Archive

Category Archives for "Networking"

6 things you need to know about virtual private networks

A virtual private network is a secure tunnel between two or more computers on the internet, allowing them to access each other as if on a local network. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too, protecting them from attacks when they connect to public wireless networks. Given their importance, here's what you need to know about VPNs:VPNs are good for your privacy and securityOpen wireless networks pose a serious risk to users, because attackers sitting on the same networks can use various techniques to sniff web traffic and even hijack accounts on websites that don't use the HTTPS security protocol. In addition, some Wi-Fi network operators intentionally inject ads into web traffic, and these could lead to unwanted tracking.To read this article in full or to leave a comment, please click here

6 things you need to know about virtual private networks

A virtual private network is a secure tunnel between two or more computers on the internet, allowing them to access each other as if on a local network. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too, protecting them from attacks when they connect to public wireless networks. Given their importance, here's what you need to know about VPNs:VPNs are good for your privacy and securityOpen wireless networks pose a serious risk to users, because attackers sitting on the same networks can use various techniques to sniff web traffic and even hijack accounts on websites that don't use the HTTPS security protocol. In addition, some Wi-Fi network operators intentionally inject ads into web traffic, and these could lead to unwanted tracking.To read this article in full or to leave a comment, please click here

6 things you need to know about virtual private networks

A virtual private network is a secure tunnel between two or more computers on the internet, allowing them to access each other as if on a local network. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too, protecting them from attacks when they connect to public wireless networks. Given their importance, here's what you need to know about VPNs:VPNs are good for your privacy and securityOpen wireless networks pose a serious risk to users, because attackers sitting on the same networks can use various techniques to sniff web traffic and even hijack accounts on websites that don't use the HTTPS security protocol. In addition, some Wi-Fi network operators intentionally inject ads into web traffic, and these could lead to unwanted tracking.To read this article in full or to leave a comment, please click here

Subscription Defined Networking

Cisco’s big announcement this week ahead of Cisco Live was their new Intent-based Networking push. This new portfolio does include new switching platforms in the guise of the Catalyst 9000 series, but the majority of the innovation is coming in the software layer. Articles released so far tout the ability of the network to sense context, provide additional security based on advanced heuristics, and more. But the one thing that seems to be getting little publicity is the way you’re going to be paying for software going forward.

The Bottom Line

Cisco licensing has always been an all-or-nothing affair for the most part. You buy a switch and you have two options – basic L2 switching or everything the switch supports. Routers are similar. Through the early 15.x releases, Cisco routers could be loaded with an advanced image that ran every service imaginable. Those early 15.x releases gave us some attempts at role-based licensing for packet, voice, and security device routers. However, those efforts were rolled back due to customer response.

Shockingly, voice licensing has been the most progressive part of Cisco’s licensing model for a while now. CallManager 4.x didn’t even bother. Hook things up and Continue reading

Juniper Routers Sample BGP Configurations : Quick and Easy

As in my earlier post i wrote about the basic configurations on Cisco Router where i define configurations on Route Reflector, Confederation, Route-Maps, Prefix Lists, Local Preference, AS-Path, MED, Communities and Peer groups.

In this article I am just going to put Juniper router basics BGP configurations. In the later articles I will cover all the configurations like Route Reflector, Confederation, Route-Maps, Prefix Lists, Local Preference, AS-Path, MED, Communities and Peer groups on juniper and Huawei routers.

Below is the basic network topology with configuration as below

Fig 1.1- Juniper Router BGP Topology
Here in the above shown topology, we have Router A, Router B, Router C, Router D and Router E. Router A, B and C are in the AS 22 while Router D is in AS 79 and Router E is in AS 17

Configure the interfaces to Peers A, B, C, and D
Router_NB# set ge-1/2/0 unit 0 description to-A
Router_NB# set ge-1/2/0 unit 0 family inet address 10.10.10.1/30
Router_NB# set ge-0/0/1 unit 5 description to-B
Router_NB# set ge-0/0/1 unit 5 family inet address 10.10.10.5/30
Router_NB# set ge-0/1/0 unit 9 description to-C
Router_NB# set ge-0/1/0 unit 9 family inet address Continue reading

