Archive

Category Archives for "Networking"

Why is the Feasibility Condition Less Than?

A reader recently emailed me with this question: Why isn’t the condition for a Feasible Successor set to less than (<), rather than less than of equal (<=), in EIGRP? It certainly seems, as noted in the email, that this rules out a lot of possible possible loop free alternate paths. The network below will be used to illustrate.

First, assume all links are cost of 1 except D->C, which is cost of 2. Here D will choose B as the Successor, and the FC will be set to 2. The RD of C will be 1, so C will be an FS. Now consider two failures. The first failure is D->B. D will immediately reroute to the FS, which is C, without changing the FC. This works, because C’s cost to 100::/64 via D is 4, much higher than it’s cost to 100::64 along C->A. Now consider what happens if A->100::/64 fails. If the timing of the query “works right,” C and B will be notified first, then finally D. Even if D is somehow notified before C, and D switches to C as its FS, the traffic is dropped, rather than looped—so all is happy.

Now change the situation a little. Assume the A->C link is cost Continue reading

Tune in to Our Q&A tomorrow!


Don’t miss our CCNA/CCNP Kickoff with Keith Bogart Tomorrow!

 

Join Keith May 8th at 10 am PST/ 1 pm EST for his CCNA/CCNP Kickoff.

This is a FREE live session that is open to everyone. In this open forum, you’ll have the opportunity to ask Keith all of your questions regarding the CCNA or CCNP Routing & Switching exam and related technologies.

Get all of your questions answered by an experienced industry expert! Just click here.

Enterprises are moving SD-WAN beyond pilot stages to deployment

Research conducted by market research firm IHS Markit found that 74 percent of firms surveyed had SD-WAN lab trials in 2017, and many of them plan to move into production this year.The report, titled “The WAN Strategies North America” (pdf, registration required), found security is the number one network concern by a wide margin and the top reason to invest in new infrastructure, as companies must fend off the constant threat of cyber attacks.There are other reasons, as well, such as traffic growth, company expansion, adoption of the Internet of things (IoT), the need for greater control over the WAN, and the need to put WAN costs on a sustainable path.To read this article in full, please click here

Enterprises are moving SD-WAN beyond pilot stages to deployment

Research conducted by market research firm IHS Markit found that 74 percent of firms surveyed had SD-WAN lab trials in 2017, and many of them plan to move into production this year.The report, titled “The WAN Strategies North America” (pdf, registration required), found security is the number one network concern by a wide margin and the top reason to invest in new infrastructure, as companies must fend off the constant threat of cyber attacks.There are other reasons, as well, such as traffic growth, company expansion, adoption of the Internet of things (IoT), the need for greater control over the WAN, and the need to put WAN costs on a sustainable path.To read this article in full, please click here

Network Break 183: VMware Embraces Cloud Networking; Cisco Acquires Accompany

Take a Network Break! VMware announces its Virtual Cloud Network vision and outlines the product portfolio to bring that vision to life. Dell Technology World showcases new servers and storage and cements Dell’s one-stop-shop strategy. Cisco spends $270 million to buy relationship intelligence purveyor Accompany.

Cisco also shed its service provider video business, Anuta Networks makes its orchestration platform available as SaaS, and the Lojack laptop recovery software suffers a serious vulnerability.

Meanwhile, a Webex vulnerability enables remote code execution, Arista shares dip despite a strong quarter, and Juniper shares rise slightly despite a poor one.

Get links to all these stories after our sponsor message.

Sponsor: Couchdrop

Send files to the cloud quickly and easily with Couchdrop, a cloud-based service that uses the Secure Copy Protocol to transfer files. Couchdrop integrates with Dropbox, GoogleDrive, Amazon S3 buckets and more. Head to Couchdrop.io to get details, and get two months free with a one-year subscription.

Show Links:

VMware Advances Networking for the Digital Era with the Virtual Cloud Network – VMware

Dell outlines a one-stop-shopping portfolio for technology-hungry businesses – Diginomica

Cisco Announces Intent to Acquire Accompany – Cisco

Permira Funds to Acquire Cisco’s SPVSS Business – Cisco

Continue reading

What is BGP Hijacking, Anyway?

Two weeks ago, we learned about yet another routing security incident, namely the hijack of BGP routes to the Amazon DNS infrastructure, used as a stepping stone to steal about $150,000 of Ethereum cryptocurrency from MyEtherWallet.com. We’ve been talking a lot lately about BGP hijacking, digging into the details of what happened in this post. But maybe we need to back up a minute and answer: What in the world is BGP hijacking, anyway, and why does it matter? Here, we’ll explain the basics and how network operators and Internet Exchange Points can join MANRS to help solve the problem.

What is BGP?

BGP, or Border Gateway Protocol, is used to direct traffic across the Internet. Networks use BGP to exchange “reachability information” – networks they know how to get to. Any network that is connected to the Internet eventually relies on BGP to reach other networks.

What is BGP Hijacking?

