Archive

Category Archives for "Networking"

TCPDump Quick Reference

TCPDump is a tool for sniffing packets on a network. This is not a comprehensive tutorial, only a quick reference source. Consult the man pages and/or documentation for indepth explanation of commands. Capturing Traffic All Traffic for an interface -i <interface-name> specifies an...

Viptela Cloud onRamp optimizes cloud access

Over the past few years, SD-WANs have become the Kardashians of the tech industry. That is, it’s hard to go anywhere or talk to anyone without the topic of SD-WANs coming up. Unlike the Kardashians, SD-WANs deserve this level of attention, since the technology is useful by lowering the cost of running a WAN and improves application performance. However, for all the hype and chatter about the topic, its primary focus has been to improve connectivity to branch offices.It’s been well documented on this site and others that the cloud is not only mainstream but also the preferred strategy for many organizations, so a WAN must not only address connectivity to branch offices but also cloud services.To read this article in full or to leave a comment, please click here

Quantum fiber network to launch in August

The most secure form of network ever created has been successfully real-world-tested in China, said a publication there yesterday.Quantum entanglement—the tech that drives quantum networks—is a part of quantum-key distribution (QKD). Roughly, it gains its supposedly unhackable nature because the subatomic particles that make up the data impact each other all at the same time, regardless of where they are in the transmission.That means that because all of the cryptographic keys are intertwined, it’s possible to see at any time if bits have been corrupted. That includes being stolen or erased. Any disruption becomes transparent and throws an error. One can’t hack the system, experts say.To read this article in full or to leave a comment, please click here

Quantum fiber network to launch in August

The most secure form of network ever created has been successfully real-world-tested in China, said a publication there yesterday.Quantum entanglement—the tech that drives quantum networks—is a part of quantum-key distribution (QKD). Roughly, it gains its supposedly unhackable nature because the subatomic particles that make up the data impact each other all at the same time, regardless of where they are in the transmission.That means that because all of the cryptographic keys are intertwined, it’s possible to see at any time if bits have been corrupted. That includes being stolen or erased. Any disruption becomes transparent and throws an error. One can’t hack the system, experts say.To read this article in full or to leave a comment, please click here

Getting started with Cloudflare Apps

We recently launched our new Cloudflare Apps platform, and love to see the community it is building. In an effort to help people who run web services such as websites, APIs and more, we would like to help make your web services faster, safer and more reliable using our new Apps Platform by leveraging our 115 points of presence around the world. (Skip ahead to the fun part if you already know how Cloudflare Apps works)

How Cloudflare apps work

Here is a quick diagram of how Cloudflare apps work:

The “Origin” is the server that is providing your services, such as your website or API. The “Edge” represents a point of presence that is closest to your visitors. Cloudflare uses a routing method known as Anycast to ensure the end user, pictured on the far right, is routed through the best network path to our points of presence closest to them around the world.

Historically, to make changes or additions to your site at the edge changes to a site, you needed to be a Cloudflare employee. Now with apps, anyone can quickly make changes to the pages rendered to their users via Javascript and CSS. Today, you Continue reading

BrandPost: Why An Intelligent WAN Edge Solution Is Key To Branch Office Success

The concept of the “thin branch” enabled by simplifying infrastructure has been around for as long as there have been branch offices. Branch offices are typically a microcosm of the company headquarters, but without the necessary IT staff to run them. It’s common to find a myriad of network and security equipment in a branch including a router, firewall, WAN optimizer, VPN concentrators, along with almost anything else you can think of. This, of course, results in an operational nightmare as network administrators must deal with multiple devices in dozens, hundreds or even thousands of branch locations. In small networks it can be extremely challenging to track all the different hardware components and related software versions across the various locations. In large networks, this task is impossible as the number of possible combinations of hardware and software grows exponentially in relation to the number of locations.To read this article in full or to leave a comment, please click here

Arista eAPI

The sFlow and eAPI features of EOS (Extensible Operating System) are standard across the full range of Arista Networks switches. This article demonstrates how the real-time visibility provided by sFlow telemetry can be combined with the programmatic control of eAPI to automatically adapt the network to changing traffic conditions.

In the diagram, the sFlow-RT analytics engine receives streaming sFlow telemetry, provides real-time network-wide visibility, and automatically applies controls using eAPI to optimize forwarding, block denial of service attacks, or capture suspicious traffic.

Arista eAPI 101 describes the JSON RPC interface for programmatic control of Arista switches. The following eapi.js script shows how eAPI requests can be made using sFlow-RT's JavaScript API:
function runCmds(proto, agent, usr, pwd, cmds) {
var req = {
jsonrpc:'2.0',id:'sflowrt',method:'runCmds',
params:{version:1,cmds:cmds,format:'json'}
};
var url = (proto || 'http')+'://'+agent+'/command-api';
var resp = http(url,'post','application/json',JSON.stringify(req),usr,pwd);
if(!resp) throw "no response";
resp = JSON.parse(resp);
if(resp.error) throw resp.error.message;
return resp.result;
}
The following test.js script demonstrates the eAPI functionality with a basic show request:
include('eapi.js');
var result = runCmds('http','10.0.0.90','admin','arista',['show hostname']);
logInfo(JSON.stringify(result));
Starting sFlow-RT:
env "RTPROP=-Dscript.file=test.js" ./start.sh
Running the script generates the following output:
2017-07-10T14:00:06-0700  Continue reading