Archive

Category Archives for "Networking"

US security agencies warn of threats to industrial, utility control networks

Key US government security organizations are warning that industrial control system (ICS)/supervisory control and data acquisition (SCADA)-based networks are being threatened by bad actors armed with custom software tools.The Department of Energy (DOE), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA) and Federal Bureau of Investigation (FBI) issued a joint warning that certain advanced persistent threat (APT) actors have shown the ability to gain full system access to compromised ICS/SCADA systems.The alert did not identify which groups were making the threats, but it did recognize Dragos, Mandiant, Microsoft, Palo Alto Networks and Schneider Electric for helping put together the warning. Dragos has posted a paper about part of the threat.To read this article in full, please click here

US security agencies warn of threats to industrial, utility control networks

Key US government security organizations are warning that industrial control system (ICS)/supervisory control and data acquisition (SCADA)-based networks are being threatened by bad actors armed with custom software tools.The Department of Energy (DOE), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA) and Federal Bureau of Investigation (FBI) issued a joint warning that certain advanced persistent threat (APT) actors have shown the ability to gain full system access to compromised ICS/SCADA systems.The alert did not identify which groups were making the threats, but it did recognize Dragos, Mandiant, Microsoft, Palo Alto Networks and Schneider Electric for helping put together the warning. Dragos has posted a paper about part of the threat.To read this article in full, please click here

MikroTik – RouterOS v7 – BGP performance testing for full tables

MikroTik has come a long way since the first release of RouterOS v7 beta.

One of the long-awaited features is improved BGP performance and the ability to leverage multiple CPU cores.

Testing BGP performance is a long process of lab and prod evaluation, so we decided to run some quick and basic tests to get a baseline.

When the CCR2216-1G-12XS-2XQ was released and MikroTik entered the world of 100G, we ordered some right away to test and just got them in the lab a few days ago – the results are below.

Hope this is helpful and look for more BGP perf tests in the coming months!

The BGP testing lab

TLDR; 2.1 million routes learned and forwarding in 46 seconds and withdrawn in 44 seconds. This was tested under a 25 Gbps load on both routers with a cpu load of 12%.

Lab overview: The lab consists of (2) CCR2216 routers running ROSv7.2 stable connected to a ProxMox hypervisor that runs (4) Linux route generators and MikroTik CHRs (also on 7.2) acting as border routers. The specific connectivity is in the overview drawing below.

IPv6: We are currently developing a route generator that will inject IPv4 Continue reading

What is DRaaS and how it can save your business from disaster

Disaster Recovery as a Service (DRaaS) provides data replication, hosting, and recovery services from the cloud in the event of a disaster, power outage, ransomware attack, or other business interruption.DRaaS backs up data, applications, and IT infrastructure to the cloud, with providers typically having geographically dispersed data center footprints. In the event of a disaster, the business will failover to the DRaaS provider’s data center in a different region. As opposed to traditional disaster recovery methods, which require businesses to operate an off-site DR facility, DRaaS shifts that burden to service providers, and, thus, expands the market beyond the large enterprises that could afford such capital-intensive setups.To read this article in full, please click here

What is DRaaS and how it can save your business from disaster

Disaster Recovery as a Service (DRaaS) provides data replication, hosting, and recovery services from the cloud in the event of a disaster, power outage, ransomware attack, or other business interruption.DRaaS backs up data, applications, and IT infrastructure to the cloud, with providers typically having geographically dispersed data center footprints. In the event of a disaster, the business will failover to the DRaaS provider’s data center in a different region. As opposed to traditional disaster recovery methods, which require businesses to operate an off-site DR facility, DRaaS shifts that burden to service providers, and, thus, expands the market beyond the large enterprises that could afford such capital-intensive setups.To read this article in full, please click here

Telephone System Is a Bad Example of Hierarchical Addresses

Networking engineers proposing strict hierarchical addressing scheme as a solution to global BGP table explosion often cite the international telephone system numbering plan (E.164) as a perfect example of an addressing plan that uses hierarchy to minimize routing table sizes. Even more, widespread mobile roaming and local number portability indicate that we could solve IP mobility and multihoming if only insert-your-favorite-opinion-here.

US security agencies warn of threats to indusctial, utility control networks

Key US government security organizations are warning industrial control system (ICS)/supervisory control and data acquisition (SCADA)-basednetworks are being threatened by bad actors armed with custom software tools.The Department of Energy (DOE), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA) and Federal Bureau of Investigation (FBI) issued a joint warning that certain advanced persistent threat (APT) actors have shown the ability to gain full system access to compromised ICS/SCADA systems. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

New Fujitsu cloud service is based Arm chips used in the world’s fastest supercomputer

Fujitsu announced it will launch a cloud service based on the same hardware used in the world's fastest supercomputer, Fugaku.The first step in what it calls Fujitsu Computing-as-a-Service (CaaS) will be Fujitsu Cloud Service HPC, which offers the high-performance computing power of the Fujitsu Supercomputer PRIMEHPC FX1000, which is based on the A64FX 64-bit Arm processor Fujitsu developed specifically for Fugaku. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Fujitsu cloud service is based on Arm chips used in the world’s fastest supercomputer

