Archive

Category Archives for "Networking"

VMware adds more security for diverse cloud workloads

VMware has added more security features to its forthcoming on-demand multi-cloud networking and security service called Northstar that it previewed during its August VMware Explore 2022 conference.VMware said then that Northstar will provide a central console for turning up networking and security services across private clouds and VMware Cloud deployments that run on public clouds. It will include VMware services such as Network Detection and Response, NSX Intelligence, advanced load balancing and Web Application Firewall. Within Northstar, Network Detection and Response support will provide scalable threat detection and response for workloads deployed in private and/or public clouds.To read this article in full, please click here

VMware adds more security for diverse cloud workloads

VMware has added more security features to its forthcoming on-demand multi-cloud networking and security service called Northstar that it previewed during its August VMware Explore 2022 conference.VMware said then that Northstar will provide a central console for turning up networking and security services across private clouds and VMware Cloud deployments that run on public clouds. It will include VMware services such as Network Detection and Response, NSX Intelligence, advanced load balancing and Web Application Firewall. Within Northstar, Network Detection and Response support will provide scalable threat detection and response for workloads deployed in private and/or public clouds.To read this article in full, please click here

Bash: A primer for more effective use of the Linux bash shell

Bash is not just one of the most popular shells on Linux systems, it actually predates Linux by a couple of years. An acronym for the “GNU Bourne-Again Shell”, bash not only provides a comfortable and flexible command line, it delivers a large suite of scripting tools—if/then commands, case statements, functions, etc.—that allow users to build complex and powerful scripts.This post contains a collection of articles about important aspects of bash that will help you make better use of this versatile shell.Commands vs bash builtins While Linux systems install with thousands of commands, bash also supplies a large number of “built-ins”—commands that are not sitting in the file system as separate files, but are part of bash itself. To get a list of the bash builtins, just type “help” when you’re on the bash command line. For more about built-ins, refer to “How to tell if you’re using a bash builtin”.To read this article in full, please click here

Bash: A primer for more effective use of the Linux bash shell

Bash is not just one of the most popular shells on Linux systems, it actually predates Linux by a couple of years. An acronym for the “GNU Bourne-Again Shell”, bash not only provides a comfortable and flexible command line, it delivers a large suite of scripting tools—if/then commands, case statements, functions, etc.—that allow users to build complex and powerful scripts.This post contains a collection of articles about important aspects of bash that will help you make better use of this versatile shell.Commands vs bash builtins While Linux systems install with thousands of commands, bash also supplies a large number of “built-ins”—commands that are not sitting in the file system as separate files, but are part of bash itself. To get a list of the bash builtins, just type “help” when you’re on the bash command line. For more about built-ins, refer to “How to tell if you’re using a bash builtin”.To read this article in full, please click here

3 container security best practices to strengthen your overall security posture

Container environments are highly dynamic and require continuous monitoring, observability, and security. Since container security is a continuous practice, it should be fully integrated into the entire development and deployment cycle. Implementing security as an integral part of this cycle allows you to mitigate risk and reduce the number of vulnerabilities across the dynamic and complex attack surface containers present.

Let’s take a look at three best practices for ensuring containers remain secure during build, deployment, and runtime.

Securing container deployments

Securing containers during the build and deployment stages is all about vulnerability management. It’s important to continuously scan for vulnerabilities and misconfigurations in software before deployment, and block deployments that fail to meet security requirements. Assess container and registry image vulnerabilities by scanning first- and third-party images for vulnerabilities and misconfigurations, and using a tool that scans multiple registries to identify vulnerabilities from databases such as NVD. You also need to continuously monitor images, workloads, and infrastructure against common configuration security standards (e.g. CIS Benchmarks). This enables you to meet internal and external compliance standards, and also quickly detect and remediate misconfigurations in your environment, thereby eliminating potential attack vectors.

Securing containers at runtime

Containerized workloads require a Continue reading

VMware says its SD-WAN client makes remote-access VPNs unnecessary

VMware is prepping client software for individual devices to connect to its SD-WAN services without the need for remote-access VPNs.Aimed at the work-from-home or hybrid worker, the company will launch VMware SD-WAN Client software that provides secure access to PCs and mobile devices, and provides management, visibility, and policy support as if they were in the office. When it becomes generally available in the spring, it will include versions for Windows, Mac, Linux, iOS, and Android and be bundled with the VMware SD-WAN package.“Post pandemic secure remote access is obviously important, and all of the challenges that led IT to deploy SD-WAN in the first place, like simplicity of management at scale, automation, visibility, and network error correction, are amplified as people work from home,” said Craig Connors, vice president and general manager of SASE Business at VMware. “The software client will bring all of that SD-WAN technology right to your desktop or mobile phone and leapfrog legacy remote access VPNs via a cloud-native, cloud-delivered package.”To read this article in full, please click here

BrandPost: Aruba Wi-Fi 6E: A Slam Dunk for The Golden State Warriors and Its Fans

By: Gayle Levin, Senior Product Marketing Manager at Aruba, a Hewlett Packard Enterprise company.The most successful NBA franchise in the past decade, the Golden State Warriors, is not only innovating on the basketball court by winning four NBA titles in the past seven seasons, they are also leading the game of technological innovation. The franchise became the first in North America to install the latest generation of Wi-Fi technology, Wi-Fi 6E, at a live entertainment venue, Chase Center, in San Francisco, Calif. To read this article in full, please click here

