Archive

Category Archives for "Networking"

IDG Contributor Network: Addressing IoT security with DNS and DNSSEC

We are witnessing a huge explosion in the number of Internet of Things (IoT) devices as a growing number of new “smart” consumer items, appliances, and vehicles are brought to market. While these devices introduce conveniences and enable new exciting applications and experiences, they introduce a high level of security risk to business and consumer networks. This is because manufacturers are frequently lax when it comes to the security implications of deploying smart connected devices in the wild.So why does IoT pose a potential risk to consumers? These devices fall under the “set it and forget it” bucket. They are typically easy to set up – you connect them to whatever network or networks you use regularly and then you don’t have to think about the devices again. Consumers are focused on functionality instead of the way the devices are communicating with the outside world, about updates to the devices, or about the network security characteristics of the devices.  To read this article in full, please click here

Episode 25 – MPLS Part 1

In a new protocol deep-dive series, Nick Russo and Russ White return to discuss MPLS. In part one, we discuss the primary use cases for MPLS, label allocation, and what SD-WAN means for the future of MPLS.


Show Notes:

  1. MPLS solves 3 fundamental problems, individually or in concert
    1. Multi-tenancy/VPNs
    2. Traffic engineering
    3. Fast reroute
  2. 4 bytes in a shim header, technically not a label, but we call it that
    1. 20 bits for label value, 2^20 ~= 1 million values (this is important)
    2. 3 bits for EXP, QoS really
    3. 1 S-bit to signal bottom of stack
    4. 8 bits TTL
  3. Label depth is theoretically infinite, but some HW platforms have a tolerance
  4. Many ways to allocate labels
    1. LDP transport
    2. LDP pseudowire
    3. BGP labeled unicast
    4. BGP based IP VPNs (VPNv4/v6)
    5. BGP pseudowire
    6. SR (really built into OSPF and ISIS for distribution)
    7. RSVP-TE
  5. Some forward rules are worth mentioning (basic LDP/BGP-LU environment)
    1. If route learned via IGP/static, LDP label must be used
    2. If route learned via BGP, BGP label must be used
    3. No exceptions
  6. Penultimate Hop Popping: second to last hop removes topmost label when signaled with imp-null from last hop along a given LSP, saves a lookup
  7. Is MPLS is a tunnel or not:
    1. Continue reading

Countries Consider Penalties for Spreading ‘Fake News’

A handful of countries have recently considered passing new laws or regulations to combat so-called fake news, with Malaysia adding penalties of up to six years in jail for distributors.

Malaysia’s controversial Anti-Fake News 2018 bill, which passed this week, also includes a fine of US$123,000. An earlier draft of the legislation included jail time of up to 10 years. Under the new law, fake news is “news, information, data and reports which is or are wholly or partly false,” as determined by Malaysian courts.

The new Malaysian law covers digital news outlets, including video and audio, and social media, and it applies to anyone who maliciously spreads fake news inside and outside the country, including foreigners, as long as Malaysia or its citizens are affected.

Eric Paulsen, cofounder and executive director of Malaysian civil rights group Lawyers for Liberty, called the new law “shocking.” “Freedom of speech, info & press will be as good as dead in Malaysia,” he tweeted in late March.

The law will create a chilling effect on free speech, Malaysia lawyer Syahredzan Johan wrote in TheStar.com. “While we may hope that the implementation of the bill will be transparent and fair, the Continue reading

Datanauts 128: Kubernetes, Serverless And No Code With Kelsey Hightower

Today, the Datanauts revisit the world of Kubernetes and container scheduling, but we also loop in Serverless or Functions as a Service (FaaS) along with building an incredibly famous project that has literally no code.

Our guest is Kelsey Hightower, a Google employee as well as a Kubernetes advocate and expert. We talk with Kelsey about the latest evolution of Kubernetes, whether the notion of Kubernetes lock-in is a concern, and how it’s being used in production.

We also delve into serverless computing or Functions as a Service (FaaS) and discuss the technology’s development and adoption. We also explore Kelsey’s latest project, No Code.

Last but not least, we look at how containers and orchestration affects the interaction between Devs and Ops, and how to embrace the new world of application design.

Show Links:

Kelsey Hightower on GitHub

Kelsey Hightower on Twitter

Kubernetes Up And Running – Amazon

Kubernetes The Hard Way – GitHub

Datanauts 058: Kubernetes A Deep-Dive Introduction

Datanauts 042: Understanding Serverless Architecture

Datanauts 047: A Serverless Architecture Follow-Up

Cloud Native Computing Foundation Announces Kubernetes as First Graduated Project – CNCF

Serverless Ops: What do we do when the server goes away? – Serverless Ops

Security Center Continue reading

Riverbed’s ‘firework’ CEO, Jerry Kennelly, retires

In 2010, pop singer Katy Perry released a song called Firework. Some of its lyrics are: “Cause baby you're a firework, come on show 'em what you're worth, make 'em go oh, oh, oh.”  In addition to being one of my favorite Katy Perry songs, it’s always reminded me of the firework that was Riverbed and its charismatic and often outspoken CEO, Jerry Kennelly.Riverbed was the face of WAN optimization Riverbed was indeed a firework, as it hit the market with a bang and became the face of WAN optimization. (Note: Riverbed is a client of ZK Research.) Riverbed wasn’t the first vendor in this market — that was Packeteer — but Riverbed evangelized it and became synonymous with the technology.To read this article in full, please click here