Fujitsu announced it will launch a cloud service based on the same hardware used in the world's fastest supercomputer, Fugaku.The first step in what it calls Fujitsu Computing-as-a-Service (CaaS) will be Fujitsu Cloud Service HPC, which offers the high-performance computing power of the Fujitsu Supercomputer PRIMEHPC FX1000, which is based on the A64FX 64-bit Arm processor Fujitsu developed specifically for Fugaku. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Fujitsu cloud service is based on Arm chips used in the world’s fastest supercomputer

Fujitsu announced it will launch a cloud service based on the same hardware used in the world's fastest supercomputer, Fugaku.The first step in what it calls Fujitsu Computing-as-a-Service (CaaS) will be Fujitsu Cloud Service HPC, which offers the high-performance computing power of the Fujitsu Supercomputer PRIMEHPC FX1000, which is based on the A64FX 64-bit Arm processor Fujitsu developed specifically for Fugaku. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

New Fujitsu cloud service is based Arm chips used in the world’s fastest supercomputer

Fujitsu announced it will launch a cloud service based on the same hardware used in the world's fastest supercomputer, Fugaku.The first step in what it calls Fujitsu Computing-as-a-Service (CaaS) will be Fujitsu Cloud Service HPC, which offers the high-performance computing power of the Fujitsu Supercomputer PRIMEHPC FX1000, which is based on the A64FX 64-bit Arm processor Fujitsu developed specifically for Fugaku. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Fujitsu cloud service is based on Arm chips used in the world’s fastest supercomputer

Fujitsu announced it will launch a cloud service based on the same hardware used in the world's fastest supercomputer, Fugaku.The first step in what it calls Fujitsu Computing-as-a-Service (CaaS) will be Fujitsu Cloud Service HPC, which offers the high-performance computing power of the Fujitsu Supercomputer PRIMEHPC FX1000, which is based on the A64FX 64-bit Arm processor Fujitsu developed specifically for Fugaku. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Fujitsu cloud service is based on Arm chips used in the world’s fastest supercomputer

Fujitsu announced it will launch a cloud service based on the same hardware used in the world's fastest supercomputer, Fugaku.The first step in what it calls Fujitsu Computing-as-a-Service (CaaS) will be Fujitsu Cloud Service HPC, which offers the high-performance computing power of the Fujitsu Supercomputer PRIMEHPC FX1000, which is based on the A64FX 64-bit Arm processor Fujitsu developed specifically for Fugaku. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Nokia pulls most of its business from Russia

Finland-based telecommunications equipment giant Nokia has announced that it would cease most of its operations in Russia, in response to that country’s month-old invasion of Ukraine.Nokia said in a statement that it would suspend equipment deliveries, accept no new orders and move “our limited R&D activities” out of the country, saying that “it has been clear for Nokia since the early days of the invasion of Ukraine that continuing our presence in Russia would not be possible.”Russia accounted for less than 2% of the company’s net sales in 2021, according to Nokia, which added that the move will not affect the bottom line in a significant way, and that the company expects to hit all of its immediate earnings targets going forward.To read this article in full, please click here

Hedge 126: George Michaelson on ISDN

ISDN, while an old technology, is still around in many parts of the world. When will it go away? George Michaelson joins Tom Ammon and Russ White to discuss the end of ISDN. The conversation then veers into old networking technologies, and the importance of ISDN in setting the terms and ideas we use today—ISDN is one of the key technologies around which network engineers built their mental maps of how to build and maintain networks.

download

Practical Python For Networking: 2.1 – Lab Topology – Video

This episode on Python for networking covers the lab topology we’ll be working with in VIRL, choosing a text editor, and basic lab configurations. Course files are in a GitHub repository: https://github.com/ericchou1/pp_practical_lessons_1_route_alerts Eric Chou is a network engineer with 20 years of experience, including managing networks at Amazon AWS and Microsoft Azure. He’s the founder […]

The post Practical Python For Networking: 2.1 – Lab Topology – Video appeared first on Packet Pushers.

The Key to Networking is First Getting a Good Night’s Sleep

Anyone who’s ever gone to a networking event knows that they can be exhausting. You’re constantly meeting new people, exchanging business cards, and trying to make a good impression. It’s no wonder that so many people end up burning out quickly.

The key to networking effectively is actually quite simple: getting a good night’s sleep beforehand.

How much sleep do you need to be at your best for networking events?

Most people need around eight hours of sleep per night to function at their best. However, if you know you have an upcoming networking event, it’s important to get even more sleep than usual. Try to get at least nine or ten hours of sleep the night before. This will help ensure that you’re well-rested and won’t be as likely to feel exhausted during the event.

How can you make sure you get enough sleep?

There are a few different things you can do to make sure you get enough sleep. First, avoid caffeine in the evening. Caffeine can stay in your system for up to eight hours, so it’s best to avoid it after lunchtime. 

Second, establish a bedtime routine and stick to it as much as possible. Continue reading

Day Two Cloud 142: OpenZiti Serves Up Zero Trust For Applications (Sponsored)

Today's Day Two Cloud episode bites into OpenZiti, an open-source project that brings zero trust principles to networks and applications. OpenZiti builds an overlay network to enforce zero trust. It has several moving parts including edge routers, a controller, and SDKs. OpenZiti was created by NetFoundry, our sponsor for this episode. Guest Clint Dovholuk takes us through the nitty-gritty of how it works.