Remove Authentication Remove Infrastructure Remove LAN Remove WAN
article thumbnail

The Cable Security Experience

CableLabs

They may attack a customer premises equipment (CPE) device from the network side of the service, typically referred to as the wide area network (WAN) side. They may attack the CPE device from the home network side, or the local area network (LAN) side. And they may attack the network operator’s infrastructure. fiber, coax).

article thumbnail

Strategies for Managing Network Traffic from a Remote Workforce

Kentik

When more of the workforce shifts to working remotely, it puts new and different strains on the infrastructure across different parts of the network, especially where VPN gateways connect to the network edge. This could mean the users are saturating the internet connectivity or that they’ve saturated the LAN (or maybe WAN).

Network 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Network Troubleshooting in Depth: A Complete Guide

Kentik

You could be solving many different issues across several different networks and planes (underlay and overlay) in a complex, hybrid network infrastructure. This information can be found in logs of AAA (Authentication, Authorization, and Accounting) events from your devices. On a network, configurations are constantly changing.

Network 114
article thumbnail

Enabling Digital Transformation, Securely

CIO

SASE is SD-WAN-as-a-service and security-as-a-service. Offering more flexibility at low cost, software-defined networking, or SD-WAN, abstracts network control from the connectivity layer and enables real-time monitoring, reporting, and analytics across network nodes. Let’s look at each: Software-defined wide area networking.

WAN 235