Archive

Category Archives for "Networking"

BrandPost: What’s the state of SASE?

By: Eve-Marie Lanza, Senior Security Solutions Marketing Manager at HPE Aruba Networking. SASE adoption among organizations is on the rise, according to research independently conducted by leading security research firm Ponemon Institute, sponsored by Hewlett Packard Enterprise.In the report, The 2023 Global Study on Closing the IT Security Gap: Addressing Cybersecurity Gaps from Edge to Cloud, 30% of organizations indicate they have adopted the Secure Access Service Edge (SASE) architecture. Nearly the same amount (29%) plan to deploy SASE.To read this article in full, please click here

A Look At Broadcom’s Jericho3-AI Ethernet Fabric: Schedules, Credits, And Cells

Broadcom has come up with some interesting mechanisms to address the challenges of building an Ethernet-based fabric that supports AI workloads. These mechanisms, which include a scheduling framework, cells, and credits, are intended to minimize congestion, latency, and dropped frames or packets in the fabric. In this post I talk about what I learned at […]

The post A Look At Broadcom’s Jericho3-AI Ethernet Fabric: Schedules, Credits, And Cells appeared first on Packet Pushers.

Grafana Network Weathermap

The screen capture above shows a simple network weathermap, displaying a network topology with links animated by real-time network analytics.
Hovering over a link in the weathermap pops up a trend chart showing traffic on the link over the last 30 minutes.

Deploy real-time network dashboards using Docker compose, describes how to quickly deploy a real-time network analytics stack that includes the sFlow-RT analytics engine, Prometheus time series database, and Grafana to create dashboards. This article describes how to extend the example using the Grafana Network Weathermap Plugin to display network topologies like the ones shown here.

First, add a dashboard panel and select the Network Weathermap visualization. Next define the three metrics shown above. The ifinoctets and ifoutoctets need to be scaled by 8 to convert from bytes per second to bits per second. Creating a custom legend entry makes it easier to select metrics to associate metric instances with weathermap links.
Add a color scale that will be used to color links by link utilization. Defining the scale first ensures that links will be displayed correctly when they are added later.
Add the nodes to the canvas and drag them to their desired locations. There is a Continue reading

Project Cybersafe Schools: Bringing security tools for free to small K-12 school districts in the US

Project Cybersafe Schools: Bringing security tools for free to small K-12 school districts in the US
Project Cybersafe Schools: Bringing security tools for free to small K-12 school districts in the US

Like other under-resourced organizations, schools face cyber attacks from malicious actors that can impact their ability to safely perform their basic function: teach children. Schools face email, phishing, and ransomware attacks that slow access and threaten leaks of confidential student data. And these attacks have real effects. In a report issued at the end of 2022, the U.S. Government Accountability Office concluded that schools serving kindergarten through 12th grade (K-12) reported significant educational impact and monetary loss due to cybersecurity incidents, such as ransomware attacks. Recovery time can extend from 2 all the way up to 9 months — that’s almost an entire school year.

Cloudflare’s mission is to help build a better Internet, and we have always believed in helping protect those who might otherwise not have the resources to protect themselves from cyberattack.

It is against this backdrop that we’re very excited to introduce an initiative aimed at small K-12 public school districts: Project Cybersafe Schools. Announced as part of the Back to School Safely: K-12 Cybersecurity Summit at the White House on August 8, 2023, Project Cybersafe Schools will support eligible K-12 public school districts with a package of Zero Trust cybersecurity solutions — for Continue reading

Remote working turbocharged: How WAN Optimization unlocks next-level productivity for remote workers

According to a 2022 survey by McKinsey , 58% of Americans have the opportunity to work from home at least one day a week. This trend is accelerating a shift from traditional IT solutions to cloud-based alternatives that are better suited to supporting a distributed workforce. Gartner predicts that enterprise IT spending on public cloud computing will overtake spending on traditional IT in 2025 in four key market segments.  To read this article in full, please click here

Python – Using the IP Address Module to Calculate IPs

I’m currently preparing for a network rollout and the preparation includes assigning subnets to the sites. There are subnets needed for management, wired users, wireless users, guests, and so on. Once subnets have been assigned, for some of the subnets, DHCP scopes need to be created. The team managing the server has requested that information on the subnets, gateway, and what IP the scope begins and ends with be provided as a CSV file. This will allow for easily importing the scopes into the server.

For my scenario, I have the information in a spreadsheet and I’m accessing the information using the openpyxl project. I am then using the ipaddress library to take the prefix from the spreadsheet and performing various calculations. Why use Python for this?

