Modify an existing Access Control Group Entry

Method:              PUT URI:                      ALF/Firewall/AccessControl/{IPType}/{ACLID} This method will modify an existing Access Control Group Entry (allow/deny rule) within the specified Access Control Group ID specified. The {IPType} is either “IPv4” or “IPv6” The {ACLID} is the ID of the group […]

Create a new Access Control Group Entry

Method:              POST URI:                      ALF/Firewall/AccessControl/{IPType}/{ACLID} This method will create a new Access Control Group Entry (allow/deny rule) within the specified Access Control Group ID specified. The {IPType} is either “IPv4” or “IPv6” The {ACLID} is the ID of the group […]

Cloud Platform Release v20.8.0

Our August release is packed with new features and functionality as well as the usual array of minor bug fixes. The complete list of changes included are detailed below. Back-end Updating: Further to our release last month, we have updated the UI to display an improved updating progress bar. Now, when changes are made via […]

Measuring Failure

If you are goal-oriented, you know how important it is to measure success. For network professionals, the goal is usually 99.999% availability. But despite all the counsel we’ve heard about focusing on the positive, sometimes we need to take a closer look at what negative things may affect us. For network management, there are several […]

DNSSEC Implementation Guide

We recently added an easy-to-use implementation of DNSSEC in our UI.  The currently deployed version in our UI makes it nearly impossible to misconfigure.  Every time you make a change, it is queued for review by one of our NOC engineers to ensure that the requested actions will not impact any existing chain of trust. […]

What You Should Know About APIs

We all know how a computer user interface (UI) works — at least in general terms. Humans interact with digital machines using input devices, and we watch everything real-time on computer monitors. When we think of user input, we usually think of Input devices like a mouse, keyboard, touchscreen, trackball, or pointing stick. But we […]

Why Ransomware is a Threat to Availability

According to the FBI, ransomware became a billion dollar industry in 2016.  That is right, $1 billion.  If ransomware were a legitimate industry, it would be the focus of case studies in every business school in the world as its growth is unprecedented.  This growth is attributed to four primary reasons. The amount of money […]

Decrease Downtime with Change Management

Service providers do everything they know how to avoid downtime. Generally the best practice is not to touch a live network. If it ain’t broke, don’t fix it. But change is inevitable, and eventually every network or system will need improvements. The trick is to handle these changes with little to no disruption of running […]

The True Costs of Downtime for IT

Downtime is a dirty word in the IT business. Unplanned outages are unacceptable and should not be tolerated. In a universe where customers expect services to be available 99.999% of the time, any time your IT service offering is down is costly to your business. And the true cost of downtime may be more than […]