Archive

Category Archives for "Networking"

5 VMware products need patching against serious security vulnerabilities

Virtualization and cloud vendor VMware this week disclosed eight vulnerabilities in five of its products, and urged users of Workspace ONE Access and all its products that include VMware Identity Manager components to patch immediately.Three of those vulnerabilities were rated critical on the CVSSv3 scale—two of them contain the possibility for remote code execution, while the third would allow a bad actor to bypass VMware’s user authentication systems to execute unauthorized operations.To read this article in full, please click here

New from Cisco: Workplace-safety service, branch office firewall

Cisco has taken the wraps off a new firewall and a technology package it says help enterprises better control hybrid workers' access to corporate resources and to enable a safer, more secure return to the office.On the firewall front, Cisco has rolled out a new security appliance: the 1RU, 17 Gbps throughput Secure Firewall 3100. It is the low end of the 3100 series and meant to lower the barrier to entry, better support small branches and boost VPN performance, Cisco stated. The Cisco Secure Series already included the 3120, 3130, and 3140 devices which support 23Gbps-45Gbps throughputs.To read this article in full, please click here

Device Management From The Ground Up: Part 7 – Resetting Device Passwords

In an ideal world, we would never need to know how to reset passwords on network devices. In my utopia, network documentation would be thorough, updated, and readily available. We do not live in the ideal world, however. It is almost inevitable you will encounter a device that you are unable to properly authenticate to. In this lesson, I cover the steps for accessing a device without a password.

The post Device Management From The Ground Up: Part 7 – Resetting Device Passwords appeared first on Packet Pushers.

New Routing Protocol to replace BGP

New routing protocol to replace BGP is one of the most common questions every good Network Engineer in their career at least a few times encounter. In this post, we will look at some of those thoughts and we will discuss aims to replace BGP were real or not.

LISP as a new routing protocol aims to replace BGP?

Locator and Identity Separation Protocol, RFC 6830, as an experimental RFC, was one of those technologies, many Network Engineers thought of as a replacement for BGP, especially over the Internet.

This was probably one of the biggest myths we have been discussing for years when we discuss Routing protocol to replace BGP, but first thing is, LSIP is not a Routing protocol!.

It is an IP in the IP Encapsulation mechanism, or in other words, a tunneling mechanism, which is mainly used to hide the Internal prefixes from the network core to avoid the control plane state. So, LISP helps for Routing protocol scalability but LISP was never aimed to replace BGP.

In fact, I discussed exactly this point in the below video with Dino Farinacci, who is the inventor of the LISP protocol. Dino runs, www.lispers.net, Continue reading

Handling Bursty Traffic in Real-Time Analytics Applications

Dhruba Borthakur Dhruba is CTO and co-founder of Rockset and is responsible for the company's technical direction. He was an engineer on the database team at Facebook, where he was the founding engineer of the RocksDB data store. Earlier at Yahoo, he was one of the founding engineers of the Hadoop Distributed File System. He was also a contributor to the open source Apache HBase project. Note: This post is the third in the series “can spike 10x during Black Friday. There are many other occasions where data traffic balloons suddenly. Halloween causes consumer social media apps to be inundated with photos. Major news events can set the markets afire with electronic trades. A meme can suddenly go viral among teenagers. In the old days of batch analytics, bursts of data traffic were easier to manage. Executives didn’t expect reports more than once a week nor dashboards to have up-to-the-minute data. Though some data Continue reading

Intel suspends all operations in Russia

Intel has become the latest technology firm to suspend its business operations in Russia. The announcement comes a month after the chipmaker announced that it would suspend all shipments to customers in Russia and Belarus.“Intel continues to join the global community in condemning Russia’s war against Ukraine and calling for a swift return to peace,” the company said in a statement.Intel says that it is working to support its 1,200 Russian-based employees and will continue to put business continuity measures in place to minimize disruption to its global operations.To read this article in full, please click here

10 essential Linux tools for network and security pros

Picking just 10 Linux open source security tools isn’t easy, especially when network professionals and security experts have dozens if not several hundred tools available to them.There are different sets of tools for just about every task—network tunneling, sniffing, scanning, mapping. And for every environment—Wi-Fi networks, Web applications, database servers.We consulted a group of experts (Vincent Danen, vice president of product security, RedHat; Casey Bisson, head of product growth, BluBracket; Andrew Schmitt, a member of the BluBracket Security Advisory Panel; and John Hammond, senior security researcher, Huntress) to develop this list of must-have Linux security tools.To read this article in full, please click here

John Deere gets more connected with Samsara integration

Agricultural equipment manufacturer John Deere this week announced a new level of integration with Samsara Vehicle Gateways, which should allow farmers a greater degree of real-time insight into the vehicles that support key farm gear.The new integration works through JDLink, John Deere’s in-house connectivity layer for remote management and monitoring agricultural equipment. JDLink, via a phone or web app, can show remote diagnostic information, track machinery geographically, and provide a host of other remote monitoring features.Integrating Samsara’s vehicle gateways — edge devices that can be equipped on any vehicle to track engine diagnostics, GPS position, and many other pieces of operational data — means that JDLink can be used to track a much wider array of support vehicles necessary for modern agriculture, not just John Deere’s own machines, which have native support for the system.To read this article in full, please click here

10 essential Linux tools for network and security pros

Picking just 10 Linux open source security tools isn’t easy, especially when network professionals and security experts have dozens if not several hundred tools available to them.There are different sets of tools for just about every task—network tunneling, sniffing, scanning, mapping. And for every environment—Wi-Fi networks, Web applications, database servers.We consulted a group of experts (Vincent Danen, vice president of product security, RedHat; Casey Bisson, head of product growth, BluBracket; Andrew Schmitt, a member of the BluBracket Security Advisory Panel; and John Hammond, senior security researcher, Huntress) to develop this list of must-have Linux security tools.To read this article in full, please click here

Next Hops of BGP Routes Reflected by Arista EOS

Imagine a suboptimal design in which:

  • A BGP route reflector also servers as an AS edge (PE) router1;
  • You want to use next-hop-self on AS edge routers.

Being exposed to Cisco IOS for decades, I considered that to be a no-brainer. After all, section 10 of RFC 4456 is pretty specific:

In addition, when a RR reflects a route, it SHOULD NOT modify the following path attributes: NEXT_HOP, AS_PATH, LOCAL_PREF, and MED.

Arista EOS is different – a route reflector happily modifies NEXT_HOP on reflected routes (but then, did you notice the “SHOULD NOT” wording?2)

2 ways to remove duplicate lines from Linux files

There are many ways to remove duplicate lines from a text file on Linux, but here are two that involve the awk and uniq commands and that offer slightly different results.Remove duplicate lines with awk The first command we'll examine in this post is a very unusual awk command that systematically removes every line in the file that is encountered more than once. It leaves the first instance of the line intact, but "remembers" it and removes any duplicates encountered afterwards.Here's an example. Initially, the file looks like this:To read this article in full, please click here

2 ways to remove duplicate lines from Linux files

There are many ways to remove duplicate lines from a text file on Linux, but here are two that involve the awk and uniq commands and that offer slightly different results.Remove duplicate lines with awk The first command we'll examine in this post is a very unusual awk command that systematically removes every line in the file that is encountered more than once. It leaves the first instance of the line intact, but "remembers" it and removes any duplicates encountered afterwards.Here's an example. Initially, the file looks like this:To read this article in full, please click here