  • Writing CSV is time consuming for humans.
  • Although I’m quite good at performing calculations, I’m not better than a computer.
  • Using code means consistent output that is less error prone.

The goal is to create a line of CSV that looks like this:

VLAN 100 User,192.0.2.64,255.255.255.192,192.0.2.65,192.0.2.75,192.0.2.126,US0100 NY,example.com,

This line consists of:

Tech Bytes: Spotting Performance Problems Faster With Digital Experience Monitoring (Sponsored)

Today on the Tech Bytes podcast we get into Digital Experience Monitoring (DEM). DEM goes beyond traditional SLAs by offering more precise measurements of network and application performance as experienced by end users, and can provide detailed measurements to help network engineers identify and respond to problems. We talk with sponsor Fortinet about how it delivers DEM.

The post Tech Bytes: Spotting Performance Problems Faster With Digital Experience Monitoring (Sponsored) appeared first on Packet Pushers.

Tech Bytes: Spotting Performance Problems Faster With Digital Experience Monitoring (Sponsored)

Today on the Tech Bytes podcast we get into Digital Experience Monitoring (DEM). DEM goes beyond traditional SLAs by offering more precise measurements of network and application performance as experienced by end users, and can provide detailed measurements to help network engineers identify and respond to problems. We talk with sponsor Fortinet about how it delivers DEM.

Who is selling Zero Trust Network Access (ZTNA) and what do you get?

The last few years have seen an explosion of interest in Zero Trust Network Access (ZTNA). The zero trust approach replaces the perimeter defense model with a "least privilege" framework where users authenticate to access specific data and applications, and their activities are continuously monitored.ZTNA gained a boost in the wake of the COVID-19 pandemic, with more employees working remotely. The old perimeter defense model, exemplified by VPNs, provides a secured internet connection that gives remote users privileges as if they were on an internal private network. This doesn't match up with a zero trust mindset; and to make things worse, many organizations found that their infrastructure couldn't handle the traffic loads created by large numbers of remote workers connecting via VPN. To read this article in full, please click here

Network Break 441: AWS Makes You Pay For IPv4; Superconductor Claims Meet Resistance; An Ultra Ethernet Q&A

Take a Network Break! This week we discuss new charges for IPv4 addresses being levied by AWS, Cisco's acquisition of a BGP monitoring service, and financial results for a host of tech companies. We also speak with J Metz, the Steering Committee Chair of the Ultra Ethernet Consortium to learn more about the organization's goals; and examine the efforts to investigate claims of a breakthrough in superconducting research.

The post Network Break 441: AWS Makes You Pay For IPv4; Superconductor Claims Meet Resistance; An Ultra Ethernet Q&A appeared first on Packet Pushers.

Network Break 441: AWS Makes You Pay For IPv4; Superconductor Claims Meet Resistance; An Ultra Ethernet Q&A

Take a Network Break! This week we discuss new charges for IPv4 addresses being levied by AWS, Cisco's acquisition of a BGP monitoring service, and financial results for a host of tech companies. We also speak with J Metz, the Steering Committee Chair of the Ultra Ethernet Consortium to learn more about the organization's goals; and examine the efforts to investigate claims of a breakthrough in superconducting research.

Nvidia teams with Accenture and ServiceNow for AI program

An interesting alliance has been struck, with Nvidia partnering with IT consultancy Accenture and helpdesk vendor ServiceNow to offer what the vendors are calling the AI Lighthouse, a program designed to help ServiceNow customers quickly adopt generative AI tools.The IT service management and customer service markets seem a natural fit for generative AI. When customers or employees need help with something, that’s where generative AI can shine.To read this article in full, please click here

Nvidia teams with Accenture and ServiceNow for AI program

An interesting alliance has been struck, with Nvidia partnering with IT consultancy Accenture and helpdesk vendor ServiceNow to offer what the vendors are calling the AI Lighthouse, a program designed to help ServiceNow customers quickly adopt generative AI tools.The IT service management and customer service markets seem a natural fit for generative AI. When customers or employees need help with something, that’s where generative AI can shine.To read this article in full, please click here

