article thumbnail

The Cable Security Experience

CableLabs

They may attack the CPE device from the home network side, or the local area network (LAN) side. These tools are authentication, encryption, and message hashing. Authentication is conducted using a secret of some sort. And they may attack the network operator’s infrastructure. Tapping fiber or coaxial cables are both practical.

article thumbnail

Network Troubleshooting in Depth: A Complete Guide

Kentik

In today’s “gotta have it fast” culture, more often than not, you need to fix it now — or revenue is affected. This information can be found in logs of AAA (Authentication, Authorization, and Accounting) events from your devices. Troubleshooting requires taking a methodical approach to resolving the issue as quickly as possible.

Network 114