Today at the RSA Conference 2017 in San Francisco, our Chief Internet Technology Officer Olaf Kolkman will be speaking as part of a panel on:
Internet of Insecurity: Can Industry Solve It or Is Regulation Required?
The abstract of the session is:
Whenever I start talking about network visibility and aggreagation taps I can’t help but think of The Matrix. Millions of packets flowing through your network every minute of every day, tapping into that can be a daunting exercise. Luckily we have some new blood in this space, at least in my view, Ixia Vision ONE. For those of you that recognize the name, yes I’m talking about that Ixia.. previously one of the leaders in the load testing market, they’ve moved into the network packet broker space.
Vision ONE is Ixia’s all-in-one product attempts to provide assurance that the network traffic you want to reach your monitoring and security tools is actually reaching your tools. Vision ONE is able to take the input from your device, and send it out in several directions, applying filters to the traffic as needed. This means that you can filter out specific traffic and send it to a monitoring / security tool with traffic it doesn’t need to process. All of this is managed through a clean, easy to user interface that displays the connections between the TAP’s physical ports, filters, and tool ports.
Take a look at the Vision One demo here.
This post will describe the exercises and solutions for week two of Kirk Byers Python for Network Engineers.
The second exercise of week two is the following:
II. Create an IP address converter (dotted decimal to binary): A. Prompt a user for an IP address in dotted decimal format. B. Convert this IP address to binary and display the binary result on the screen (a binary string for each octet). Example output: first_octet second_octet third_octet fourth_octet 0b1010 0b1011000 0b1010 0b10011
We already have the knowledge to achieve this and the previous post went through all of the concepts needed to finish this task so I won’t bee too verbose with the code here.
The first part is to ask the user for an IP address using the “input()” function.
ip_add = input("\n\nPlease enter an IP address: ")
The next step is to split the IP address into octets using “split()”.
octets = ip_add.split(".")
After that each octet is converted into binary with the following code:
first_octet_bin = bin(int(octets[0])) second_octet_bin = bin(int(octets[1])) third_octet_bin = bin(int(octets[2])) fourth_octet_bin = bin(int(octets[3]))
Like in the previous post we have to convert the strings to integers before we can use “bin()” on them. We Continue reading
As is our annual tradition, this blog provides a year-end review of how the Internet providers at the top of our Internet Intelligence – Transit global rankings fared over the previous year. The structure, performance and security of the Internet remains a huge blind spot for most enterprises, even those critically dependent on it for business operations. These are familiar topics that we’ve covered over the years in this blog and our Twitter feed, and 2016 was no different. We saw bogus routing and subsequent grossly misdirected traffic from Ukraine and Iran, for just two examples. We saw cable breaks, new cable activations, censorship and crippling attacks. And much, much more. Dyn provides such critical insight into the structure and performance of the Internet, both real-time and historical, and uses this data set to make 40 billion traffic steering decisions daily for customers.
Back in 2008, we chose to look at the 13 providers that spent at least some time in the Top Ten that year, hence the name “Baker’s Dozen“. We repeated that exercise in 2009, 2010, 2011, 2012, 2013 Continue reading
A couple of months Packet Pushers hosted an open format, non-boring, live discussion about the reality of operating a SD-WAN with people who have lived through it. This was part of the Future WAN Virtual Summit series from Viptela which are now available online.
The session format was live questions & answers from the audience (via chat window) we answered them live, on air.
Packet Pushers Open Mic Live: Real SD-WAN Challenges Live Q&A
Ethan Banks & Greg Ferro, Analysts, Packet Pushers Date: Jan 17 2017, 0900PST Duration: 45 mins
On a separate note, I would welcome any feedback about the “Virtual Summit” idea. The sessions were recorded and now available for anyone to watch.
Which has me thinking about the potential of running a “virtual conference”.
Could that work ? Drop a note in the comments or email me I would love to hear what you think.
The post Sponsor: FutureWAN – a virtual conference on SD-WAN appeared first on EtherealMind.