Why are the DDoS Statistics Always Blank?

If you’ve gone to the NETWORKING > DoS/DDoS tab and haven’t seen any data, consider that a good thing! This means you haven’t received any attack traffic. By default the DoS/DDoS tab will show stats for the last 7 days, but you can easily adjust the time range drop-down to one year to see if […]

Can I create a wildcard NS record?

Yes. While NS records do support the wildcard character, an asterisk (*), it is important to be careful when using this character to avoid sending untended traffic to another name server. For example, if you create a pair of NS records for xyz.example.com to point to a name server ns1.example.net what you’ve essentially done is […]

How can I get the X-Forwarded-Proto HTTP header?

The ADC-as-a-Service / Cloud Load Balancer does not send the X-Forwarded-Proto HTTP header. However, we have one of our own that will give you the information you’re looking for as well as the IP address the user connected on. So while it’s not exactly what you’re looking for, it gets the job done with a […]

Finding Your Network’s Weakest Link

High availability is the nirvana of network engineers. When everything is humming, monitoring screens are green, and no notifications are in their inbox, network managers can spend time dreaming about how big their Christmas bonuses might be this year. But an unforeseen problem can interrupt their dreams and pop their bubbles at any given moment. […]

Does the Cloud Solve Problems?

There is something about that word cloud. We know that cloud is a catch-all term for the many services available on the internet. And there are particular benefits to be found in moving to the cloud, as we have previously discussed in this blog space. But the cloud is not some heavenly realm of digital […]

Hardware Application Delivery Controllers are Dead

There’s a big migration going on – people are moving away from hardware. Oh, hardware has its place. Some companies still like something they can touch, installing and upgrading and surveilling and maintaining it throughout their local data center. But for many managers, moving their IT workloads to a virtualized cloud environment seems to be […]

Increase Availability with Ticket Excellence

Everybody has troubles — especially IT professionals. But for obvious reasons, they don’t have the luxury to ignore them, run from them, put them off, or pass them on to somebody else. Doing so would undermine availability. Perhaps the availability of a server or a desktop, or even a workforce. No, in the world of […]

Those Vulnerable 3rd-Party Web Services

Just when you think things are getting safer on the web, somebody comes up with a startling claim and spoils your party: “Our analysis paints a somewhat bleak situation on the state of modern web ecosystem.” That’s the conclusion of a 2016 study conducted by Carnegie Mellon University. The full title is worth noting: Oh, […]

Drilling for Disaster Recovery

On an Air Force base in San Antonio, Texas, two men walk into the base exchange. They show their IDs to the clerks, don Halloween masks, and proceed to play the part of terrorists. “This is a drill! We want liberation!  This is only a drill!” Airmen shopping in the facility give them funny looks, […]

Protocol Anomaly Detection

It’s late at night and you’re walking to your car after attending a community event. Your car is still a block away. As you walk, you scan the scene before you. Something is just not right, you say to yourself. On the dark sidewalk ahead of you, you see two silhouettes. They are moving about, […]