Archive

Category Archives for "Networking"

Case Study: BGP Routing Policy

Talking about BGP routing policy mechanisms is nice, but it’s even better to see how real Internet Service Providers use those tools to implement real-life BGP routing policy.

Getting that information is incredibly hard as everyone considers their setup a secret sauce. Fortunately, there are a few exceptions; Pim van Pelt described the BGP Routing Policy of IPng Networks in great details. The article is even more interesting as he’s using Bird2 configuration language that looks almost like a programming language (as compared to the ancient route-maps used by vendors focused on “industry-standard” CLI).

Have fun!

Case Study: BGP Routing Policy

Talking about BGP routing policy mechanisms is nice, but it’s even better to see how real Internet Service Providers use those tools to implement real-life BGP routing policy.

Getting that information is incredibly hard as everyone considers their setup a secret sauce. Fortunately, there are a few exceptions; Pim van Pelt described the BGP Routing Policy of IPng Networks in great details. The article is even more interesting as he’s using Bird2 configuration language that looks almost like a programming language (as compared to the ancient route-maps used by vendors focused on “industry-standard” CLI).

Have fun!

What’s new in Calico Enterprise 3.18: Major workload-centric WAF updates and more

This release, we’re really excited about major improvements to Calico’s workload-centric WAF. We’ve made it much easier for users to configure and deploy the WAF in just a few clicks and we’ve also made it much easier to review and manage WAF alerts through our new Security Events feature.

Why do we need a new WAF for microservices?

Application security teams have deployed perimeter-based WAFs for decades to protect against common web attacks, with a focus on browser-based and client-side attacks. But with the rise of microservice architecture, there’s now a significant amount of HTTP traffic related to internal APIs. Moreover, with the growing use of open source and third-party software, all deployed within your Kubernetes cluster, you can no longer trust that the software running in your cluster is safe or secure. With this growing attack surface within your cloud environment, it’s critical to employ a workload-based WAF.

Calico’s workload-centric WAF

We know that security teams are struggling to keep up with the rapid pace of software development in their organizations, so we wanted to simplify the way that security teams secure application traffic. Further, we wanted to ensure that security teams can secure all workloads, not just their Continue reading

Day Two Cloud 209: Cloud Essentials – Virtual Private Clouds (VPCs)

Today's Day Two Cloud kicks off an occasional series on cloud essentials. For the first episode we discuss the Virtual Private Cloud (VPC). A VPC is an fundamental construct of a public cloud. It's essentially your slice of the shared cloud infrastructure, and you can launch and run other elements within a VPC to support your workload. Ned Bellavance walks through key VPC components including regions and AZs, networking and IP addressing, paid add-ons, data egress and associated charges, monitoring and troubleshooting, and basic security controls.

The post Day Two Cloud 209: Cloud Essentials – Virtual Private Clouds (VPCs) appeared first on Packet Pushers.

Day Two Cloud 209: Cloud Essentials – Virtual Private Clouds (VPCs)

Today's Day Two Cloud kicks off an occasional series on cloud essentials. For the first episode we discuss the Virtual Private Cloud (VPC). A VPC is an fundamental construct of a public cloud. It's essentially your slice of the shared cloud infrastructure, and you can launch and run other elements within a VPC to support your workload. Ned Bellavance walks through key VPC components including regions and AZs, networking and IP addressing, paid add-ons, data egress and associated charges, monitoring and troubleshooting, and basic security controls.

10 questions to ask about secure service edge (SSE)

In 2019, Gartner created the term secure access service edge (SASE) to describe a cloud-based service that combines networking and security in order to give remote workers safe access to internet-based resources.Gartner had put its finger on a new set of challenges that enterprise IT faced as employees shifted to remote work during Covid and applications migrated to the cloud. But Gartner overshot the runway a bit; vendors were caught flatfooted and scrambled to cobble together full suites of SASE features.On the customer side, a recent Gartner survey of CISOs revealed that “a majority of buyers are planning for a two-vendor strategy for SASE,” with security and networking teams making separate buying decisions rather than opting for single-vendor SASE.To read this article in full, please click here

10 questions to ask about secure service edge (SSE)

In 2019, Gartner created the term secure access service edge (SASE) to describe a cloud-based service that combines networking and security in order to give remote workers safe access to internet-based resources.Gartner had put its finger on a new set of challenges that enterprise IT faced as employees shifted to remote work during Covid and applications migrated to the cloud. But Gartner overshot the runway a bit; vendors were caught flatfooted and scrambled to cobble together full suites of SASE features.On the customer side, a recent Gartner survey of CISOs revealed that “a majority of buyers are planning for a two-vendor strategy for SASE,” with security and networking teams making separate buying decisions rather than opting for single-vendor SASE.To read this article in full, please click here

10 questions to ask about secure service edge (SSE)

In 2019, Gartner created the term secure access service edge (SASE) to describe a cloud-based service that combines networking and security in order to give remote workers safe access to internet-based resources.Gartner had put its finger on a new set of challenges that enterprise IT faced as employees shifted to remote work during Covid and applications migrated to the cloud. But Gartner overshot the runway a bit; vendors were caught flatfooted and scrambled to cobble together full suites of SASE features.On the customer side, a recent Gartner survey of CISOs revealed that “a majority of buyers are planning for a two-vendor strategy for SASE,” with security and networking teams making separate buying decisions rather than opting for single-vendor SASE.To read this article in full, please click here

