Incognito Blog

Your source for opinion and insight on network management trends and subscriber experience optimization.

Why Integrating IPAM Matters and How to Achieve It

IPAM solutions are the source of truth for IP resources on the network, but when performing IPAM functions such as assignments, reconciliations, DNS updates, network plans, or Regional Internet Registry (RIR) requests, IPAM is often limited by its integration with an OSS. Operational teams often find it challenging to complete routine tasks without an integrated IPAM solution due to siloed data pools and swivel-chair environments. Continue Reading

Continue Reading
  • Share:

IPv6: What metrics do you measure in infinity?

By now, most service providers are aware that IPv4 is a limited resource that needs to be used efficiently. Preparations are well underway to move towards an IPv6 future, but for operators who are v6-ready, there is a different problem: how do you know how much of your space is used? The constraints are different, but you still need to know this information. How do you measure the usage of something that is essentially unlimited? Continue Reading

Continue Reading
  • Share:

Gaining Better Network Edge Visibility with Automated IPAM

Large Communication Service Providers (CSPs) that provide transit to their customers need to pay special attention to those network segments to ensure that the IPs associated to them are actually being used. What happens should that customer move on or require more (or less) IP real estate? What do communication and management processes look like to ensure that all the various departments are aligned for rapid and seamless network configuration changes with no downtime? These are issues that you should rely on your IPAM solution to resolve; otherwise, what good is it? Continue Reading

Continue Reading
  • Share:

Kill the Spreadsheets! Automate VPN IP Assignments and Tracking over MPLS/VRF and vLAN

Advancements in virtual private networking have extended system capabilities for service providers. Providers can divide LANs into multiple discrete segments using either Virtual Local Area Networks (vLANs), leverage Multiprotocol Label Switching (MPLS) or Virtual Routing and Forwarding (VRF) to host Virtual Private Networks (VPNs) that support service operations over multiple instances. Continue Reading

Continue Reading
  • Share:

Address Commander Security Model Best Practices (Part 1)

Address Commander is an IP address management (IPAM) solution that allows you to improve workflows, automate common processes, and gain a clear picture of your IP resources. The ability to centralize all IP address management poses security concerns — such as who can access what information — that Address Commander can help you address. You will need to consider how to divide user types and arrange the layout of IP space to ensure data integrity as well as efficiency. This document aims to establish best practices for setting up effective security containers in Address Commander so that you can restrict who views which IP resources on your network. Part 1 will establish the user types and IP layout options, while Part 2 will focus on security implications and use cases. Continue Reading

Continue Reading
  • Share: