Archive

Category Archives for "Networking"

The Candy Jar Effect

When I first started in Cisco TAC, as a lowly grade 3 engineer taking hardware RMA calls, I didn’t know anyone. I had just moved to North Carolina, we hadn’t found a church yet, I’m not the most social person on the face of the earth (in fact, if anything, I’m antisocial), and I was sitting in a cubicle surrounded by people who’d been working in serious networking for a lot longer than I had. Not only that, but a lot of them were a lot smarter than I was (and still are). These people were really busy; it was hard to sip from the firehose, and I really needed to find my way around. How could I go about building a network?candy-jar-effect

What to do… ??

I put a candy jar on my desk, and filled it with interesting candy. How would a candy jar work? Well, it attracted all sorts of interesting people to my desk throughout the day, and as I got to know what different people liked, it gave me an excuse to bring stuff to their desk—along with a question about a case I was working on, of course. In a sense, I learned all I Continue reading

FCC votes to expand Lifeline program to include broadband subsidy

The Federal Communications Commission voted 3-to-2 along party lines Thursday to expand the Lifeline telephone subsidy for low-income Americans to include Internet access.The decision generally follows an earlier proposal by FCC Chairman Tom Wheeler, a Democrat, to expand Lifeline's current $9.25 monthly phone subsidy to include broadband Internet access or bundled voice and data service plans. The fixed speed of the service will be based on what a "substantial majority of consumers receive," which is currently 10 Mbps for downloads and uploads. The changes are expected to go into effect by Dec. 1.To read this article in full or to leave a comment, please click here

Photos leaked for new CCR-6506-96G-48S-16S+

So photos have been leaked (we can’t say from where exactly) for the newest experimental router from MikroTik. We don’t know much about it yet except it will be the largest router MikroTik has ever built and is currently designated as CCR-6506-96G-48S-16S+.

Rough specs are:

  • 6 slot chassis
  • Dual redundant 720 Gbps CPU modules
  • Dual power
  • 96 ports of copper 1 gig
  • 48 1 gig SFP ports
  • 16 Ten gig SFP+ ports

Apparently this device will coincide with the release of RouterOS version 8 in 2026 [an inside source at MikroTik named “Janis” confirmed this is a realistic target date.]

Many covert mAP-quadcopters died to bring us this information…these photos are NOT for public distribution.

IMAG2270

IMAG2271

IMAG2272

And if you haven’t quite figured it out yet…APRIL FOOLS DAY!!!! But seriously MikroTik….we need this router. ?

 

 

Photos leaked for new CCR-6506-96G-48S-16S+

So photos have been leaked (we can’t say from where exactly) for the newest experimental router from MikroTik. We don’t know much about it yet except it will be the largest router MikroTik has ever built and is currently designated as CCR-6506-96G-48S-16S+.

Rough specs are:

  • 6 slot chassis
  • Dual redundant 720 Gbps CPU modules
  • Dual power
  • 96 ports of copper 1 gig
  • 48 1 gig SFP ports
  • 16 Ten gig SFP+ ports

Apparently this device will coincide with the release of RouterOS version 8 in 2026 [an inside source at MikroTik named “Janis” confirmed this is a realistic target date.]

Many covert mAP-quadcopters died to bring us this information…these photos are NOT for public distribution.

IMAG2270

IMAG2271

IMAG2272

And if you haven’t quite figured it out yet…APRIL FOOLS DAY!!!! But seriously MikroTik….we need this router. ?

 

 

Microsoft is putting Windows 10, Cortana at the center of smart homes

Are you too lazy to open the door or switch on a light? Let Windows 10 and its Cortana voice-activated digital assistant do the job for you.Microsoft's vision is to make home automation a breeze in Windows 10, and the company featured several related Internet-of-things announcements at its ongoing Build conference.Windows 10 will work with a wider range of devices and appliances by integrating new Open Connectivity Foundation (OCF) protocols, scheduled to be released in 2017. Additionally, Cortana will allow users to easily automate tasks using a Windows PC, mobile device, Xbox console or Raspberry Pi 3.Users will be able to program "actions" so Cortana can be used to switch on lights, air conditioning or even unlock cars. For example, users will be able to speak, "lights" to their smartphones, and the bulbs will turn on.To read this article in full or to leave a comment, please click here

Come Geek Out With The Original Inventor of DNS at CloudFlare

We like DNS, we think you might too.