Data center startup offers compute colo at cell towers

Vapor IO, an Austin-based data center technology startup, is launching a rather interesting collocation business by offering leased data center capacity at cellular network towers. The company’s argument is that it should offer compute and network capabilities together for maximum edge computing.The service, called Project Volutus, includes everything from site selection to rack space, power, connectivity, infrastructure management software, and remote hands. The company believes that the need for edge computing capacity will increase as things like IoT, connected and autonomous cars, augmented and virtual reality, and 5G wireless come to market and start scaling.To read this article in full or to leave a comment, please click here

Data center startup offers compute colo at cell towers

Vapor IO, an Austin-based data center technology startup, is launching a rather interesting collocation business by offering leased data center capacity at cellular network towers. The company’s argument is that it should offer compute and network capabilities together for maximum edge computing.The service, called Project Volutus, includes everything from site selection to rack space, power, connectivity, infrastructure management software, and remote hands. The company believes that the need for edge computing capacity will increase as things like IoT, connected and autonomous cars, augmented and virtual reality, and 5G wireless come to market and start scaling.To read this article in full or to leave a comment, please click here

Viewing Linux output in columns

The Linux column command makes it easy to display data in a columnar format -- often making it easier to view, digest, or incorporate into a report. While column is a command that's simple to use, it has some very useful options that are worth considering. In the examples in this post, you will get a feel for how the command works and how you can get it to format data in the most useful ways.By default, the column command will ignore blanks lines in the input data. When displaying data in multiple columns, it will organize the content by filling the left column first and then moving to the right. For example, a file containing numbers 1 to 12 might be displayed in this order:To read this article in full or to leave a comment, please click here

Viewing Linux output in columns

The Linux column command makes it easy to display data in a columnar format -- often making it easier to view, digest, or incorporate into a report. While column is a command that's simple to use, it has some very useful options that are worth considering. In the examples in this post, you will get a feel for how the command works and how you can get it to format data in the most useful ways.By default, the column command will ignore blanks lines in the input data. When displaying data in multiple columns, it will organize the content by filling the left column first and then moving to the right. For example, a file containing numbers 1 to 12 might be displayed in this order:To read this article in full or to leave a comment, please click here

IDG Contributor Network: The fight to defend the Internet of Things

The Internet has entered a new chapter called the Internet of Things (IoT). It follows the fixed-Internet era characterized by connected PCs and laptops through the 1990s, and builds on the mobile-Internet era spearheaded by the proliferation of smartphones during the first two decades of this century. This new chapter has a new set of challenges and opportunities because it involves a broader diversity of devices — ranging from connected light bulbs, smart gas meters and smart speakers, to IP monitoring cameras, smart watches, drones, and robots. And while the connectivity and compute requirements of these IoT devices vary widely, they all have a common need: strong security.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The fight to defend the Internet of Things

The Internet has entered a new chapter called the Internet of Things (IoT). It follows the fixed-Internet era characterized by connected PCs and laptops through the 1990s, and builds on the mobile-Internet era spearheaded by the proliferation of smartphones during the first two decades of this century. This new chapter has a new set of challenges and opportunities because it involves a broader diversity of devices — ranging from connected light bulbs, smart gas meters and smart speakers, to IP monitoring cameras, smart watches, drones, and robots. And while the connectivity and compute requirements of these IoT devices vary widely, they all have a common need: strong security.To read this article in full or to leave a comment, please click here

Security Here I Come!

The announcement has been made!  It is completely official!  I can finally share the awesome great news I am so excited about.  Security will be my absolute #1 focus now. 

Security has always fascinated me.  My entire career.  ….. It’s just that the fundamentals of routing and design intrigued me even more.  🙂

But now?  Yeah baby!  Now I get to flip a switch… dive into and completely surround myself with all things Security.  And I just could not be any more tickled pink and excited.  I feel like all my years of networking have been a build up towards this.

Am I leaving my CPOC lab and job I adore so much?  Nah… I’d go through withdrawal.  LOL.  Nah… wouldn’t be pretty.  It is just my role that will be changing.

Woot woot!  Security here I come!  ROCK!