Riverbed’s ‘firework’ CEO, Jerry Kennelly, retires

In 2010, pop singer Katy Perry released a song called Firework. Some of its lyrics are: “Cause baby you're a firework, come on show 'em what you're worth, make 'em go oh, oh, oh.”  In addition to being one of my favorite Katy Perry songs, it’s always reminded me of the firework that was Riverbed and its charismatic and often outspoken CEO, Jerry Kennelly.Riverbed was the face of WAN optimization Riverbed was indeed a firework, as it hit the market with a bang and became the face of WAN optimization. (Note: Riverbed is a client of ZK Research.) Riverbed wasn’t the first vendor in this market — that was Packeteer — but Riverbed evangelized it and became synonymous with the technology.To read this article in full, please click here

Don’t Miss Keith Bogart’s CCNA Kickoff Tomorrow!

Perhaps you’re interested in starting your CCNA certification journey, or exploring careers in the IT field, but aren’t sure where to start. If this sounds like you then this webinar is for you!

Tune in on Thursday, April 5 at 10 am PST/ 1 pm EST for Keith’s CCNA kickoff session and get all of your questions answered.

 

This kickoff session for those who are interested in, or have started to study for the CCNA certification. In this free session, we will cover common trouble areas that most people experience when getting started with their certification, such as: how to approach making a study schedule, strategies for not becoming overwhelmed during the study process, deciding whether to take one test or two to get your CCNA, what to expect when you walk into the testing center, which topics to study and how in depth, and what study tools can be useful. Keith will also discuss the testing experience and the CCNA Certification test format.

7 free tools every network needs

"I am all about useful tools. One of my mottos is 'the right tool for the right job.'" –Martha StewartIf your "right job" involves wrangling computer networks and figuring out how to do digital things effectively and efficiently or diagnosing why digital things aren't working as they're supposed to, you've got your hands full. Not only does your job evolve incredibly quickly becoming evermore complex, but whatever tools you use need frequent updating and/or replacing to keep pace, and that's what we're here for; to help in your quest for the right tools.[ Don’t miss customer reviews of top remote access tools and see the most powerful IoT companies . | Get daily insights by signing up for Network World newsletters. ] We've done several roundups of free network tools in the past, and since the last one, technology has, if anything, sped up even more. To help you keep up, we've compiled a new shortlist of seven of the most useful tools that you should add to your toolbox.To read this article in full, please click here

7 free tools every network needs

"I am all about useful tools. One of my mottos is 'the right tool for the right job.'" –Martha StewartIf your "right job" involves wrangling computer networks and figuring out how to do digital things effectively and efficiently or diagnosing why digital things aren't working as they're supposed to, you've got your hands full. Not only does your job evolve incredibly quickly becoming evermore complex, but whatever tools you use need frequent updating and/or replacing to keep pace, and that's what we're here for; to help in your quest for the right tools.[ Don’t miss customer reviews of top remote access tools and see the most powerful IoT companies . | Get daily insights by signing up for Network World newsletters. ] We've done several roundups of free network tools in the past, and since the last one, technology has, if anything, sped up even more. To help you keep up, we've compiled a new shortlist of seven of the most useful tools that you should add to your toolbox.To read this article in full, please click here

MPLS 101 – Dynamic routing with BGP

In our last post we talked about how to make the MPLS control plane more dynamic by getting rid of static LSPs and adding in LDP to help advertise and distribute LSPs to all MPLS speaking routers.  However – even once got LDP up and running, we still had to tell the routers to use a given LSP.  In the last post, we accomplished this by adding recursive static routes in the inet.0 table to force the routers to recurse to the inet.3 table where the MPLS LSPs lived.  In this post, we’re going to tackle getting rid of the static routes and focus on replacing it with a dynamic routing protocol – BGP.

So to start off with, let’s get our lab back to a place where we can start.  To do that, we’re going to load the following configuration on each router show in the following lab topology…

interfaces {
    ge-0/0/0 {
        enable;
        unit 0 {
            family inet {
                address 10.2.2.0/31;
            }
        }
    }
    ge-0/0/1 {
        enable;
        unit 0 {
            family inet {
                address 10.1.1.0/31;
            }
            family mpls;
        }
    }
    lo0 {
        unit 0 {
            family  Continue reading

BrandPost: Businesses report cost savings with advanced network solution

Extreme networks recently released our brand-new report: Quantifying the Value of the New Extreme Networks Solution (an Enterprise Strategy Group Economic Value Validation report). We set out to show IT organizations like yours the costs and benefits of deploying Extreme Networks compared with alternative network vendors, and trust us, the results are pretty mind-blowing.“Extreme Networks convinced us that for a reasonable price you can get a technologically advanced and reliable solution that can be managed through a unified management console.” - Extreme CustomerTo read this article in full, please click here

BrandPost: What’s behind IoT’s growth?

We asked CIOs and IT managers from all industries around the world to find out how they are embracing the Internet of Things. They told us about their plans, concerns, benefits, and the issues they've encountered.The vast majority have already implemented or are planning to implement IoT projects. Building-related projects involving smart lighting and energy management are the most common, followed by video surveillance and data collection projects.On the concerns and drawbacks side, device security, an issue addressed by ExtremeControl, swamps all other challenges. Data privacy, fear of rogue control and hijacking, service interruptions, and data integrity are all issues that CIOs face when implementing IoT.To read this article in full, please click here