Intel is shipping the next generation of Xeon Scalable processors

After almost a year and a half of delays, Intel has begun to ship its 4th Generation Xeon Scalable processors, code-named Sapphire Rapids, to customers, and it has set January 10, 2023 as the formal launch date.The launch is a formality because, according to an Intel spokesperson, the new Xeons are already shipping to customers—OEMs—now, but it falls to those OEMs to announce their product release plans.CEO Pat Gelsinger said during the company’s earnings call last week that the company was ramping up production for launch and that he expected the new Xeons to see the fastest ramp to one million units ever.The challenge for Intel wasn’t in design, it was manufacturing. This will be the first generation of chips using Intel 7 fabrication, an advanced 10nm design that took years to get right.To read this article in full, please click here

Intel is shipping the next generation of Xeon Scalable processors

After almost a year and a half of delays, Intel has begun to ship its 4th Generation Xeon Scalable processors, code-named Sapphire Rapids, to customers, and it has set January 10, 2023 as the formal launch date.The launch is a formality because, according to an Intel spokesperson, the new Xeons are already shipping to customers—OEMs—now, but it falls to those OEMs to announce their product release plans.CEO Pat Gelsinger said during the company’s earnings call last week that the company was ramping up production for launch and that he expected the new Xeons to see the fastest ramp to one million units ever.The challenge for Intel wasn’t in design, it was manufacturing. This will be the first generation of chips using Intel 7 fabrication, an advanced 10nm design that took years to get right.To read this article in full, please click here

Announcing Networking and Advanced Security Enhancement in NSX 4.0.1.1

We’re thrilled to announce the general availability of VMware NSX 4.0.1.1, another exciting release with updates in networking, security, and operations for private, public, and multi-clouds.

With this release, VMware NSX customers will be able to leverage accelerated NSX networking and security performance, enhanced network observability, and new network monitoring and troubleshooting features for increased flexibility.

NSX 4.0.1.1 will also deliver enhanced threat detection and prevention capabilities, helping customers bolster network defenses to block advanced threats from moving laterally across multi-cloud environments.

Read on to get the details on our latest NSX release.

Distributed Malware Prevention

The NSX Distributed Firewall has added malware detection and prevention support for Linux guest endpoints (VMs). Linux has become the most common operating system across multi-cloud environments, powering more than 78% of the most popular websites. With the recent emergence of more Linux-specific threats, and current malware countermeasures being mostly focused on addressing Windows-based threats, there is an imperative to address the specific security needs of Linux machines. Adding Linux to our prevention solution enables the NSX Distributed Firewall to provide more effective prevention coverage and fewer false positives across multi-cloud environments.

In addition, we expanded the Continue reading

Enhanced NSX Edge and Networking Services in NSX 4.0.1.1

VMware NSX 4.0.1.1 introduces exciting new capabilities and enhancements for virtualized networking and security for private, public, and multi-clouds. Check out the release blog for an overview of the new features.

Among these new features is NSX Gateway Stateful Active/Active Services. This feature delivers a key security enhancement, giving you the full power of the NSX Edge cluster for your services without worrying about bandwidth and CPU limitations. In this blog post, we’ll cover all the terminology you need to know for this new feature, as well as configuration and architecture, and design considerations.

Stateful Active/Active Services

Prior to VMware NSX 4.0.1.0, configuring NSX using any of the variety of NSX services offered by VMware required you to set up NSX Edge Gateways in Active/Standby High Availability mode. Under this configuration, traffic is forwarded through a single (Active) NSX Edge Node. So, when designing the architecture, you needed to be aware of the limits imposed by the Active/Standby mode on the bandwidth and CPU (Central Processing Unit) utilization of the node.

With the NSX 4.0.1.0 release of NSX Stateful Active/Active Services, this consideration no longer applies. This new feature makes it Continue reading

Tech Bytes: Why SASE Is An Architecture, Not A Product (Sponsored)

Today on the Tech Bytes podcast, we’ll be investigating Secure Access Service Edge, or SASE, including the current state of the market and how SASE is evolving. We’ll also look at how sponsor Juniper Networks is moving into the SASE space. Our guest is Kate Adam, Sr. Director of Security Product Marketing at Juniper Networks.

The post Tech Bytes: Why SASE Is An Architecture, Not A Product (Sponsored) appeared first on Packet Pushers.

Network Break 406: Gluware Adds API Modeling To Network Automation; Arista Revenues Rise

This week's Network Break covers new features in Gluware and Aviatrix, new servers from HPE, and new partner specializations from Cisco. We also cover financial results from Fortinet and Arista and Russian threats against commercial satellites.

The post Network Break 406: Gluware Adds API Modeling To Network Automation; Arista Revenues Rise appeared first on Packet Pushers.

Adventures in Upgrading Netbox

I’ve been using Netbox for a while now, and, frankly, I can’t live without it. If you’ve never heard of it, it’s a Source of Truth for your network automation tasks started by Jeremy Stretch. I use it to document my networks (hardware inventory, subnets, physical connections, etc.), which provides my automation tasks a place to pull and push all sorts of information like management IPs, rack locations, power connections, network drops…the list goes on. In better words, your automation tools can ask Netbox what the state of your network is, and send it an update if that tool discovers something different. There are plenty of better places to discuss the benefits of a Souce of Truth, so just do the Googles for it.

My production instance is running Netbox 2.7.6, which is very old. The latest version of Netbox as of today is 3.3.7, so that should tell you how far behind we are. I’ve had mine running for over two years, and, in the meantime, the world has moved forward. If I update the server it’s running on (Ubuntu 20.04), then Netbox breaks. Yes, it’s so far behind Continue reading