Archive

Category Archives for "Networking"

Live Training: How Routers Really Work

On the 27th of May, I’ll be teaching a three-hour course called How Routers Really Work? From the course description:

This training will peer into the internal components of a router, starting with an explanation of how a router switches packets. This walk through of a switching path, in turn, will be used as a foundation for explaining the components of a router, including the various tables used to build forwarding tables and the software components used to build these tables.

Sign up here.

Cisco warns of critical vulnerability in virtualized network software

Multiple vulnerabilities have been discovered in Cisco's Enterprise NFV Infrastructure Software (NFVIS). The worst of the vulnerabilities could let an attacker escape from the guest virtual machine (VM) to the host machine, Cisco disclosed. The other two problems involve letting a bad actor inject commands that execute at the root level and allowing a remote attacker to leak system data from the host to the VM.NFVIS is Linux-based infrastructure software designed to help enterprises and service providers to deploy virtualized network functions, such as a virtual router, firewall and WAN acceleration, Cisco stated.To read this article in full, please click here

Cisco warns of critical vulnerability in virtualized network software

Multiple vulnerabilities have been discovered in Cisco's Enterprise NFV Infrastructure Software (NFVIS). The worst of the vulnerabilities could let an attacker escape from the guest virtual machine (VM) to the host machine, Cisco disclosed. The other two problems involve letting a bad actor inject commands that execute at the root level and allowing a remote attacker to leak system data from the host to the VM.NFVIS is Linux-based infrastructure software designed to help enterprises and service providers to deploy virtualized network functions, such as a virtual router, firewall and WAN acceleration, Cisco stated.To read this article in full, please click here

Cisco warns of critical vulnerability in virtualized network software

Multiple vulnerabilities have been discovered in Cisco's Enterprise NFV Infrastructure Software (NFVIS). The worst of the vulnerabilities could let an attacker escape from the guest virtual machine (VM) to the host machine, Cisco disclosed. The other two problems involve letting a bad actor inject commands that execute at the root level and allowing a remote attacker to leak system data from the host to the VM.NFVIS is Linux-based infrastructure software designed to help enterprises and service providers to deploy virtualized network functions, such as a virtual router, firewall and WAN acceleration, Cisco stated.To read this article in full, please click here

Hedge 128: Network Engineering at College

Have you ever thought about getting a college degree in computer networking? What are the tradeoffs between this and getting a certification? What is the state of network engineering at colleges—what do current students in network engineering programs think about their programs, and what they wish was there that isn’t? Rick Graziani joins Tom Ammon and Russ White in a broad ranging discussion on network engineering and college. Rick teaches network engineering full time in the Valley.

download

Whoop Dee Doo for my SuzieQ! » The Gratuitous Arp

Blog post on using SuzieQ for change validation by collecting state information prior to change. Lots of detail on installation and coding so you can do this yourself.  The PRE snapshot was just that, a snapshot of state at a point in time before we started the work. If a device was not on the […]

Dell offers data, app recovery support for multicloud assets

Dell is offering an expanded ecosystem of multicloud data management tools for its customers with a focus on data recovery services, adding recovery vault support for on-premises as well as public cloud assets."Our customers want help reducing complexity and are seeking solutions that use a common approach to managing data wherever it lives — from public clouds, to the data center, to the edge," said Chuck Whitten, co-chief operating officer, Dell Technologies, in a statement. "We are building a portfolio of software and services that simplifies on-premises and multicloud environments and offers." To read this article in full, please click here

Dell offers data, app recovery support for multicloud assets

Dell is offering an expanded ecosystem of multicloud data management tools for its customers with a focus on data recovery services, adding recovery vault support for on-premises as well as public cloud assets."Our customers want help reducing complexity and are seeking solutions that use a common approach to managing data wherever it lives — from public clouds, to the data center, to the edge," said Chuck Whitten, co-chief operating officer, Dell Technologies, in a statement. "We are building a portfolio of software and services that simplifies on-premises and multicloud environments and offers." To read this article in full, please click here

Dell offers data, app recovery support for multicloud assets

Dell is offering an expanded ecosystem of multicloud data management tools for its customers with a focus on data recovery services, adding recovery vault support for on-premises as well as public cloud assets."Our customers want help reducing complexity and are seeking solutions that use a common approach to managing data wherever it lives — from public clouds, to the data center, to the edge," said Chuck Whitten, co-chief operating officer, Dell Technologies, in a statement. "We are building a portfolio of software and services that simplifies on-premises and multicloud environments and offers." To read this article in full, please click here

