Q3 disappoints, but Ciena says the Cyan acquisition points to a strong SDN future.
Are white box switches less secure than proprietary alternatives like Juniper or Cisco switches?
Gregory Pickett, Founder of Hellfire Security, did a presentation about white box security during the last Black Hat conference, triggering a multitude of news articles which we will study in this post. Without dwelling on the author mixing ideas between SDN and White Box Networking (which is quite common these days – the title of the presentation is about SDN and the presentation is all about white box networking security) the security issues raised are real.
Those security issues are either network operating system (NOS) specific (which I will not comment on as none of them are related to PicOS), or Pre-Boot related (Bootkit). I will focus on the key issues relating to security of NOS boot loaders, specific to Open Networking / White Box Networking.
Rootkit and Bootkit
The typical goal of a malicious user is to install a rootkit on the device under attack. A rootkit is a collection of software designed to enable unauthorized access while masking its existence.
Because NOS’s protection mechanisms are becoming more elaborate, a new kind of attack came up. This type of attack bypasses all NOS security by Continue reading
Streamlining opex to unlock NFV capex savings.

The post Worth Reading: IWAN at Networking by Fish appeared first on 'net work.
On this week's show we're chatting with hacker superstar and YouTube phenomenon Samy Kamkar. Samy is a security researcher of note -- his recent hardware hacks have been coming thick and fast. This week I spoke to him about his brush with the law following his unleashing of the Samy worm on MySpace a decade ago, some of his recent research and his plans for the future.
Sometimes it seems like the networking vendors try to (A) create solutions in search of problems, (B) boil the ocean, (C) solve the scalability problems of Google or Amazon instead of focusing on real-life scenarios or (D) all of the above.
Bryan Stiekes from HP decided to do a step in the right direction: let’s ask the customers how complex their data centers really are. He created a data center complexity survey and promised to share the results with me (and you), so please do spend a few minutes of your time filling it in. Thank you!
Werner Herzog and NetScout are capturing it all on film.
KEMP takes a higher view of application/device management
Hi everyone, JP here. You know as CCIE candidates, we are faced with one of the most difficult, and grueling, exams the networking world has to offer – the CCIE lab exam. As you may or may not be aware, Frame-Relay was replaced with L3VPN and DMVPN in the R&S Version 5 blueprint update. This means not only will we need to understand our IGP’s, MPLS, and VRF Lite, but we will need to fully understand how to configure MPBGP in order to transport our VPN labels and prefixes across the service provider’s network.
Using a topology from one of our mock labs, let’s have a look into the configuration of MP-BGP and make sure we understand it. Preview the diagram in HD here.

In a Layer 3 VPN we are driven by the need to advertise customer prefixes across a service provider network, while keeping these customers isolated from one another. To do this using L3VPN, we need to carry more than just the IPv4 unicast address, which is all standard BGP is capable of. Additional information like the MPLS label, VPN label, and route-distinguisher need to be carried from one point of the network to the other. Let’s Continue reading
Arista's EOS is a single binary image that runs on all its products. This lets Arista do interesting things with APIs and an SDK, but it creates potential challenges too.
The post Arista EOS: Benefits & Challenges Of A Single OS appeared first on Packet Pushers.