CloudFlare and Gandi are hosting a three-part series on DNS. Our first event will be at the CloudFlare office with Paul Mockapetris, the original inventor of the Domain Name System.

Beyond inventing DNS, Paul built the first ever SMTP server. He ran networking at ARPA, served as the chair of the IETF, and is a honored member of the Internet Hall of Fame. He is currently the Chief Scientist at Threatstop, and the visiting scholar at the Universite de Pierre et Marie Curie in Paris.

The event is on Tuesday, April 12th, 2016 at 6 PM PST at our office in San Francisco, 101 Townsend Street (RSVP here). We’ll be covering the early days of DNS, DNS and security, the commercialization of DNS (what Paul famously calls DN$), and the future of DNS.

So come, grab some beer, and hang out with people who like DNS as much as you do.

Terrible computer pranks that could get you fired

Office pranksI know, I know – that jerk from sales deserves it. That snippy attitude last time you showed up to fix his “slowdown problem,” which was obviously just him having like 150 Chrome windows open at once. Still, as tempting as it might be, you can’t just take revenge on the guy’s computer. Please, just go and read something else now. You’ll feel like a better person.To read this article in full or to leave a comment, please click here

Fibre Channel in the Cloud: FCaaS

Public cloud providers such as Amazon Web Services, Microsoft Azure, and Rackspace, as well as private cloud systems such as OpenStack, have dominated the computing landscape for the past several years. And once a joke of a marketing term (remember Larry Ellison’s super villain-monologue on the topic?), the cloud is now A Thing, with a definition and everything.

One technology that seemed like it was getting left behind in all these cloud games, however, was Fibre Channel. Ephemeral compute nodes, object storage, extreme scale, elastic provisioning — all of these were characteristics that were initially thought to be bad fits for Fibre Channel.

giphy

Sad Fibre Channel is Sad

As it turns out, Fibre Channel is right at home in the cloud.

mrp6ibd

Amazon Web Services has recently rolled out Fibre Channel as a Service (FCaaS), as have Rackspace, Digital Ocean, and Microsoft Azure.

All of those public cloud providers have some sort of block storage offerings, but they’re typically based on something like iSCSI or another back-end block protocol. Customers have been demanding the kind of block storage in the public cloud, where they can control zoning and zonesets, just like they do in their traditional data centers worlds.

The Continue reading

Late Breaking: Cisco Switches to Arista

The legal feud between Cisco and Arista may finally be over, though perhaps not in the way any of us had expected.

Arista LogoCisco Logo

The news starting to filter out of San Jose this morning is that Cisco has agreed to drop its lawsuit in return for the immediate acquisition of Arista Networks’ assets, intellectual property and employees. After the ITC’s initial determination last month that Arista had infringed on three out of five patents listed in the suit, it is understood that this solution was urgently brokered to protect the company’s employees from the potential fallout should the ITC’s next ruling be less than favorable.

Sources close to Cisco CEO Chuck Robbins are saying that Cisco plans to rebrand Arista’s impressive 7500 switch hardware as the new flagship Cisco Nexus 8000 series. With its reassuringly familiar command line interface, Arista’s EOS should be a seamless addition to Cisco’s impressive existing portfolio of network operating systems (i.e. IOS, Native IOS, IOS-XR, IOS-XRv, IOS-XE and NXOS) and customers will likely be lining up to deploy the impressive new Nexus 8000 series hardware without having to suffer through the pains of the usual new product learning curve.