How to deal with network-operations brain drain

Even before the tight labor market that emerged in the later stages of the pandemic, enterprise network operations teams were struggling to hire personnel, especially people with advanced technical skills. It’s safe to say the pandemic has only exacerbated the situation.Over the last six years, Enterprise Management Associates (EMA) has observed a significant decline in the effectiveness of network operations teams. EMA’s ongoing, biennial Network Management Megatrends research asks NetOps professionals to assess the success of their teams every two years. In 2016, 49% were fully successful. In 2022, only 27% reported total success. EMA believes that the current IT job market is partly to blame.To read this article in full, please click here

Arkansas engineer wins round 3 of Project Jengo, and Cloudflare continues to win at the Patent Office

Arkansas engineer wins round 3 of Project Jengo, and Cloudflare continues to win at the Patent Office
Arkansas engineer wins round 3 of Project Jengo, and Cloudflare continues to win at the Patent Office

We are excited to announce another Project Jengo winner, and provide you with an important update on our fight against Sable Networks.

As a reminder, Project Jengo is Cloudflare’s efforts to flip the incentive structure that has encouraged the growth of patent trolls that seek to leverage overbroad and unpracticed patents to extract settlements from operating entities. We do this by refusing to settle patent cases brought against us by trolls, and instead, use a crowdsourced bounty to identify prior art that undermines the value of the troll’s patents, and not just the ones asserted against Cloudflare. This is the second iteration of Project Jengo, which is focused on a patent troll called Sable.

Even though the case against Sable has been active for over a year now, and we’ve already achieved some great results, we haven’t let up the pressure. We’re now also giving out Cloudflare T-shirts to new Project Jengo participants – all you need to do is submit prior art related to any of the Sable patents this year and the first 100 participants with a U.S. mailing address will receive a Cloudflare t-shirt.

$5,000 to Project Jengo’s round three winner!

We have already awarded $30,000 Continue reading

Practical Python For Networking: 8.0 – Conclusion – Video

The final episode in this course reviews everything we covered. Thanks for watching! Course files are in a GitHub repository: https://github.com/ericchou1/pp_practical_lessons_1_route_alerts Eric Chou is a network engineer with 20 years of experience, including managing networks at Amazon AWS and Microsoft Azure. He’s the founder of Network Automation Nerds and has written the books Mastering Python […]

The post Practical Python For Networking: 8.0 – Conclusion – Video appeared first on Packet Pushers.

4 networking best practices learned from the Atlassian network outage

Last month, software tools vendor Atlassian suffered a major network outage that lasted two weeks and affected more than 400 of their over 200,000 customers. The outage took down several of their products, including Jira, Confluence, Atlassian Access, Opsgenie, and Statuspage. While only a few customers were affected for the full two weeks, the outage was significant in terms of the depth of problems uncovered by the company’s engineers and the lengths they had to go to find and fix the problems.The outage was the result of a series of unfortunate internal errors by Atlassian’s own staff, and not the result of a cyberattack or malware. In the end, no customer lost more than a few minutes’ worth of data transactions, and the vast majority of customers didn’t see any downtime whatsoever.To read this article in full, please click here

4 networking best practices learned from the Atlassian network outage

Last month, software tools vendor Atlassian suffered a major network outage that lasted two weeks and affected more than 400 of their over 200,000 customers. The outage took down several of their products, including Jira, Confluence, Atlassian Access, Opsgenie, and Statuspage. While only a few customers were affected for the full two weeks, the outage was significant in terms of the depth of problems uncovered by the company’s engineers and the lengths they had to go to find and fix the problems.The outage was the result of a series of unfortunate internal errors by Atlassian’s own staff, and not the result of a cyberattack or malware. In the end, no customer lost more than a few minutes’ worth of data transactions, and the vast majority of customers didn’t see any downtime whatsoever.To read this article in full, please click here

Configure Hardware Labs with netsim-tools

netsim-tools started as a simple tool to create virtual lab topologies (I hated creating Vagrantfiles describing complex topologies), but when it morphed into an ever-growing “configure all the boring stuff in your lab from a high-level description” thingie, it gave creative networking engineers an interesting idea: could we use this tool to do all the stuff we always hated doing in our physical labs?

