Archive

Category Archives for "Networking"

IDG Contributor Network: When it comes to your IT infrastructure, visibility matters

CIOs everywhere are faced with a common question: do we have the right infrastructure for our business today and tomorrow? The question is complicated since there is no right answer – even though the major public cloud providers would say otherwise.Most large companies have hybrid infrastructures, comprising internal data centers, private clouds and at least one public cloud service. Increasingly, companies are using more than one public cloud service, as each one has something different to offer and prices are always changing. These choices provide needed flexibility and the potential for carving out the perfect environment for a company’s multifarious needs.To read this article in full, please click here

We’ve Added A New Cybersecurity Certified Penetration Testing Engineer Course To Our Library!

Cybersecurity has become an integral part of any IT system. This course is focused on the 5 key elements of penetration testing: Information Gathering, Scanning, Enumeration, Exploitation, and Reporting. These key areas build upon each other and provide you with the technical know-how to gear you up for a career in penetration testing.


 


Who Should Watch:

This course is for students who want to become a penetration tester. It is recommended to have at least 3 years experiences with networking and basic security knowledge. Other cybersecurity certifications are always a help.


What You’ll Learn:

In this course you will learn the required skills to pass the CPTE demonstration practical knowledge of penetration testing and cybersecurity. At the end of this course you will have the understanding of the basic course requirements to pass the exam and conduct penetration tests.


About The Instructor:

Joe Brinkley has over 10 years of professional IT and Information Security experience under his belt. Joe has always been a tinkerer, geek and all around “computer guy.” He has numerous certifications including the CPTE.

All Access Pass members can view this course on our streaming site. You can also purchase this course at ine.com.

We have lift off – Rocket Loader GA is mobile!

We have lift off - Rocket Loader GA is mobile!

Today we’re excited to announce the official GA of Rocket Loader, our JavaScript optimisation feature that will prioritise getting your content in front of your visitors faster than ever before with improved Mobile device support. In tests on www.cloudflare.com we saw reduction of 45% (almost 1 second) in First Contentful Paint times on our pages for visitors.

We have lift off - Rocket Loader GA is mobile!
Photo by SpaceX / Unsplash

We initially launched Rocket Loader as a beta in June 2011, to asynchronously load a website’s JavaScript to dramatically improve the page load time. Since then, hundreds of thousands of our customers have benefited from a one-click option to boost the speed of your content.

With this release, we’ve vastly improved and streamlined Rocket Loader so that it works in conjunction with mobile & desktop browsers to prioritise what matters most when loading a webpage: your content.

Visitors don’t wait for page “load”

To put it very simplistically - load time is a measure of when the browser has finished loading the document (HTML) and all assets referenced by that document.

When you clicked to visit this blog post, did you wait for the spinning wheel on your browser tab to start reading this content? You Continue reading

Cisco taps AMD to power a hyper-dense server for data centers, edge computing

Cisco this week broadened its server family with a high-density box aimed at handling compute intensive data center workloads and distributed edge computing environments.The Cisco C-Series C4200 multinode rack server is a 2RU box comprised of the C4200 chassis and C125 server nodes which Cisco says brings up to 128% higher processor core density and 33% more memory compared to its existing two-socket UCS M5 rack servers.  The C4200 chassis can house up to four server nodes.[ Now see who's developing quantum computers.] “As computing demand shifts from large, traditional data centers to include smaller, more distributed environments at the edge, the ability to mix form factors seamlessly in ‘micro data centers,’ and to manage and automate operations from the cloud becomes vitally important,” wrote Kaustubh Das, Cisco vice president of strategy and product development, storage in its Computing Systems Product Group in a blog about the new server.To read this article in full, please click here

Cisco taps AMD to power a hyper-dense server for data centers, edge computing

Cisco this week broadened its server family with a high-density box aimed at handling compute intensive data center workloads and distributed edge computing environments.The Cisco C-Series C4200 multinode rack server is a 2RU box comprised of the C4200 chassis and C125 server nodes which Cisco says brings up to 128% higher processor core density and 33% more memory compared to its existing two-socket UCS M5 rack servers.  The C4200 chassis can house up to four server nodes.[ Now see who's developing quantum computers.] “As computing demand shifts from large, traditional data centers to include smaller, more distributed environments at the edge, the ability to mix form factors seamlessly in ‘micro data centers,’ and to manage and automate operations from the cloud becomes vitally important,” wrote Kaustubh Das, Cisco vice president of strategy and product development, storage in its Computing Systems Product Group in a blog about the new server.To read this article in full, please click here

Link Propagation 121: All The Links Fit To Click

Welcome to Link Propagation, a Packet Pushers newsletter. Link Propagation is included in your free membership. Each week we hand-select the most relevant practitioner blog posts, tech news, and product announcements. We age them in oak barrels for up to seven days and then distill them using ancient craft techniques handed down by Tim Berners-Lee. […]

Living in Times of Digital Uncertainty: Are Control and Trust Compatible?

The Cambridge Analytica data misuse is the most recent high-profile incident to impact Internet trust. Trust – or the lack thereof – is the term used to describe much of the current state of the Internet. For years now, we have been hearing about a decline in user trust because of fears of surveillance, cybercrime, data breaches, crack downs on speech, or misuse of their data.

However, recently updated data from a recently released edition of CIGI’s annual survey on Trust seems to shatter commonly-held views on the state of trust and raise some novel questions. While the survey covers a wide range of issues from privacy to e-commerce and online habits, one particular result is rather striking:

Three quarters of respondents (73%) said that they agree with the statement “overall, I trust the Internet.” Last year only 56% said that. The trust was highest in China (91%) and India (90%).

This result appears to contradict the assumption that overall trust in the Internet is diminishing.

