Archive

Category Archives for "Networking"

5 enterprise-related things you can do with blockchain technology today

Diamonds. Bitcoin. Pork. If you think you've spotted the odd one out, think again: All three are things you can track using blockchain technologies today. Blockchains are distributed, tamper-proof, public ledgers of transactions, brought to public attention by the cryptocurrency bitcoin, which is based on what is still the most widespread blockchain. But blockchains are being used for a whole lot more than making pseudonymous payments outside the traditional banking system. Because blockchains are distributed, an industry or a marketplace can use them without the risk of a single point of failure. And because they can't be modified, there is no question of whether the record keeper can be trusted. Those factors have prompted a number of enterprises to build blockchains into essential business functions, or at least to test them there.To read this article in full or to leave a comment, please click here

Trump, tech executives may try to untangle relationship

U.S. president-elect Donald Trump is meeting this week in New York with top tech executives, including Oracle CEO Safra Catz, Apple CEO Tim Cook, Microsoft CEO Satya Nadella, Alphabet CEO Larry Page and Facebook COO Sheryl Sandberg, according to news reports.Invitations to the meeting were signed by Trump's son-in-law and adviser Jared Kushner, chief of staff Reince Priebus, and billionaire tech investor Peter Thiel, a Silicon Valley figure who came out openly early on in favor of Trump.The relationship between Trump and Silicon Valley companies has been difficult with some senior tech executives openly backing his Democratic rival Hillary Clinton in the run-up to the presidential elections. The president-elect and tech companies also appear to have differing views on issues such as immigration, outsourcing abroad, clean energy, net neutrality, encryption, surveillance and on restoring lost manufacturing jobs in the U.S.To read this article in full or to leave a comment, please click here

Trump, tech executives may try to untangle relationship

U.S. president-elect Donald Trump is meeting this week in New York with top tech executives, including Oracle CEO Safra Catz, Apple CEO Tim Cook, Microsoft CEO Satya Nadella, Alphabet CEO Larry Page and Facebook COO Sheryl Sandberg, according to news reports.Invitations to the meeting were signed by Trump's son-in-law and adviser Jared Kushner, chief of staff Reince Priebus, and billionaire tech investor Peter Thiel, a Silicon Valley figure who came out openly early on in favor of Trump.The relationship between Trump and Silicon Valley companies has been difficult with some senior tech executives openly backing his Democratic rival Hillary Clinton in the run-up to the presidential elections. The president-elect and tech companies also appear to have differing views on issues such as immigration, outsourcing abroad, clean energy, net neutrality, encryption, surveillance and on restoring lost manufacturing jobs in the U.S.To read this article in full or to leave a comment, please click here

Network Automation Tools: Featured Webinar in December 2016

The featured webinar in December 2016 is the Network Automation Tools webinar, and in the featured videos you'll find in-depth description of automation frameworks (focusing on Ansible) and open-source IPAM tools (including NSoT recently released by Dropbox).

To view the videos, log into my.ipspace.net, select the webinar from the first page, and watch the videos marked with star.

Read more ...

US-CERT: Stop using your remotely exploitable Netgear routers

Netgear router owners, I hope you have a spare router – at least those of you with remotely exploitable models, since US-CERT recommended discontinuing use of router models which are vulnerable to arbitrary command injection.Which models? Right now it looks like Netgear R7000, R6400 and R8000 routers, but there may be more models that are vulnerable. Should you really take this seriously and unplug your router? You betcha, since US-CERT said it is “trivial” to exploit this vulnerability. Visit a booby-trapped page and whammo! An attacker would be saying hello to root privileges on your router.An exploit, which was released on Exploit Database, was published on Dec. 7. Netgear has yet to issue new firmware to patch the flaw in its vulnerable routers. There is a way to test if your router is vulnerable and even a non-official temporary fix you can try if tossing out your router is not an option.To read this article in full or to leave a comment, please click here

