Archive

Category Archives for "Networking"

Video: Practical Aspects of IPv6 Security

Christopher Werny has tons of hands-on experience with IPv6 security (or lack thereof), and described some of his findings in the Practical Aspects of IPv6 Security part of IPv6 security webinar, including:

  • Impact of dual-stack networks
  • Security implications of IPv6 address planning
  • Isolation on routing layer and strict filtering
  • IPv6-related requirements for Internet- or MPLS uplinks
You need Free ipSpace.net Subscription to watch the video.

Video: Practical Aspects of IPv6 Security

Christopher Werny has tons of hands-on experience with IPv6 security (or lack thereof), and described some of his findings in the Practical Aspects of IPv6 Security part of IPv6 security webinar, including:

  • Impact of dual-stack networks
  • Security implications of IPv6 address planning
  • Isolation on routing layer and strict filtering
  • IPv6-related requirements for Internet- or MPLS uplinks
You need Free ipSpace.net Subscription to watch the video.

Live Training: How Routers Really Work

On the 27th of May, I’ll be teaching a three-hour course called How Routers Really Work? From the course description:

This training will peer into the internal components of a router, starting with an explanation of how a router switches packets. This walk through of a switching path, in turn, will be used as a foundation for explaining the components of a router, including the various tables used to build forwarding tables and the software components used to build these tables.

Sign up here.

Cisco warns of critical vulnerability in virtualized network software

Multiple vulnerabilities have been discovered in Cisco's Enterprise NFV Infrastructure Software (NFVIS). The worst of the vulnerabilities could let an attacker escape from the guest virtual machine (VM) to the host machine, Cisco disclosed. The other two problems involve letting a bad actor inject commands that execute at the root level and allowing a remote attacker to leak system data from the host to the VM.NFVIS is Linux-based infrastructure software designed to help enterprises and service providers to deploy virtualized network functions, such as a virtual router, firewall and WAN acceleration, Cisco stated.To read this article in full, please click here

Cisco warns of critical vulnerability in virtualized network software

Multiple vulnerabilities have been discovered in Cisco's Enterprise NFV Infrastructure Software (NFVIS). The worst of the vulnerabilities could let an attacker escape from the guest virtual machine (VM) to the host machine, Cisco disclosed. The other two problems involve letting a bad actor inject commands that execute at the root level and allowing a remote attacker to leak system data from the host to the VM.NFVIS is Linux-based infrastructure software designed to help enterprises and service providers to deploy virtualized network functions, such as a virtual router, firewall and WAN acceleration, Cisco stated.To read this article in full, please click here

Cisco warns of critical vulnerability in virtualized network software

Multiple vulnerabilities have been discovered in Cisco's Enterprise NFV Infrastructure Software (NFVIS). The worst of the vulnerabilities could let an attacker escape from the guest virtual machine (VM) to the host machine, Cisco disclosed. The other two problems involve letting a bad actor inject commands that execute at the root level and allowing a remote attacker to leak system data from the host to the VM.NFVIS is Linux-based infrastructure software designed to help enterprises and service providers to deploy virtualized network functions, such as a virtual router, firewall and WAN acceleration, Cisco stated.To read this article in full, please click here

Hedge 128: Network Engineering at College

Have you ever thought about getting a college degree in computer networking? What are the tradeoffs between this and getting a certification? What is the state of network engineering at colleges—what do current students in network engineering programs think about their programs, and what they wish was there that isn’t? Rick Graziani joins Tom Ammon and Russ White in a broad ranging discussion on network engineering and college. Rick teaches network engineering full time in the Valley.

download

Whoop Dee Doo for my SuzieQ! » The Gratuitous Arp

Blog post on using SuzieQ for change validation by collecting state information prior to change. Lots of detail on installation and coding so you can do this yourself.  The PRE snapshot was just that, a snapshot of state at a point in time before we started the work. If a device was not on the […]

Dell offers data, app recovery support for multicloud assets

Dell is offering an expanded ecosystem of multicloud data management tools for its customers with a focus on data recovery services, adding recovery vault support for on-premises as well as public cloud assets."Our customers want help reducing complexity and are seeking solutions that use a common approach to managing data wherever it lives — from public clouds, to the data center, to the edge," said Chuck Whitten, co-chief operating officer, Dell Technologies, in a statement. "We are building a portfolio of software and services that simplifies on-premises and multicloud environments and offers." To read this article in full, please click here

