Archive

Category Archives for "Networking"

How To Access Devices with Unsupported SSL Ciphers

With the HeartBleed bug effectively killing off SSLv3 and vulnerabilities in cipher block chaining ruling out another whole swathe of SSL ciphers, network engineers may have found themselves trying to connect to a device and either getting no response (Safari), or getting a response like this (Chrome):

Chrome SSL Error

Or this (Firefox):

Firefox SSL Error

Once upon a time, it was possible to go into settings and enable the old, insecure ciphers again, but in more recent updates, those ciphers no longer exist within the code and are thus inaccessible. So what to do? My answer was to try a proxy.

Charles Proxy

The first proxy I looked at seemed promising. Although not free, Charles Proxy offers a 30 day free trial, and that seemed like a good thing to try. It’s limited additionally by only running for 30 minutes at a time before it has to be reloaded, but for my testing purposes that was not a problem.

During installation I declined to give Charles Proxy permission to configure the system proxy settings. Instead, I manually updated just my Firefox browser to use the proxy which was now listening on port 127.0.0.1:8888. Since I was making an SSL connection, I also Continue reading

Forrester predicts what’s next for IoT

What’s in store for the Internet of Things (IoT) in 2018? That’s the question on many people’s minds in the fast-growing IoT industry. One set of answers can be found in a new report from Forrester, called Predictions 2018: IoT Moves From Experimentation To Business Scale. According to Forrester and published reports last week, that journey means many things, but apart from the usual superheated speculation about IoT’s incredible growth and increasing impact, here’s what I think is most interesting. To read this article in full, please click here

Forrester predicts what’s next for IoT

What’s in store for the Internet of Things (IoT) in 2018? That’s the question on many people’s minds in the fast-growing IoT industry. One set of answers can be found in a new report from Forrester, called Predictions 2018: IoT Moves From Experimentation To Business Scale. According to Forrester and published reports last week, that journey means many things, but apart from the usual superheated speculation about IoT’s incredible growth and increasing impact, here’s what I think is most interesting. To read this article in full, please click here

AMD charges back into the HPC fray with new systems

After years of watching its presence shrink on the Top 500 supercomputer list, AMD is battling back with a new set of EPYC-based server processors and specially-tuned GPUs for high-performance computing (HPC) in a complete server system.The company and its partners announced new servers with the EPYC 7601 processor, which it claims is three times more performance-efficient than Intel’s best Xeon server processors, the Xeon Platinum 8180M1, as measured by SPECfp[i] benchmark. The news came at the Supercomputing ’17 show taking place in Denver.Target workloads for AMD solutions include machine learning, weather modeling, computational fluid dynamics, simulation and crash analysis in aviation and automotive manufacturing, and oil and gas exploration, according to the company.To read this article in full, please click here

AMD charges back into the HPC fray with new systems

After years of watching its presence shrink on the Top 500 supercomputer list, AMD is battling back with a new set of EPYC-based server processors and specially-tuned GPUs for high-performance computing (HPC) in a complete server system.The company and its partners announced new servers with the EPYC 7601 processor, which it claims is three times more performance-efficient than Intel’s best Xeon server processors, the Xeon Platinum 8180M1, as measured by SPECfp[i] benchmark. The news came at the Supercomputing ’17 show taking place in Denver.Target workloads for AMD solutions include machine learning, weather modeling, computational fluid dynamics, simulation and crash analysis in aviation and automotive manufacturing, and oil and gas exploration, according to the company.To read this article in full, please click here

The Super Secret Cloudflare Master Plan, or why we acquired Neumob

The Super Secret Cloudflare Master Plan, or why we acquired Neumob

We announced today that Cloudflare has acquired Neumob. Neumob’s team built exceptional technology to speed up mobile apps, reduce errors on challenging mobile networks, and increase conversions. Cloudflare will integrate the Neumob technology with our global network to give Neumob truly global reach.

It’s tempting to think of the Neumob acquisition as a point product added to the Cloudflare portfolio. But it actually represents a key part of a long term “Super Secret Cloudflare Master Plan”.

The Super Secret Cloudflare Master Plan, or why we acquired Neumob CC BY 2.0 image by Neil Rickards

Over the last few years Cloudflare has been building a large network of data centers across the world to help fulfill our mission of helping to build a better Internet. These data centers all run an identical software stack that implements Cloudflare’s cache, DNS, DDoS, WAF, load balancing, rate limiting, etc.