My answer was always “of course, please feel free to submit a PR”, and Stefano Sasso did just that: he implemented external orchestration provider that allows you to use netsim-tools to configure IPv4, IPv6, VLANs, VRFs, LLDP, BFD, OSPFv2, OSPFv3, EIGRP, IS-IS, BGP, MPLS, BGP-LU, L3VPN (VPNv4 + VPNv6), SR-MPLS, or SRv6 on supported hardware devices.

Configure Hardware Labs with netlab

netlab started as a simple tool to create virtual lab topologies (I hated creating Vagrantfiles describing complex topologies), but when it morphed into an ever-growing “configure all the boring stuff in your lab from a high-level description” thingie, it gave creative networking engineers an interesting idea: could we use this tool to do all the stuff we always hated doing in our physical labs?

My answer was always “of course, please feel free to submit a PR”, and Stefano Sasso did just that: he implemented external orchestration provider that allows you to use netlab to configure IPv4, IPv6, VLANs, VRFs, VXLAN, LLDP, BFD, OSPFv2, OSPFv3, EIGRP, IS-IS, BGP, MPLS, BGP-LU, L3VPN (VPNv4 + VPNv6), EVPN, SR-MPLS, or SRv6 on supported hardware devices.

Licenses for 5G service provider auction winners approved by FCC

The winners of a critical FCC auction for midband spectrum that ended last November have received their official grants of license to use the airwaves for which they spent a total of $22.4 billion, the FCC announced Wednesday.A total of 4,041 licenses were issued to 23 different bidders, according to the commission. Licensees hoping to use the spectrum for 5G rollouts still have to reimburse incumbent non-federal users of the band, which had been in use for radiolocation purposes, and the FCC said that further details about those costs would be laid out in a subsequent filing.Auction 110 saw the government sell off 100MHz of spectrum in the midband — around the 3.45GHz range — divided into 10 10MHz blocks for each Partial Economic Area or PEA that the FCC adopted in 2014. (There are 416 PEAs covering the US, meaning that 119 specific licenses were not sold in the auction.)To read this article in full, please click here

5G mid-band spectrum winners receive their FCC licenses

The winners of a critical FCC auction for midband spectrum that ended last November have received their official grants of license to use the airwaves for which they spent a total of $22.4 billion, the FCC announced Wednesday.A total of 4,041 licenses were issued to 23 different bidders, according to the commission. Licensees hoping to use the spectrum for 5G rollouts still have to reimburse incumbent non-federal users of the band, which had been in use for radiolocation purposes, and the FCC said that further details about those costs would be laid out in a subsequent filing.Auction 110 saw the government sell off 100MHz of spectrum in the midband — around the 3.45GHz range — divided into 10 10MHz blocks for each Partial Economic Area or PEA that the FCC adopted in 2014. (There are 416 PEAs covering the US, meaning that 119 specific licenses were not sold in the auction.)To read this article in full, please click here

Tracking shifts in Internet connectivity in Kherson, Ukraine

Tracking shifts in Internet connectivity in Kherson, Ukraine

The Internet is not only a human right according to the United Nations, and a way to get information, but it has also become an important element in geopolitical conflicts, like the war going on in Ukraine. We have previously written about Ukrainians moving westward to escape the war and Internet outages in the country, but also about the importance of the open Internet in Russia.

Over this past week, we observed an outage in the occupied city of Kherson, south Ukraine, coupled with an apparent shift in who controls the Internet within the region. First, let’s give some context and show what we saw.

The Russian-occupied Kherson (a city of 280,000 people) experienced an Internet outage on Saturday, April 30, 2022, that began just after 16:00 UTC. The outage lasted until Wednesday, May 4, with traffic starting to return around 04:30 UTC traffic.

Tracking shifts in Internet connectivity in Kherson, Ukraine

In the chart below, we can see that there was a 43% decrease in traffic from Kherson from February 23 to 24, after the war started. However, this weekend’s outage is the most significant disruption to Internet traffic in Kherson since the start of the war.

Tracking shifts in Internet connectivity in Kherson, Ukraine

According to Ukraine’s vice Prime-Minister, Mykhailo Fedorov, and Continue reading

Tech Bytes: Flexible Cloud Migration Using VMware vRealize Network Insight Universal (Sponsored)

Welcome to the Tech Bytes podcast. VMware is our sponsor, and we’re discussing vRealize Network Insight Universal, the SaaS version of vRealize Network Insight. We look at how it can help with your cloud migration project.

The post Tech Bytes: Flexible Cloud Migration Using VMware vRealize Network Insight Universal (Sponsored) appeared first on Packet Pushers.