Dell announces generative AI solutions

Dell Technologies is the latest IT vendor to jump on the generative AI bandwagon with a range of new AI offerings that span its hardware, software and services lineup.In May, Dell announced plans to develop integrated AI services in partnership with Nvidia. That service has come to fruition with this portfolio, dubbed Dell Generative AI Solutions. As part of the program, the company announced validated designs with Nvidia that are aimed at helping enterprises deploy AI workloads on premises. The new offerings also include professional services to help enterprises determine where and how to best use generative AI services.Typically, Nvidia GPUs go into servers for AI functions. But Dell's news isn't limited to servers. Dell is also announcing Precision workstations with expanded Nvidia GPU configurations to help users accelerate generative AI workloads locally on their devices.To read this article in full, please click here

Dell announces generative AI solutions

Dell Technologies is the latest IT vendor to jump on the generative AI bandwagon with a range of new AI offerings that span its hardware, software and services lineup.In May, Dell announced plans to develop integrated AI services in partnership with Nvidia. That service has come to fruition with this portfolio, dubbed Dell Generative AI Solutions. As part of the program, the company announced validated designs with Nvidia that are aimed at helping enterprises deploy AI workloads on premises. The new offerings also include professional services to help enterprises determine where and how to best use generative AI services.Typically, Nvidia GPUs go into servers for AI functions. But Dell's news isn't limited to servers. Dell is also announcing Precision workstations with expanded Nvidia GPU configurations to help users accelerate generative AI workloads locally on their devices.To read this article in full, please click here

Pixelfed – Part 1 – Installing

About this series

Pixelfed

I have seen companies achieve great successes in the space of consumer internet and entertainment industry. I’ve been feeling less enthusiastic about the stronghold that these corporations have over my digital presence. I am the first to admit that using “free” services is convenient, but these companies are sometimes taking away my autonomy and exerting control over society. To each their own of course, but for me it’s time to take back a little bit of responsibility for my online social presence, away from centrally hosted services and to privately operated ones.

After having written a fair bit about my Mastodon [install] and [monitoring], I’ve been using it every day. This morning, my buddy Ramón asked if he could make a second account on ublog.tech for his Campervan Adventures, and notably to post pics of where he and his family went.

But if pics is your jam, why not … [Pixelfed]!

Introduction

Similar to how blogging is the act of publishing updates to a website, microblogging is the act of publishing small updates to a stream of updates on your profile. Very similar to the relationship between Facebook and Continue reading

OSPF Convergence In a Hub and Spoke Topology

My dear friend Micheline Murphy posted an excellent question on OSPF in a Hub and Spoke topology at the Cisco Learning Network. The scenario is a Hub and Spoke topology with two Hub routers that are ABRs belonging to area 100 and area 200. SP-101 and SP-102 belong to area 100. SP-201 and SP-202 belong to area 200. The topology is shown below:

The OSPF areas are shown below:

Some facts about the setup and intent of this post:

  • All routers are Catalyst8000v running IOS-XE 17.6.3.
  • Hub routers are connected to area 0 where the prefix 198.51.100.0/24 is being advertised.
  • Each spoke advertises a /28 from 192.0.2.0/24.
  • All interfaces are point to point as the purpose is not to simulate a NBMA topology.
  • The intent is to verify what happens in a failure scenario but lab first shows the stable topology.

The expectation is that in a stable topology each Spoke will have two ECMP routes, one via each Hub, to the other spokes. The router SP-202 will be used to demonstrate. First let’s verify that everything is working as expected. SP-202 is a router in area 200:

SP-202#show ip ospf 1
  Continue reading

Unmasking the top exploited vulnerabilities of 2022

Unmasking the top exploited vulnerabilities of 2022
Unmasking the top exploited vulnerabilities of 2022

The Cybersecurity and Infrastructure Security Agency (CISA) just released a report highlighting the most commonly exploited vulnerabilities of 2022. With our role as a reverse proxy to a large portion of the Internet, Cloudflare is in a unique position to observe how the Common Vulnerabilities and Exposures (CVEs) mentioned by CISA are being exploited on the Internet.

We wanted to share a bit of what we’ve learned.

Based on our analysis, two CVEs mentioned in the CISA report are responsible for the vast majority of attack traffic seen in the wild: Log4J and Atlassian Confluence Code Injection. Although CISA/CSA discuss a larger number of vulnerabilities in the same report, our data clearly suggests a major difference in exploit volume between the top two and the rest of the list.

The top CVEs for 2022

Looking at the volume of requests detected by WAF Managed Rules that were created for the specific CVEs listed in the CISA report, we rank the vulnerabilities in order of prevalence:

Popularity rank

Description

CVEs

1. Improper Input Validation caused Remote Code execution in Apache Log4j logging library

Log4J

CVE-2021-44228

2. Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability

Atlassian Confluence Code Injection

CVE-2022-26134

Continue reading