US-CERT: Stop using your remotely exploitable Netgear routers

Netgear router owners, I hope you have a spare router – at least those of you with remotely exploitable models, since US-CERT recommended discontinuing use of router models which are vulnerable to arbitrary command injection.Which models? Right now it looks like Netgear R7000, R6400 and R8000 routers, but there may be more models that are vulnerable. Should you really take this seriously and unplug your router? You betcha, since US-CERT said it is “trivial” to exploit this vulnerability. Visit a booby-trapped page and whammo! An attacker would be saying hello to root privileges on your router.An exploit, which was released on Exploit Database, was published on Dec. 7. Netgear has yet to issue new firmware to patch the flaw in its vulnerable routers. There is a way to test if your router is vulnerable and even a non-official temporary fix you can try if tossing out your router is not an option.To read this article in full or to leave a comment, please click here

Python Functions – Basic

Python Function is a block of statements that can be used multiple times in a program. Its tedious task to use same block of statements multiple times, instead we can have function which contains same block of statement and can be called wherever there is need for the same. A function in Python is defined […]

[minipost] Capturing bidirectional traffic of virtual machine (VMs) on vmWare ESX 6.x

Here I was getting a trouble with communication between an ESX virtual machine and the nearby switch (Nuage/DCN controller VM talking with a VTEP switch if someone is interested) and because that switch was direct destination of the control plane packets (OVSDB over TCP) I was not having much success creating a mirroring interface on the switch. So I learned how to capture a specific virtual machine traffic directly on the ESXi host’s SSH console and to not forget that, I will document this here.

Step 1 – enable SSH to the ESX host

In most cases this is not running by default, so go to the ESXi server direct terminal or iLo and via “F2″enter system customization and enter troubleshooting section:

ESX host troubleshooting options location

ESX host troubleshooting options location

Right behind this menu should be “SSH Enable” option, and you simply hit that with enter ?

ALTERNATIVE: If you have vCenter deployed, you can use its GUI to enable SSH on a specific host like this:

Locate ESX Host in vCenter and open its security profile

Locate ESX Host in vCenter and open its security profile

Inside security profiles enable SSH server

Inside security profiles enable SSH server

Step 2 – locating switchport ID

My virtual machine was called “DCN4.0R5_VSC1” and was simply connected to logical vswitch0 in Continue reading

Nerd Alert! You need a Christmas tree for your car!

What makes this product truly nerdy is that you have to be kind of a nerd to drive around with a lit up Christmas tree on your car roof. A PR company recently sent me a sample of the aptly named Christmas Car Tree and, natch, I had to, er, test drive it. The Christmas Car Tree It’s easy to assemble, solidly made (it’s got a metal, bolt-together frame), and unless you're driving a Ferrari, this 30-inch tree isn’t going to come loose. The Christmas Car Tree has 70 LEDs in multiple colors and can be folded flat so you can get into low garages.To read this article in full or to leave a comment, please click here

Cisco dents Arista again with patent infringement ruling

A US trade judge ruled today that Arista Networks infringed on two Cisco switch patents – the second important victory the networking giant has won against Arista in their ongoing legal confrontation since it began in 2014.U.S. International Trade Commission Judge MaryJoan McNamara issued the so-called “initial determination” on the case which now must be reviewed by the ITC. In the end should the ITC find against Arista its switches could once again be banned from import into the US. The ITC you may recall ruled against Arista in another part of this case and between June and August the company could not import those products. In November Arista announced that US Customs has given it permission to resume importing its networking gear in the United States.To read this article in full or to leave a comment, please click here

Cisco dents Arista again with patent infringement ruling

A US trade judge ruled today that Arista Networks infringed on two Cisco switch patents – the second important victory the networking giant has won against Arista in their ongoing legal confrontation since it began in 2014.U.S. International Trade Commission Judge MaryJoan McNamara issued the so-called “initial determination” on the case which now must be reviewed by the ITC. In the end should the ITC find against Arista its switches could once again be banned from import into the US. The ITC you may recall ruled against Arista in another part of this case and between June and August the company could not import those products. In November Arista announced that US Customs has given it permission to resume importing its networking gear in the United States.To read this article in full or to leave a comment, please click here

