Archive

Category Archives for "Networking"

Lawmakers move to end warrantless surveillance of US residents

A new bill in Congress would require law enforcement agencies to get court-ordered warrants before targeting U.S. residents in searches of electronic communications collected by the National Security Agency.The End Warrantless Surveillance of Americans Act, introduced Tuesday by three members of the House of Representatives, would end the so-called surveillance back door that allows the FBI and other agencies to search U.S. emails, texts and other data swept up in NSA surveillance of overseas communications.+ A REVIEW: Government can exploit loopholes for warrantless surveillance on Americans +To read this article in full or to leave a comment, please click here

PSA: Linux Does RPF Checking

Twice now I've "discovered" that Linux hosts (even those that aren't doing IP forwarding) do Reverse Path Forwarding checks on incoming traffic.

Both times this has come up was in the context of a multicast application. It resulted in a conversation that went like this:
Application Person: Hey Chris, what's up with the network? My application isn't receiving any traffic.
Me: Um... The routers indicate they're sending it to you. The L3 forwarding counters are clicking. The L2 gear indicates it has un-filtered all of the ports between the router and your access port. Are you sure?
Application Person: My application says it's not arriving.
Me: I now have tcpdump running on your server. The traffic is arriving. Here are the packets. Do they look okay?
In the end, it turns out that the network was operating perfectly fine. The requested traffic was being delivered to the server, on the interface that requested it. It was the routing table within the Linux host that was screwed up.

RPF Checks
Reverse Path Flow checking is a feature that checks to make sure that a packet's ingress interface is the one that would be used to reach the packet's source. If a Continue reading

Snake, the original mobile game, is coming to Android and iOS

The 90's nostalgia bubble is actually producing something useful – the return of Snake, the classic game made popular on some of Nokia's earliest popular cellphones.The Verge reported today that the mobile game's original creator, former Nokia design engineer Taneli Armanto, has partnered with Finnish video game studio Rumilus Design for Snake Rewind, which will feature updated graphics and gameplay, including a new feature that seems like heresy – "the ability to rewind if you crash your snake," according to the report. Where I come from, if you crash the Snake, you're out.To read this article in full or to leave a comment, please click here

The Two “Network As Code” Domains

This entry is part 4 of 4 in the series DevOps for Networking

You’ve probably heard the term “network programmability” at this point. You probably also heard it equated to anything to do with code, automation, and networking. This was not always the case.

Network programmability really first hit the big time back in 2011 in the early days of the public OpenFlow discussion. That phrase was almost universally understood to be a data plane concept – because it was describing the revolutionary ideas brought up by abstracting away a forwarding pipeline. “You mean I can program my network device directly?” Network programmability.

I was inspired by a thread that my friend Josh kicked off with this tweet:

An interesting dialogue followed, and I felt compelled to address the problem caused by marketing departments muddying the waters of what would otherwise be a very simple idea.

Now obviously it’s too late to “right the wrong” that resulted from marketing and journalism engines chugging at full steam trying Continue reading

The Two “Network As Code” Domains

You’ve probably heard the term “network programmability” at this point. You probably also heard it equated to anything to do with code, automation, and networking. This was not always the case.

Network programmability really first hit the big time back in 2011 in the early days of the public OpenFlow discussion. That phrase was almost universally understood to be a data plane concept - because it was describing the revolutionary ideas brought up by abstracting away a forwarding pipeline. “You mean I can program my network device directly?” Network programmability.

I was inspired by a thread that my friend Josh kicked off with this tweet:

An interesting dialogue followed, and I felt compelled to address the problem caused by marketing departments muddying the waters of what would otherwise be a very simple idea.

Now obviously it’s too late to “right the wrong” that resulted from marketing and journalism engines chugging at full steam trying to make every technical term and phrase utterly useless. However, I would like Continue reading

SD-WAN with Viptela

Software Defined Wide Area Networking (SD-WAN) is bubbling up to be one of the prime use cases of SDN. The vendors that fall into the SD-WAN bucket often include Glue Networks, Nuage, Viptela, CloudGenix, VeloCloud, etc. As you dive into each of the solutions from the vendors, you may realize that some are truly unique technologically and some may just be offering a better way to manage existing wide area networking equipment (which is still a huge value add).
                                                                                                                                                       Read More

