Archive

Category Archives for "Networking"

VRF-Aware SNMP on Brocade VDX

SNMP was not designed with VRFs in mind. Querying the routing table via SNMP did not take into account the idea of having multiple routing tables. But clearly it’s something people want to do, so some clever engineers figured out how to shoe-horn VRF contexts in. This week a customer asked me how to query the routing table for the non-default VRF on Brocade VDX switches. Here’s how to do it:

VRF Configuration

I’m using a Brocade 6940 running NOS 7.0.1 here. Note that SNMP configuration changed around NOS 6.x, so if you’re running something older this may work differently.

For this lab I have Loopback 1 in the default VRF, with an IP of 50.50.50.50/32. I’ve created another VRF called “internet”, and put Loopback 2 in that VRF, with IP 60.60.60.60/32. Now I have two different routing tables:

VDX6940-204063# sh run rb 1 int loop 1
rbridge-id 1
interface Loopback 1
no shutdown
ip address 50.50.50.50/32
!
!
VDX6940-204063# sh ip route
Total number of IP routes: 1
Type Codes - B:BGP D:Connected O:OSPF S:Static U:Unnumbered +:Leaked route; Cost - Dist/Metric
BGP Codes - i:iBGP e:eBGP
OSPF Codes -  Continue reading

VRF-Aware SNMP on Brocade VDX

SNMP was not designed with VRFs in mind. Querying the routing table via SNMP did not take into account the idea of having multiple routing tables. But clearly it’s something people want to do, so some clever engineers figured out how to shoe-horn VRF contexts in. This week a customer asked me how to query the routing table for the non-default VRF on Brocade VDX switches. Here’s how to do it:

VRF Configuration

For this lab I have Loopback 1 in the default VRF, with an IP of 50.50.50.50/32. I’ve created another VRF called “internet”, and put Loopback 2 in that VRF, with IP 60.60.60.60/32. Now I have two different routing tables:

VDX6940-204063# sh run rb 1 int loop 1
rbridge-id 1
interface Loopback 1
no shutdown
ip address 50.50.50.50/32
!
!
VDX6940-204063# sh ip route
Total number of IP routes: 1
Type Codes - B:BGP D:Connected O:OSPF S:Static U:Unnumbered +:Leaked route; Cost - Dist/Metric
BGP Codes - i:iBGP e:eBGP
OSPF Codes -  Continue reading

73% off TechMatte Air Vent Magnetic Universal Car Mount for Smartphones – Deal Alert

The MagGrip Vent Car Mount is a sturdy, cradle-less device holding system focused on simplicity. Pop it onto your car's air vent and magnets do all the work. Currently discounted to just $8 and averages 4.5 out of 5 stars on Amazon from over 7,000 people. Learn more, or buy it now, on Amazon.To read this article in full or to leave a comment, please click here

Malware from Friday’s DDoS attack continues to harass in short bursts

It's still unclear who pulled off Friday's massive internet disruption, but the malware largely responsible for the cyber attack has since assaulted new targets -- possibly including video gamers.Since last Friday, botnets created by the Mirai malware have been launching distributed denial-of-service attacks at seemingly random targets, in short bursts, according to a security researcher who goes by the name MalwareTech.He has tracked Mirai-powered botnets and helped produce a Twitter feed that monitors their DDoS attacks. On Wednesday alone, the feed posted close to 60 attacks, many of them lasting from 30 seconds to over a minute long.To read this article in full or to leave a comment, please click here

Malware from Friday’s DDoS attack continues to harass in short bursts

It's still unclear who pulled off Friday's massive internet disruption, but the malware largely responsible for the cyber attack has since assaulted new targets -- possibly including video gamers.Since last Friday, botnets created by the Mirai malware have been launching distributed denial-of-service attacks at seemingly random targets, in short bursts, according to a security researcher who goes by the name MalwareTech.He has tracked Mirai-powered botnets and helped produce a Twitter feed that monitors their DDoS attacks. On Wednesday alone, the feed posted close to 60 attacks, many of them lasting from 30 seconds to over a minute long.To read this article in full or to leave a comment, please click here

WISP Design: Using OSPF to build a transit fabric over unequal links

 

Defining the problem – unused capacity

One of the single greatest challenges if you have ever owned, operated or designed a WISP (Wireless Internet Service Provider) is using all of the available bandwidth across multiple PtP links in the network. It is very common for two towers to have multiple RF PtP (Point-to-Point) links between them and run at different speeds. It is not unusual to have a primary link that runs at near-gigabit speeds and a backup link that may range anywhere from 50 Mbps to a few hundred Mbps.

This provides a pretty clean HA routing architecture, but it leaves capacity in the network unused until there is a failure. One of the headaches WISP designers always face is how to manage and engineer traffic for sub-rate ethernet links – essentially links that can’t deliver as much throughput as the physical link to the router or switch. In the fiber world, this is pretty straightforward as two links between any two points can be the exact same speed and either be channeled together with LACP or rely on ECMP with OSPF or BGP.

