Archive

Category Archives for "Networking"

Your design should be usable !

Whatever you design , it should be usable first. Computer network design is not an exception.You are not designing a network to support one service only such as VPN or Internet.It should provide enough functionality for today and future needs. Your design should be usable today and the future ! It was so common to use… Read More »

The post Your design should be usable ! appeared first on Network Design and Architecture.

CloudGenix SD-WAN Whitepaper by Packet Pushers

Packet Pushers took on an SD-WAN whitepaper sponsored by CloudGenix. There were two main ideas behind this whitepaper. (1) Describe a typical SD-WAN solution. (2) Discuss CloudGenix specifics. When done reading, you should know both what SD-WAN will do for you, as well as how to integrate CloudGenix into your existing WAN with a minimum of disruption. Download with no regwall from here: http://bit.ly/PPCGWP.

The post CloudGenix SD-WAN Whitepaper by Packet Pushers appeared first on Packet Pushers.

CCNA Security 210-260 IINS

As some of you probably already know, the CCNA Security IINS exam topics have been refreshed from version 2.0 to version 3.0. The new exam is now called CCNA 210-260 “Implementing Cisco Network Security”. We will now take a look at the differences between the two exams and highlight the most important topic changes.

First thing, IINS 3.0 topics combine and adjust the current domains. Instead of covering nine domains (IINS 2.0), only seven domains are now included. This change was made to better reflect current job roles and job tasks typically performed by CCNA Security individuals. Note that although there are fewer domains, the exam remains the same length – it lasts for 90 minutes and contains 60-70 questions. This is because some new technologies were added and certain topic areas are now covered in more depth. The exam prerequisites did not change – you will not be able to obtain a valid CCNA Security Certificate until you already possess a valid CCENT or CCNA R&S, or any CCIE certificate.

In general, the new CCNA Security exam tests the candidate’s knowledge of secure network infrastructure, understanding core security concepts, managing secure access, VPN encryption, firewalls, Continue reading

OpenStack Summit Tokyo: Learn Open Networking with OpenStack

Meet us at OpenStack Summit Tokyo and learn how to build fast, scalable, secure OpenStack networking.

Mark McClain (CTO, Akanda Inc) and I will be presenting at the OpenStack Summit in Tokyo about the next-generation physical and virtual network that DreamHost is deploying for their DreamCompute cloud.

Screen Shot 2015-10-23 at 10.11.24 AM

The design marries Cumulus Networks Dynamic LNV (Lightweight Network Virtualization) with Akanda’s Astara L3-7 services, all being orchestrated by the OpenStack Neutron.

We’ll be expanding on the talk we gave at the last OpenStack summit in Vancouver.  That talk was about the design and why we should deploy it. In this one, we will be discussing in depth about our experiences deploying it in production.

If you can’t make it to Tokyo, don’t worry, the talk will be recorded.

Watch out for this space for updates on the talk!

The post OpenStack Summit Tokyo: Learn Open Networking with OpenStack appeared first on Cumulus Networks Blog.

OpenStack Summit Tokyo: Learn Open Networking with OpenStack

Meet us at OpenStack Summit Tokyo and learn how to build fast, scalable, secure OpenStack networking.

Mark McClain (CTO, Akanda Inc) and I will be presenting at the OpenStack Summit in Tokyo about the next-generation physical and virtual network that DreamHost is deploying for their DreamCompute cloud.

Screen Shot 2015-10-23 at 10.11.24 AM

The design marries Cumulus Networks Dynamic LNV (Lightweight Network Virtualization) with Akanda’s Astara L3-7 services, all being orchestrated by the OpenStack Neutron.

We’ll be expanding on the talk we gave at the last OpenStack summit in Vancouver.  That talk was about the design and why we should deploy it. In this one, we will be discussing in depth about our experiences deploying it in production.

If you can’t make it to Tokyo, don’t worry, the talk will be recorded.

Watch out for this space for updates on the talk!

The post OpenStack Summit Tokyo: Learn Open Networking with OpenStack appeared first on Cumulus Networks Blog.

Germany probes Regin-powered cyberespionage

It looks like Chancellor Angela Merkel is not the only German official who might have been spied on by the nation's allies. The head of a German Federal Chancellery unit reportedly had his laptop infected with Regin, a cyberespionage program believed to be used by the U.S. National Security Agency and its closest intelligence partners. The German federal prosecutor's office has opened an investigation into the breach, which came to light in 2014, German news magazine Der Spiegel reported Friday. The Chancellery is the federal agency that serves Merkel's office.To read this article in full or to leave a comment, please click here

TalkTalk had ‘no legal obligation’ to encrypt customers’ sensitive data

Potentially as many as 4 million customers were affected by the cyberattack on UK telecoms provider TalkTalk, yet the company's CEO Dido Harding admitted that TalkTalk was "not legally required" to encrypt customer data. Harding told the Sunday Times "[Our data] wasn't encrypted, nor are you legally required to encrypt it. We have complied with all of our legal obligations in terms of storing of financial information."While that may be true, such a statement provides little comfort to TalkTalk customers who are targets of high-level social engineering attacks meant to empty their bank accounts.To read this article in full or to leave a comment, please click here

The Odd Hours Solution

For many years, when I worked out in the center of the triangle of runways and taxiways, I would get up at around 4, swim a mile in the indoor poor (36 laps), shower, grab breakfast, run by base weather just to check the bigger pieces of equipment out (mostly the RADAR system), and then I’d head out to the shop. We could mostly only get downtime on the airfield equipment (particularly the VOR, TACAN, and glideslopes) in the early morning hours — unless, of course, there was a war on. Then we couldn’t get downtime at all. By 2:30 I was done with my work day, and I headed home to get whatever else done.

When I left the USAF, after being trapped in some 9–5 jobs, I joined the cisco TAC. Our shift started at 8 or 8:30, when we took over the 1–800 number from Brussels, and our shift lasted until around 2 in the afternoon (it varied over time, as the caseloads and TACs were moved around). Freed from 9–5, I started getting to work at around 5:30 again. I could spend the first two or three hours following up on cases (did you know that Continue reading