Archive

Category Archives for "Networking"

New products of the week 1.9.17

New products of the weekImage by invrisionOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Comodo Internet Security 10Image by ComodoTo read this article in full or to leave a comment, please click here

Windows 10 tips and tricks for Wi-Fi and networking

There have been many changes in Windows 10, especially since the first anniversary update last August, officially called version 1607. Here are some of the most important changes related to the Wi-Fi and networking aspects of Windows 10, along with some tips and tricks on using the new and improved features and navigating the revamped GUI.To read this article in full or to leave a comment, please click here(Insider Story)

Promoting cloud in a risk-averse organization

Our organization, like most large public bodies, is locked into formal bureaucratic procedures and, by general standards, is highly risk-averse. In addition, like other organizations of the United Nations System, it has a unique attribute which makes moving to the cloud a much greater leap than for most other organizations: UN System organizations enjoy a special status.In the aftermath of World War II, countries negotiating the Charter for the future United Nations agreed the organization should be in a position to function without interference from any single Member State. For this reason, a regime of privileges and immunities was developed. It is this special legal regime that ensures UN organizations are immune from the jurisdiction of national courts, that their premises cannot be entered by national enforcement agencies without their consent, and that their archives – including their data – cannot be accessed without their agreement.To read this article in full or to leave a comment, please click here

Promoting cloud in a risk-averse organization

Our organization, like most large public bodies, is locked into formal bureaucratic procedures and, by general standards, is highly risk-averse. In addition, like other organizations of the United Nations System, it has a unique attribute which makes moving to the cloud a much greater leap than for most other organizations: UN System organizations enjoy a special status.

In the aftermath of World War II, countries negotiating the Charter for the future United Nations agreed the organization should be in a position to function without interference from any single Member State. For this reason, a regime of privileges and immunities was developed. It is this special legal regime that ensures UN organizations are immune from the jurisdiction of national courts, that their premises cannot be entered by national enforcement agencies without their consent, and that their archives – including their data – cannot be accessed without their agreement.

To read this article in full or to leave a comment, please click here

2017’s 25 geekiest 25th anniversaries

Early 90s notablesImage by Nintendo, Pan Books, Michael Hughes, Paramount PicturesA big year for technology – and technology-related events – 1992 saw the release of Linux under GNU, the sending of the first SMS message, IBM trotting out the ThinkPad and Simon, which was the first mobile phone to include PDA features (smartphone). The year also saw the launch of iconic videogame franchises Mario Kart and Mortal Kombat. And, perhaps worst of all, Microsoft unleashed upon the world the scourge that is PowerPoint. For previous versions of this series, please see: 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007.To read this article in full or to leave a comment, please click here

2017’s 25 geekiest 25th anniversaries

Early 90s notablesImage by Nintendo, Pan Books, Michael Hughes, Paramount PicturesA big year for technology – and technology-related events – 1992 saw the release of Linux under GNU, the sending of the first SMS message, IBM trotting out the ThinkPad and Simon, which was the first mobile phone to include PDA features (smartphone). The year also saw the launch of iconic videogame franchises Mario Kart and Mortal Kombat. And, perhaps worst of all, Microsoft unleashed upon the world the scourge that is PowerPoint. For previous versions of this series, please see: 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007.To read this article in full or to leave a comment, please click here

Plans for 2017

With January 6th the Christmas/New Year holidays are over even for most European countries, so it’s time to restart my blog and set some goals for 2017.

Webinars

2015 was year of SDN, 2016 was year of network automation, and 2017 is shaping up to be the year of the cloud.

Read more ...

Aerohive’s Private Pre-Shared Key Technology

ppsk-aerohiveA fairly common question I get asked when talking to people about Aerohive Networks is “what makes us different?” In other words, why should they choose Aerohive to replace their existing wireless vendor? It is a fair question. After all, plenty of vendors sell APs that can serve the most basic wireless needs. All of the vendors I compete with do a lot of the same things when it comes to general wireless.