However, in the WISP world, this becomes problematic, as the links are unequal and Continue reading

WISP Design: Using OSPF to build a transit fabric over unequal links

 

Defining the problem – unused capacity

One of the single greatest challenges if you have ever owned, operated or designed a WISP (Wireless Internet Service Provider) is using all of the available bandwidth across multiple PtP links in the network. It is very common for two towers to have multiple RF PtP (Point-to-Point) links between them and run at different speeds. It is not unusual to have a primary link that runs at near-gigabit speeds and a backup link that may range anywhere from 50 Mbps to a few hundred Mbps.

This provides a pretty clean HA routing architecture, but it leaves capacity in the network unused until there is a failure. One of the headaches WISP designers always face is how to manage and engineer traffic for sub-rate ethernet links – essentially links that can’t deliver as much throughput as the physical link to the router or switch. In the fiber world, this is pretty straightforward as two links between any two points can be the exact same speed and either be channeled together with LACP or rely on ECMP with OSPF or BGP.

However, in the WISP world, this becomes problematic, as the links are unequal and Continue reading

Twitter video app dying on the Vine

I never bothered much with Vine, the 6-second video app that went live in 2013 after being snapped up by Twitter the year before, and apparently not many others are bothering much with it lately as they spend more time on Instagram, Snapchat and other apps.Twitter and Vine announced on Medium some "Important News about Vine," or more directly "Today, we are sharing the news that in the coming months we'll be discontinuing the mobile app."MORE: 2016 tech industry graveyardTo read this article in full or to leave a comment, please click here

The secret behind the success of Mirai IoT botnets

There’s no magic behind the success of Mirai DDoS botnets that are made up of IoT devices: the software enabling them is publicly available, which makes it easy for relatively inexperienced actors to create them and turn them loose on anyone.Flashpoint speculates that the attacker in the case of the Dyn DDoS, which had an enormous impact on major Web sites, was the work of low-skilled script kiddies – a frightening prospect that contributes to Trend Micro’s assessment that “the Internet of Things ecosystem is completely, and utterly, broken.”+More on Network World: US Senator wants to know why IoT security is so anemic+To read this article in full or to leave a comment, please click here

The secret behind the success of Mirai IoT botnets

There’s no magic behind the success of Mirai DDoS botnets that are made up of IoT devices: the software enabling them is publicly available, which makes it easy for relatively inexperienced actors to create them and turn them loose on anyone.Flashpoint speculates that the attacker in the case of the Dyn DDoS, which had an enormous impact on major Web sites, was the work of low-skilled script kiddies – a frightening prospect that contributes to Trend Micro’s assessment that “the Internet of Things ecosystem is completely, and utterly, broken.”+More on Network World: US Senator wants to know why IoT security is so anemic+To read this article in full or to leave a comment, please click here

Apple’s new MacBook Pro isn’t iPhone-friendly

Apple didn't kill the 3.5mm headphone jack on its new lineup of MacBook Pros, but new design changes to Apple's revamped notebook lineup will undoubtedly irk many customers.Sure, the new Touch Bar looks amazing, and sure, the specs on the new MacBook Pro models certainly warrant getting excited about, but the port situation on the MacBook Pro is a mixed bag.+ Also on Network World: First Look: Apple’s new MacBook Pro lineup, and more + As Phil Schiller explained during today's event, Apple's new MacBook Pros feature four Thunderbolt 3 USB Type-C ports, and conveniently, each of these can be used to charge the machine. Now, USB-C is incredibly versatile, and Apple will use the advanced port for power charging, HDMI and much more.To read this article in full or to leave a comment, please click here

First Look: Apple’s new MacBook Pro lineup, and more

Run your fingers over this!Apple rolled out the newest generation of the MacBook Pro today at a showcase event at the company’s Cupertino campus. Along with – get this – thinner and sleeker construction, Apple’s latest MacBook Pros have had several important features redesigned, and one big new feature added. Have a look.The Touch BarImage by AppleTo read this article in full or to leave a comment, please click here

The FIDO Alliance provides strong authentication for online services  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  For many security professionals, passwords are the scourge of the authentication world, and their death can't come soon enough. Passwords are too often stolen, shared, forgotten or simply too weak or obvious to be effective. According to the 2016 Verizon Data Breach Investigations Report, 63% of confirmed data breaches involve the use of weak, default or stolen passwords.End users hate passwords too, because they create a bad user experience (UX). We are advised (or forced) to use complex combinations of numbers, characters and symbols that are practically impossible to remember, and we are supposed to have a different password for every system and application we use. Years ago I resorted to a password manager to keep track of my 300+ sets of credentials.To read this article in full or to leave a comment, please click here

The FIDO Alliance provides strong authentication for online services  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  For many security professionals, passwords are the scourge of the authentication world, and their death can't come soon enough. Passwords are too often stolen, shared, forgotten or simply too weak or obvious to be effective. According to the 2016 Verizon Data Breach Investigations Report, 63% of confirmed data breaches involve the use of weak, default or stolen passwords.End users hate passwords too, because they create a bad user experience (UX). We are advised (or forced) to use complex combinations of numbers, characters and symbols that are practically impossible to remember, and we are supposed to have a different password for every system and application we use. Years ago I resorted to a password manager to keep track of my 300+ sets of credentials.To read this article in full or to leave a comment, please click here