In short, BGP hijacking is when an attacker disguises itself as another network; it announces network prefixes belonging to another network as if those prefixes are theirs. If this false information is accepted by neighboring networks and propagated further using BGP, it distorts the “roadmap” of the Continue reading

The Week in Internet News: Criminal Cryptocurrency Miners Target IoT

Cryptomining the IoT: Cryptocurrency mining has caused a run on high-powered graphics cards, but criminal groups are looking for ways to exploit other computing power for mining operations. One target is Internet of Things networks because of the lack of strong security on many IoT devices, reports ZDNet. IoT cryptojacking malware is becoming popular on underground forums.

Secrecy for Slackers: Have you ever sent a message on Slack that you didn’t want your boss to see? Or maybe you’re concerned that someone could forward your Slack conversations. Apparently, you’re not alone. Security consulting firm Minded Security has created a tool, called Shhlack, that allows for encrypted messages in the popular messaging app, Motherboard says.

Hey, something worked! Law enforcement authorities in several countries worked together to take down WebStresser, a large DDoS-for-hire service, in late April. In the week following the takedown, DDoS attacks observed by one security provider dropped by about 60 percent in Europe, BleepingComputer reports.  The drop may have been only temporary, however.

Fake news hits the courts: Malaysia’s controversial new has its first casualties. A Danish citizen has pleaded guilty maliciously publishing a fake news report by posting a YouTube video that appeared to contradict Continue reading

HPE’s new Nimble flash arrays offer storage guarantee, NVMe and SCM support

HPE is rolling out the next generation of its Nimble Storage platform, overhauled to better meet the ever-increasing performance demands on data-center workloads, including real-time web analytics, business intelligence, and mission-critical enterprise resource applications.The new HPE Nimble Storage All Flash arrays as well as Nimble Adaptive Flash arrays for hybrid implementations (mixing solid state drives and hard disk drives, for example), are generally available from May 7 and have both been engineered to support NVMe (non-volatile memory express), an extremely fast communications protocol and controller designed to move data to and from SSDs via the PCIe bus standard. NVMe SSDs are expected to offer two orders of magnitude speed improvement over prior SSDs.To read this article in full, please click here

HPE’s new Nimble flash arrays offer storage guarantee, NVMe and SCM support

HPE is rolling out the next generation of its Nimble Storage platform, overhauled to better meet the ever-increasing performance demands on data-center workloads, including real-time web analytics, business intelligence, and mission-critical enterprise resource applications.The new HPE Nimble Storage All Flash arrays as well as Nimble Adaptive Flash arrays for hybrid implementations (mixing solid state drives and hard disk drives, for example), are generally available from May 7 and have both been engineered to support NVMe (non-volatile memory express), an extremely fast communications protocol and controller designed to move data to and from SSDs via the PCIe bus standard. NVMe SSDs are expected to offer two orders of magnitude speed improvement over prior SSDs.To read this article in full, please click here

HPE’s new Nimble flash arrays offer storage guarantee, NVMe and SCM support

HPE is rolling out the next generation of its Nimble Storage platform, overhauled to better meet the ever-increasing performance demands on data-center workloads, including real-time web analytics, business intelligence, and mission-critical enterprise resource applications.The new HPE Nimble Storage All Flash arrays as well as Nimble Adaptive Flash arrays for hybrid implementations (mixing solid state drives and hard disk drives, for example), are generally available from May 7 and have both been engineered to support NVMe (non-volatile memory express), an extremely fast communications protocol and controller designed to move data to and from SSDs via the PCIe bus standard. NVMe SSDs are expected to offer two orders of magnitude speed improvement over prior SSDs.To read this article in full, please click here

Using 4-Byte BGP AS Numbers with EVPN on Junos

After documenting the basic challenges of using EBGP and 4-byte AS numbers with EVPN automatic route targets, I asked my friends working for various vendors how their implementation solves these challenges. This is what Krzysztof Szarkowicz sent me on specifics of Junos implementation:

To learn more about EVPN technology and its use in data center fabrics, watch the EVPN Technical Deep Dive webinar.

Read more ...

Amateur Radio and FT8

My interest in SDR got me into Amateur Radio. One reason was that so that I could transmit on non-ISM bands and with more power. Turns out the 2.3GHz band available to Amateur Radio operators is much quieter than the 2.4GHz band where WiFi, bluetooth, microwave ovens, drones, cordless phones and everything else lives. Shocker, I know.

Amateur radio doesn’t just have voice and morse code, there’s also digital modes.

A popular mode is FT8. It’s only used to exchange signal reports, so there’s no chatting. It’s in fact often practically unattended.

It’s a good way to check the quality of your radio setup, and the radio propagation properties that depend on how grumpy the ionosphere is at the moment.

If you transmit, even if you nobody replies, you’ll be able to see on PSKReporter who heard you, which is useful.

Because propagation should be pretty much symmetric, receiving a strong signal should mean that two-way communication is possible with the station. Though FT8 is a slow mode that will get through where others won’t, so a weak FT8 signal means that any voice communication is very unlikely to get through.

Unfortunately unlike WSPR the standard FT8 Continue reading