Archive

Category Archives for "Networking"

Navigating your way around the Linux file system

One of the first things Linux users need to learn is how to move around the Linux file system and, eventually, how to make it even easier to move around the file system. This post describes both the basic commands you need and some smart moves to make navigating easier.Absolute and relative paths Before we get moving, it’s important to understand the difference between absolute paths (like /home/jdoe) and relative paths (like images/photos and ..). Absolute paths always begin with a / that, of course, represents the base of the file system. If the specified path doesn’t start with a /, it’s relative. Here are some examples of both relative and absolute paths:To read this article in full, please click here

Navigating your way around the Linux file system

One of the first things Linux users need to learn is how to move around the Linux file system and, eventually, how to make it even easier to move around the file system. This post describes both the basic commands you need and some smart moves to make navigating easier.Absolute and relative paths Before we get moving, it’s important to understand the difference between absolute paths (like /home/jdoe) and relative paths (like images/photos and ..). Absolute paths always begin with a / that, of course, represents the base of the file system. If the specified path doesn’t start with a /, it’s relative. Here are some examples of both relative and absolute paths:To read this article in full, please click here

4 activities that lead to human error in network operations

You might have been alarmed to read recently that half of all network problems are due to human error. Well, bad news. That’s true of the number of problems. If you look at the hours of degraded or failed operation, three-quarters of all of it is due to human error. Furthermore, the great majority of degraded or failed operation can be traced to four specific activities: Fault analysis and response, which network professionals and their management say creates 36% of error-induced outage time Configuration changes (attributed to 27% of error-induced outage time) Scaling and failover tasks (attributed to 19% of error-induced outage time) Security policies (attributed to 18% of error-induced outage time) Not surprisingly, network professionals are eager to find remedies for each of the four primary culprits. Before that can happen, it’s important to understand why the human error occurs.To read this article in full, please click here

Human error in network operations and how to deal with it

You might have been alarmed to read recently that half of all network problems are due to human error. Well, bad news. That’s true of the number of problems. If you look at the hours of degraded or failed operation, three-quarters of all of it is due to human error. Furthermore, the great majority of degraded or failed operation can be traced to four specific activities: Fault analysis and response, which network professionals and their management say creates 36% of error-induced outage time Configuration changes (attributed to 27% of error-induced outage time) Scaling and failover tasks (attributed to 19% of error-induced outage time) Security policies (attributed to 18% of error-induced outage time) Not surprisingly, network professionals are eager to find remedies for each of the four primary culprits. Before that can happen, it’s important to understand why the human error occurs.To read this article in full, please click here

Application Security Report: Q2 2023

Application Security Report: Q2 2023
Application Security Report: Q2 2023

Cloudflare has a unique vantage point on the Internet. From this position, we are able to see, explore, and identify trends that would otherwise go unnoticed. In this report we are doing just that and sharing our insights into Internet-wide application security trends.

This report is the third edition of our Application Security Report. The first one was published in March 2022, with the second published earlier this year in March, and this is the first to be published on a  quarterly basis.

Since the last report, our network is bigger and faster: we are now processing an average of 46 million HTTP requests/second and 63 million at peak. We consistently handle approximately 25 million DNS queries per second. That's around 2.1 trillion DNS queries per day, and 65 trillion queries a month. This is the sum of authoritative and resolver requests served by our infrastructure. Summing up both HTTP and DNS requests, we get to see a lot of malicious traffic. Focusing on HTTP requests only, in Q2 2023 Cloudflare blocked an average of 112 billion cyber threats each day, and this is the data that powers this report.

But as usual, before we dive in, Continue reading

An August reading list about online security and 2023 attacks landscape

An August reading list about online security and 2023 attacks landscape
An August reading list about online security and 2023 attacks landscape

In 2023, cybersecurity continues to be in most cases a need-to-have for those who don’t want to take chances on getting caught in a cyberattack and its consequences. Attacks have gotten more sophisticated, while conflicts (online and offline, and at the same time) continue, including in Ukraine. Governments have heightened their cyber warnings and put together strategies, including around critical infrastructure (including health and education). All of this, at a time when there were never so many online risks, but also people online — over five billion in July 2023, 64.5% of the now eight billion that are the world’s total population.

Here we take a look at what we’ve been discussing in 2023, so far, in our Cloudflare blog related to attacks and online security in general, with several August reading list suggestions. From new trends, products, initiatives or partnerships, including AI service safety, to record-breaking blocked cyberattacks. On that note, our AI hub (ai.cloudflare.com) was just launched.

Throughout the year, Cloudflare has continued to onboard customers while they were being attacked, and we have provided protection to many others, including once.net, responsible for the 2023 Eurovision Song Contest online voting system Continue reading

netlab 1.6.1: BGP Reports, Markdown Support

We added just a few small features in netlab release 1.6.11:

  • Markdown reports: netlab report command can produce Markdown-formatted reports, making it extremely easy to include them in your documentation (assuming you’re using Markdown to write it)
  • If you’re using BGP in your labs, you can generate reports on BGP autonomous systems and BGP neighbors.
  • I made locations of default files configurable. I’m using this feature in large projects where I want to have a shared set of project-wide defaults for topologies stored in different directories.

netlab 1.6.1: BGP Reports, Markdown Support

We added just a few small features in netlab release 1.6.11:

  • Markdown reports: netlab report command can produce Markdown-formatted reports, making it extremely easy to include them in your documentation (assuming you’re using Markdown to write it)
  • If you’re using BGP in your labs, you can generate reports on BGP autonomous systems and BGP neighbors.
  • I made locations of default files configurable. I’m using this feature in large projects where I want to have a shared set of project-wide defaults for topologies stored in different directories.