The only Apple Watch review you really need to see: Kids have at it…

Tech pundits and Apple fanboys/fangirls have shared their views on the new Apple Watch in recent weeks, but The Fine Brothers bring you the only review you really need to see: A seven-and-a-half-minute YouTube videos in which kids have their say.This is a twist on the usual Fine Brothers videos, as they usually try to stump today's youth with yesterday's technology, as they did here with Walkmans ("Video makers torture kids with unexplained Walkmans"). One kid says he's speechless upon identifying the Apple Watch, but the rest are certainly not....To read this article in full or to leave a comment, please click here

Show 235 – HP IMC BYOD Solution – Sponsored

HP Networking's Juliano Forti & Chris Young talk with Greg Ferro and Ethan Banks about how HP handles BYOD through integration with HP's Intelligent Management Center platform.

Author information

Ethan Banks

Ethan Banks, CCIE #20655, has been managing networks for higher ed, government, financials and high tech since 1995. Ethan co-hosts the Packet Pushers Podcast, which has seen over 3M downloads and reaches over 10K listeners. With whatever time is left, Ethan writes for fun & profit, studies for certifications, and enjoys science fiction. @ecbanks

The post Show 235 – HP IMC BYOD Solution – Sponsored appeared first on Packet Pushers Podcast and was written by Ethan Banks.

IDG Contributor Network: The UK is ‘running out of internet,’ pundit says

The United Kingdom, which is ranked on a GDP basis just behind France, Germany, and Japan – which in-turn are out-ranked only by the U.S. and China – is going to run out of internet soon, and might need to ration it, according to Andrew Ellis, a professor in optical communications at Aston University in Birmingham, England. The web will collapse because existing fiber optic cables can't accept any more data, and telcos can't afford to keep laying more fiber, Ellis has said recently. In any case, pumping data through cables is using up the country's power supply, Ellis says. At the current rate of growth, the web will consume the country's power supply within 20 years, he reckons.To read this article in full or to leave a comment, please click here

Configuration management 101

Configuration management, without a doubt this is probably one of those things we all do, but to what end do we perform configuration management though? Usually configuration begins and sometimes ends with backing up and storing those configuration files but how much further can or should we go with configuration? Backing and storing configuration files […]

Google launches a service for storing big data

Google has introduced a service for storing large amounts of data online, potentially enabling organizations to execute big data analysis as a cloud service.The offering, called Google Cloud Bigtable, "is based on technology that Google has been running internally for many years, so it is not a brand new thing," said Tom Kershaw, who is Google's director of product management for the Google Cloud Platform.Bigtable powers many of Google's core services, including Google Search, Gmail, and Google Analytics.MORE ON NETWORK WORLD: Big data's biggest challenges The service could be used to store sensor data from an Internet-of-things monitoring system. Finance companies could house petabytes of trading data on the service to analyze for emerging trends. Telecommunications companies, digital advertising firms, energy, biomedical, and other data-intensive industries might benefit from the technology as well.To read this article in full or to leave a comment, please click here

Economist: The Internet of Things will deliver surge of productivity

BOSTON - The view from Harvard's Michael Porter, an economist noted for his work on competition, is that the last 10 or 15 years have been "pretty dismal" for the economy. The IT- and Internet- driven innovations over the past four decades or so have played themselves out. The rate of investment and innovation "has been slowing down," he said.But that will change thanks to Internet of Things (IoT) technologies, which will deliver "tremendous" efficiency gains, he said. Harvard economist Michael Porter.To read this article in full or to leave a comment, please click here

The Internet of Things to take a beating in DefCon hacking contest

Hackers will put Internet-connected embedded devices to the test at the DefCon 23 security conference in August. Judging by the results of previous Internet-of-Things security reviews, prepare for flaws galore.This year, DefCon, the largest hacker convention in the U.S., will host a so-called IoT Village, a special place to discuss, build and break Internet-of-Things devices.“Show us how secure (or insecure) IP enabled embedded systems are,” a description of the new village reads. “Routers, network storage systems, cameras, HVAC systems, refrigerators, medical devices, smart cars, smart home technology, and TVs—If it is IP enabled, we’re interested.”To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Wednesday, May 6

