Technical Community Blog

The PHY-ast and the Fi-rious

Introduction Reliability is important, but most consumers of Wi-Fi are more like Dominic Toretto and live their life one quarter mile at a time and always want their Wi-Fi (or 10 second car) to go as fast as possible. In this post I wanted to highlight ...
0 comments
Introduction Wireless surveys are important in the planning, troubleshooting, and the validation of a Wi-Fi deployment. The Wi-Fi software survey solutions available today for surveys are excellent in the planning and design aspect of a Wi-Fi deployment ...
0 comments
Introduction Want to enable new Wi-Fi features in your environment? How do you confirm your clients supported features? There are several optional features to enable on your wireless clients to best experience. Some of the common features not generally ...
0 comments
Introduction Like many network people, I use WLAN scanner software to view surrounding wirlesss networks. I specifically use Wi-Fi Explorer Pro 3 by Intuitibits when I have my MacBook as a tool to scan, investigate, and troubleshoot wireless networks. ...
0 comments
Indoor positioning can feel complex, especially when you're trying to manually place APs accurately on a floor plan. To simplify this process, I’ve created a 12-minute end-to-end walkthrough of AP Auto Locate : a practical guide that covers everything ...
0 comments
Before any routing or security policies can come to life, something far more fundamental must happen: the network must be able to connect securely and intelligently . That foundation is built by the Overlay Tunnel Orchestrator ...
1 comment
Modern data centers are no longer static networks of switches—they are distributed, service-aware systems where compute, storage, and network boundaries blur. As applications adopt microservice architectures and east–west traffic becomes dominant, traditional ...
0 comments

Why SD-Branch?

Aruba’s Wi‑Fi, dynamic segmentation, and role-based access controls are widely known — but what often goes unnoticed is the orchestration layer that ties everything together. At the c ore of that is the SD‑Branch Orchestrator — ...
0 comments
The modern data center faces a dual challenge: delivering the performance and agility required by AI, cloud-native, and mission-critical workloads—while also standing resilient against ransomware and advanced threats. Traditional perimeter defenses and ...
0 comments
W eb content and reputation classification plays a critical role in enforcing security policies and protecting users from threats. Attackers increasingly host malware, phishing kits, and command-and-control infrastructure on legitimate-looking websites. ...
0 comments
A Practical Guide to SSE Agent Troubleshooting by matt.hum@hpe.com One of the questions I get asked often is, "How do I debug or troubleshoot the HPE Aruba Networking SSE agent?" This can be especially relevant when a destination or application ...
2 comments
In the first part of this blog series we focused on how HPE Aruba Networking Central NAC can help you identify every user and device and build simple policies to assign each to the desired user-role. That’s a great first step in your zero trust journey! ...
1 comment
We’ve been talking about zero trust for a while. And so have many others! This makes sense considering how much of a threat cyber-crime has become. But… What do we mean by zero trust? Why are so many vendors claiming to have a “zero trust” solution? There’s ...
1 comment
Using enrollment over secure transport (EST) to validate network devices By Danny Jump Adding a new network device to your infrastructure? How confident are you that it actually is a device from your selected vendor, and that it has not been ...
2 comments
Smart Routing with HPE Aruba Networking SSE Matt Hum ( matt.hum@hpe.com ) Smart routing is a unique concept that may spur on some questions but is part of the “secret sauce” of our SSE platform. At its core, Smart Routing creates a comprehensive ...
0 comments
Do you know how big a zettabyte is? Take my word for it, its big. It’s a one, followed by seven sets of zeros. The worldwide amount of data is expected to be around 175 zettabytes in the next 500 days. 90 zettabytes will be unstructured data. Think of ...
0 comments
ZTNA Packet Handling in HPE Aruba Networking SSE Matt Hum (matt.hum@hpe.com) Packet handling for Zero Trust Network Access (ZTNA) varies significantly based on the nature of the traffic and the type of application being accessed. This chart ...
0 comments
HPE Aruba Networking is integrating Wi-Fi 7 technology to meet the industry’s increasing requirements for faster and more reliable Wi-Fi connectivity. As modern networks require higher speeds, enhanced network capabilities and reliability, HPE Aruba’s ...
0 comments