More than a dozen years after the SDN brouhaha erupted, some people still haven’t got the memo on the obsolescence of CLI. For example, Julia Evans tries to make people comfortable with the command line. Has nobody told her it’s like teaching COBOL?
On a more serious note: you OUGHT TO master Linux CLI and be comfortable using CLI commands on network devices and servers. Her article has tons of useful tips and is definitely worth reading.
We’re thrilled to invite you to VMware Explore in Las Vegas, where we’ll be showcasing the latest innovations in multi-cloud network security and redefining perceptions of managing cloud infrastructure.
Keep reading for a sneak peek at what you’ll find at VMware Explore 2023 in the realm of multi-cloud networking and security. Below, we describe the live demos and other events you can look forward to by connecting with us at Booth #305.
The technologies we’ll showcase at VMware Explore are part of VMware NSX.
With NSX, you can deploy workloads automatically without opening tickets and get end-to-end visibility across private, hybrid, and multi-clouds. Moreover, NSX’s security features can help strengthen your ransomware defenses and detect and evict threats in your private, hybrid, and multi-cloud environments with strong lateral security. In fact, NSX is the industry’s only network virtualization platform with full stack L2-L7 integrated networking to connect, protect, and scale your infrastructure running across clouds.
But don’t just take our word for it. Come check out our demos by visiting us at booth #305 at VMware Explore or in our virtual booth at https://engage.vmware.com/explore2023, where we cover a wide Continue reading
In the previous post, we looked at some of the challenges with L2-based networks. Now let’s start diving into what VXLAN is and what it can provide. First, let’s talk about overlays.
Overlays are not new. We have had overlays for many years. The most well known ones are probably GRE and MPLS. In general, overlays are used to create a level of indirection that extends network capabilities. For example, MPLS L3 VPNs provided some of these capabilities to IP networks:
With overlays, intelligence is often pushed to the edge of the network while intermediate devices can be “dumb”. This can reduce costs as not all devices need the advanced features. How does an overlay work? To create the indirection, the original frame or packet needs to be encapsulated. Depending on the type of overlay, the frame or packet could get encapsulated into another frame or packet. The transport between the overlay nodes is called the underlay. This is the network that transports packets between the nodes. For VXLAN, this is a layer 3 network.
Because overlays encapsulate frames or packets, the size of the frame or packet will increase. To compensate Continue reading
While team dynamics are messy and can never be fully encapsulated by a model, Tuckman’s four stages of group development offer a vocabulary and structure to help us understand how to move teams forward to more productive work.
The post Team Building And Tuckman’s Stages of Group Development appeared first on Packet Pushers.
Endace has announced a new offering that can capture packets inside your public cloud deployments. Called EndaceProbe Cloud, the offering is available for AWS and Azure public clouds. It can also be deployed in VMware-based private clouds. Why capture packets in the cloud? Endace says the top two customer drivers are security and performance monitoring. […]
The post Endace Debuts Packet Capture Software For Public Clouds appeared first on Packet Pushers.
On today's Day Two Cloud we examine the similarities and differences among SSE and SASE, which provide cloud-delivered security; and SD-WAN, which can provide connections to these services. We also discuss the drivers for cloud-delivered security, the role of networking, where and how zero trust can come into play, some of the big players in these spaces, and more.
The post Day Two Cloud 207: Making Sense Of SSE, SASE, And SD-WAN appeared first on Packet Pushers.
Today's Full Stack Journey digs into the Acorn open source project with Darren Shepherd. Darren and Scott Lowe discuss where Acorn fits into the infrastructure and app development landscape, how it plugs gaps in Kubernetes, and how you can get started with Acorn.
The post Full Stack Journey 081: Growing Your Application Deployments With Acorn appeared first on Packet Pushers.


After shutting down a ‘phishing-as-a-service’ operation that impacted thousands of victims in 43 countries, INTERPOL recently noted, “Cyberattacks such as phishing may be borderless and virtual in nature, but their impact on victims is real and devastating.” Business email compromise (BEC), a type of malware-less attack that tricks recipients into transferring funds — for example — has cost victims worldwide more than $50 billion, according to the FBI.
It is estimated that 90% of successful cyber attacks start with email phishing, which continues to be very lucrative for attackers. There is not much today that can be done to stop phishing attempts. However, to prevent successful attacks, it is important to understand (and proactively address) evolving phishing trends — including the ways attackers cleverly exploit intended victims’ trust in “known” email senders. To that end, this week Cloudflare published its first Phishing Threats Report.
This report explores key phishing trends and related recommendations, based on email security data from May 2022 to May 2023. During that time, Cloudflare processed approximately 13 billion emails, which included blocking approximately 250 million malicious messages from reaching customers’ inboxes. The report is also informed by a Cloudflare-commissioned survey Continue reading