We’re now at 118 data centers in 58 countries and are continuing to expand with a goal of being as close to end users as possible worldwide.

The data centers are tied together by secure connections which are optimized using our Argo smart routing capability. Our Quicksilver technology enables us to update and modify the settings and software running across this vast network in seconds.

Continue reading

IDG Contributor Network: How patchable software can secure the IoT

As the Internet of Things continues to grow, delving further into every corner of our markets and societies, the ability to secure it from malevolent attackers and massive data-breaches will become more vital towards its survival. Today’s IoT security landscape is a confused mess, with vulnerabilities running rampant and paltry little being done to make it more secure. So how can IoT experts and tech enthusiast alike contribute to a safer IoT?The answer lies in patchable software. By embracing more industry standards and fostering the greater implementation of patchable software, IoT enthusiast can ensure that this much-beloved connectivity phenomenon lives on to serve us for years to come.To read this article in full, please click here

Deploy360 at IETF 100, Day 3: SIDR, TLS & Crypto

This week is IETF 100 in Singapore, and we’re bringing you daily blog posts highlighting some of the topics that Deploy360 is interested in. After the focus on IPv6 & IoT during the first couple of days, we’re switching tack today with a focus on routing and crypto matters.

We’re having to wait until after lunch, but then there’s a choice of UTA, SIDROPS or ROLL at 13.30 SGT/UTC+8.

UTA will be focusing on resolving the final IESG comments on the use of TLS for email submission and access which outlines current recommendations for using TLS to provide confidentiality of email traffic between a mail user agent and a mail access server. Next up for discussion are the open issues on a draft related to Strict Transport Security (STS) for mail (SMTP) transfer agents and mail user agents, before consideration of  a draft on an option to require TLS for SMTP.


NOTE: If you are unable to attend IETF 100 in person, there are multiple ways to participate remotely.


Over in SIDROPS, there will be a review of the status of BGP Origin Validation deployment in RENATA: the Columbia National Research and Education Network. This represents the first wide-scale deployment Continue reading

IDG Contributor Network: The benefits of multi-cloud computing

Its application might be a tough concept to grasp, but the idea of multi-cloud computing is a simple one. It’s the choice of a business to distribute its assets, redundancies, software, applications and anything it deems worthy not on one cloud-hosting environment, but rather across several. At its surface, this concept might seem to be rubbing against the grain a bit. For security purposes alone, having all your company’s proverbial eggs in one basket appears the best way to keep your information from suffering leakage. Plus, many cloud-hosting companies will offer perks and discounts when your company use their services in totality.   However, the model of using multiple cloud services to house your business’s functions and features has an impressive list of advantages that can provide security, flexibility, cost-effectiveness and more to increase your business’s efficiency and ensure it stays up and running 24 hours a day. To read this article in full, please click here

Your online freedoms are under threat – 2017 Freedom on the Net Report

As more people get online everyday, Internet Freedom is facing a global decline for the 7th year in a row.

Today, Freedom House released their 2017 Freedom on the Net report, one of the most comprehensive assessments of countries’ performance regarding online freedoms. The Internet Society is one of the supporters of this report. We think it brings solid and needed evidence-based data in an area that fundamentally impacts user trust.

Looking across 65 countries, the report highlights several worrying trends, including:

  • manipulation of social media in democratic processes
  • restrictions of virtual private networks (VPNs)
  • censoring of mobile connectivity
  • attacks against netizens and online journalists

Elections prove to be particular tension points for online freedoms (see also Freedom House’s new Internet Freedom Election Monitor). Beyond the reported trend towards more sophisticated government attempts to control online discussions, the other side of the coin is an increase in restrictions to Internet access, whether through shutting down networks entirely, or blocking specific communication platforms and services.

These Internet shutdowns are at the risk of becoming the new normal. In addition to their impact on freedom of expression and peaceful assembly, shutdowns generate severe economic costs, affecting entire economies [1] and Continue reading

Another Reason to Run Linux on Your Data Center Switches

Arista’s OpenFlow implementation doesn’t support TLS encryption. Usually that’s not a big deal, as there aren’t that many customers using OpenFlow anyway, and those that do hopefully do it over a well-protected management network.

