Archive

Category Archives for "Networking"

Hedge 114: Hardware Hacking 101 with Federico Lucifredi

Hardware hacking isn’t a topic most network engineers are familiar with—but we always used to say that if I can get access to the console of a router, I can eventually get into the box. The same is largely true of all kinds of computing hardware, including laptops, compute nodes connected to a data center fabric, and, again, routers and switches. In this episode of the Hedge, Federico Lucifredi joins Tom Ammon and Russ White to discuss the many options hardware hackers have today.

download

IPv6 Buzz 092: Listener Questions – NAT66, Stable IPv6 Prefix Delegation And More!

In the latest episode of IPv6 Buzz, we tackle the first listener questions of the year (well, really left over from the end of 2021 but still good ones!). Those questions cover topics including Unique Local Addressing (ULA) and SD-WAN, NAT66, IPv6 prefix delegation, and more.

The post IPv6 Buzz 092: Listener Questions – NAT66, Stable IPv6 Prefix Delegation And More! appeared first on Packet Pushers.

Cisco ASR 9000 Series Routers

Cisco already supports industry standard sFlow telemetry across a range of products and the recent IOS-XR Release 7.5.1 extends support to Cisco ASR 9000 Series Routers.

Note: The ASR 9000 series routers also support Cisco Netflow. Rapidly detecting large flows, sFlow vs. NetFlow/IPFIX describes why you should choose sFlow if you are interested in real-time monitoring and control applications.

The following commands configure an ASR 9000 series router to sample packets at 1-in-20,000 and stream telemetry to an sFlow analyzer (192.127.0.1) on UDP port 6343.

flow exporter-map SF-EXP-MAP-1
version sflow v5
!
packet-length 1468
transport udp 6343
source GigabitEthernet0/0/0/1
destination 192.127.0.1
dfbit set
!

Configure the sFlow analyzer address in an exporter-map.

flow monitor-map SF-MON-MAP
record sflow
sflow options
extended-router
extended-gateway
if-counters polling-interval 300
input ifindex physical
output ifindex physical
!
exporter SF-EXP-MAP-1
!

Configure sFlow options in a monitor-map.

sampler-map SF-SAMP-MAP
random 1 out-of 20000
!

Define the sampling rate in a sampler-map.

interface GigabitEthernet0/0/0/3
flow datalinkframesection monitor-map SF-MON-MAP sampler SF-SAMP-MAP ingress

Enable sFlow on each interface for complete visibilty into network traffic.

The diagram shows the general architecture of an sFlow monitoring deployment. All the switches stream sFlow telemetry to a central sFlow analyzer for network Continue reading

Explicit Null in Segment Routing

MPLS is such a user-friendly technology it needs a special label that does nothing.

Why explicit null

Normally, the penultimate router in the LSP removes (pops) the top transport label, so that the egress LSR will deal either with the …

Worst Topics To Discuss At A Dinner Party

The holiday season is near. This means you will have to attend dinner parties. And, of course, conversations are the best way to have fun at most events.

When you interact with people at a dinner party, you can talk about various things. For example, you may want to discuss your hobbies, interests, and much more. 

However, there are some topics that you should avoid. Here are the worst topics to discuss at a dinner party.

  1. Controversial Jokes

During dinner parties, you are not banned from making jokes. However, you should avoid controversial topics at all costs. Humor is harmless and good only if it’s not very sarcastic.

Besides that, you may decide to joke about another person that is not at the event. Well, we suggest you do not. That is because the individual you’re talking to may know that person. Additionally, it is not good etiquette to talk behind someone’s back.

  1. Encouraging Someone To Eat Or Drink

Yes, we understand that at a dinner party eating is mainly the point. But of course, you should never tell someone to eat more. This is, of course, unless you’re the host. 

A person may have eaten less as Continue reading

How the Internet Really Works Part 2

I’m a little late in posting this, but I thought I’d put it out here anyway. Tomorrow I’m teaching through a three-hour webinar, How the Internet Really Works part 2. From the session description—

This training will provide short reviews of many of these systems and a deeper look at the many tools network engineers can use to discover the information they need to navigate through the DNS and routing systems on the global Internet. This training will be arranged as a set of case studies posing a problem, and then working through tools available to gather the information needed to understand the problem.

You can register here.