In some ways the timing of Continue reading

Flaw in popular door controllers allow hackers to easily unlock secure doors

Doors that provide access into secure areas in airports, hospitals, government facilities and other organizations can easily be opened by hackers due to a vulnerability into a popular brand of networked door controllers.The flaw exists in the widely used VertX and Edge lines of door controllers from HID Global, one of the world's largest manufacturers of smartcards, card readers and access control systems.HID's VertX and Edge controllers can be remotely managed over the network and have a service called discoveryd (discovery daemon) that listens to UDP probe packets on port 4070, according to Ricky Lawshae, a researcher with Trend Micro's newly acquired DVLabs division.To read this article in full or to leave a comment, please click here

TFTP via VRF

How does Internet work - We know what is networking

As you can see from my article list, I’m going through some VRF configuration in the last few weeks I ran into this today and it sounded interesting enough to share it with you. The issue with TFTP IOS image copy to flash when having all interfaces in specific VRF and no interface in Global Routing Table. Long story short, you kick in this command for normal IOS download to the router: R1#copy tftp://10.10.10.11/c890-universalk9-mz.154-3.M5.bin flash: Destination filename ? Accessing tftp://10.10.10.11/c890-universalk9-mz.154-3.M5.bin... %Error opening tftp://10.10.10.11/c890-universalk9-mz.154-3.M5.bin (Timed out) …and it isn’t working of course. The issue is in having all interfaces member of

TFTP via VRF

10 no-cost home security mobile apps worth a download

The App Store and Google Play stores are awash in home security apps. How do you choose? Some of the features you should look for are the "ability to save CCTV footage to your mobile device, view live CCTV footage through your mobile device, store recordings on your cloud, control your security system from your mobile device and activate a 'call to action'," says James McCann of JMC Technologies, a UK-based supplier of CCTV equipment. In addition, all of the best apps offer instant notification whenever unusual activity is detected, says McCann. McCann has rounded up 10 of the best mobile home security apps for iOS and Android — all free to download and all worth a try. These apps come recommended by industry experts and have (mostly) positive reviews on their respective app stores, says McCann. And he personally vouches for every last one of them.To read this article in full or to leave a comment, please click here(Insider Story)

Salary Survey 2016: How does your compensation stack up?

Survey says!Image by ThinkstockIn a tight job market, security pros are paid well, rate job satisfaction high, and will make a move for money, according to Computerworld's 2016 IT Salary Survey*. Read the full article: With all eyes on security, talent shortage sends salaries sky highTo read this article in full or to leave a comment, please click here(Insider Story)

How to audit external service providers

News of or firsthand experience with breaches that attackers managed to achieve using external service providers such as POS vendors reminds enterprises that the federated enterprise makes a bulletproof perimeter no longer possible.Failure to audit your providers is like neglecting to audit your internal enterprise, culminating in similar ramifications. In both cases, you can’t close holes you don’t know exist. But knowing what to audit can be the lion’s share of how to get it done right.In this fourth installment of a five part series designed to harden and remove vulnerabilities in incident response itself, CSO tips you off on what to audit inside those who conduct trade so closely with you and what resources to use.To read this article in full or to leave a comment, please click here(Insider Story)

IOS For iOS – New Cisco App Brings Network Control To iPhone

This morning Cisco announced the release of a groundbreaking new product offering complete control of a Cisco-based enterprise network using Apple’s iPhone™ platform. IOS For iOS, or IFi® (pronounced eye-Fie, kind of like WiFi but without the W) will be available in the App Store in July 2016. Cisco have described the app as bringing Cellphone Defined Networking (CDN) to busy network engineers and administrators.

Cisco Logo

What Is IOS For iOS?

The basic idea is to offer real time telemetry and full remote automation of the network so that engineers can make critical changes anywhere and anytime, reducing Mean Time To Restore (MTTR) and increasing employee satisfaction. The system requires at least one companion server to be located in a data center to perform management and automation functions on the user’s behalf. The other component of course is the app itself, which connects to the companion server as needed.

My main initial criticisms of the app are that it requires a massive 23GB (you read that correctly!) of storage on your iPhone, and–due to the screen estate needs and the CPU required for the app to run at a reasonable speed–it is only recommended for use on the iPhone Continue reading

Automating Security Group and Policy Creation with NSX REST API

As we’ve seen in many of the prior posts, VMware NSX is a powerful platform decoupling networking services from physical infrastructure. NSX effectively enables logical networking and security within a virtualized environment; this brings many of the same benefits we’re familiar with gaining from server virtualization such as flexibility, faster provisioning, better utilization of hardware, cost savings, decreased downtime, etc. One of the major benefits of the software approach that NSX brings is the ability to automate easily via REST API. In this post, we’ll take a look at a simple yet realistic use case focused around security where automation can help.  Continue reading