Archive

Category Archives for "Networking"

IDG Contributor Network: China to block SD-WAN and VPN traffic by Jan. 11

A new Chinese policy going into effect next week, will have profound impact on businesses relying on Internet VPN or SD-WAN access within China.According to a notice from China Telecom obtained by SD-WAN Experts, the Chinese Government will require commercial Chinese ISPs to block TCP ports 80, 8080, and 443 by January 11, 2018. Port 80 is of course the TCP port commonly used for carrying HTTP traffic; 8080 and 443 are used for carrying HTTPS traffic. Commercial ISP customers interested in maintaining access to those ports must register or apply to re-open the port through their local ISP.  The news, first reported by Bloomberg July, was expected to be implemented by February, 2018. This is the first time a specific date has been provided for the action.To read this article in full, please click here

IDG Contributor Network: China to block SD-WAN and VPN traffic by Jan. 11

A new Chinese policy going into effect next week, will have profound impact on businesses relying on Internet VPN or SD-WAN access within China.According to a notice from China Telecom obtained by SD-WAN Experts, the Chinese Government will require commercial Chinese ISPs to block TCP ports 80, 8080, and 443 by January 11, 2018. Port 80 is of course the TCP port commonly used for carrying HTTP traffic; 8080 and 443 are used for carrying HTTPS traffic. Commercial ISP customers interested in maintaining access to those ports must register or apply to re-open the port through their local ISP.  The news, first reported by Bloomberg July, was expected to be implemented by February, 2018. This is the first time a specific date has been provided for the action.To read this article in full, please click here

France goes after companies for deliberately shortening life of hardware

Printer manufacturers “deliberately shorten the life of printers and cartridges,” a French environmental and consumer protection group claims. That's against the law in France, and government prosecutors have agreed to investigate the claims.If the lawsuit against the printer company, Japan-based Epson, is proven, the firm could be found guilty of breaking a little-known French law that stipulates vendors can’t purposefully lower the lifespan of a product to ramp up replacement rates.Also on Network World: Top 10 data center predictions: IDC A conviction could be significant for tech hardware manufacturing overall. Nabbing Epson would likely affect not only how hardware is built and sold in France, but it also could mean laws get adopted in other European territories —individual nations are involved in the functioning of the EU bloc overall.To read this article in full, please click here

41% off CyberPower Surge Protector 3-AC Outlet with 2 USB (2.1A) Charging Ports – Deal Alert

The Professional Surge Protector CSP300WUR1 safeguards common home and office devices, such as computers and electronics, by absorbing spikes in energy caused by storms and electrical power surges. Designed for convenience, the portable CSP300WUR1 is ideal for travelers. It provides 600 joules of protection, has three surge-protected outlets, and a folding wall tap plug. Two USB ports (2.1 Amp shared) charge personal electronics, including smartphones, digital cameras, MP3 players, and other devices. A Limited-Lifetime Warranty ensures that this surge suppressor has passed high quality standards in design, assembly, material or workmanship and further protection is offered by a $50,000 Connected Equipment Guarantee. It currently averages 4 out of 5 stars on Amazon, where its typical list price of $21.95 has been reduced 41% to just $12.99. See the discounted CSP300WUR1 on Amazon.To read this article in full, please click here

41% off CyberPower Surge Protector 3-AC Outlet with 2 USB (2.1A) Charging Ports – Deal Alert

The Professional Surge Protector CSP300WUR1 safeguards common home and office devices, such as computers and electronics, by absorbing spikes in energy caused by storms and electrical power surges. Designed for convenience, the portable CSP300WUR1 is ideal for travelers. It provides 600 joules of protection, has three surge-protected outlets, and a folding wall tap plug. Two USB ports (2.1 Amp shared) charge personal electronics, including smartphones, digital cameras, MP3 players, and other devices. A Limited-Lifetime Warranty ensures that this surge suppressor has passed high quality standards in design, assembly, material or workmanship and further protection is offered by a $50,000 Connected Equipment Guarantee. It currently averages 4 out of 5 stars on Amazon, where its typical list price of $21.95 has been reduced 41% to just $12.99. See the discounted CSP300WUR1 on Amazon.To read this article in full, please click here

Un-Nintendo Consequences: Protect Your Devices from Attacking Gaming Networks

This holiday season, we published a buying guide for “smart toys,” as well as steps you could take to secure them once they were home. As we start the new year, it’s a good time to revisit Holiday DDoS Attacks: Targeting Gamers (Plus Five Things You Can Do). Last year Ryan Polk wrote, “gaming networks are most often targeted by DDoS attacks, as the end of year holidays usually bring many users online who are eager to try out their new games and systems.” He included the following helpful tips.