Nvidia acquires Bright Computing

Remember when Nvidia was a gaming-card vendor? That doesn’t seem all that long ago but now it’s a full-blown enterprise high-performance computing and AI company that happens to sell videogame cards - if you can actually find them.Its latest move is the acquisition of Bright Computing, a maker of Bright Cluster Manager software that controls the configuration of clustered HPC systems, including Nvidia’s own DGX servers and HGX systems made by OEMs and ODMs, plus clusters from other manufacturers. The clusters of servers are linked by high-speed networks into a single unit.[Get regularly scheduled insights by signing up for Network World newsletters.] If the deal goes through, Bright Cluster Manager will become a part of Nvidia’s Enterprise Products Group. Nvidia has no intention of keeping Bright Cluster Manager for itself, and by being a part of the Nvidia channel, it gives Bright an opportunity to expand and grow its market.To read this article in full, please click here

Nvidia acquires Bright Computing

Remember when Nvidia was a gaming-card vendor? That doesn’t seem all that long ago but now it’s a full-blown enterprise high-performance computing and AI company that happens to sell videogame cards - if you can actually find them.Its latest move is the acquisition of Bright Computing, a maker of Bright Cluster Manager software that controls the configuration of clustered HPC systems, including Nvidia’s own DGX servers and HGX systems made by OEMs and ODMs, plus clusters from other manufacturers. The clusters of servers are linked by high-speed networks into a single unit.[Get regularly scheduled insights by signing up for Network World newsletters.] If the deal goes through, Bright Cluster Manager will become a part of Nvidia’s Enterprise Products Group. Nvidia has no intention of keeping Bright Cluster Manager for itself, and by being a part of the Nvidia channel, it gives Bright an opportunity to expand and grow its market.To read this article in full, please click here

Full speed ahead for contested 5G, W-Fi spectrum

Recent wrangling over 5G and Wi-Fi wireless spectrum indiates the breakneck pace of new bandwidths being opoened up to broadband use will continue.The underlying issues are whether newly alloted 5G bandwidth will interfere with airplane safety and whether new unlicensed spectrum will interfere with the backhaul of communications from cell towers.[Get regularly scheduled insights by signing up for Network World newsletters.] Airlines vs. telecoms The FAA’s well-publicized worries over 5G deployments in the recently auctioned C-band frequencies center on the potential of those 5G services to interfere with radio altimeter equipment in older aircraft. A radio altimeter is an avionics device that measures the distance between the bottom of an airplane and the ground directly, using radio waves, rather than measuring the surrounding air density like barometric altimeters do. It’s a key technology for bad-weather and low-visibility landings, and the possibility of any interference with those systems is worrisome from a safety perspective.To read this article in full, please click here

IoT in 2022: IoT turns into a service

The Internet of Things has been a hyped technology for years, but the pandemic and its associated tidal wave of remote work pushed its actual use in the enterprise into overdrive. What’s more, IoT is maturing as vendors begin to sell fully functioning applications, not just the components needed for businesses to build their own.The pandemic has already driven sharp growth in the types of technologies for which the IoT is already well-known including predictive maintenance in industry and automation at ports and other transportation facilities. In those areas IoT limits the amount of time workers spend on-site because remotely monitored systems don’t need to be maintained in-person nearly as often as they might otherwise. Some functions, including certain types of inspection and servicing, can be handled fully remotely, further reducing the amount of time workers have to spend on-site and in close proximity to one another.To read this article in full, please click here

Want To Create Content? Consider The Packet Pushers’ Community Blog And Newsletter

If you’ve got “Create Content” as a 2022 goal but aren’t sure how to start, consider the Packet Pushers’ Community blog or our Human Infrastructure newsletter. We welcome articles from folks in networking and IT who have ideas to share or the inclination to write, but don’t have the interest in setting up their own […]

The post Want To Create Content? Consider The Packet Pushers’ Community Blog And Newsletter appeared first on Packet Pushers.

6 East-West Security Myths Busted

With the world at our fingertips via a simple Google search, it can sometimes be tough to figure out what’s fact and what’s fiction. Whether you’re an expert, novice, or beginner in the tech world, time should be spent putting capabilities and terms into action – rather than trying to piece them together and understand them like a Sudoku puzzle. That’s why we’re going to debunk six major East-West security myths for you – so you can get back to the good stuff. 

1. East-West security is the monitoring and inspection of traffic moving medially within the network perimeter, working to identify and block threats and enable access rights.

Busted. East-West security does all of the fancy stuff mentioned, with one very important difference: it moves laterally through the network perimeter. This is a key understanding, since East-West security operates on the premise that threat factors will eventually find a way through next-generation firewalls – which means all internal network traffic is vulnerable.

2. A traditional firewall that manages North-South traffic can handle a modern network breach by itself. 

Busted. While it’s important to have North-South security in place (filtering the traffic that is exiting and entering the network), it cannot protect the network on its own Continue reading