Archive

Category Archives for "Networking"

Podcast: Ironing Out the BGP Ruffles

After the (in)famous October 2021 Facebook outage, Corey Quinn invited me for another Screaming in the Cloud chat, this time focusing on what went wrong (hint: it wasn’t DNS or BGP).

We also touched on VAX/VMS history, how early CCIE lab exams worked, how BGP started, why there are only 13 root name servers (not really), and the transition from networking being pure magic to becoming a commodity. Hope you’ll enjoy our chat as much as I did.

Real-Time Observability with InfluxDB for BAI Communications

Jason Myers Jason is a technical marketing writer at InfluxData. In public transportation, there’s little room for error when it comes to passenger safety. At the same time, rail operators don’t have bottomless financial resources to oversee their rail system. The team at BAI Communications in Toronto faced these two, diametrically opposed realities. Fortunately, by using their existing network infrastructure, a time-series platform and a sizable helping of ingenuity, the BAI team was able to close that gap between their technical needs and cost. Here’s how they did it. Background BAI Communications is a global company and a leader in providing communications infrastructure, pioneering the future of advanced connectivity and delivering the ubiquitous coverage that can transform lives, power business ambitions and shape the future of our cities. The company focuses on three key verticals: broadcast, neutral host and 5G, and transit. It seeks to enrich lives by connecting communities and advancing economies. BAI manages and operates the networking infrastructure for T-Connect, the wireless network used by the Toronto Transit Commission (TTC). T-Connect averages over 200,000 daily sessions, and over 5 million every month from approximately 100,000 unique devices every weekday. The T-Connect network consists of more than 1,000 access Continue reading

Cloudflare announces partnerships with leading cyber insurers and incident response providers

Cloudflare announces partnerships with leading cyber insurers and incident response providers
Cloudflare announces partnerships with leading cyber insurers and incident response providers

We are excited to announce our cyber risk partnership program with leading cyber insurance carriers and incident response providers to help our customers reduce their cyber risk. Cloudflare customers can qualify for discounts on premiums or enhanced coverage with our partners. Additionally, our incident response partners are partnering with us for mitigating under attack scenarios in an accelerated manner.  

What is a business’ cyber risk?

Let's start with security and insurance —  e.g., being a homeowner is an adventure and a responsibility. You personalize your home, maintain it, and make it secure against the slightest possibility of intrusion — fence it up, lock the doors, install a state of the art security system, and so on. These measures definitely reduce the probability of an intrusion, but you still buy insurance. Why? To cover for the rare possibility that something might go wrong — human errors, like leaving the garage door open, or unlikely events, like a fire, hurricane etc. And when something does go wrong, you call the experts (aka police) to investigate and respond to the situation.

Running a business that has any sort of online presence is evolving along the same lines. Getting the right Continue reading

Introducing Cloudflare Security Center

Introducing Cloudflare Security Center
Introducing Cloudflare Security Center

Today we are launching Cloudflare Security Center, which brings together our suite of security products, our security expertise, and unique Internet intelligence as a unified security intelligence solution.

Cloudflare was launched in 2009 to help build a better Internet and make Internet performance and security accessible to everyone. Over the last twelve years, we’ve disrupted the security industry and launched a broad range of products to address our customer’s pain points across Application Security, Network Security, and Enterprise Security.

While there are a plethora of solutions on the market to solve specific pain points, we’ve architected Cloudflare One as a unified platform to holistically address our customers’ most pressing security challenges.  As part of this vision, we are extremely excited to launch the public beta of Security Center. Our goal is to help customers understand their attack surface and quickly take action to reduce their risk of an incident.

Starting today, all Cloudflare users can use Security Center (available in your Cloudflare dashboard) to map their attack surface, review potential security risks and threats to their organizations, and mitigate these risks with a few clicks.

The changing corporate attack surface

A year ago, we announced Cloudflare One to address Continue reading

Shadow IT: make it easy for users to follow the rules

Shadow IT: make it easy for users to follow the rules
Shadow IT: make it easy for users to follow the rules

SaaS application usage has exploded over the last decade. According to Gartner, global spending on SaaS in 2021 was $145bn and is forecasted to reach $171bn in 2022. A key benefit of SaaS applications is that they are easy to get started with and either free or low cost. This is great for both users and leaders — it’s easy to try out new tools with no commitment or procurement process. But this convenience also presents a challenge to CIOs and security teams. Many SaaS applications are great for a specific task, but lack required security controls or visibility. It can be easy for employees to start using SaaS applications for their everyday job without IT teams noticing — these “unapproved” applications are popularly referred to as Shadow IT.