One of the things I like to talk to potential customers about is Aerohive’s Private Pre-Shared Key(PPSK) technology. For some organizations, PPSK is not something they are interested in. Maybe they already have a pretty solid 802.1X implementation and don’t have a need for WPA2 Personal(pre-shared key) security on their wireless network. That’s perfectly fine in my book. I have other things I can always talk about with regard to an Aerohive solution. For quite a few organizations though, they see the advantage of PPSK over standard pre-shared key implementations and jump right in to using it. I wanted to briefly discuss what PPSK is and how it can be utilized with an Aerohive solution. No configuration screenshots or long demonstration videos. Just a basic Continue reading

10 years of the iPhone: How Apple changed pretty much everything in the enterprise

In the space of a decade, Apple’s iPhone has gone from being a consumer craze to the single product that some say most affects the design and operation of enterprise IT, turning a controlled, top-down environment into something far more open.“I think the iPhone was probably one of the most impactful pieces of technology to come into the IT world since computing,” said VMware VP and chief information security officer Alex Tosheff, commenting on the 10th anniversary of the Apple iPhone, which was introduced on Jan. 9, 2007. VMware VMware VP and chief information security officer Alex Tosheff: Feeling iPhone's impactTo read this article in full or to leave a comment, please click here

Watch Steve Jobs crack up crowd in revealing original iPhone 10 years ago

Apple CEO Steve Jobs had the MacWorld crowd eating out of his hand and yukking it up when he introduced the first iPhone 10 years ago this Jan. 9.Among his gags: A photo of an iPod with a rotary dial on it. MORE iPHONE 10TH ANNIVERSARY COVERAGE: Whirlwind look back at every iPhone model | iPhone prototypes that never saw the light of day | 10 iPhone features that rocked the smartphone world | A look back at prognostications that the iPhone would be a flop | 10 years of the iPhone: How Apple changed pretty much everything in the enterpriseTo read this article in full or to leave a comment, please click here

General – Happy New Year!

Happy new year to all the readers of the blog!

I’ve been lacking the time to update the blog lately which I’m sorry for. Work is keeping me busy with some interesting projects. I hope to get a bit more frequent with the updates and maybe do smaller posts than my traditional larger ones.

For 2017 I’m going to focus on a few different areas to stay sharp and broaden my skillset a bit.

Wireless – I haven’t worked much with wireless and I’m going to upskill in this area to be able to understand the wireless requirements better when designing enterprise networks.

Datacenter – There are a lot of DC projects right now. Many companies are at the end of their Catalyst 6500 lifecycle and are looking for new solutions in the datacenter. Cisco’s Application Centric Infrastructure (ACI) is a hot topic right now. I’ll probably be working more on DC projects and ACI in 2017.

Python – In my role as a network architect I don’t really have the need to do a lot of programming but I want to keep the brain sharp and know the basics of Python. I can use it to automate boring things Continue reading

TV news anchor triggers Alexa to attempt ordering dollhouses

Last year, I was gifted an Amazon Echo; stunned, I stared at the gifter and thought to myself, have you ever met me…do you know me at all? The side of the Echo box listed features, starting with “fair-field voice control, with 7-microphone array and beam-forming technology to hear you from across the room.” Echo didn’t leave the box for six months.When I finally did open Echo, I was interested in comparing functions of Echo against those of ZOE; the latter smart home assistant was developed by Protonet with privacy in mind – nothing goes to the cloud so it couldn’t be turned into a surveillance device.To read this article in full or to leave a comment, please click here

TV news anchor triggers Alexa to attempt ordering dollhouses

Last year, I was gifted an Amazon Echo; stunned, I stared at the gifter and thought to myself, have you ever met me…do you know me at all? The side of the Echo box listed features, starting with “fair-field voice control, with 7-microphone array and beam-forming technology to hear you from across the room.” Echo didn’t leave the box for six months.When I finally did open Echo, I was interested in comparing functions of Echo against those of ZOE; the latter smart home assistant was developed by Protonet with privacy in mind – nothing goes to the cloud so it couldn’t be turned into a surveillance device.To read this article in full or to leave a comment, please click here

Is Cisco CCDE exam harder than CCIE ?