BrandPost: Always-on networking for always-on SMBs

By: Amol Mitra, Vice President and General Manager, Global Small and Medium Business at HPE Aruba Networking.Soaring user expectations for mobile connectivity no matter where individuals live, work, educate, shop, recreate, or dine has many small and mid-sized businesses searching for fast, reliable, flexible, and secure Wi-Fi solutions that are delivered affordably and require little or no technology expertise to manage.Until recently, finding such a solution was a challenge. Fortunately, there are now options that provide entities like yours with modern networking infrastructure to fit SMB requirements, ensuring you can mobilize employees, deliver guest Wi-Fi to customers, and stay competitive in today’s rapidly evolving marketplace.To read this article in full, please click here

BrandPost: Always-on networking for always-on SMBs

By: Amol Mitra, Vice President and General Manager, Global Small and Medium Business at HPE Aruba Networking.Soaring user expectations for mobile connectivity no matter where individuals live, work, educate, shop, recreate, or dine has many small and mid-sized businesses searching for fast, reliable, flexible, and secure Wi-Fi solutions that are delivered affordably and require little or no technology expertise to manage.Until recently, finding such a solution was a challenge. Fortunately, there are now options that provide entities like yours with modern networking infrastructure to fit SMB requirements, ensuring you can mobilize employees, deliver guest Wi-Fi to customers, and stay competitive in today’s rapidly evolving marketplace.To read this article in full, please click here

Layer-3 WAN Handoff (L3Out) in VXLAN/EVPN Fabrics

I got a question from a few of my students regarding the best way to implement end-to-end EVPN across multiple locations. Obviously there’s the multi-pod and multi-site architecture for people believing in the magic powers of stretching VLANs across the globe, but I was looking for something that I could recommend to people who understand that you have to have a L3 boundary if you want to have multiple independent failure domains (or availability zones).

Layer-3 WAN Handoff (L3Out) in VXLAN/EVPN Fabrics

I got a question from a few of my students regarding the best way to implement end-to-end EVPN across multiple locations. Obviously there’s the multi-pod and multi-site architecture for people believing in the magic powers of stretching VLANs across the globe, but I was looking for something that I could recommend to people who understand that you have to have a L3 boundary if you want to have multiple independent failure domains (or availability zones).

Heavy Wireless 010: Using Drones In Your WLAN Consulting

Drones can be a useful tool for outdoor wireless surveys. Drones can help an engineer figure out the best place to mount a radio, get line of sight between points, confirm antenna orientation, and save a lot of climbing up and down ladders. On today's Heavy Wireless, Keith Parsons speaks with Mike Wade, a wireless design engineer who uses drones in his survey work, about the certifications and requirements necessary to add a drone to your toolkit.

The post Heavy Wireless 010: Using Drones In Your WLAN Consulting appeared first on Packet Pushers.

Heavy Wireless 010: Using Drones In Your WLAN Consulting

Drones can be a useful tool for outdoor wireless surveys. Drones can help an engineer figure out the best place to mount a radio, get line of sight between points, confirm antenna orientation, and save a lot of climbing up and down ladders. On today's Heavy Wireless, Keith Parsons speaks with Mike Wade, a wireless design engineer who uses drones in his survey work, about the certifications and requirements necessary to add a drone to your toolkit.

Heavy Networking 698: Integrating Edge Networking And Compute With VMware Edge Cloud Orchestrator (Sponsored)

On today’s Heavy Networking we explore the edge. But where is the edge? In today's conversation with sponsor VMware, it's a remote location where data is being generated. It could be end users in a branch office, or IoT devices and sensors on a factory floor. These edge locations needs integrated compute and networking to run application workloads while also being able to  connect to cloud applications and services. We discuss the VMware Edge Cloud Orchestrator, which provides unified management for networking and compute at remote sites.

The post Heavy Networking 698: Integrating Edge Networking And Compute With VMware Edge Cloud Orchestrator (Sponsored) appeared first on Packet Pushers.

Heavy Networking 698: Integrating Edge Networking And Compute With VMware Edge Cloud Orchestrator (Sponsored)

On today’s Heavy Networking we explore the edge. But where is the edge? In today's conversation with sponsor VMware, it's a remote location where data is being generated. It could be end users in a branch office, or IoT devices and sensors on a factory floor. These edge locations needs integrated compute and networking to run application workloads while also being able to  connect to cloud applications and services. We discuss the VMware Edge Cloud Orchestrator, which provides unified management for networking and compute at remote sites.

Tech Bytes: Introducing The Network Automation Forum And AutoCon Event (Sponsored)

Today on the Tech Bytes podcast we discuss the Network Automation Forum (NAF) and its inaugural independent conference--AutoCon 0. The networking industry has been taking about automation forever, but most engineers and organizations don't get much beyond a few scripts. The Network Automation Forum wants to change that by serving as a salon where enterprises, service providers, and vendors can talk openly about what works, what doesn't, and how to advance the state of the art.

The post Tech Bytes: Introducing The Network Automation Forum And AutoCon Event (Sponsored) appeared first on Packet Pushers.

Tech Bytes: Introducing The Network Automation Forum And AutoCon Event (Sponsored)

Today on the Tech Bytes podcast we discuss the Network Automation Forum (NAF) and its inaugural independent conference--AutoCon 0. The networking industry has been taking about automation forever, but most engineers and organizations don't get much beyond a few scripts. The Network Automation Forum wants to change that by serving as a salon where enterprises, service providers, and vendors can talk openly about what works, what doesn't, and how to advance the state of the art.