Archive

Category Archives for "Networking"

Prep for Cisco, CompTIA, and More IT Certifications With This $39 Bundle

Large companies need to maintain a robust IT infrastructure if they want to thrive in the digital age, and they can’t accomplish this without certified IT professionals. Luckily, traditional schooling isn’t necessary to land an IT job; IT professionals simply need to pass their certification exams, and they can do so thanks to the wealth of training courses available. One such resource is this Ultimate IT Certification Training Bundle, which is currently on sale for $39.To read this article in full, please click here

Announcing general availability of VMware NSX-T Data Center 2.3.0

With this release, NSX-T 2.3 continues to enable VMware’s vision of delivering consistent, pervasive connectivity and intrinsic security for applications and data across any environment. These new advancements help customers implement a more secure, end-to-end software-based network architecture – a Virtual Cloud Network – that supports their multi-cloud enterprises and advanced security in new and compelling ways.

NSX-T Data Center 2.3 extends advanced multi-cloud networking and security capabilities to AWS, in addition to Microsoft Azure and on-premises environments, and adds support for bare metal hosts as well.

Here are a few highlighted features among what’s new in this release.

Extending NSX-T Data Center support for Bare-Metal

NSX-T Data Center 2.3 introduces support for bare metal hosts, in addition to hypervisor and container environments. This includes Linux-based workloads running on bare-metal servers, as well as containers running on bare-metal servers without a hypervisor. To support this new capability, NSX-T leverages the Open vSwitch, allowing any Linux host to be an NSX-T transport node.

Bare-Metal Server Support

This release introduces support for Bare-Metal native compute workloads running RHEL 7.4, 7.5, CentOS 7.4, and Ubuntu 16.0.4 operating systems that allows users to network Bare-Metal compute Continue reading

Hybrid IoT communications could be the best option

Using a sole communications technology doesn’t make sense in many Internet of Things (IoT) implementations, says connectivity vendor Sigfox.In fact, the company, which provides Low Power Wide Area (LPWA) networks, says one could use a hybrid that includes an unlicensed LPWA network along with a licensed, cellular LTE narrowband IoT (NB-IoT) or LTE Cat M1 network solution instead. That way you can support cheap, unlicensed IoT short messaging close up, as is offered by Sigfox and others, and then offload the sensor traffic to more expensive, licensed LTE cellular mobile networks as the devices move off home base, such as what happens in asset tracking, Sigfox says.To read this article in full, please click here

Hybrid IoT communications could be the best option

Using a sole communications technology doesn’t make sense in many Internet of Things (IoT) implementations, says connectivity vendor Sigfox.In fact, the company, which provides Low Power Wide Area (LPWA) networks, says one could use a hybrid that includes an unlicensed LPWA network along with a licensed, cellular LTE narrowband IoT (NB-IoT) or LTE Cat M1 network solution instead. That way you can support cheap, unlicensed IoT short messaging close up, as is offered by Sigfox and others, and then offload the sensor traffic to more expensive, licensed LTE cellular mobile networks as the devices move off home base, such as what happens in asset tracking, Sigfox says.To read this article in full, please click here

BrandPost: Security and the Cloud Go Hand-in-Hand: Are You Prepared?

Just because you’ve tapped into the vast resources of a cloud service provider to replace previously on-premises IT assets doesn’t lessen your management or cybersecurity burden. In fact, cloud migration creates new issues for network admins to focus on: migrations are inherently risky from a cyber perspective – data on the move is data that can be exploited in transit.Cloud providers are prone to proclaiming that their security is better than any single business can achieve, simply because they have more resources to apply to the issue. By now, we all know that simply throwing money at the challenge is no guarantee of success, so maybe take that with a dose of skepticism.To read this article in full, please click here

Episode 35 – Do You Really Need Good Engineers?

IT staffing budgets are shrinking and consequently many organizations are forgoing having strong engineering talent on staff. In this episode we explore the dynamics of staffing good engineers and whether or not it’s possible to remove that cost in modern networks.

 

Denise Donohue
Guest
Alia Atlas
Guest
Pete Welcher
Guest

Jordan Martin
Host
Eyvonne Sharp
Host
Russ White
Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 35 – Do You Really Need Good Engineers? appeared first on Network Collective.

We’ve Added a New Cisco CCNA Certification Course To Our Library!

Tune into Gabe Rivas’s most recent course release, Network Foundation Protection: Management Plane, the second in a series of eight CCNA security courses.

Network Foundation Protection is a security framework that provides with strategies to protect three functional areas of a device: Management Plane, Control Plane, and Data plane. In this Course we will focus on the management plane functionality and we will look at ways to protect and secure management access to network devices. We will compare the Pros and Cons of using an in-band vs an out-of-band management network and we will learn how to use network management protocols such as SNMP, NTP, SCP, RADIUS, TACACS+, Telnet, SSH, HTTP, and HTTPS to name a few. We will also learn the difference between the Cisco ACS and ISE servers and configure TACACS+ on ISE and an IOS device to provide with AAA for device administration. As a bonus, we will look at commonly used tools that can help you determine Cisco product vulnerabilities, best recommended software, and how to search bugs.