Is Cisco CCDE exam harder than CCIE exam ? This is one of the most commonly asked questions by the CCDE candidates.  Short answer is no. But, you should know the differences between the CCIE vs. CCDE as well. CCDE exam is scenario based. You have four scenarios which is called as Lab or practical […]

The post Is Cisco CCDE exam harder than CCIE ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Musing: Norton Core Router | Introducing the Future of WiFi.

We set out to change WiFi forever. Our uncompromising vision: a wireless router that secures your digital life, while delivering the highest level of performance. The result is Norton Core. Core uses advanced machine learning and Symantec’s global intelligence network to defend your home WiFi—and every device connected to it—against malware, viruses, hackers and much more.

Powerful, secure WiFi is now a thing.

  1. We know that Norton produces sub-standard, low quality, deeply insecure anti-virus & malware desktop software. How good do you think this is ?
  2. Want to bet that no one cares and the branding plus a lot of marketing dollars will make it successful
  3. Attempting to be a full security suite in a single box. Oh, and WiFi.
  4. Enterprise-grade security features can now be offered to retail customers – (Enterprise comes last)
  5. Uses cloud for intelligence and threat analysis to power the security engine. Reuse of existing technology means its cheap and profitable.
  6. MIMO is hard, beam forming is really hard. I’m doubtful that Norton could get this right the first time (or at all).
  7. Lots of effort has been spent to make it look nice. Which is nice.
  8. Its probably better than nothing (which is what you really Continue reading

Response: XenDesktop and XenApp Interoperability with VMware NSX

Citrix and NSX integration to build departmental isolation between VDI desktops.

In this blog, I am going to focus on XenDesktop, NetScaler and NSX interoperability. I will discuss a field use case, see how to implement that in VMware NSX for XenDesktop and then look at a few micro-segmentation deployment scenarios, to showcase how XenDesktop and NetScaler in conjunction with NSX provides a compelling deployment model.

The ability to isolate and control desktops represents a major security and integrity enhancement. Using a Netscaler provides a single point of access into the data centre and can be integrated into the NSX overlay.

Adding NetScaler in this deployment would simplify the set up and allow the users of all the airlines (or tenants) access the same landing URL and still have complete isolation from each other’s data and resources.

Observation: NSX is an automation tool for connectivity between end points and offers isolation/segmentation as service. Added to Netscaler, we get orchestration to produce greater business benefits because the XenDesktop & NSX becomes a unified service.

No specific provisioning to make this happen. Thats an SDN outcome.

XenDesktop and XenApp Interoperability with VMware NSX | Citrix Blogs

The post Response: XenDesktop and XenApp Continue reading

ASA Pro Tip — A Better Prompt

The Cisco ASA FW has a simple and robust failover mechanism. It works so well that sometimes an administrator may not realize that the load has moved from the primary device to the secondary device. When connecting to the IP address, the primary IP address for the interface follows the active unit. So it is even possible to be logged in to a different Firewall than the administrator thinks they are in.

This can easily be determined by doing a show failover.  In the output, it is easy to see if the unit is the Primary or Secondary (configured state) and Active or Standby (operational state). Since the ASA Failover is not preemptive, any glitch moving the load to standby will result in the load remaining there (unless there is a subsequent failure or manual failback).

Given the fact that I am a huge fan of situational awareness, I like to reflect the state in the CLI prompt. This is a simple configuration change.

asav-1# 
asav-1# conf t
asav-1(config)# prompt hostname priority state 
asav-1/pri/act(config)# exit
asav-1/pri/act# 

As can be seen above, a simple configuration change results in the ASA displaying its hostname, configured priority and operational state.

Disclaimer: This Continue reading