Cisco dents Arista again with patent infringement ruling

A US trade judge ruled today that Arista Networks infringed on two Cisco switch patents – the second important victory the networking giant has won against Arista in their ongoing legal confrontation since it began in 2014.U.S. International Trade Commission Judge MaryJoan McNamara issued the so-called “initial determination” on the case which now must be reviewed by the ITC. In the end should the ITC find against Arista its switches could once again be banned from import into the US. The ITC you may recall ruled against Arista in another part of this case and between June and August the company could not import those products. In November Arista announced that US Customs has given it permission to resume importing its networking gear in the United States.To read this article in full or to leave a comment, please click here

OpenStack SDN With OVN (Part 2) – Network Engineering Analysis

In this post we will see how OVN implements virtual networks for OpenStack. The structure of this post is such that starting from the highest level of networking abstraction we will delve deeper into implementation details with each subsequent section. The biggest emphasis will be on how networking data model gets transformed into a set of logical flows, which eventually become OpenFlow flows. The final section will introduce a new overlay protocol GENEVE and explain why VXLAN no longer satisfies the needs of an overlay protocol.

Continue reading

CCIE/CCDE Re-certification Time Again – Go for it? … or Emeritus?

It is “that” time again.  Time to start studying for one of the CCxE (CCIE/CCDE) re-certifications. Got my 1st CCIE back in 1997.  A couple years later my CCIE SNA/IP.  Then back in 2009 I passed my “favorite E” – the CCDE.  And now?   I’ll tell you a secret that I actually haven’t told anyone at all except for my wife. — I am so tired of studying for the writtens. I prefer spending my time getting my hands dirty in the lab at work in CPOC, learning new technologies, reading pcap files, technically reviewing books, writing blogs, making youtubes, CiscoLive….. Anything but studying… yet again…. just to pass a CCxE written.  Especially now with the 10% “evolving technologies” add.  For the past few months I’ve been trying so hard to get myself to sit down and do some studying.  It has really been a struggle to get myself to study and I have rescheduled my exam twice so far. It has just been really hard to find the motivation when there are so many other things I’d prefer to be doing.

To make matters worse, each and every time I actually Continue reading

6 network and security trends you can expect in 2017

‘Tis the season for tech bloggers to prognosticate and pontificate about the trends for the next year.  This is also the time of year when we fondly reflect on the amazing rate of innovation during the past year and try to imagine how the pace of new technology will continue to accelerate. When publicly making these types of predictions, it is prudent to write about trends that are probable, and it is unwise to write about things that are too far-reaching. Along these lines, here are six network and security technology predictions that are probable for 2017.1. Malware will continue to evolve Malware has been the most effective way for attackers to reach targets globally.  Malware propagation has been the definitive attack method for the past few years, and now the effectiveness of most antivirus products is called into question. More and more security vendors offer malware defenses, but not all of these vendor’s solutions are completely effective as malware continues to metamorphize.To read this article in full or to leave a comment, please click here

Why CISO Succeed and Why They Leave

Earlier this year, ESG and the Information Systems Security Association (ISSA) published a research report titled, The State of Cyber Security Careers.  The report was based on a survey of 437 cybersecurity professionals, the clear majority of which were ISSA members.Two-thirds of these cybersecurity professionals worked at an organization that employed a CSO or CISO.  These individuals were then asked to identify the most important qualities that make a successful CISO.  Here is a sample of the results: 50% of respondents said that strong leadership skills were most important 47% of respondents said that strong communication skills were most important 30% of respondents said that a strong relationship with business executives was most important 29% of respondents said that a strong relationship with the CIO and other members of the IT leadership team was most important 23% of respondents said that strong management skills were most important Based upon this list, it’s clear that successful CISOs need to be strong business people who can work with business and IT executives.  This is an important consideration since many security professionals are deeply rooted in the technology rather than the business aspects of infosec.To Continue reading