Prerequisites

If this was a single course covering the entire CCNA Security blueprint, the pre-requisite would have been the CCENT Certification or equivalent knowledge. Since this is Continue reading

Learning by Doing: Have You Heard of the Suusamyr Community Network in Kyrgyzstan?

Last week, the Internet Society together with our Kyrgyz chapter and the wider local community held discussions about Internet connectivity in remote areas in Bishkek, Kyrgyzstan. Approximately 35% of the Kyrgyz population use the Internet (ITU data, 2017) and most users are located in cities and urban areas.

In cooperation with its Kyrgyz chapter, the Internet Society is piloting the community networks approach in the village of Suusamyr, located some 150 kilometers south of the capital city Bishkek. We had an opportunity to visit this village of about 4000 people, tucked away in a wide valley surrounded by high mountains. The economic activity revolves around farming, horse and cattle keeping, and tourism.

While the final phase of the Suusamyr community network is still under implementation, we can already draw some lessons learnt from the preparatory and testing phases.

Partnerships

As a starting point, the Internet Society Kyrgyz chapter consolidated a partnership with the government, Internet Service Providers (ISP), and the local community in Suusamyr. The Kyrgyz government saw the opportunity for local economic development. Two ISPs agreed to lease their existing backbone infrastructure to connect the last mile. And most importantly, the local community embraced this initiative with a Continue reading

38 – DCNM 11 and VXLAN EVPN Multi-site

Hot networks served chilled, DCNM style

When I started this blog for Data Center Interconnection purposes some time ago, I was not planning to talk about network management tools. Nevertheless, I recently tested DCNM 11 to deploy an end-to-end VXLAN EVPN Multi-site architecture, hence, I thought about sharing with you my recent experience with this software engine. What pushed me to publish this post is that I’ve been surprisingly impressed with how efficient and time-saving DCNM 11 is in deploying a complex VXLAN EVPN fabric-based infrastructure, including the multi-site interconnection, while greatly reducing the risk of human errors caused by several hundred required CLI commands. Hence, I sought to demonstrate the power of this fabric management tool using a little series of tiny videos, even though I’m usually not a fan of GUI tools.

To cut a long story short, if you are not familiar with DCNM (Data Center Network Manager), DCNM is a software management platform that can run from a vCenter VM, a KVM machine, or a Bare metal server. It focuses on Cisco Data Center infrastructure, supporting a large set of devices, services, and architecture solutions. It covers multiple types of Data Center Fabrics; from the Storage Continue reading

RPKI and BGP: our path to securing Internet Routing

RPKI and BGP: our path to securing Internet Routing
RPKI and BGP: our path to securing Internet Routing

This article will talk about our approach to network security using technologies like RPKI to sign Internet routes and protect our users and customers from route hijacks and misconfigurations. We are proud to announce we have started deploying active filtering by using RPKI for routing decisions and signing our routes.

Back in April, articles including our blog post on BGP and route-leaks were reported in the news, highlighting how IP addresses can be redirected maliciously or by mistake. While enormous, the underlying routing infrastructure, the bedrock of the Internet, has remained mostly unsecured.

At Cloudflare, we decided to secure our part of the Internet by protecting our customers and everyone using our services including our recursive resolver 1.1.1.1.

From BGP to RPKI, how do we Internet ?

A prefix is a range of IP addresses, for instance, 10.0.0.0/24, whose first address is 10.0.0.0 and the last one is 10.0.0.255. A computer or a server usually have one. A router creates a list of reachable prefixes called a routing table and uses this routing table to transport packets from a source to a destination.  

On the Internet, network Continue reading

RPKI – The required cryptographic upgrade to BGP routing

RPKI - The required cryptographic upgrade to BGP routing

We have talked about the BGP Internet routing protocol before. We have talked about how we build a more resilient network and how we can see outages at a country-level via BGP. We have even talked about the network community that is vital to the operation of the global Internet.

Today we need to talk about why existing operational practices for BGP routing and filtering have to significantly improve in order to finally stop route leaks and hijacks; which are sadly pervasive in today’s Internet routing world. In fact, the subtle art of running a BGP network and the various tools (both online and within your a networks subsystems) that are vital to making the Internet routing world a safe and reliable place to operate need to improve.

Internet routing and BGP and security along with its operational expertise must improve globally.

RPKI - The required cryptographic upgrade to BGP routing
photo by Marco Verch by/2.0

Nothing specific triggered today’s writing except the fact that Cloudflare has decided that it's high-time we took a leadership role to finally secure BGP routing. We believe that each and every network needs to change its mindset towards BGP security both on a day-by-day and a long-term basis.

It's time to stop Continue reading