Archive

Category Archives for "Networking"

Firewalls Checkpoint : Check Point 1100 Security Appliances Introduction


Today I am going to talk about the Checkpoint Firewalls where i am talking about the Checkpoint 1100 security appliances. There are lot of vendors who have head to head competition on the security domain which includes Palo-Alto, Cisco, Brocade and Checkpoint. The market is moving away from the stateful firewall as they are moving towards the Next generation firewalls which Gartner provide the set of features.

What is Next Generation Firewalls ?
Well I wrote so many articles here in this blog about the Next Generation Firewalls. Next Generation Firewall includes the features like Firewall, IPS, Stability and Reliability with Visibility feature. Below is the basic topology where it is showing where we can deploy the firewalls in the network. The below mentioned network topology showing the firewall is deployed on the gateway and for the internal segmentation of the networks. The network topology uses here is just for the demo purposes and have no relevance with any of the live or enterprise network.

Fig 1.1- Basic Firewall deployment in the Network

I had write some of the articles on Next generation firewalls earlier. Please go through the below links to get the more ideas of Next Generation Firewalls Continue reading

Cisco Access Points- Basics, Comparison with Aruba and Ruckus

Today I am going to talk about the Cisco Wireless topic where I will talk about Aironet 3700 Series Access point which features and the comparison with the other vendors as well. But before we are going to talk about the Aironet 3700 Access point we will talk about the Access points.

What is Access Point ?
Well if you talk about the Access point, It is a hardware device which is capable to creating the Wireless network in the campus or in the office. An access point connects to a wired router, switch, or hub via an Ethernet cable, and projects a Wi-Fi signal to a designated area.

What is the use of the Access Points?
High-density experience through a purpose-built, innovative chipset with best-in-class RF architecture for a high-performance enterprise network. Below is showing the basic topology of the Cisco Aironet Access points.

Fig 1.1- Cisco Aironet Network Topology

Cisco Aironet 3700 Access Points
The Cisco Aironet 3700 Series Access Point is designed for high-density network environments that utilize mission-critical, high-performance applications.

Fig 1.2- Cisco Aironet Models
The Aironet 3700 Series delivers:
  • The industry's first wireless access point with integrated 802.11ac Wave 1 radio to support a 4x4 MIMO with Continue reading

Introduction to Cloud Computing : Private, Public and Hybrid Cloud Models

Today I am going to talk about the most demanding cloud technology where so many companies are moving towards the next generation cloud computing approach. Even as per the demand, vendors and service providers are taking the new route to provide the cloud based technology to their customers.

There are so many questions as many of you are not aware of what cloud actually is and how they migrate the traditional network to cloud based infrastructure. But make sure if you are moving to the cloud based technology the hardware should be cloud ready to support and even support the third party APIs.

What is Cloud Computing and how are they helpful to the customers ?

Cloud computing approach storing and gaining access to information and applications over the internet rather than your computer's tough power. It is going again to the times of flowcharts and displays that would constitute the huge server-farm infrastructure of the internet as nothing but a puffy, white cumulonimbus cloud, accepting connections and dishing out facts because it floats.

Cloud computing is the result of the evolution and adoption of existing technology and paradigms. The aim of cloud computing is to permit customers to take benefit Continue reading

RONOG4 meeting in Bucharest, Romania

The 4th edition of Romanian NOG (RONOG) is being held today, 31 October 2017, in Bucharest, Romania, and as the largest meeting of Internet technology professionals in Romania it is expecting to hit over 170 attendees.

As specified in the meeting agenda, I’ll deliver my talk about NAT64 experiments in the go6lab and also one very useful tool that came out of this testing – NAT64Check. I also have the honour of chairing the IPv6/IOT session.

I’m looking forward to being back in Bucharest and if you happen to be at RONOG4, please come and find me in the hallways as I’m always happy to chat about technology, IPv6, DNSSEC, DANE and everything else that makes our Internet a bit of a better place!

The post RONOG4 meeting in Bucharest, Romania appeared first on Internet Society.

Network Automation Engineer Persona: Targeted Learning

The series of Network Automation Engineer (NAE) Persona blog posts have churned some comments in the community around learning. Part of the feedback appears to be the hero syndrome fighting back and also the odd misunderstanding, which might be a result of fear. Change often results in fear, so this is natural.

Network Heroes

Some people love networking because it makes them feel special. Some people have got used to that special feeling and hang on to the fact that they’re

important
. These network engineers feel like a “Packet Lord”.

Automation is designed to remove from humans deterministic and testable tasks. One result is fewer self-titled “Prime minister of Packets” and fewer bottlenecks. Taking IaC (Infrastructure as Code), it becomes so much simpler to define tasks, implement them and test for success or failure. Dealing with sources of truth is part of the natural flow of the process instead of an afterthought on a Friday afternoon.

The hero very much becomes the norm at this point.

Articles

At a high level, the articles discuss the evolving NAE persona and not what you should or shouldn’t learn. The articles do not discourage learning, they recognise and promote learning. After all, you Continue reading

IDG Contributor Network: Zombie companies are everywhere! But there’s a cure

It’s zombie season again! Not only was The Walking Dead back with new episodes this month, but neighborhoods around the country are about to be crawling with zombies (most can be staved off with a little chocolate).In business, unfortunately, zombie season has been in full swing for some time. This is an era of digital disruption, and it’s completely changed the way business is done, but not everyone has gotten on board. Companies are persisting with outdated business models, investing in outdated products, and committed to outdated delivery methods. To me, these companies are zombies, dead without knowing it. They may be moving forward, but don’t let the motion fool you, they’re only moving toward obsolescence.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Zombie companies are everywhere! But there’s a cure

It’s zombie season again! Not only was The Walking Dead back with new episodes this month, but neighborhoods around the country are about to be crawling with zombies (most can be staved off with a little chocolate).In business, unfortunately, zombie season has been in full swing for some time. This is an era of digital disruption, and it’s completely changed the way business is done, but not everyone has gotten on board. Companies are persisting with outdated business models, investing in outdated products, and committed to outdated delivery methods. To me, these companies are zombies, dead without knowing it. They may be moving forward, but don’t let the motion fool you, they’re only moving toward obsolescence.To read this article in full or to leave a comment, please click here

Applying Software Agility to Network Design

The paper we are looking at in this post is tangential to the world of network engineering, rather than being directly targeted at network engineering. The thesis of On Understanding Software Agility—A Social Complexity Point of View, is that at least some elements of software development are a wicked problem, and hence need to be managed through complexity. The paper sets the following criteria for complexity—

  • Interaction: made up of a lot of interacting systems
  • Autonomy: subsystems are largely autonomous within specified bounds
  • Emergence: global behavior is unpredictable, but can be explained in subsystem interactions
  • Lack of equilibrium: events prevent the system from reaching a state of equilibrium
  • Nonlinearity: small events cause large output changes
  • Self-organization: self-organizing response to disruptive events
  • Co-evolution: the system and its environment adapt to one another

It’s pretty clear network design and operation would fit into the 7 points made above; the control plane, transport protocols, the physical layer, hardware, and software are all subsystems of an overall system. Between these subsystems, there is clearly interaction, and each subsystem acts autonomously within bounds. The result is a set of systemic behaviors that cannot be predicted from examining the system itself. The network design process is, Continue reading