Archive

Category Archives for "Networking"

How network security can save security dollars

For the last twelve years, 100% of CIOs have said that they expect to spend more on IT security, making security the only category that just keeps on absorbing investment. Every year in the last three years, over 80% of enterprises have said that their IT security still needed improvement. So, like death and taxes, is security spending growth inevitable? If we keep on the way we have, it sure seems like it. But what might change?Let’s start with what’s important to users. External threats, meaning hacking, are a problem for every CIO. Internal threats, from badly behaving employees, are a problem for three out of four. Data theft is a universal fear, and malware that interferes with applications and operations is an important problem for over 90% of CIOs. As far as approaches or targets are concerned, 100% say access security on applications and data is essential and so is regular malware scanning. If you ask CIOs to pick a single thing they think is essential for IT security, it’s access security.To read this article in full, please click here

HPE Aruba intros Wi-Fi 6 access point, stackable switch for SMBs

HPE's Aruba networking division announced a new access point and switch that are designed to enable faster speeds, increased capacity, and strengthened security for small and medium businesses that are grappling with bandwidth-intensive cloud applications.The Aruba Instant On AP22D is a Wi-Fi 6 access point, and the Aruba Instant On 1960 is a stackable switch with 2.5GB port capacity. Both are designed to optimize network performance for employees and customers.The combination is ideal for SMBs with high data demands and growing traffic. The two new products work together to provide increased throughput and improved security with minimal effort, according to HPE Aruba Networking.To read this article in full, please click here

BGP Labs: Protect EBGP Sessions

I published another BGP labs exercise a few days ago. You can use it to practice EBGP session protection, including Generalized TTL Security Mechanism (GTSM) and TCP MD5 checksums1.

I would strongly recommend to run BGP labs with netlab, but if you like extra work, feel free to use any system you like including physical hardware.


  1. I would love to add TCP-AO to the mix, but it’s not yet supported by the Linux kernel, and so cannot be used in Cumulus Linux or FRR containers. ↩︎

New chip designs on display at Intel Innovation 2023

Intel took the wraps off a number of new chip designs during its Innovation 2023 event in San Jose, Calif. Among the highlights is a preview of fifth-generation Xeon processors, which gain performance improvements and faster memory while using the same amount of power as the current generation.Scheduled to launch beginning December 14 and going into 2024, the fifth generation of Xeon processors splits the structure into two different core designs: the P (for performance) core, codenamed Granite Rapids, and the E (for efficient) core, codenamed Sierra Forest. P cores are high-performance cores for maximum computing power, while E cores are smaller, much less power-hungry, and designed for simpler tasks.To read this article in full, please click here

New chip designs on display at Intel Innovation 2023

Intel took the wraps off a number of new chip designs during its Innovation 2023 event in San Jose, Calif. Among the highlights is a preview of fifth-generation Xeon processors, which gain performance improvements and faster memory while using the same amount of power as the current generation.Scheduled to launch beginning December 14 and going into 2024, the fifth generation of Xeon processors splits the structure into two different core designs: the P (for performance) core, codenamed Granite Rapids, and the E (for efficient) core, codenamed Sierra Forest. P cores are high-performance cores for maximum computing power, while E cores are smaller, much less power-hungry, and designed for simpler tasks.To read this article in full, please click here

New chip designs on display at Intel Innovation 2023

Intel took the wraps off a number of new chip designs during its Innovation 2023 event in San Jose, Calif. Among the highlights is a preview of fifth-generation Xeon processors, which gain performance improvements and faster memory while using the same amount of power as the current generation.Scheduled to launch beginning December 14 and going into 2024, the fifth generation of Xeon processors splits the structure into two different core designs: the P (for performance) core, codenamed Granite Rapids, and the E (for efficient) core, codenamed Sierra Forest. P cores are high-performance cores for maximum computing power, while E cores are smaller, much less power-hungry, and designed for simpler tasks.To read this article in full, please click here

Using curl and wget commands to download pages from web sites

One of the most versatile tools for collecting data from a server is curl. The “url” portion of the name properly suggests that the command is built to locate data through the URL (uniform resource locater) that you provide. And it doesn’t just communicate with web servers. It supports a wide variety of protocols. This includes HTTP, HTTPS, FTP, FTPS, SCP, SFTP and more. The wget command, though similar in some ways to curl, primarily supports HTTP and FTP protocols.Using the curl command You might use the curl command to: Download files from the internet Run tests to ensure that the remote server is doing what is expected Do some debugging on various problems Log errors for later analysis Back up important files from the server Probably the most obvious thing to do with the curl command is to download a page from a web site for review on the command line. To do this, just enter “curl” followed by the URL of the web site like this (the content below is truncated):To read this article in full, please click here

Using curl and wget commands to download pages from web sites

One of the most versatile tools for collecting data from a server is curl. The “url” portion of the name properly suggests that the command is built to locate data through the URL (uniform resource locater) that you provide. And it doesn’t just communicate with web servers. It supports a wide variety of protocols. This includes HTTP, HTTPS, FTP, FTPS, SCP, SFTP and more. The wget command, though similar in some ways to curl, primarily supports HTTP and FTP protocols.Using the curl command You might use the curl command to: Download files from the internet Run tests to ensure that the remote server is doing what is expected Do some debugging on various problems Log errors for later analysis Back up important files from the server Probably the most obvious thing to do with the curl command is to download a page from a web site for review on the command line. To do this, just enter “curl” followed by the URL of the web site like this (the content below is truncated):To read this article in full, please click here

