Archive

Category Archives for "Networking"

Juniper grabs Mist for wireless AI, cloud service delivery technology

Juniper has entered into an agreement to buy advanced wireless-gear-maker Mist Systems for $405 million. For Juniper the Mist buy could be significant as it currently depends on agreements with partners such as Aerohive and Aruba to deliver wireless, according to Gartner.  Mist, too, is a partner of and recently announced joint product development with VMware that integrates Mist WLAN technology and VMware’s VeloCloud-based NSX SD-WAN. More about 802.11ax (Wi-Fi 6) Why 802.11ax is the next big thing in wireless FAQ: 802.11ax Wi-Fi Wi-Fi 6 (802.11ax) is coming to a router near you Wi-Fi 6 with OFDMA opens a world of new wireless possibilities 802.11ax preview: Access points and routers that support Wi-Fi 6 are on tap “Wireless was a hole that Juniper needed to plug to fill out its enterprise story,” said Ritesh Patel, wireless LAN analyst at Dell’Oro. “It also needs strong wireless technology  in order to effectively compete against other enterprise networking players such as Cisco, HP/Aruba, Extreme and other players such as Fortinet.”To read this article in full, please click here

Tech Bytes: Leveraging Packets And Flows For NetOps And SecOps With VIAVI Solutions (Sponsored)

Find out how packet capture and flow data can serve both the network and security teams to solve performance problems and investigate security events in this sponsored Tech Bytes conversation with VIAVI Solutions. Our guest is Charles Thompson, Sr. Director, Product Management at VIAVI.

The post Tech Bytes: Leveraging Packets And Flows For NetOps And SecOps With VIAVI Solutions (Sponsored) appeared first on Packet Pushers.

Network Break 224: Beware TLS Alternatives; Volta Networks And Veriflow Launch New Products

Today's Network Break examines a ETS, a proposed alternative to TLS 1.3 that enables decryption, looks at ICAAN's call for DNSSEC everywhere, discusses new products from startups Volta Networks and Veriflow, and much more tech news.

The post Network Break 224: Beware TLS Alternatives; Volta Networks And Veriflow Launch New Products appeared first on Packet Pushers.

Is it Balance, or Workism?

While we tend to focus on work/life balance, perhaps the better question is: how effective are we at using the time we use for work? From a recent study (which you may have already seen):

  • Workers average just 2 hours and 48 minutes of productive device time a day
  • 21% of working hours are spent on entertainment, news, and social media
  • 28% of workers start their day before 8:30 AM (and 5% start before 7 AM)
  • 40% of people use their computers after 10 PM
  • 26% of work is done outside of normal working hours
  • Workers average at least 1 hour of work outside of working hours on 89 days/year (and on ~50% of all weekend days)
  • We check email and IM, on average, every 6 minutes

This is odd—we are starting work earlier, finishing later, and working over weekends, but we still only “work” less than three hours a day.

The first question must be: is this right? How are they measuring productive versus unproductive device time? What is “work time,” really? I know I don’t keep any sort of recognizable “office hours,’ so it seems like it would be hard to measure how much time I spend Continue reading

Wireshark 3.0 Released

Recently, Wireshark dropped a major release which adds a few cool features (some new and some old). However outside of the new features, there is one major under the hood change this feature introduces. WireShark v3 for Windows now ships with Npcap as opposed to Winpcap that we have been used forever now. Npcap is […]

Building fast interpreters in Rust

Building fast interpreters in Rust

In the previous post we described the Firewall Rules architecture and how the different components are integrated together. We also mentioned that we created a configurable Rust library for writing and executing Wireshark®-like filters in different parts of our stack written in Go, Lua, C, C++ and JavaScript Workers.

With a mixed set of requirements of performance, memory safety, low memory use, and the capability to be part of other products that we’re working on like Spectrum, Rust stood out as the strongest option.
Building fast interpreters in Rust

We have now open-sourced this library under our Github account: https://github.com/cloudflare/wirefilter. This post will dive into its design, explain why we didn’t use a parser generator and how our execution engine balances security, runtime performance and compilation cost for the generated filters.

Parsing Wireshark syntax

When building a custom Domain Specific Language (DSL), the first thing we need to be able to do is parse it. This should result in an intermediate representation (usually called an Abstract Syntax Tree) that can be inspected, traversed, analysed and, potentially, serialised.

There are different ways to perform such conversion, such as:

  1. Manual char-by-char parsing using state machines, regular expression and/or native string APIs.
  2. Parser combinators, which use Continue reading

Short Take – Navigating Technology Change

In and industry where technology seems to change overnight sometimes, how should you decide what you should and shouldn’t invest time in? Are there techniques you can use to optimize navigating technology change? In this Short Take, Russ shares his take on how you should analyze new technologies and intelligently approach new tech to not be ahead or behind of the curve.

