Technical Community Blog

Indoor positioning can feel complex, especially when you're trying to manually place APs accurately on a floor plan. To simplify this process, I’ve created a 12-minute end-to-end walkthrough of AP Auto Locate : a practical guide that covers everything ...
0 comments
Before any routing or security policies can come to life, something far more fundamental must happen: the network must be able to connect securely and intelligently . That foundation is built by the Overlay Tunnel Orchestrator ...
1 comment
Modern data centers are no longer static networks of switches—they are distributed, service-aware systems where compute, storage, and network boundaries blur. As applications adopt microservice architectures and east–west traffic becomes dominant, traditional ...
0 comments

Why SD-Branch?

Aruba’s Wi‑Fi, dynamic segmentation, and role-based access controls are widely known — but what often goes unnoticed is the orchestration layer that ties everything together. At the c ore of that is the SD‑Branch Orchestrator — ...
0 comments
The modern data center faces a dual challenge: delivering the performance and agility required by AI, cloud-native, and mission-critical workloads—while also standing resilient against ransomware and advanced threats. Traditional perimeter defenses and ...
0 comments
W eb content and reputation classification plays a critical role in enforcing security policies and protecting users from threats. Attackers increasingly host malware, phishing kits, and command-and-control infrastructure on legitimate-looking websites. ...
0 comments
A Practical Guide to SSE Agent Troubleshooting by matt.hum@hpe.com One of the questions I get asked often is, "How do I debug or troubleshoot the HPE Aruba Networking SSE agent?" This can be especially relevant when a destination or application ...
2 comments
In the first part of this blog series we focused on how HPE Aruba Networking Central NAC can help you identify every user and device and build simple policies to assign each to the desired user-role. That’s a great first step in your zero trust journey! ...
1 comment
We’ve been talking about zero trust for a while. And so have many others! This makes sense considering how much of a threat cyber-crime has become. But… What do we mean by zero trust? Why are so many vendors claiming to have a “zero trust” solution? There’s ...
1 comment
Using enrollment over secure transport (EST) to validate network devices By Danny Jump Adding a new network device to your infrastructure? How confident are you that it actually is a device from your selected vendor, and that it has not been ...
2 comments
Smart Routing with HPE Aruba Networking SSE Matt Hum ( matt.hum@hpe.com ) Smart routing is a unique concept that may spur on some questions but is part of the “secret sauce” of our SSE platform. At its core, Smart Routing creates a comprehensive ...
0 comments
Do you know how big a zettabyte is? Take my word for it, its big. It’s a one, followed by seven sets of zeros. The worldwide amount of data is expected to be around 175 zettabytes in the next 500 days. 90 zettabytes will be unstructured data. Think of ...
0 comments
ZTNA Packet Handling in HPE Aruba Networking SSE Matt Hum (matt.hum@hpe.com) Packet handling for Zero Trust Network Access (ZTNA) varies significantly based on the nature of the traffic and the type of application being accessed. This chart ...
0 comments
HPE Aruba Networking is integrating Wi-Fi 7 technology to meet the industry’s increasing requirements for faster and more reliable Wi-Fi connectivity. As modern networks require higher speeds, enhanced network capabilities and reliability, HPE Aruba’s ...
0 comments