If, indeed, there is an overall increase in trust, then the first question we should ask is: what type of trust are we talking about?

WISP Design – OSPF “Leapfrog” path for traffic engineering

Introduction

One challenge that every WISP owner or operator has faced is how to leverage unused bandwidth on a backup path to generate more revenue.

For networks that have migrated to MPLS and BGP, this is an easier problem to solve as there are tools that can be used in those protocols like communities or MPLS TE to help manage traffic and set policy.

However, many WISPs rely solely on OSPF and cost adjustment to attempt to influence traffic. Alternatively, trying to use policy routing can lead to a design that doesn’t failover or scale well.

Creating a bottleneck on a single path

WISPs that are OSPF routed will often have a primary path back to the Internet at one or more points in the network typically from a tower that aggregates multiple backhauls.

As more towers are added that rely on this path, it can create a bottleneck while other paths are unused.

ospf-leapfrog-pic1

Creating an alternate best path by leapfrogging another router

One way to solve this problem is to use VLANs to create another subnet for OSPF to form an adjacency.

By tagging the VLAN from Tower 6 through Tower 3 and into Tower 4, a new path Continue reading

WISP Design – OSPF “Leapfrog” path for traffic engineering

Introduction

One challenge that every WISP owner or operator has faced is how to leverage unused bandwidth on a backup path to generate more revenue.

For networks that have migrated to MPLS and BGP, this is an easier problem to solve as there are tools that can be used in those protocols like communities or MPLS TE to help manage traffic and set policy.

However, many WISPs rely solely on OSPF and cost adjustment to attempt to influence traffic. Alternatively, trying to use policy routing can lead to a design that doesn’t failover or scale well.

Creating a bottleneck on a single path

WISPs that are OSPF routed will often have a primary path back to the Internet at one or more points in the network typically from a tower that aggregates multiple backhauls.

As more towers are added that rely on this path, it can create a bottleneck while other paths are unused.

ospf-leapfrog-pic1

Creating an alternate best path by leapfrogging another router

One way to solve this problem is to use VLANs to create another subnet for OSPF to form an adjacency.

By tagging the VLAN from Tower 6 through Tower 3 and into Tower 4, a new path Continue reading

Show 392: Debating The Value Of Expert Certifications

On today’s Weekly Show the Packet Pushers jump on the live grenade that is the debate over the value of IT certifications.

Spurred by Greg’s blog about giving up his CCIE status, this episode looks at the value of technology certifications such as the CCIE and others.

Greg and guests Mike Fryar, Chris Kluka, and Jeremy Filliben discuss the benefits and limits of professional certifications, the differences between certifications and actual skills, whether certifications represent a standardized body of knowledge or just a set of instructions, and how the industry might better foster learning.

Sponsor: InterOptic

InterOptic offers high-performance, high-quality optics at a fraction of the cost. Find out more at InterOptic.com, and if you re attending Interop 2018 in Vegas, stop by the InterOptic booth to learn how they can help you spec the right optics for your network.

Sponsor: Cumulus Networks

The Cumulus Linux network OS is simple, open, untethered Linux that can run on more than 70 hardware platforms and help you transition from your legacy infrastructure. Cumulus Networks is Web-scale networking for the digital age. Go to cumulusnetworks.com to find out more.

Show Links:

Quitting My CCIE Status – Greg Ferro

Jeremy Filliben.com

Continue reading

Install Netmiko on Windows

Netmiko develop by kirk Byers is open source python library  based on Paramiko which simplifies SSH management to network devices . Netmiko library  makes task to automate . Its very tedious to find out the procedure to install Netmiko in Windows enviornment.Let’s make out task simple :- Steps: Install Anaconda ( https://www.anaconda.com/download/) From the Anaconda […]

Install Netmiko on Windows

Netmiko develop by kirk Byers is open source python library  based on Paramiko which simplifies SSH management to network devices .

Netmiko library  makes task to automate . Its very tedious to find out the procedure to install Netmiko in Windows enviornment.Let’s make out task simple :-

Steps:

  • Install Anaconda ( https://www.anaconda.com/download/)
  • From the Anaconda shell, run “conda install paramiko”.a
  • From the Anaconda shell, run “pip install scp”.b
  • Install git for windows (https://www.git-scm.com/downloads)
  • Clone Netmiko from Git Bash Window (https://github.com/ktbyers/netmiko).1
  • Change directory to netmiko.2
  • Run  python setup.py install from Git Bash Window3
  • Check on Python console to confirm the availabilty of paramiko and netmiko libraryresult

Its done.. Enjoy automating tasks !!!!

 

 

Today we mitigated 1.1.1.1

Today we mitigated 1.1.1.1

On May 31, 2018 we had a 17 minute outage on our 1.1.1.1 resolver service; this was our doing and not the result of an attack.

Cloudflare is protected from attacks by the Gatebot DDoS mitigation pipeline. Gatebot performs hundreds of mitigations a day, shielding our infrastructure and our customers from L3/L4 and L7 attacks. Here is a chart of a count of daily Gatebot actions this year:

Today we mitigated 1.1.1.1

In the past, we have blogged about our systems:

Today, things didn't go as planned.

Gatebot

Today we mitigated 1.1.1.1

Cloudflare’s network is large, handles many different types of traffic and mitigates different types of known and not-yet-seen attacks. The Gatebot pipeline manages this complexity in three separate stages:

  • attack detection - collects live traffic measurements across the globe and detects attacks
  • reactive automation - chooses appropriate mitigations
  • mitigations - executes mitigation logic on the edge

The benign-sounding "reactive automation" part is actually the most complicated stage in the pipeline. We expected that from the start, which is why we implemented this stage using a custom Functional Reactive Programming (FRP) framework. If you want to know more about it, see the talk and the presentation.

Continue reading