Using curl and wget commands to download pages from web sites

One of the most versatile tools for collecting data from a server is curl. The “url” portion of the name properly suggests that the command is built to locate data through the URL (uniform resource locater) that you provide. And it doesn’t just communicate with web servers. It supports a wide variety of protocols. This includes HTTP, HTTPS, FTP, FTPS, SCP, SFTP and more. The wget command, though similar in some ways to curl, primarily supports HTTP and FTP protocols.Using the curl command You might use the curl command to: Download files from the internet Run tests to ensure that the remote server is doing what is expected Do some debugging on various problems Log errors for later analysis Back up important files from the server Probably the most obvious thing to do with the curl command is to download a page from a web site for review on the command line. To do this, just enter “curl” followed by the URL of the web site like this (the content below is truncated):To read this article in full, please click here

AMD introduces Epyc server processors for the edge

AMD has formally launched its new Epyc 8004 Series processors, the fourth generation of server processors developed under the Siena codename. They're specifically built for energy-efficient and differentiated platforms such as the intelligent edge, as well as for data center, cloud services, storage and other applications.The 8004 product family ranges from eight cores to 64 cores. The 8004 core design is known as Zen 4c, as in compact. It has fewer cores, fewer PCIe lanes and fewer memory channels, but the payoff is in much lower power requirements.In an era of ever-increasing power consumption, the 8004 series is going in the opposite direction. The product family has thermal design power (TDP) measurements ranging from about 70 to 225 watts. That’s more along the lines of a desktop processor than a server processor, which can often be double that number.To read this article in full, please click here

AMD introduces Epyc server processors for the edge

AMD has formally launched its new Epyc 8004 Series processors, the fourth generation of server processors developed under the Siena codename. They're specifically built for energy-efficient and differentiated platforms such as the intelligent edge, as well as for data center, cloud services, storage and other applications.The 8004 product family ranges from eight cores to 64 cores. The 8004 core design is known as Zen 4c, as in compact. It has fewer cores, fewer PCIe lanes and fewer memory channels, but the payoff is in much lower power requirements.In an era of ever-increasing power consumption, the 8004 series is going in the opposite direction. The product family has thermal design power (TDP) measurements ranging from about 70 to 225 watts. That’s more along the lines of a desktop processor than a server processor, which can often be double that number.To read this article in full, please click here

AMD introduces Epyc server processors for the edge

AMD has formally launched its new Epyc 8004 Series processors, the fourth generation of server processors developed under the Siena codename. They're specifically built for energy-efficient and differentiated platforms such as the intelligent edge, as well as for data center, cloud services, storage and other applications.The 8004 product family ranges from eight cores to 64 cores. The 8004 core design is known as Zen 4c, as in compact. It has fewer cores, fewer PCIe lanes and fewer memory channels, but the payoff is in much lower power requirements.In an era of ever-increasing power consumption, the 8004 series is going in the opposite direction. The product family has thermal design power (TDP) measurements ranging from about 70 to 225 watts. That’s more along the lines of a desktop processor than a server processor, which can often be double that number.To read this article in full, please click here

Juniper targets data-center management with Apstra upgrade

Juniper Networks is giving its Apstra software a boost with management features designed to make complicated data centers easier to operate. The vendor rolled out Apstra 4.2.0, which includes intent-based analytics probes for telemetry and network visibility as well as support for HashiCorp’s Terraform network provisioning tool.Since it bought Apstra in 2021, Juniper has been bolstering the platform with features such as automation, intelligent configuration capabilities, multivendor hardware and software support, and improved environmental analytics, with the goal of making the system more attractive to a wider range of enterprise data-center organizations.To read this article in full, please click here

Juniper targets data-center management with Apstra upgrade

Juniper Networks is giving its Apstra software a boost with management features designed to make complicated data centers easier to operate. The vendor rolled out Apstra 4.2.0, which includes intent-based analytics probes for telemetry and network visibility as well as support for HashiCorp’s Terraform network provisioning tool.Since it bought Apstra in 2021, Juniper has been bolstering the platform with features such as automation, intelligent configuration capabilities, multivendor hardware and software support, and improved environmental analytics, with the goal of making the system more attractive to a wider range of enterprise data-center organizations.To read this article in full, please click here

How Waiting Room makes queueing decisions on Cloudflare’s highly distributed network

How Waiting Room makes queueing decisions on Cloudflare's highly distributed network
How Waiting Room makes queueing decisions on Cloudflare's highly distributed network

Almost three years ago, we launched Cloudflare Waiting Room to protect our customers’ sites from overwhelming spikes in legitimate traffic that could bring down their sites. Waiting Room gives customers control over user experience even in times of high traffic by placing excess traffic in a customizable, on-brand waiting room, dynamically admitting users as spots become available on their sites. Since the launch of Waiting Room, we’ve continued to expand its functionality based on customer feedback with features like mobile app support, analytics, Waiting Room bypass rules, and more.

We love announcing new features and solving problems for our customers by expanding the capabilities of Waiting Room. But, today, we want to give you a behind the scenes look at how we have evolved the core mechanism of our product–namely, exactly how it kicks in to queue traffic in response to spikes.

How was the Waiting Room built, and what are the challenges?

The diagram below shows a quick overview of where the Waiting room sits when a customer enables it for their website.

How Waiting Room makes queueing decisions on Cloudflare's highly distributed network

Waiting Room is built on Workers that runs across a global network of Cloudflare data centers. The requests to a customer’s website can Continue reading