Yes, we are going to talk about destination routing. I know it sounds boring and archaic, and it is. But it is also necessary to contrast against another topic that I intend to introduce. As I scour PacketU, I see a substantial number of page views on articles about segmentation and VRFs. One thing I often tell my customers is that once a VRF-lite implementation reaches a certain scale, the configuration can become unwieldy.
This article is a first in a series where we will discuss MPLS. This technology enables VPNv4 and is a common method of networking. MPLS can connect VRFs without compromising their segmentation characteristics. In this first article, we are going to examine traditional destination-based routing. This is meant to nail down some of the typical behavior of an IPv4 routed network. These characteristics will not go away entirely, but it is important to understand how routing changes as we introduce label switching concepts.
Throughout this series, we will use a common topology. In later articles, we will expand as necessary to introduce the relevant topics.
To illustrate a point, I have pre-configured OSPF on all links and loopback 0 of all routers. In a minute, I will bring Continue reading
Both vendors were recently labeled as "challengers" by IHS Markit in the optical networking space behind heavyweights Cisco, Ciena, Huawei, and Nokia.
Every day there’s another company touting its “edge” product. Let’s start to separate the hype from reality.
The end user monitoring company added new cloud nodes on AWS, Azure, GCP, IBM, Tencent, and Alibaba regions, and extended its monitoring capabilities outside of its existing support.
The design differs from traditional Docker-based containers that allow for a host kernel to be shared by running containers, which leads to more interaction between the host and container pods.
The company’s platform uses blockchain to connect industrial IoT devices and synchronize and store credentials, certificates, policies, and data between edge and data center locations.
Stronger passwords are always better—at least this is the working theory of most folks in information technology, security or otherwise. Such blanket rules should raise your suspicions, however; the rule11 maxim if you haven’t found the tradeoff, you haven’t looked hard enough should apply to passwords, too.
Begin with this simple assertion: complex passwords are primarily a guard against password guessing attacks. Further, while the loss of a single account can be tragic for the individual user (and in some systems, the loss of a single password can have massive consequences!), for the system operator, it is the overall health of the system that matters. There is, in any system, a point at which enough accounts have been compromised that the system itself can no longer secure any information. This not only means the system can no longer hide information, it also means transactions within the system can no longer be trusted.
The number of compromised accounts varies based on the kind of system in view; effectively breaching Continue reading
Did you know INE Inc. Is partnering with Aviator Brewing in this years Hops for Hope Competition to raise money for Children’s Flight of Hope?
To aid us in our efforts we’re offering a chance to win a FREE All Access Pass if you donate to this great cause. From now until July 31st donate $25 or more to Children’s Flight of Hope and you’ll be entered into a drawing to win a one year All Access Pass on us! Click Here to donate!
What is Hops for Hope?
Triangle Hops for Hope is a fundraising event that pairs corporate teams with local breweries to create an original beer and raise money for charity. Teams showcase their creations to hundreds of attendees at an epic beer competition on September 22, 2018 at the Raleigh Beer Garden. It’s the perfect opportunity to mix corporate social responsibility, employee engagement, and support local craft breweries.
All proceeds benefit Children’s Flight of Hope, a 501(c)(3) organization that provides air transportation for children to access specialized medical care. Last year’s event raised more than $70,000 for CFOH!
If you’re in the Raleigh-Durham area and want to buy tickets to this event you can do so Continue reading
Enterprises should limit their investment in IPv6, a tactical protocol that Named Data Networking will displace.
As the network continues to evolve and change, IT professionals have to adapt and learn in order to keep up, and employers must find ways to verify that perspective.
Investing in hacking IoT: A startup in Israel has raised $12.5 million in investments to help governments hack the Internet of Things and other technologies, Forbes reports. What could go wrong? Toka says it’ll provide spy tools for whatever device its clients require, with a special focus on the IoT.
Encryption wars, part 348: U.S. FBI Director Christopher Wray says legislation allowing law enforcement agencies access to encrypted devices may be necessary if the government and private vendors cannot come to a compromise, Cyberscoop reports. The FBI has, for several years, complained that its investigations are hampered by encrypted devices, although many security experts say encryption backdoors will make us all less safe.
AI for good: More than 2,000 Artificial Intelligence experts have signed a pledge saying they will not participate in the development of legal, autonomous weapons systems, Gizmodo reports. Autonomous weapons posed a “clear and present danger to the citizens of every country in the world,” the pledge says.
Clamping down: The government in Iraq shut down the Internet for two days in response to protests there, CircleID says. The government ordered the disconnection of the fiber backbone that carries traffic for most of the country Continue reading