Archive

Category Archives for "Networking"

Feds consider tougher requirements for IoT security

A bill submitted this week to the U.S. Senate could be the first step toward fixing IoT security, requiring that device makers who want to do business with the federal government meet basic security standards.The bill mandates that any Internet-connected device provided by government contractors be free from known security vulnerabilities, be able to receive regular software updates, and use up-to-date communications and encryption industry standards.+ALSO ON NETWORK WORLD: IDC: SD-WAN growth is exploding for at least the next 5 years + The 10 most powerful companies in enterprise networkingTo read this article in full or to leave a comment, please click here

IoT security for healthcare is in critical condition

IoT security is a headache, a mess and several other flavors of annoying for any enterprise, but in healthcare, it can be literally life and death.Compromising any connected device has two main consequences – one is to enlist devices into a botnet, like the security camera-capturing Mirai, and the other is to offer a passage deeper into any infrastructure the device is connected to.+ALSO ON NETWORK WORLD: What is IoT? + Bluetooth Mesh takes aim at enterprise IoT, but hasn’t taken flightTo read this article in full or to leave a comment, please click here

Data center construction increases thanks to the cloud

A new report from a real estate firm that specializes in data center construction and leasing says data center construction in North America is up 43 percent over the same period in 2016, and industry consolidation has driven $10 billion in mergers and acquisitions (M&A) so far. Jones Lang LaSalle just published its report on the North America data center market, highlighting trends such as consolidation, enterprise hybrid cloud, security, and high-performance computing.+ Also on Network World: Ireland the best place to set up a data center in the EU + While construction continues at a record clip, the report also found that absorption of data center space available for lease has returned to normal levels after record leasing in 2016. So many of the cloud providers are still digesting the capacity they picked up last year.To read this article in full or to leave a comment, please click here

Data center construction increases thanks to the cloud

A new report from a real estate firm that specializes in data center construction and leasing says data center construction in North America is up 43 percent over the same period in 2016, and industry consolidation has driven $10 billion in mergers and acquisitions (M&A) so far. Jones Lang LaSalle just published its report on the North America data center market, highlighting trends such as consolidation, enterprise hybrid cloud, security, and high-performance computing.+ Also on Network World: Ireland the best place to set up a data center in the EU + While construction continues at a record clip, the report also found that absorption of data center space available for lease has returned to normal levels after record leasing in 2016. So many of the cloud providers are still digesting the capacity they picked up last year.To read this article in full or to leave a comment, please click here

Data center construction increases thanks to the cloud

A new report from a real estate firm that specializes in data center construction and leasing says data center construction in North America is up 43 percent over the same period in 2016, and industry consolidation has driven $10 billion in mergers and acquisitions (M&A) so far. Jones Lang LaSalle just published its report on the North America data center market, highlighting trends such as consolidation, enterprise hybrid cloud, security, and high-performance computing.+ Also on Network World: Ireland the best place to set up a data center in the EU + While construction continues at a record clip, the report also found that absorption of data center space available for lease has returned to normal levels after record leasing in 2016. So many of the cloud providers are still digesting the capacity they picked up last year.To read this article in full or to leave a comment, please click here

History of Networking: Quality of Service with Fred Baker

Some folks over at the Network Collective thought it would be cool to sit around with folks who invented various networking technologies and just talk about the where, why, and how of those technologies were invented. Donald Sharp and I, while not officially a part of the collective, are hosting this new video cast, and the first edition just published.

For this videocast, we’re sitting down with Fred Baker to talk about the origins of Quality of Service. Hopefully we will have Fred on again in the future to talk about Raven and some of the history around network surveillance. You can watch it here, or you can jump over to the main Network Collective site and watch it there.

The post History of Networking: Quality of Service with Fred Baker appeared first on rule 11 reader.

Virtual networking optimization and best practices

Network optimization is an incredibly important component to scalability and efficiency. Without solid network optimization, an organization will be confronted with a quickly building overhead and vastly reduced efficiency. Network optimization aids a business in making the most of its technology, reducing costs and even improving upon security. Through virtualization, businesses can leverage their technology more effectively — they just need to follow a few virtual networking best practices.

Prioritize the most important applications

There are certainly applications that are optional, but there are others that are critical. The most important applications on a network are the ones that need to be prioritized in terms of system resources. These are generally cyber security suites, firewalls, and monitoring services. Optional applications may still be preferred for business operations, but because they aren’t critical they can still operate slowly in the event of system wide issues.

Prioritizing security applications is especially important as there are many cyber security exploits that operate with the express purpose of flooding the system until security elements fail. When security apps are prioritized, the risk of this type of exploit is greatly reduced.

Install application monitoring services

Application monitoring services will be able to automatically detect when Continue reading

EVPN-VXLAN lab – RT assignment methods

This post continues the EVPN-VXLAN lab from the previous one.

