Archive

Category Archives for "Packet Pushers Podcast"

Link Propagation 118

Welcome to Link Propagation, a Packet Pushers newsletter. Link Propagation is included in your free membership. Each week we scour the InterWebs to find the most relevant practitioner blog posts, tech news, and product announcements. We drink from the fire hose so you can sip from a coffee cup. Blogs Foundations of MPLS: Label Switching […]

Show 389: Using MPLS In The Enterprise

Today on the Weekly show, MPLS in the enterprise, especially for the use case of segmentation.

Should you do it? Why would you do it? Considering the equipment you ve got, could you do it even if you wanted to? And even if you should, you would, and you can, what about all those other people you work with?

Discussing this emotionally fraught topic of MPLS in the enterprise is Tom Ammon, a senior network engineer who s supported it in a few different environments. He blogs at blog.tomammon.net.

We start by discussing the general case for MPLS in the enterprise, walk through the hardware and software requirements necessary to support MPLS, and then drill into segmentation more specifically.

We also look at reasons why you’d want to use MPLS for segmentation, and explores issues around operations, skillsets and training, and troubleshooting.

The post Show 389: Using MPLS In The Enterprise appeared first on Packet Pushers.

PQ 149: WPA3 And Wireless Security Improvements

In January 2018, the WiFi Alliance announced that WPA3 was coming this year, a collection of security enhancements to address issues with WPA2.

Today, we discuss WPA3 with Dan Harkins, a scientist at Aruba Networks, a Hewlett Packard Enterprise company. Dan has been closely involved with WPA3 s development, and I heard Dan present on his work at Aruba Atmosphere 2018 in March of this year.

Dan was kind enough to join us today for a preview of what s coming, with a special focus on one aspect of WPA3 that interests me personally, Opportunistic Wireless Encryption (OWE).

We also discuss the fixes that WPA3 makes to WPA2, and when we can anticipate product support.

Sponsor: Paessler AG

Paessler AG is the maker of PRTG Network Monitor. PRTG monitors your whole IT infrastructure 24/7 and alerts you to problems before users even notice. Find out more about the monitoring software that helps system administrators work smarter, faster, better. Visit paessler.com today.

Show Links:

Wi-Fi Alliance® introduces security enhancements – Wi-Fi Alliance

Opportunistic Wireless Encryption (RFC 8110) – IETF

Dragonfly Key Exchange (RFC 7664) – IETF

The post PQ 149: WPA3 And Wireless Security Improvements appeared first on Packet Pushers.

Datanauts 133: Perfecting The Job Hunt

Whether by choice or circumstance, it’s inevitable you’ll find yourself looking for a new job.

On today’s Datanauts episode we break down the job hunt process to help you understand what you want, what you have to offer, and how to make the most of your application.

Our guest is Doug Lane, a tech/ops professional who’s been working in IT for 25 years. He’s also recently gone through the process of finding and getting a new job.  You can follow him on Twitter at @debuggist.

Doug shares his experiences and tips about how he approached the job search. We start by talking about honestly understanding your own strengths and weaknesses, and then thinking about what kind of job it is you really want.

We also discuss how to evaluate job descriptions, and how to nail the application process.

The post Datanauts 133: Perfecting The Job Hunt appeared first on Packet Pushers.

Network Break 183: VMware Embraces Cloud Networking; Cisco Acquires Accompany

Take a Network Break! VMware announces its Virtual Cloud Network vision and outlines the product portfolio to bring that vision to life. Dell Technology World showcases new servers and storage and cements Dell’s one-stop-shop strategy. Cisco spends $270 million to buy relationship intelligence purveyor Accompany.

Cisco also shed its service provider video business, Anuta Networks makes its orchestration platform available as SaaS, and the Lojack laptop recovery software suffers a serious vulnerability.

Meanwhile, a Webex vulnerability enables remote code execution, Arista shares dip despite a strong quarter, and Juniper shares rise slightly despite a poor one.

Get links to all these stories after our sponsor message.

Sponsor: Couchdrop

Send files to the cloud quickly and easily with Couchdrop, a cloud-based service that uses the Secure Copy Protocol to transfer files. Couchdrop integrates with Dropbox, GoogleDrive, Amazon S3 buckets and more. Head to Couchdrop.io to get details, and get two months free with a one-year subscription.

Show Links:

VMware Advances Networking for the Digital Era with the Virtual Cloud Network – VMware

Dell outlines a one-stop-shopping portfolio for technology-hungry businesses – Diginomica

Cisco Announces Intent to Acquire Accompany – Cisco

Permira Funds to Acquire Cisco’s SPVSS Business – Cisco

Continue reading

Link Propagation 117

Welcome to Link Propagation, a Packet Pushers newsletter. Link Propagation is included in your free membership. Each week we scour the InterWebs to find the most relevant practitioner blog posts, tech news, and product announcements. We drink from the fire hose so you can sip from a coffee cup. Blogs How Real Life Can Change […]

Show 388: The Future Of Networking With Kyle Mestery

The Future of Networking series continues with guest Kyle Mestery.