Dell offers data, app recovery support for multicloud assets

Dell is offering an expanded ecosystem of multicloud data management tools for its customers with a focus on data recovery services, adding recovery vault support for on-premises as well as public cloud assets."Our customers want help reducing complexity and are seeking solutions that use a common approach to managing data wherever it lives — from public clouds, to the data center, to the edge," said Chuck Whitten, co-chief operating officer, Dell Technologies, in a statement. "We are building a portfolio of software and services that simplifies on-premises and multicloud environments and offers." To read this article in full, please click here

Dell offers data, app recovery support for multicloud assets

Dell is offering an expanded ecosystem of multicloud data management tools for its customers with a focus on data recovery services, adding recovery vault support for on-premises as well as public cloud assets."Our customers want help reducing complexity and are seeking solutions that use a common approach to managing data wherever it lives — from public clouds, to the data center, to the edge," said Chuck Whitten, co-chief operating officer, Dell Technologies, in a statement. "We are building a portfolio of software and services that simplifies on-premises and multicloud environments and offers." To read this article in full, please click here

How to deal with network-operations brain drain

Even before the tight labor market that emerged in the later stages of the pandemic, enterprise network operations teams were struggling to hire personnel, especially people with advanced technical skills. It’s safe to say the pandemic has only exacerbated the situation.Over the last six years, Enterprise Management Associates (EMA) has observed a significant decline in the effectiveness of network operations teams. EMA’s ongoing, biennial Network Management Megatrends research asks NetOps professionals to assess the success of their teams every two years. In 2016, 49% were fully successful. In 2022, only 27% reported total success. EMA believes that the current IT job market is partly to blame.To read this article in full, please click here

Arkansas engineer wins round 3 of Project Jengo, and Cloudflare continues to win at the Patent Office

Arkansas engineer wins round 3 of Project Jengo, and Cloudflare continues to win at the Patent Office
Arkansas engineer wins round 3 of Project Jengo, and Cloudflare continues to win at the Patent Office

We are excited to announce another Project Jengo winner, and provide you with an important update on our fight against Sable Networks.

As a reminder, Project Jengo is Cloudflare’s efforts to flip the incentive structure that has encouraged the growth of patent trolls that seek to leverage overbroad and unpracticed patents to extract settlements from operating entities. We do this by refusing to settle patent cases brought against us by trolls, and instead, use a crowdsourced bounty to identify prior art that undermines the value of the troll’s patents, and not just the ones asserted against Cloudflare. This is the second iteration of Project Jengo, which is focused on a patent troll called Sable.

Even though the case against Sable has been active for over a year now, and we’ve already achieved some great results, we haven’t let up the pressure. We’re now also giving out Cloudflare T-shirts to new Project Jengo participants – all you need to do is submit prior art related to any of the Sable patents this year and the first 100 participants with a U.S. mailing address will receive a Cloudflare t-shirt.

$5,000 to Project Jengo’s round three winner!

We have already awarded $30,000 Continue reading

Practical Python For Networking: 8.0 – Conclusion – Video

The final episode in this course reviews everything we covered. Thanks for watching! Course files are in a GitHub repository: https://github.com/ericchou1/pp_practical_lessons_1_route_alerts Eric Chou is a network engineer with 20 years of experience, including managing networks at Amazon AWS and Microsoft Azure. He’s the founder of Network Automation Nerds and has written the books Mastering Python […]

The post Practical Python For Networking: 8.0 – Conclusion – Video appeared first on Packet Pushers.

4 networking best practices learned from the Atlassian network outage

Last month, software tools vendor Atlassian suffered a major network outage that lasted two weeks and affected more than 400 of their over 200,000 customers. The outage took down several of their products, including Jira, Confluence, Atlassian Access, Opsgenie, and Statuspage. While only a few customers were affected for the full two weeks, the outage was significant in terms of the depth of problems uncovered by the company’s engineers and the lengths they had to go to find and fix the problems.The outage was the result of a series of unfortunate internal errors by Atlassian’s own staff, and not the result of a cyberattack or malware. In the end, no customer lost more than a few minutes’ worth of data transactions, and the vast majority of customers didn’t see any downtime whatsoever.To read this article in full, please click here