Archive

Category Archives for "Networking"

BrandPost: Top 2019 SD-WAN Predictions

For the past three years, SD-WAN has been one of the most talked about technology trends. All the discussion around SD-WAN has helped shine the spotlight on the business value enterprises can realize by changing the way they build their wide area networks.As the market continues to gain momentum coming into the new year, here are my annual predictions for SD-WAN and the future of the WAN edge infrastructure market. You can also view Silver Peak’s webinar to prepare for SD-WAN in 2019.SD-WAN Market ConsolidationTo read this article in full, please click here

Network Break 220: Cisco Announces ACI Anywhere; U.S. Prosecutors Target Huawei

Today's Network Break analyzes a slew of Cisco Live announcements including ACI Anywhere and HyperFlex for edge deployments, Huawei's run-ins with U.S. prosecutors, financial results from Juniper Networks and Mellanox, and more tech news.

The post Network Break 220: Cisco Announces ACI Anywhere; U.S. Prosecutors Target Huawei appeared first on Packet Pushers.

The Week in Internet News: Japan to Probe Residents’ IoT Devices

Government hacking: Japanese government workers will be able to hack into residents’ Internet of Things devices in an attempted survey of IoT insecurity, ZDNet reports. The Japanese government recently approved an amendment that allows the survey by employees of the National Institute of Information and Communications Technology. The government hacking effort is part of Japan’s preparation for the Tokyo 2020 Summer Olympics. Government officials are worried that other hackers might use compromised IoT devices to launch attacks against the games.

Evolving encryption: A story at TechTarget looks at the evolution of the Let’s Encrypt certificate authority, established in 2016. The free and automated certificate authority is “changing the industry in interesting ways” by making the certificate process less cumbersome, the story says. Meanwhile, a story at CSO Online looks at the Electronic Frontier Foundation’s efforts to encrypt the entire Internet and says that Let’s Encrypt is an important piece of that campaign.

Lagging encryption: Less than 30 percent of enterprise businesses encrypt their data across their on-premises environments, within their cloud services or on their mobile devices, according to a survey from French aerospace and security vendor Thales Group. A Computer Business Review story notes that encryption still isn’t widespread, Continue reading

Intel promotes Swan to CEO, bumps off Itanium, and eyes Mellanox

It was a busy week for Intel as it announced the promotion of CFO Bob Swan to CEO, ending a seven-month search, set a deadline for the life of its ill-fated Itanium processor, and is now reportedly in the running to buy Mellanox.I don’t think for a second these are unrelated. Swan is a money guy. Ending the life of Itanium and making a strategic acquisition are right in his wheelhouse.Swan’s elevation is just what analyst Jim McGregor called for a few weeks ago when I asked what was taking so long in the CEO search. Swan, 58, who joined Intel as CFO in October 2016, becomes Intel’s seventh CEO and only its second non-engineer. The first was the late Paul Otellini, and he worked out very well.To read this article in full, please click here

Intel promotes Swan to CEO, bumps off Itanium, and eyes Mellanox

It was a busy week for Intel as it announced the promotion of CFO Bob Swan to CEO, ending a seven-month search, set a deadline for the life of its ill-fated Itanium processor, and is now reportedly in the running to buy Mellanox.I don’t think for a second these are unrelated. Swan is a money guy. Ending the life of Itanium and making a strategic acquisition are right in his wheelhouse.Swan’s elevation is just what analyst Jim McGregor called for a few weeks ago when I asked what was taking so long in the CEO search. Swan, 58, who joined Intel as CFO in October 2016, becomes Intel’s seventh CEO and only its second non-engineer. The first was the late Paul Otellini, and he worked out very well.To read this article in full, please click here

Intel promotes Swan to CEO, bumps off Itanium, and eyes Mellanox

It was a busy week for Intel as it announced the promotion of CFO Bob Swan to CEO, ending a seven-month search, set a deadline for the life of its ill-fated Itanium processor, and is now reportedly in the running to buy Mellanox.I don’t think for a second these are unrelated. Swan is a money guy. Ending the life of Itanium and making a strategic acquisition are right in his wheelhouse.Swan’s elevation is just what analyst Jim McGregor called for a few weeks ago when I asked what was taking so long in the CEO search. Swan, 58, who joined Intel as CFO in October 2016, becomes Intel’s seventh CEO and only its second non-engineer. The first was the late Paul Otellini, and he worked out very well.To read this article in full, please click here

Helping To Build Cloudflare, Part 4: Public Engagement

This is part 4 of a six part series based on a talk I gave in Trento, Italy. To start from the beginning go here.