For now I configured the simplest possible variant of RT assignment – one vrf-target for all ES and VNI routes (vrf-target target:65000:1):

alex@vQFX1# show switch-options
service-id 1;
vtep-source-interface lo0.0;
route-distinguisher 11.11.11.11:1;
vrf-target target:65000:1;    ### This RT applies to ALL EVPN routes


alex@vMX1# show routing-instances
evpn {
    vtep-source-interface lo0.0;
    instance-type virtual-switch;
    interface ge-0/0/4.0;
    interface ae0.0;
    route-distinguisher 1.1.1.1:1;
    vrf-target target:65000:1;   ### This RT applies to ALL EVPN routes
    protocols {
        evpn {
            encapsulation vxlan;
            extended-vni-list [ 100 200 ];
            multicast-mode ingress-replication;
            default-gateway no-gateway-community;
        }
    }
    bridge-domains {
        v100 Continue reading

44% off Aukey Dash Cam, Full HD Wide Angle With Night Vision – Deal Alert

This 1080p Dash Camera captures video or stills, and is equipped with a motion detector and continuous loop recording. An emergency recording mode can be activated by sharp turns or sudden stops, and automatically captures unexpected driving incidents. The Dash Camera can also record whenever it sees motion in front or create a time-lapse video of your trip. Features Full HD 1080P, 170° Wide Angle Lens, 2“ LCD and Night Vision. Its typical list price has been reduced 44% to just $58.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

22% off Aukey Dash Cam, Full HD Wide Angle With Night Vision – Deal Alert

This 1080p Dash Camera captures video or stills, and is equipped with a motion detector and continuous loop recording. An emergency recording mode can be activated by sharp turns or sudden stops, and automatically captures unexpected driving incidents. The Dash Camera can also record whenever it sees motion in front or create a time-lapse video of your trip. Features Full HD 1080P, 170° Wide Angle Lens, 2“ LCD and Night Vision. Its typical list price has been reduced 22% to just $69.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

22% off Aukey Dash Cam, Full HD Wide Angle With Night Vision – Deal Alert

This 1080p Dash Camera captures video or stills, and is equipped with a motion detector and continuous loop recording. An emergency recording mode can be activated by sharp turns or sudden stops, and automatically captures unexpected driving incidents. The Dash Camera can also record whenever it sees motion in front or create a time-lapse video of your trip. Features Full HD 1080P, 170° Wide Angle Lens, 2“ LCD and Night Vision. Its typical list price has been reduced 22% to just $69.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

44% off Aukey Dash Cam, Full HD Wide Angle With Night Vision – Deal Alert

This 1080p Dash Camera captures video or stills, and is equipped with a motion detector and continuous loop recording. An emergency recording mode can be activated by sharp turns or sudden stops, and automatically captures unexpected driving incidents. The Dash Camera can also record whenever it sees motion in front or create a time-lapse video of your trip. Features Full HD 1080P, 170° Wide Angle Lens, 2“ LCD and Night Vision. Its typical list price has been reduced 44% to just $58.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

67% off Amir 3 in 1 Cell Phone Camera Lens Kit – Deal Alert

With this smartphone lens kit from Amir you can take high clarity, professional photos wish fisheye, macro and super wide angle format from virtually any cell phone. These professional HD lenses reduce glass flare & ghosting caused by reflections. A universal clip design makes it easy to attach to most cell phones, iPads and PC's as well.  The fisheye lens capture images at 180-degrees, wide angle lens at 140-degrees and the macro lens magnifies 10x with a minimum object distance of 10-15mm. The lens kit receives an average of 4 out of 5 stars on Amazon (read reviews). Regular price is listed at $29.99 on Amazon, but with the current 67% discount you can gift this kit to yourself or an aspiring photographer for just $9.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

.NE Body Out There?

Protecting end users starts with understanding their use and integration of services. For authoritative DNS, this includes human error when copying and pasting information between interfaces. After purchasing a new domain, such as “containercult.com,” the end user configures authoritative nameservers. Delegation is a “set it and forget it” operation; it is often made outside of scope of continuous integration pipelines and automated deployment systems. To quantify this risk and reconcile it with reality, we started to look at the existence of nameserver record typos in the .COM zone file.

There are typos in nameserver records for a number of authoritative DNS providers made across a number of zones, making it clear that end users make delegation typos. The existence of the typo is one thing, it’s another when the typo has been registered and another provider is serving responses. One of the typos of interest was dynect.ne, which was registered some time in February of 2016. At that time, it was delegated to a pair of authoritative nameservers operated by myhostadmin.net, a name related to a Chinese hosting provider. Sometime around January 2017, the authoritative nameservers changed over to Yandex, the Russian internet services provider, and Continue reading

GRE Tunnels – Generic Routing Encapsulation – Use Cases

GRE Tunnels  GRE tunnels are by far most common tunnelling technology. Very easy to setup, troubleshoot and operate. But in large scale deployment, configuring GRE tunnels become cumbersome, because GRE tunnel is a point to point tunnel.   GRE Tunnel Characteristics    • GRE tunnels are manual point to point tunnels. Tunnel end points are not automatically […]

The post GRE Tunnels – Generic Routing Encapsulation – Use Cases appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.