All the resources an IT professional needs

Check out our latest posts below. For access to additional resources including reports, podcasts, webinars, and more, head over to our resources page.

toolkit illustration

Searching for something? Filter by topic

Just browsing? Check out our latest posts

Devices

Layer 2 vs Layer 3 Network Switches: What’s the Difference?

What’s the difference between Layer 2 and Layer 3 network switches and how critical are they to a properly functioning network?
Author: Steve Petryschuk
Director & Tech Evangelist, Auvik
Network Management

What is a Subnet Mask? Examples, Uses and Benefits

Learn about subnet masks in our guide. Includes fundamentals of IPv4 and IPv6 subnetting, plus an overview of tools you really need.
Author: Nolan Greene
Product Marketing Manager, Auvik
Network Management

How to Find IP Addresses on a Network and Monitor their Usage

If you’re looking for a specific IP address, the simplest way to discover that device is to use the ICMP ping command. Typing in “ping ” with the addr
Author: Steve Petryschuk
Director & Tech Evangelist, Auvik
Protocols & Communication

Classful and Classless Addressing Explained

Of course, as anyone who has studied for a networking certification can tell you, there is a significant complexity increase between classful and clas
Author: Steve Petryschuk
Director & Tech Evangelist, Auvik
Network Management

Subnetting: What it is and How it Works

You don’t need that subnet calculator! Not when you have this handy guide to subnetting using both mask and CIDR notation.
Author: Kevin Dooley
Network Management

What IS CIDR? Everything You Need to Know About This IP Addressing Method

CIDR revolutionized IP address allocation via customizable subnet masks instead of wasted fixed blocks. Learn CIDR’s capabilities for efficient addres
Author: Justin Ong
Community Evangelism Director
Network Management

Networking Basics: OSPF Protocol Explained

OSPF is one of the few protocols you can count on being available just about anywhere. Explore principles, interfaces and more in this intro guide.
Author: Ethan Banks
Network Management

NetFlow Basics: An Introduction to Monitoring Network Traffic

You probably have support for NetFlow or other flow protocols on your client devices already. That means you can quickly and inexpensively start gaini
Author: Steve Petryschuk
Director & Tech Evangelist, Auvik
Network Management

Network Time Synchronization: Why and How It Works

One of the keys to effective network management is syncing clocks on all network devices. There are really two ways to do it.
Author: Kevin Dooley
Network Management

Introducing SNMP Poller History

Despite everyone’s best efforts, network failures happen. And when downtime means lost productivity, fast troubleshooting becomes an integral part of
Author: Lemna Manoharan

What’s your shadow IT risk factor?

Find out in this free guide and exercise kit.
cover of shadow IT ebook
You will learn:
  • The impact shadow IT has on an organization
  • How to evaluate tools
  • Tips on security
  • A quiz to help you determine the severity of shadow IT in your org
  • Solutions to solve these problems