Five actions to protect your devices from becoming bots:

  • Create and use strong passwords for all your devices. Do not use the default. This is especially important for smart devices, routers, and other devices with which you may not interact directly.
  • Update your devices! Software is often patched to remove known vulnerabilities, greatly strengthening your defenses.
  • Monitor your devices. If a device is acting strangely, investigate it. One example is bounced email messages. If email messages are not reaching their destination, your device could be infected and sending spam as a part of a botnet.
  • Run anti-virus scans and use other security tools to find and remove malicious software.
  • Continue reading

Link Aggregation – LACP Protocol

How Does Internet Work - We know what is networking

EtherChannel enables bundling multiple physical links connecting same devices into a single logical link. I will try to show you how it is configured and how it works. The issue with one uplink I made an example with 8 clients connected to two Cisco 3850 switches. For start, those two switches are connected together with 1G copper on Interface Ge1/23. The clients are also connected to 1G ports. In this case, when all of those four clients on the left side start simultaneously sending traffic at full speed to different computers on the right side, they will congest the uplink

Link Aggregation – LACP Protocol

Linux Routing On The Host With FRR

We've all been there, it's supposed to be a relatively simple change and then BOOM! Spanning tree topology change blows up the network :( There is a movement in the data centre space to push the layer 2 boundary down into the host to avoid the bandwidth waste of spanning tree link blocking and...

My DC Virtual Lab Setup – Insights

Hi,

I have been getting a lot of requests offline and online on the lab setup I use, I have to say I have tested many things and finally settled with Vmware ESXi 5.5. Eve-ng was good but not good enough when spawned with multiple instances of qemu, maybe because my host operating system might be slow enough for it.

I will cover the connectivity for two VMX devices but the logic Remains same for any device connectivity.

What I have Already

-> Vmware Esxi5.5

-> Dell R810

-> Insane amount of time to waste :), I hope you won’t fall into the same path.

 

You need to have the OVA files, all settings are straightforward, don’t even worry about Memory allocations yet, there is time for that and also the networking part, import the OVA

There will be two OVA images

Vfp – forwarding plane

VCP – Control Plane

General import – No Rocket science – Don’t worry about any settings as of now

 

This is how my VCP looks like – Again don’t worry about any networking here, catch here – VCP has only two networking Adapters – One for Fxp0 which is the Continue reading

Meltdown and Spectre exploits: Cutting through the FUD

There is lots of information circulating about the new exploits of computer chips from Intel and others announced in the past few days. Some of it has been accurate, and some has been sensationalist and overblown. There is much technical information with high level of details available for both Meltdown and Spectre, so I won’t get into a lot of technical detail here. Rather, I’ll focus on the higher-level issues affecting business and personal computer users.+RELATED: Intel’s processor flaw is a virtualization nightmare; Red Hat responds to the Intel processor flaw+To read this article in full, please click here

Meltdown and Spectre exploits: Cutting through the FUD

There is lots of information circulating about the new exploits of computer chips from Intel and others announced in the past few days. Some of it has been accurate, and some has been sensationalist and overblown. There is much technical information with high level of details available for both Meltdown and Spectre, so I won’t get into a lot of technical detail here. Rather, I’ll focus on the higher-level issues affecting business and personal computer users.+RELATED: Intel’s processor flaw is a virtualization nightmare; Red Hat responds to the Intel processor flaw+To read this article in full, please click here

Meltdown and Spectre exploits: Cutting through the FUD

There is lots of information circulating about the new exploits of computer chips from Intel and others announced in the past few days. Some of it has been accurate, and some has been sensationalist and overblown. There is much technical information with high level of details available for both Meltdown and Spectre, so I won’t get into a lot of technical detail here. Rather, I’ll focus on the higher-level issues affecting business and personal computer users.First, to be clear, these exploits affect all the major computer chip architectures. The major chip makers — AMD, ARM and Intel — have decided to work together to mitigate the potential effects of a common enemy that affects most modern computer chips — a good sign for future industry collaboration. And all the major software vendors of Linux, Microsoft for Windows, Apple for macOS, and virtualization software suppliers such as VMware and Citrix have all collaborated to mitigate this threat.To read this article in full, please click here