However, lack of OpenFlow TLS encryption might become an RFP showstopper… not because the customer would really need it but because the customer is in CYA mode (we don’t know what this feature is or why we’d use it, but it might be handy in a decade, so we must have it now) or because someone wants to eliminate certain vendors based on some obscure missing feature.

Read more ...

Cloud Managed Wireless Solution : Cisco Meraki MR52

Today I am going to talk about the Cisco Meraki solution which is totally a cloud based managed system and the product name is Cisco Meraki MR52. It is based on the next generation wireless systems that can be deployed in various departments like Education systems, Manufacturing units, Offices, Enterprise networks and so on. The way Cisco Meraki works is totally a next generation revolution where all management can be done via cloud and you just need to deploy the hardware in your network to work.

What is the purpose to deploy and how much time it takes to configure Cisco Meraki MR52 ?
Well if you have the requirement to have the wireless network with various SSIDs you should go with the site surveys and on the basis of it you should go with the suitable model of the wireless WLCs. If I talk about the Cisco Meraki cloud managed MR52, It is simple to deploy and self configured via cloud. So you need not to require any resource for the configuration of the Meraki MR52 at the remote sites.

What is the throughput of the Cisco Meraki MR52 ?
Well Cisco Meraki MR52 is a high performance box and will provides Continue reading

Cloud Managed Wireless Systems : Cisco Meraki MR52

Today I am going to talk about the Cisco Meraki solution which is totally a cloud based managed system and the product name is Cisco Meraki MR52. It is based on the next generation wireless systems that can be deployed in various departments like Education systems, Manufacturing units, Offices, Enterprise networks and so on. The way Cisco Meraki works is totally a next generation revolution where all management can be done via cloud and you just need to deploy the hardware in your network to work.

What is the purpose to deploy and how much time it takes to configure Cisco Meraki MR52 ?
Well if you have the requirement to have the wireless network with various SSIDs you should go with the site surveys and on the basis of it you should go with the suitable model of the wireless WLCs. If I talk about the Cisco Meraki cloud managed MR52, It is simple to deploy and self configured via cloud. So you need not to require any resource for the configuration of the Meraki MR52 at the remote sites.

Fig 1.1- Cisco Meraki MR25 Wireless Systems

What is the throughput of the Cisco Meraki MR52 ?
Well Cisco Meraki Continue reading

Manage user performance, not the network, with machine learning-based tools

Over the past decade, network management tools have evolved from being fault based to performance based. This has become a critical element in running infrastructure because faults don’t matter as much.That might seem like a strange thing to say, but consider the fact that critical infrastructure such as switches, routers, Wi-Fi access points and servers are deployed in a way to protect against outages. Infrastructure is built so redundantly today that any hardware device can go down and its likely no one will notice.Also on Network World: 7 must-have network tools A bigger problem is managing user performance. Often users calling about a certain application not working well, but when the engineer looks at the dashboard, everything is green. Performance problems are much harder to diagnose and can kill employee productivity. To read this article in full, please click here

Manage user performance, not the network, with machine learning-based tools

Over the past decade, network management tools have evolved from being fault based to performance based. This has become a critical element in running infrastructure because faults don’t matter as much.That might seem like a strange thing to say, but consider the fact that critical infrastructure such as switches, routers, Wi-Fi access points and servers are deployed in a way to protect against outages. Infrastructure is built so redundantly today that any hardware device can go down and its likely no one will notice.Also on Network World: 7 must-have network tools A bigger problem is managing user performance. Often users calling about a certain application not working well, but when the engineer looks at the dashboard, everything is green. Performance problems are much harder to diagnose and can kill employee productivity. To read this article in full, please click here

Real-time WiFi heat map

Real-time Wifi-Traffic Heatmap (source code GitHub: cod3monk/showfloor-heatmap) displays real-time WiFi traffic from SC17 (The International Conference for High Performance Computing, Networking, Storage and Analysis, November 12-17, 2017). Click on the link to see live data.

The Cisco Wireless access points in the conference network don't currently support sFlow, however, the access points are connected to Juniper EX switches which stream sFlow telemetry to an instance of sFlow-RT analytics software that provides real-time usage metrics for the heat map.

Wireless describes the additional visibility delivered by sFlow capable wireless access points, including: air time, channel, retransmissions, receive / transmit speeds, power, signal to noise ratio, etc. With sFlow enabled wireless access points, additional information could be layered on the heat map. The sFlow.org web site lists network products and vendors that support the sFlow standard.