Russ White

The post Short Take – Navigating Technology Change appeared first on Network Collective.

Improve Productivity. Shut Off Notifications. (YouTube)

Here’s a short car video where I recommend shutting off notifications as a way to increase productivity. Spoiler alert. That’s pretty much the summary of the entire video, so you can save yourself the four minutes. Or…watch it to get the nuance. I’ll be okay either way. I’m not making money on YouTube ads.

The Week in Internet News: Many Ugandans Quit Internet Services After Tax on Social Media

Taxing the Internet: A social media tax in Uganda has prompted many users to quit those same sites, The Guardian reports. The tax, intended to raise government revenues and discourage “idle talk,” amounts to 200 Ugandan shillings, or about U.S. 5 cents, per day. More than one million people have quit taxed mobile apps, the story says.

Tough measures: A large majority of Europeans support a proposal to require social media companies to direct all users who have seen take news toward fact-checks, Time.com says. A recent poll suggest that more than 86 percent of European residents surveyed support the Correct the Record proposal from advocacy group Avaaz.

Blockchain goes to pot: Blockchain technology can help marijuana dispensaries enforce daily legal limits on individual purchases, Forbes reports. Blockchain could help dispensaries keep track of attempts at smurfing, the practice of purchasing more than the daily legal limit by going to different dispensaries, and looping, purchasing more than the limit by returning later to the same seller, the story says.

Blockchain vs. censorship: A follow-up to a trend we noted earlier this year: China’s residents are turning to blockchain technologies to fight government censorship, The Conversation reports. Some users Continue reading

How we made Firewall Rules

How we made Firewall Rules
How we made Firewall Rules

Recently we launched Firewall Rules, a new feature that allows you to construct expressions that perform complex matching against HTTP requests and then choose how that traffic is handled. As a Firewall feature you can, of course, block traffic. The expressions we support within Firewall Rules along with powerful control over the order in which they are applied allows complex new behaviour.

In this blog post I tell the story of Cloudflare’s Page Rules mechanism and how Firewall Rules came to be. Along the way I’ll look at the technical choices that led to us building the new matching engine in Rust.

The evolution of the Cloudflare Firewall

Cloudflare offers two types of firewall for web applications, a managed firewall in the form of a WAF where we write and maintain the rules for you, and a configurable firewall where you write and maintain rules. In this article, we will focus on the configurable firewall.

One of the earliest Cloudflare firewall features was the IP Access Rule. It dates backs to the earliest versions of the Cloudflare Firewall and simply allows you to block traffic from specific IP addresses:

if request IP equals 203.0.113.1 then block  Continue reading

CCIE relevancy: Is Cisco’s venerable network certification on top of programmability, automation trends?

WAVE Life Sciences was barreling toward its commercial launch when it hit a critical speedbump. The company’s network, a key part of the launch, received a negative assessment and would need to be re-architected. Anthony Murabito, vice president of IT at the Cambridge, Mass. biotechnology company, only wanted one thing from the IT pros that would be helping him fix the issue fast – to be Cisco Certified Internetwork Experts (CCIE).“We needed to do a major refresh and replacement on our network and, when I looked around, I had no network skills available in the organization,” Murabito says. Cisco’s top-tier certification would serve for Murabito and his hiring team as an indicator of a candidate’s expertise.To read this article in full, please click here

BrandPost: Can SD-WAN Help Overcome IT Skill Shortages?

The primary driver cited is an aging worker pool and the overwhelming male makeup of this sector.Other factors contributing to skill shortages include a lack of: Hybrid IT skills New skills like managing SLAs for off-premise workloads Software skills with adoption of software-defined technologies Fewer young men and women entering the field How is this affecting branch office networks? The data center IT skill set shortage is spilling over from the data center to the management and administration of branch office infrastructure. The two go hand in hand as most skills are leveraged across both areas; branch office networks are merely a “miniature architecture” of the data center network. Branch office networks typically include switches, routers, WAN optimization appliances, firewalls, and other networking gear that all require similar IT knowledge and skills as the data center.To read this article in full, please click here

Is Cisco’s CCIE certificate relevant any more?

WAVE Life Sciences was barreling toward its commercial launch when it hit a critical speedbump. The company’s network, a key part of the launch, received a negative assessment and would need to be re-architected. Anthony Murabito, vice president of IT at the Cambridge, Mass. biotechnology company, only wanted one thing from the IT pros that would be helping him fix the issue fast – to be Cisco Certified Internetwork Experts (CCIE).To read this article in full, please click here(Insider Story)