A recent report from Infoblox says the U.S. far and away hosted the largest number of domains that were used “for hosting and launching attacks using malicious DNS infrastructure” in the fourth quarter of 2015.
The post United States Hosts 72% Of Compromised DNS Domains appeared first on Packet Pushers.
I’ve covered macvlans in the Bridge vs Macvlan post. If you are new to macvlan concept, go ahead and read it first.
To recap: Macvlan allows you to configure sub-interfaces (also termed slave devices) of a parent, physical Ethernet interface (also termed upper device), each with its own unique MAC address, and consequently its own IP address. Applications, VMs and containers can then bind to a specific sub-interface to connect directly to the physical network, using their own MAC and IP address.
Macvlan is a near-ideal solution to natively connect VMs and containers to a physical network, but it has its shortcomings:
Now I know why the IETF isn't doing stuff that Enterprises care about.
The post The IETF and Not The Enterprise appeared first on EtherealMind.
The post Worth Reading: Trademarking hashtags appeared first on 'net work.
Take a Network Break! We serve up a bounty of tech news, including Microsoft's influence over hardware players, Cisco's big reorganization, a new Citrix appliance & more.
The post Network Break 80: Microsoft Moves Markets, Cisco Reorganizes appeared first on Packet Pushers.
Take a Network Break! We serve up a bounty of tech news, including Microsoft's influence over hardware players, Cisco's big reorganization, a new Citrix appliance & more.
The post Network Break 80: Microsoft Moves Markets, Cisco Reorganizes appeared first on Packet Pushers.
So you’ve spent time asking what, observing the network as a system, and considering what has actually been done in the past. And you’ve spent time asking why, trying to figure out the purpose (or lack of purpose) behind the configuration and design choices made in the past. You’ve followed the design mindset to this point, so now you can jump in and make like a wrecking ball (or a bull in a china shop), changing things so they’re better, and the new requirements you have can fit right in. Right?
Wrong.
As an example, I want to take you back to another part of a story I told here about my early days in the networking world. Before losing the war over Banyan Vines, I actually encountered an obstacle that should have been telling—but I was too much of a noob at the time to recognize it for the warning it really was. At the time, I had written a short paper comparing Vines to Netware; the paper was, perhaps, ten pages long, and I thought it did a pretty good job of comparing the two network operating systems. Heck, I’d even put together a page showing how Vines Continue reading
It's selling the unit for less than it paid for it.
Change control isn’t so bad. With the underlying goal of risk mitigation, good change control can save a network engineer from the dreaded resume generating event we sweat over during cutovers. Change management frameworks such as ITIL layer an element of bureaucracy over network operations to provide a basis for a quantitative approach to IT […]
The post Change Control: Embrace the Red Tape appeared first on Packet Pushers.
Change control isn’t so bad. With the underlying goal of risk mitigation, good change control can save a network engineer from the dreaded resume generating event we sweat over during cutovers. Change management frameworks such as ITIL layer an element of bureaucracy over network operations to provide a basis for a quantitative approach to IT […]
The post Change Control: Embrace the Red Tape appeared first on Packet Pushers.
Ecomp would be the mother of SDN open source groups.
The post Worth Reading: Building a (human) network, part 2 appeared first on 'net work.
This week’s comedy gold was listening to a conversation emanating from a nearby inhabitant of our corporate cube accomodations, where one of my colleagues, Bob, was explaining to another coworker, George, the reasoning behind the decision to deploy firewalls to a particular new location.
Roughly summarized, the argument was this:
George, deploying a firewall is like having sex.
(No; I confess I had not anticipated ever typing that particular sentence, and I hope I never have to type it again.)
When you want to have sex, you decide whether you want a baby, and thus you choose whether or not to use contraception. If you don’t use contraception, while there’s no guarantee that a baby will arrive, there’s a real good chance that it will, so don’t be surprised if it does. Contraception isn’t perfect, but it at least reduces the likelihood of having a baby.
I confess I was laughing hard as I listened to the explanation because it’s an inspired analogy. However, buried somewhere in my subconscious was an Australian voice saying something like All these security products are a waste of money. It’s cheaper to save the money you would have spent, deal with a breach Continue reading
Network assurance saves you time, money and keeps you away from implementation sweats. Learn more with CA Technologies' Tim Diep.