We don’t believe that any of our software, not a single line of code, provides us with a long-term advantage. We could, today, open source every single line of code at Cloudflare and we don’t believe we’d be hurt by it.

How we think about Open Source

Why don’t we? We actually do open source a lot of code, but we try to be thoughtful about it. Firstly, a lot of our code is so Cloudflare-specific, full of logic about how our service works, that it’s not generic enough for someone else to pick up and use for their service. So, for example, open sourcing the code that runs our web front end would be largely useless.‌‌

But other bits of software are generic. There’s currently a debate going on internally about a piece of software called Quicksilver. I mentioned before that Cloudflare used a distributed key-value store to send configuration to machines across the world. We used to use an open source project called Kyoto Tycoon. It was pretty cool.‌‌

But Continue reading

Tech Field Day Extra @ CLEUR19 Recap

I spent most of last week with a great team of fellow networking and security engineers in a windowless room listening to good, bad and plain boring presentations from (mostly) Cisco presenters describing new technologies and solutions – the yearly Tech Field Day Extra @ Cisco Live Europe event.

This year’s hit rate (the percentage of good presentations) was about 50% and these are the ones I found worth watching (in chronological order):

Read more ...

Juniper Syslog

3 steps to configure Syslog. Define a logging policy Define remote logging servers Define a logging source address (optional) Configuration Log to a local file. Logs are stored in the /var/log directory. Define a logging policy. cmd set system syslog user * any...continue reading

Emulating Juniper Devices – Various options

Hi,

I have got a lot of requests for writing up a blog post on various Methods of emulating Juniper devices for practice.

Note : For 2/3 methods to work, you need to have official Junos software (vmx-vcp and vmx-vfp)

Method 1 – Gns3

Most popular and Familiar Method – Install via gns3

After installing Gns3, download the

Vmx-vfp Appliance – https://docs.gns3.com/appliances/juniper-vmx-vfp.html

Vmx-vcp Appliance – https://docs.gns3.com/appliances/juniper-vmx-vcp.html

Documentation is straight forward, all you need to do is double click on the appliance and upload the image when requested, as easy as it can get.

 

Method2 – Vagrant

Use Juniper uploaded Images via vagrant.

Most of Juniper Vqfx / JNCIE-DC practice came up from a vagrant, You don’t need to have any official images or access to Juniper software downloads. The downside is that it only supports VQFX and generic SRX, but for most of the Routing protocol and MPLS learning this should be good.

https://app.vagrantup.com/boxes/search?utf8=%E2%9C%93&sort=downloads&provider=&q=juniper

https://app.vagrantup.com/juniper/boxes/vqfx10k-re

https://app.vagrantup.com/juniper/boxes/vqfx10k-pfe

Again, following Github link, will auto setup the topology without you worrying about much details to vagrant.

https://github.com/Juniper/vqfx10k-vagrant -> Go into a specific folder and say vagrant up, that should take Continue reading

Helping To Build Cloudflare, Part 2: The Most Difficult Two Weeks

This is part 2 of a six part series based on a talk I gave in Trento, Italy. Part 1 is here.

It’s always best to speak plainly and honestly about the situation you are in. Or as Matthew Prince likes to put it “Panic Early”. Long ago I started a company in Silicon Valley which had the most beautiful code. We could have taught a computer science course from the code base. But we had hardly any customers and we failed to “Panic Early” and not face up to the fact that our market was too small.

Ironically, the CEO of that company used to tell people “Get bad news out fast”. This is a good maxim to live by, if you have bad news then deliver it quickly and clearly. If you don’t the bad news won’t go away, and the situation will likely get worse.

Cloudbleed

Cloudflare had a very, very serious security problem back in 2017. This problem became known as Cloudbleed. We had, without knowing it, been leaking memory from inside our machines into responses returned to web browsers. And because our machines are shared across millions of web sites, that meant that HTTP requests Continue reading