Building a VXLAN Lab Using Nexus9000v

As I dive into the world of VXLAN, I will need a lab as that is the best way to deepen the learning process and to get hands-on experience with a protocol. I will be building a Cisco Nexus9000v lab in VMware ESX but the same images can be used in CML, EveNG, GNS3, etc. The lab is based on the following topology:

The specific platform I’ll use is the Nexus9300v which has the following requirements:

  • 1 vCPU (2 recommended).
  • 10 GB of RAM (12 GB recommended).

Note that there is also a Nexus9500v image which is a 16-slot modular chassis. As I have no need for multiple slots, and it requires more CPUs, I will not be using this image.

The specific image I am using is nexus9300v64.10.2.5.M.ova, which is NX-OS version 10.2.5.

Deploying the OVA can take some time but is otherwise straightforward. Refer to my post on caveats for more details.

I have mapped the different NICs to different port groups:

The mgmt0 interface is mapped to my management network so that I can SSH to the devices. I have also created specific port groups for the interconnections between leaf Continue reading

9 career-boosting Wi-Fi certifications

If you’re looking to add more certifications to your resume, don’t forget about wireless. Whether you’re just starting your IT career, have been in IT before Wi-Fi was a thing, or even if you have a non-IT position, there are certifications to help prove your wireless knowledge and skills.For starters, there are vendor-neutral certifications from Certified Wireless Network Professionals (CWNP), one of the most popular programs in the wireless world. These are great if you aren’t already loyal to a networking brand. And even if you already have a favorite brand, these go deeper into the 802.11 standards and radio frequency (RF) technology without all the proprietary details and brand specifics.To read this article in full, please click here

Heavy Networking 695: Automating Network And Firewall Operations With BackBox (Sponsored)

On today's Heavy Networking we explore network and firewall automation with sponsor BackBox. BackBox has developed a platform that aims to deliver practical automation out of the box. We get under the hood to understand how it works, what it delivers, and how it addresses the challenges of network and security operations.

The post Heavy Networking 695: Automating Network And Firewall Operations With BackBox (Sponsored) appeared first on Packet Pushers.

There’s more to more than meets the eye

The Linux more command is a fairly obvious command to use when you want to scan through a text file a screen at a time, but there still might be quite a few things you don’t know about this command. For one thing, you don’t have to start at the top of the file if you don’t want to. Add an argument like +20 and you will start with the 20th line in the file with a command like that shown below.$ man +20 myfile Note that the more command automatically adjusts itself to the number of lines in your terminal window. In addition, the last line displayed will not be a line from the file by default, but an indication of what percentage of the text has been displayed thus far – at least if there’s more text to follow. It will look like this:To read this article in full, please click here

There’s more to more than meets the eye

The Linux more command is a fairly obvious command to use when you want to scan through a text file a screen at a time, but there still might be quite a few things you don’t know about this command. For one thing, you don’t have to start at the top of the file if you don’t want to. Add an argument like +20 and you will start with the 20th line in the file with a command like that shown below.$ man +20 myfile Note that the more command automatically adjusts itself to the number of lines in your terminal window. In addition, the last line displayed will not be a line from the file by default, but an indication of what percentage of the text has been displayed thus far – at least if there’s more text to follow. It will look like this:To read this article in full, please click here

Micron launches CXL 2.0 memory expansion modules

Micron has introduced memory expansion modules that support the 2.0 generation of Compute Express Link (CXL) and come with up to 256GB of DRAM running over a PCIe x8 interface.CXL is an open interconnect standard with wide industry support that is meant to be a connection between machines allowing for the direct sharing of contents of memory. It is built on top of PCI Express for coherent memory access between a CPU and a device, such as a hardware accelerator, or a CPU and memory.PCIe is normally used in point-to-point communications, such as SSD to memory, while CXL will eventually support one-to-many communication. So far, CXL is capable of simple point-to-point communication only.To read this article in full, please click here

Micron launches CXL 2.0 memory expansion modules

Micron has introduced memory expansion modules that support the 2.0 generation of Compute Express Link (CXL) and come with up to 256GB of DRAM running over a PCIe x8 interface.CXL is an open interconnect standard with wide industry support that is meant to be a connection between machines allowing for the direct sharing of contents of memory. It is built on top of PCI Express for coherent memory access between a CPU and a device, such as a hardware accelerator, or a CPU and memory.PCIe is normally used in point-to-point communications, such as SSD to memory, while CXL will eventually support one-to-many communication. So far, CXL is capable of simple point-to-point communication only.To read this article in full, please click here