
DDoS attacks, how should ISPs protect themselves?
How should ISPs protect themselves from DDOS attacks?

How should ISPs protect themselves from DDOS attacks?

In the day-to-day life of the Network and Internet area, it is very common for Internet Providers (ISPs) to have the need to carry out certain changes at controlled times, whenever there may be a considerable risk to the Network, due to some implementation, equipment migration , etc and we call this action the maintenance window


Thinking about how to make our customers’ work even easier, the new Made4Flow integration with Telegram was launched last month. Telegram is a messaging app, with no business models involving ads or stores. The same application serves all types of users who want to exchange quick messages and make voice and video calls. It is […]

Check out the 3 best practice tips that should be implemented across all internet providers in the part of OLTs.

Before explaining what an OLT is, first we need to talk about what a PON (Passive Optical Network) is.A PON network is a network that uses fiber optics with optical splitters (splitters) along the way to provide data from point to multipoint, that is, on one side a light beam passes through a splitter and […]

We know that every small ISP starts with Mikrotik equipment and that it has a very intuitive “graphic” interface (via its own application). Many ISPs grow with these facilities in hand and end up using them for various operational and often administrative tasks. There have been situations where I’ve known ISPs that based their entire […]
To understand this question, let’s remember how Zabbix works. Zabbix is an open-source monitoring software, with it we can monitor our assets in different ways, with SNMP protocol, via Zabbix Agent, HTTP/S, with external scripts, and so on…. When we install and configure Zabbix, we see several templates ready to be able to monitor equipment […]
Hello. My name is Gabriel, I’m a network analyst here at Made4IT and today I’m going to tell you about an interesting situation involving CDN and traffic engineering that we caught here in the consulting team a few days ago. We received a call from a customer with a case where the traffic of a […]

A step-by-step guide on how to configure a CGNAT