CIOs often have no visibility over what applications their SaaS employees are using. Even when they do, they may not have an easy way to block users from using unapproved applications, or on the contrary, to provide easy access to approved ones.

Visibility into application usage

In an office, it was easier for CIOs and their teams to monitor application usage in their organization. Mechanisms existed to inspect outbound DNS Continue reading

How to customize your layer 3/4 DDoS protection settings

How to customize your layer 3/4 DDoS protection settings
How to customize your layer 3/4 DDoS protection settings

After initially providing our customers control over the HTTP-layer DDoS protection settings earlier this year, we’re now excited to extend the control our customers have to the packet layer. Using these new controls, Cloudflare Enterprise customers using the Magic Transit and Spectrum services can now tune and tweak their L3/4 DDoS protection settings directly from the Cloudflare dashboard or via the Cloudflare API.

The new functionality provides customers control over two main DDoS rulesets:

  1. Network-layer DDoS Protection ruleset — This ruleset includes rules to detect and mitigate DDoS attacks on layer 3/4 of the OSI model such as UDP floods, SYN-ACK reflection attacks, SYN Floods, and DNS floods. This ruleset is available for Spectrum and Magic Transit customers on the Enterprise plan.
  2. Advanced TCP Protection ruleset — This ruleset includes rules to detect and mitigate sophisticated out-of-state TCP attacks such as spoofed ACK Floods, Randomized SYN Floods, and distributed SYN-ACK Reflection attacks. This ruleset is available for Magic Transit customers only.

To learn more, review our DDoS Managed Ruleset developer documentation. We’ve put together a few guides that we hope will be helpful for you:

  1. Onboarding & getting started with Cloudflare DDoS protection
  2. Handling false negatives
  3. Handling false positives
  4. Continue reading

Magic Firewall gets Smarter

Magic Firewall gets Smarter
Magic Firewall gets Smarter

Today, we're very excited to announce a set of updates to Magic Firewall, adding security and visibility features that are key in modern cloud firewalls. To improve security, we’re adding threat intel integration and geo-blocking. For visibility, we’re adding packet captures at the edge, a way to see packets arrive at the edge in near real-time.

Magic Firewall is our network-level firewall which is delivered through Cloudflare to secure your enterprise. Magic Firewall covers your remote users, branch offices, data centers and cloud infrastructure. Best of all, it’s deeply integrated with Cloudflare, giving you a one-stop overview of everything that’s happening on your network.

A brief history of firewalls

We talked a lot about firewalls on Monday, including how our firewall-as-a-service solution is very different from traditional firewalls and helps security teams that want sophisticated inspections at the Application Layer. When we talk about the Application Layer, we’re referring to OSI Layer 7. This means we’re applying security features using semantics of the protocol. The most common example is HTTP, the protocol you’re using to visit this website. We have Gateway and our WAF to protect inbound and outbound HTTP requests, but what about Layer 3 and Layer 4 Continue reading

Response: Hardware Differences between Routers and Switches

Dmytro Shypovalov sent me his views on the hardware differences between routers and switches. Enjoy!


So, a long time ago routers were L3 with CPU forwarding and switches were L2 with ASIC. Then they had invented TCAM and L3 switches, and since then ASICs have evolved to support more features (QoS, encapsulations etc) and store more routes, while CPU-based architectures have evolved to specialised NPU and parallel processing (e.g. Cisco QFX) to handle more traffic, while supporting all features of CPU forwarding.

Gartner: Diversity, equity and inclusion is key to better I&O teams

“Why should an I&O leader care about diversity and inclusion? Why do you need to be involved in this at all? What good will it do you?"The answer to her questions, Debra Logan, a vice president and Gartner fellow told a virtual conference this week, is about building better infrastructure and operations (I&O) teams.[Get regularly scheduled insights by signing up for Network World newsletters.] "I’m not asking you to have faith," she said. "I’m not asking you to do it for non-business reasons. I’m not asking you to do it because someone else told you, or because you feel it’s the right thing to do. I want you to do it because it will solve the problems that keep you up at night.”To read this article in full, please click here

