who haven’t adopted NMIS (Network Management Information System) as their network monitoring solution, are sitting down around the level zero or level one area (Gartner’s IT Service Management Maturity Model). That’s also the same for many kinds of low end, off-the-shelf, free or open-source monitoring solutions,” he said.

The truth is that most companies don’t have the time or resources to monitor their networks 24/7. Using NMIS, a reliable and robust monitoring system, means you don’t have to.

 

The benefits of an integrated network management information system

Network Management Information System (NMIS) is an open-source network management system that provides real-time monitoring, configuration, and troubleshooting capabilities. It’s used by many companies worldwide who are looking for ways to manage their networks efficiently, integrating this with other modules that Opmantek offer will help build an efficient and effective strategy to help mitigate network security risk.

Open-AudIT can be installed onto Linux, Windows, or Virtual machines and once installed, needs only credentials and a subnet to discover all the devices attached to that network. Integrating Open-AudIT and NMIS is incredibly easy, Open-AudIT will discover all the devices on your network and with a click of a button, they will all be managed by NMIS, read more here. Integrating opConfig into this is a matter of importing the nodes from NMIS and then creating/applying a credential set for that node, detailed here. From here, we have a system in place that will discover any devices on your network, monitor all software installations, monitor the status/availability of devices, and report on any configuration changes.

 

To test this out on a lab network, download Opmantek’s virtual machine, with everyone installed and ready to go, and see how easy it is to get ahead of network issues.