Kyle is well known to many corners of the networking community including the open source community. He recently re-joined Cisco as a Distinguished Engineer.

We talk with Kyle to get his take on where the packets are flowing over the next several years, including the tech conference scene, open-source networking, the proliferation of open-source networking OSs, what’s inside Open Network Linux (ONL), and cloud-native network functions virtualization.

Sponsor: ThousandEyes

ThousandEyes gives you performance visibility from every user to every app over any network, both internal and external, so you can smoothly migrate to the cloud, transform your WAN, troubleshoot faster and deliver exceptional user experiences. Sign up for a free account at thousandeyes.com/packetpushers and choose a free ThousandEyes t-shirt.

Show Links:

Silicon Loons.com – Kyle’s blog

Kyle on Twitter

Network Service Mesh – GitHub

Three Years On: Open Standards, Open Source, Open Loop – Cisco Systems

Verizon Launches Virtual Service Bundles – Light Reading

The post Show 388: The Future Of Networking With Kyle Mestery appeared first on Packet Pushers.

PQ 148: How To Monitor Cryptojacking With Paessler PRTG (Sponsored)

Today on Priority Queue, the Packet Pushers peer into the darker corners of network monitoring.

Monitoring gets you visibility. But when you can see what’s happening, you might not like what you find. That s the topic of today s sponsored show with Paessler AG, maker of PRTG network monitoring software.

Our guests are Greg Ross, Presales Systems Engineer at Paessler; and Troy Mursch, a security researcher who blogs at Bad Packets Report.

Troy discovered that cryptojacking malware called Coinhive had infected a popular Website. We’ll talk about how he used Paessler sensors to monitor the malware on the site, and to track down other infected systems.

We talk with Troy and Greg about how to use Paessler to monitor key metrics that could indicate malware. We also dig into Paessler’s capabilities for more typical network monitoring use cases.

And here’s a special offer for Packet Pushers listeners: Paessler is offering a free network security eBook. You can get it at go.paessler.com/packetpushers.

You can also get a free trail of PRTG here.

Show Links:

Free Network Security eBook – Paessler

Paessler PRTG Free Trial

Paessler on Twitter

Troy Mursch/Bad Packets Report on Twitter

Who and What Is Continue reading

Datanauts 132: Unit Testing For Fun And Profit

While performing a routine sensor sweep of the Gargleblaster nebula, the crew of the Datanauts starship noticed that many of the tasks are manual in nature and could, with a little effort, be automated with some scripting.

However, every time we moved on from one part of the nebula to another, a different error would crop up with the script s code. Isn t there some way that we can automatically test our code to make sure that more time is spent drinking a frothy ale instead of all this debugging?

On today’s episode with talk with Adam Bertram, a Microsoft MVP and author of The Pester Book.

He is currently a Senior Systems Automation Engineer working with PowerShell, Desired State Configuration, and various other DevOps tools to coordinate reliable software deployments for a biotech company. You can find his work at adamtheautomator.com.

We start by defining a unit test for scripts, and how unit testing differs from integration, functional, regression tests, and others.

Then we dive into why you’d want to test your scripts (testing isn’t just for developers!), and how to create these tests.

We also talk about the notion of test-driven development, and dive Continue reading

Network Break 182: BGP Hijacked For Cryptocurrency Heist; Juniper, Big Switch Unveil New Products

Take a Network Break! A cryptocurrency heist combines BGP hijacking with some DNS tomfoolery, Juniper targets enterprise multicloud with Contrail enhancements, and Big Switch adds packet capture and analytics appliances to its product line.

The Linux community swaps out iptables for BPF, Google pushes the Rich Communication Service (RCS) to compete on messaging, and Cisco unbundles Nexus 9000.

Apple exits the home WiFi router market, Innovium snags $77 million to market its programmable ASIC, and Net Neutrality rules have yet to be revoked–why?

Get links to all these stories after our sponsor messages.

Sponsor: Cisco Systems

Find out how Cisco and its trusted partners Equilibrium Security and ePlus/IGX can help your organization tackle the General Data Protection Regulation, or GDPR. Tune into Packet Pushers Priority Queue episode 147 to get practical insights on how to get your arms around these wide-ranging rules.

Show Links:

MyEtherWallet DNS Attack Offers Opt-In Lessons – Dark Reading

Make Way for Secure and Automated Multicloud for Any Cloud, Any Workload and Any Deployment – Juniper Networks

Juniper Preaches Multicloud To Win Contrail Converts In The Enterprise – Packet Pushers

Big Mon Recorder and Analytics Nodes Enable Traffic Capture and App-aware Analytics for Cloud-Native Network Defense & Continue reading