IBM offers one-stop-shop for mainframe hybrid cloud initiatives

While cloud companies such as AWS are offering enterprise customers new ways to get applications off the mainframe and into the cloud, IBM moved this week to keep them on the Big Iron.IBM rolled out a portal  it calls the IBM Z and Cloud Modernization Center which offers an assortment of tools, training, resources and ecosystem partners to help IBM Z clients accelerate the modernization of mainframe applications, data and processes to work with hybrid-cloud architecturesHow to build a hybrid-cloud strategy “The rise of hyperscalers has led many organizations to consider an application migration approach to public cloud alone, but in many cases it can be a one-way street and lock-in to one public cloud, which may have implications on cost, governance and security," wrote Ross Mauri General Manager for IBM Z in a blog about the announcement. “The IBM Z and Cloud Modernization Center helps clients leverage existing investments, rather than committing to a costly one-size-fits-all migration strategy.”To read this article in full, please click here

AMD: The Phoenix of tech

Five years ago, AMD was hanging on by a thread. Sales had dropped below $1 billion per quarter. Its client and server CPUs were no longer competitive with Intel’s. Its Opteron server-CPU market share was less than one percent. Its GPU products were a little better but Nvidia had the mindshare.Then two things happened: Dr. Lisa Su ascended to the CEO position, and it developed the Zen microarchitecture, a clean-sheet, from-scratch redesign of the x86 architecture.[Get regularly scheduled insights by signing up for Network World newsletters.] The result? Epyc server processors now account for somewhere between 10% market share, as per Mercury Research, and 16%, as per Omdia. The AMD Ryzen desktop processor is the CPU of choice for gamers. And in Q3 of 2021, AMD reported sales of $4 billion, more in one quarter than AMD did in all of fiscal 2015 ($3.9 billion).To read this article in full, please click here

AMD: The phoenix of tech

Five years ago, AMD was hanging on by a thread. Sales had dropped below $1 billion per quarter. Its client and server CPUs were no longer competitive with Intel’s. Its Opteron server-CPU market share was less than one percent. Its GPU products were a little better but Nvidia had the mindshare.Then two things happened: Dr. Lisa Su ascended to the CEO position, and it developed the Zen microarchitecture, a clean-sheet, from-scratch redesign of the x86 architecture.[Get regularly scheduled insights by signing up for Network World newsletters.] The result? Epyc server processors now account for somewhere between 10% market share, as per Mercury Research, and 16%, as per Omdia. The AMD Ryzen desktop processor is the CPU of choice for gamers. And in Q3 of 2021, AMD reported sales of $4 billion, more in one quarter than AMD did in all of fiscal 2015 ($3.9 billion).To read this article in full, please click here

AMD: The Phoenix of tech

Five years ago, AMD was hanging on by a thread. Sales had dropped below $1 billion per quarter. Its client and server CPUs were no longer competitive with Intel’s. Its Opteron server-CPU market share was less than one percent. Its GPU products were a little better but Nvidia had the mindshare.Then two things happened: Dr. Lisa Su ascended to the CEO position, and it developed the Zen microarchitecture, a clean-sheet, from-scratch redesign of the x86 architecture.[Get regularly scheduled insights by signing up for Network World newsletters.] The result? Epyc server processors now account for somewhere between 10% market share, as per Mercury Research, and 16%, as per Omdia. The AMD Ryzen desktop processor is the CPU of choice for gamers. And in Q3 of 2021, AMD reported sales of $4 billion, more in one quarter than AMD did in all of fiscal 2015 ($3.9 billion).To read this article in full, please click here

AMD: The phoenix of tech

Five years ago, AMD was hanging on by a thread. Sales had dropped below $1 billion per quarter. Its client and server CPUs were no longer competitive with Intel’s. Its Opteron server-CPU market share was less than one percent. Its GPU products were a little better but Nvidia had the mindshare.Then two things happened: Dr. Lisa Su ascended to the CEO position, and it developed the Zen microarchitecture, a clean-sheet, from-scratch redesign of the x86 architecture.[Get regularly scheduled insights by signing up for Network World newsletters.] The result? Epyc server processors now account for somewhere between 10% market share, as per Mercury Research, and 16%, as per Omdia. The AMD Ryzen desktop processor is the CPU of choice for gamers. And in Q3 of 2021, AMD reported sales of $4 billion, more in one quarter than AMD did in all of fiscal 2015 ($3.9 billion).To read this article in full, please click here

Day Two Cloud 127: Avoiding Infrastructure As Code (IaC) Pitfalls

There are a lot of good things you can do with Infrastructure as Code (IaC) for automation, repeatability, and ease of operations and development. But there are also code and infrastructure pitfalls where you can tumble into a hole, break your leg, and get eaten by spiders. OK, maybe not  that bad, but on today's episode we talk about potential IaC pitfalls and how to avoid them with guest Tim Davis.

The post Day Two Cloud 127: Avoiding Infrastructure As Code (IaC) Pitfalls appeared first on Packet Pushers.