<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1110556&amp;fmt=gif">
Skip to content
    April 23, 2024

    Monitoring Policies: Network Rules

    Key Takeaways
    • Harness monitoring policies that make it simple to select the networks that should be monitored, streamlining ongoing management.
    • Use Monitoring Point Tags to select large sets of Monitoring Points, and include those tags in monitoring policies.
    • Assign tags to network rules to indicate the source network to monitor, and employ those tags to search and filter the data.

    AppNeta by Broadcom recently introduced monitoring policies that streamline monitoring setup and maintenance, significantly reducing the time needed to manage your monitoring.

    AppNeta is now introducing a range of new network rules in monitoring policies. These rules extend monitoring policies and make it simple to select the networks that should be monitored. This update is designed to further simplify your ongoing operations, particularly in managing dynamic, diverse networks.

    What is the challenge?

    Over the years, we've seen our customers’ networks evolve into complex ecosystems. They've embraced technologies like network segmentation using VLANs, SD-WAN deployments with multiple underlays, and a mix of Wi-Fi and wired networks in home and office environments. Customers require modern solutions to monitor these networks to reduce the time and effort needed for management.

    How is AppNeta addressing this problem?

    AppNeta Monitoring Points are deployed at critical locations in the network. Network monitoring can then be set up using network rules provided by the monitoring policies. Network rules are often needed when multiple networks exist on Monitoring Points. Here are a few examples of how that might work:

    • When using consistent VLAN addressing or interface connections across many remote sites, use VLAN or Interface rules instead of individual subnet selection. Most customers can manage a large monitoring setup with just 2 or 3 network rules.
    • You want to monitor the health of a network segment created with VLAN 2. A monitoring policy can be set up to monitor all Monitoring Points on VLAN 2 using a single network rule. This reduces the need to identify, set up, and manage monitoring one Monitoring Point at a time.
    • You want to monitor multiple SD-WAN underlays that connect to different physical interfaces on the Monitoring Points. You can use the interface selection to monitor through the specific interface from a set of Monitoring Points.
    • Do you want to monitor Wi-Fi or wired networks precisely? The connection: wireless/wired rule allows you to set it up with just one network rule.

    Network rule tags

    You can assign tags to the network rules to indicate the source network used to monitor. These custom tags allow you to search and filter the data for triage and dashboard purposes. For example, applying tags makes it easier to answer questions like:

    • How is the corporate Wi-Fi performing today?
    • How are my SD-WAN underlays performing?
    • Which network paths are monitoring over VLAN 2?

    … and more.

    ESD_FY24_Academy-Blog.Monitoring Policies - Network Rules.Figure 1

    Related information

    Use Monitoring Point Tags to select large sets of Monitoring Points. Monitoring Point tags can then be used in monitoring policies. This is especially important when your cabling/network rules apply only to a subset of your Monitoring Points.

    Educational resources

    Release information

    • Watch the release notes for more information and links to in-depth technical documentation.

    Coming soon

    Monitoring Policies will soon support web application monitoring in addition to network monitoring. Web monitoring policies provide a simple, scalable, and automated way to set up monitoring for your web applications (Experience). If you would like to participate in early access to this feature, please contact your Broadcom account representative.

    Vibhu Dubey

    Vibhu Dubey serves as a Product Manager at AppNeta by Broadcom, boasting a remarkable career spanning more than 15 years in the domains of network monitoring and automation, with a distinct emphasis on user experience monitoring.

    Other resources you might be interested in

    icon
    Video March 27, 2026

    Automic Automation Cloud Integrations: AWS Glue Automation Agent

    Broadcom's AWS Glue Automation Agent lets you easily execute AWS Glue jobs, monitor and manage them with your existing enterprise workload automation, as well as other cloud-native activities.

    icon
    Blog March 26, 2026

    Debunking the Myth of the Homogeneous Network

    Tame multi-vendor network chaos by harnessing a single, scalable observability platform that unifies fault, performance, and configuration data.

    icon
    Course March 26, 2026

    DX NetOps: Network Observability Deployment Engine (NODE) Install

    Learn how to establish the foundational architecture for the Network Observability Deployment Engine (NODE) by mastering the deployment of CaaS and LCM.

    icon
    Blog March 24, 2026

    Mastering DX Netops Upgrade Automation

    Learn how version 25.4.6 of the DX NetOps Upgrade Automation Tool provides new capabilities that make upgrades more resilient, transparent, and efficient.

    icon
    Office Hours March 19, 2026

    Rally Office Hours: March 19, 2026

    In this week's Rally Office hours, learn about Rally's new custom view revision history, color-coded tags, and AI-generated HTML widget tips.

    icon
    Blog March 16, 2026

    The Safe Bridge to S/4HANA: Why Your AutoSys Strategy Remains Rock Solid

    Don't replace your scheduler during your SAP S/4HANA migration. AutoSys is S/4HANA ready, so you can stick with the solution and streamline your migration

    icon
    Office Hours March 12, 2026

    Rally Office Hours: March 12, 2026

    Discover a new Rally course on Broadcom Software Academy featuring Custom Views and milestone dashboards, then learn about early adopter opportunities for MCP server OAuth authentication.

    icon
    Blog March 11, 2026

    Why Your NOC Will Ignore AI

    Network engineers often ignore AI warnings due to a lack of trust. Learn how network observability provides the evidence needed to validate predictive insights.

    icon
    Course March 6, 2026

    ValueOps: Implementing Frictionless Cost Accounting

    Learn how to implement and manage ValueOps Frictionless Cost Accounting (FCA)