Archive

Category Archives for "Networking"

The moving target of IoT security

As the explosive growth of IoT tech continues; businesses, vendors and consumers all have to confront the issue that the world is more connected than ever before, with potentially gigantic consequences.The central problem with IoT security is that there is no central problem – IoT is a more complicated stack than traditional IT infrastructure and is much more likely to be made up of hardware and software from different sources.+ALSO ON NETWORK WORLD: Review: VMware’s vSAN 6.6 + Configuration errors in Intel workstations being labeled a security holeTo read this article in full, please click here

The moving target of IoT security

As the explosive growth of IoT tech continues; businesses, vendors and consumers all have to confront the issue that the world is more connected than ever before, with potentially gigantic consequences.The central problem with IoT security is that there is no central problem – IoT is a more complicated stack than traditional IT infrastructure and is much more likely to be made up of hardware and software from different sources.+ALSO ON NETWORK WORLD: Review: VMware’s vSAN 6.6 + Configuration errors in Intel workstations being labeled a security holeTo read this article in full, please click here

BGP in EVPN-Based Data Center Fabrics

EVPN is one of the major reasons we’re seeing BGP used in small- and mid-sized data center fabrics. In theory, EVPN is just a BGP address family and shouldn’t have an impact on your BGP design. In practice, suboptimal implementations might invalidate that assumption.

I've described a few EVPN-related BGP gotchas in BGP in EVPN-Based Data Center Fabrics, a section of Using BGP in Data Center Leaf-and-Spine Fabrics article.

Alex raised a number of valid points in his comments to this blog post. While they don't fundamentally change my view on the subject, they do warrant a more nuanced description. Expect an updated version of this part of the article when I return from Cisco Live Europe

Big Switch Networks Q&A: Work Smarter, Not Harder – How to Use a Next-Gen NPB for greater ROI from your APM/NPM Tools

Big Switch Networks Q&A: Work Smarter, Not Harder Thanks to all who joined us for the Big Switch Networks APM/NPM Report Webinar: Work Smarter, Not Harder – How to Use a Next-Gen NPB for greater ROI from your APM/NPM Tools. During the webinar, Big Switch Networks discussed how Big Mon integrates with leading APM/NPM tools, and how to integrate an SDN-based NPB solution into... Read more →

Linus Torvalds blasts Intel’s Meltdown fixes as ‘garbage’

The father of the Linux operating system has once again blasted Intel for its handling of the Spectre and Meltdown chip vulnerabilities due to the sloppiness of some of the patches. While he has a point, he’s also being a bit unfair, as well as unreasonable.Linus Torvalds is known for his blistering comments on the Linux mailing lists and frequently expresses his dissatisfaction with high levels of acidity. In this case, he was responding to an Amazon engineer on the Linux kernel mailing list regarding recent patches that have resulted in some systems randomly rebooting.To read this article in full, please click here

Linus Torvalds blasts Intel’s Meltdown fixes as ‘garbage’

The father of the Linux operating system has once again blasted Intel for its handling of the Spectre and Meltdown chip vulnerabilities due to the sloppiness of some of the patches. While he has a point, he’s also being a bit unfair, as well as unreasonable.Linus Torvalds is known for his blistering comments on the Linux mailing lists and frequently expresses his dissatisfaction with high levels of acidity. In this case, he was responding to an Amazon engineer on the Linux kernel mailing list regarding recent patches that have resulted in some systems randomly rebooting.To read this article in full, please click here

Cisco acquires Skyport Systems to bolster its hybrid cloud positioning

For today’s IT professional, hybrid clouds are a fact of life and will be for years to come. Digital businesses need to have an agile infrastructure foundation, which the cloud provides.However, rarely does one size fit all when it comes to cloud options. Some workloads are ideally suited for public cloud services, while others make more sense to go in a private cloud. With some apps, though, part of it runs in the traditional data center and part runs in a public cloud, such as Amazon Web Services (AWS), Microsoft Azure or Google Cloud Platform. There are also apps that run in a private data center but then need to connect to a SaaS application.To read this article in full, please click here

Episode 20 – Cloud Connectivity

The flexibility of cloud infrastructure has had a significant impact on the way that organizations build out their infrastructure, but the industry is continuing to learn just how complicated connecting to cloud resources can be.  In this episode of Network Collective we take a look at the challenges around cloud connectivity and talk about some ways to do it well.


Miguel Villareal
Guest
Scott Wheeler
Guest

Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 20 – Cloud Connectivity appeared first on Network Collective.

Responding to Readers: How are these thing discovered?

A while back I posted on section 10 routing loops; Daniel responded to the post with this comment:

I am curious how these things are discovered. You said that this is a contrived example, but I assume researchers have some sort of methodology to discover issues like this. I am sure some things have been found through operational mishap, but is there some “standardized” way of testing graph logic for the possibility of loops? I trust this is much easier to do today than even a decade ago.

You would think there would be some organized way to discover these kinds of routing loops, something every researcher and/or protocol designer might follow. The reality is far different—there is no systematic way that I know of to find this sort of problem. What happens, in real life, is that people with a lot of experience at the intersection of protocol design, the bounds of different ways of finding loop free paths (solving the loop free path problem), and a lot of experience in deploying and operating a network using these protocols, will figure these things out because they know enough about the solution space to look for them in the first Continue reading