While VMware NSX enables micro-segmentation of the Software Defined Data Center, it mostly polices traffic in layers 3 and 4, with only limited application level (layer 7) support. Sometimes additional layers of protection are needed for use cases such as Secure DMZ or meeting regulatory compliance requirements like PCI, in which case partner solutions can be added to the platform, with traffic steered into the supplemental solution prior to reaching the vSwitch (virtual wire). The resulting combination is high throughput due to the scale-out nature of NSX, but can also provide deep traffic analysis from the partner solution.
The usual enemy of deep traffic inspection in the data center is bandwidth. NSX addresses this issue, micro-segmentation security policy is zero trust – only traffic explicitly permitted out of a VM can pass, then steering policy to 3rd party solutions can be designed in order that bulk protocols such as storage and backup bypass them, leaving a more manageable amount of traffic for Check Point vSEC to provide IPS, anti-virus and anti-malware protection on, including Check Point’s Sandblast Zero-Day Protection against zero day attacks.
The connection between vSEC and NSX enables dynamic threat tagging, where traffic from an VM reaches Continue reading
No word on how many employees were laid off.
Telecom operators need new network monitoring tools. Although mobile core networks are increasingly virtualized—through powerful and flexible technologies such as Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) —network monitoring and analytics functions have only recently started to be virtualized. Stand-alone virtual probes still require mirroring of all the traffic which in turn impacts performance... Read more →
In this Community Roundtable episode, returning guests Russ White and Nick Russo continue our three part deep dive into the Border Gateway Protocol, or BGP, with a look at the mechanisms within the protocol to perform traffic engineering.
Show Notes
Influence Ingress
The technology can detect malware in encrypted traffic without decryption.
Hyperconverged infrastructure vendors always tout the technology's cost efficiency, arguing that HCI reduces costs because it requires less administrative burden. In this video, Keith Townsend, principal at The CTO Advisor and Interop ITX infrastructure chair, examines whether hyperconvergence really costs less than traditional three-tier IT infrastructure.
Get up to speed on the rapidly evolving world of containers.
Level3 had a pretty bad bad-hair-day just a day before Pete Lumbis talked about Continuous Integration on the Building Network Automation Solutions online course (yes, it was a great lead-in for Pete).
According to messages circulating on mailing lists it was all caused by a fumbled configuration attempt. My wild guess: someone deleting the wrong route map, causing routes that should have been tagged with no-export escape into the wider Internet.
Read more ... Some existing licensing models include perpetual, pre-pay, post-pay, pay-per-use, and pay-per-GByte.
Would you be interested in helping guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains? If so, the Internet Society is seeking nominations for three positions on the PIR Board of Directors. The nominations deadline is 23:00 UTC on Thursday, February 1, 2018.
More information about the positions and the required qualifications can be found at: https://www.internetsociety.org/pir/call-for-nominations/
As noted on that page:
The Internet Society is now accepting nominations for the Board of Directors of the Public Interest Registry (PIR). PIR’s business is to manage the international registry of .org, .ngo, and .ong domain names, as well as associated Internationalized Domain Names (IDNs).
In 2018 there are three positions opening on the PIR Board. Two directors will serve a 3-year term that begins mid-year 2018 and expires mid-year 2021. One director will fill a vacant seat as soon as practical and serve until mid-year 2020.
If you are interested in being considered as a candidate, please see the form to submit toward the bottom of the call for nominations page.
The post Deadline of Feb 1 for Nominations for Public Interest Registry (.ORG Operator) Board of Directors Continue reading
The bugs could have allowed hackers to attack enterprise servers.
Got a New Year’s resolution for a data center revolution? We’ve got your back! The Cumulus content roundup is here to make sure you start out 2018 on the right foot. With a variety of blog posts, videos and networking resources at your disposal, you’ll find that upgrading your networking knowledge is an easily achievable goal (and much easier than starting a diet or going to the gym). Don’t worry, we won’t tell anyone if you’ve already broken your resolution! It’s a time for new beginnings and looking to the future; let’s check out what’s in store.
Cumulus in the Cloud overview: What is Cumulus in the Cloud, and what can it do for you? In this video overview, let CTO JR Rivers walk you through the pre-built virtual data center and teach you all about the great Cumulus tech you can play with.
NCLU: Network Command Line Utility overview: There’s a new chapter in our how-to video series. This time, our highly qualified instructors will teach you the ins and outs of Cumulus Networks CLI, the Network Command Line Utility. Watch the tutorial to learn more.
Open networking drives forward with Cumulus Linux Continue reading