Are Apple music-streaming deals under government scrutiny?With Apple’s new Beats music-streaming service readying a June launch, there’s a flurry of reports that its tough deal-making with record labels is drawing the attention of the U.S. Federal Trade Commission. Bloomberg reported that the regulator is investigating whether Apple is using its position as the largest seller of music downloads via iTunes to get better deals than rivals like Spotify. The Verge had earlier reported that both the Department of Justice and the FTC were digging around to find out if Apple was leaning on labels to stop letting streaming competitors offer free music options, so that users are pushed to paid services.To read this article in full or to leave a comment, please click here

EU launches antitrust probe into e-commerce sector

Europe’s e-commerce market will be subject to a full-fledged antitrust probe, as part of the European Commission’s push to tear down walls between the European Union’s 28 national digital markets.The competition inquiry will look for barriers to online cross-border trade of electronics, digital content, clothing and shoes, the Commission said Wednesday. The probe was proposed by Competition Commissioner Margrethe Vestager in March and is one of 16 initiatives announced Wednesday that the Commission hopes will make the EU a single market for digital goods and services.To read this article in full or to leave a comment, please click here

Check Point – Don’t Use the ‘Install On’ Column

I got caught out by Check Point’s “Install On” column recently. Most people don’t need this setting any more, but it’s still there for legacy reasons. Time to re-evaluate.

When you create a firewall policy using Check Point, you define the set of possible installation targets. That is, the firewalls that this policy may be installed on. When you compile & install policy, you can choose from this list of targets, and only this list.

In the 4.1 days, we didn’t have this option. At install time, you had to choose from the complete list of firewalls. The default had all firewalls selected. You can imagine the merriment that ensued when someone would install the wrong policy on a firewall.

Most organisations will only have one installation target per policy. But sometimes you want to have the same policy on multiple firewalls. This is pretty easy to do, and might make sense if you have many common rules.

 

But then you say “What if I had 30 common rules, 50 that only applied to firewall A, and another 50 that only applied to firewall B?” That’s where people start using the “Install On” column. This lets you define at a Continue reading

Video: End-to-End High Availability in Dual Stack Networks

One of the topics I discussed in the IPv6 High Availability webinar is the problem of dual-stack deployments – what do you do when the end-to-end path for one of the protocol stacks breaks down. Happy eyeballs is one of the solutions, as is IPv6-only data center (Facebook is moving in that direction really fast). For more details, watch the short End-to-End High Availability in Dual Stack Networks demo video.

Electronic lock maker clashes with security firm over software flaws

The maker of a widely used electronic lock has taken issue with a security company’s criticism of one of its flagship products.IOActive, a Seattle-based security consultancy, published an advisory alleging several security flaws in electronic locks made by CyberLock, of Corvallis, Oregon.CyberLock, which received advance notice of the problems from IOActive, contends it wasn’t given enough time or information prior to IOActive’s warning. Mike Davis, the IOActive researcher who found the problems, published two letters said to have been sent by CyberLock’s lawyers to IOActive.To read this article in full or to leave a comment, please click here

SD-WAN with Viptela

Software Defined Wide Area Networking (SD-WAN) is bubbling up to be one of the prime use cases of SDN. The vendors that fall into the SD-WAN bucket often include Glue Networks, Nuage, Viptela, CloudGenix, VeloCloud, etc. As you dive into each of the solutions from the vendors, you may realize that some are truly unique technologically and some may just be offering a better way to manage existing wide area networking equipment (which is still a huge value add).

In this post, I’m going to give some background on what is driving me to deploy an SD-WAN solution. Follow up posts will cover the deployment a bit more technically.

Requirements

Since I now have equipment in a colo, moved into a new office, and of course, have the home office, I figured it may be a good idea to look at some of these SD-WAN technologies. In reality, my requirements have a mobile 4th site too that will be used when doing consulting and training onsite at customers to give dynamic site to site access just back to the colo.

To be perfectly honest, I didn’t have strict requirements – they are probably equivalent to those of a small IT Continue reading

The Two “Network As Code” Domains

You’ve probably heard the term “network programmability” at this point. You probably also heard it equated to anything to do with code, automation, and networking. This was not always the case. Network programmability really first hit the big time back in 2011 in the early days of the public OpenFlow discussion. That phrase was almost universally understood to be a data plane concept - because it was describing the revolutionary ideas brought up by abstracting away a forwarding pipeline.