The post Noction releases IRP 3.10 appeared first on Noction.
A while ago we published a guest blog post by Christoph Jaggi explaining the high-level security challenges of most SD-WAN solutions… but what about the low-level details?
Sergey Gordeychik dived deep into implementation details of SD-WAN security in his 35C3 talk (slides, video).
TL&DW: some of the SD-WAN boxes are as secure as $19.99 Chinese webcam you bought on eBay.
Read more ...One of my goals this year was to spend more time doing Python development so I thought I’d take a break from the MPLS deep dives (no worries – there are still lots more coming) and insert some development type things along the way. One of the opensource projects I’ve used in the past was ExaBGP by the folks over at Exa-Networks. Since then – they’ve released a new version (4) and I’ve been keen to play around with it some more.
The last time I played with ExaBGP was strictly from a testing perspective. This time – I want to focus on some use cases that are closer to real life. Things you might actually do – or at the very least – try. So to start things off – we’re going to once again start with a basic lab that looks like this…

So here we have our 2 friendly end users connected at the head to a small simple network. left_user is attached to an Ubuntu 18 server called ‘bgp_peer’ which is then connected to two other routers (Juniper vMX) and finally our friendly right_user. To start with – we’re going to configure the routers vMX1 and Continue reading
4 steps to configure RIPng. Define a RIPng group Assign interfaces to the RIPng group Define a routing policy to export routes Assign the routing policy to the RIPng group Configuration Define a RIPng group. cmd set protocols ripng group RIPNG-GROUP Assign...continue reading
VMware loses one executive and gains another from Oracle; Puppet gets a new CEO.
Huawei and ZTE's list of woes continue as Germany, Canada, Poland, and the U.S. all appear to be working to impose new bans.
JHComp, an ISP based in the Czech Republic, migrated from its legacy Vyatta vRouters to the 6WIND platform without having to reconfigure its SuperMicro white boxes.
The cloud giant wants the rest of the industry to get behind its open source confidential computing framework. And it launched a $15K challenge to accelerate this technology.
TL;DR : Code is here. Help yourself ? Introduction to the Net-DevOps Container: Recently, Ethan Banks posted a very interesting blog post where he struggled a little bit to set up a Python environment. If I understood correctly, he wanted to increase his skills set in particular with NetDevOps. He fairly pointed that it could be a bit complicated to handle all the dependencies you might need. Based on the fact that you also want to start fresh between projects you want to spend the least amount of time resolving these kinds of issues and maximize your time on something that is valuable: Learn how to Automate or just Automate your network environment. A lot of people are in a [Read More...]
The post Creating a Net-DevOps environment. appeared first on VPackets.net.
The Fujitsu components are layered on top of a previous Shaw coax upgrade to provide network speeds in excess of 1 Gb/s.

The concept of logging dates to sailing ships and they got it wrong too.
The post Network Dictionary: logging appeared first on EtherealMind.
This approach provides a granular level of security control by matching functionality to specific use cases and business requirements.
The promises of the public cloud are both tantalizing and frightening. On today's Day Two Cloud podcast we talk about how to do cloud right to maximize success, while also not putting yourself out of a job. Our guest is Kenny Lowe, Senior Principal Azure Stack Technologist at Dell EMC.
The post Day Two Cloud 002: How To Do Cloud Right appeared first on Packet Pushers.
CEO Tim Eades won’t comment on his company’s valuation. But he says the investment puts it on track for an IPO and profitability within the next 12 to 18 months.