Sponsored by VMware, Future:NET 2021 is the premier thought leadership event on networking of the year. Scheduled for March 23 in AMER and March 24 in EMEA and APJ, the event will be simulcast live around the world—showcasing authentic, in-depth discussions led by the who’s-who of networking leaders. Come prepared to hear open, honest, and sometimes lively conversations about the future direction of networking.
Future:NET has always been an invite-only, in-person event held during VMworld U.S. This year, we are taking it to the next level with a virtual format that will be broadcast live to a global audience on a new, interactive online platform. This will preserve the intimate, authentic feel of past events while allowing participants to share valuable insights with change agents around the world.
Future:NET is a different kind of industry event. While other networking conferences have been reduced to vendor showcases, Future:NET disallows product pitches in favor of open debates that foster in-depth conversation among professionals across the industry. This will not be a VMware showcase or a think tank. Future:NET is a vendor-agnostic industry event led by those who have forecasted, created, or disseminated change and who are lured by new technology and its ability to transform the world. Hear from luminaries such as Albert Greenberg from Azure, Bikash Koley from Google Cloud, Nick McKeown of Stanford University, Pere Monclus from VMware, and Vijoy Pandey from Continue reading
BGP is widely used as an IGP in the underlay of modern DC fabrics. This series argues this is not the best long-term solution to the problem of routing in fabrics because BGP is not ideal for this use case. This post will consider the potential harm we are doing to the larger Internet by pressing BGP into a role it was not originally designed to fulfill—an underlay protocol or an IGP.
My last post described the kinds of configuration required to make BGP work on a DC fabric—it turns out that the configuration of each BGP speaker on the fabric is close to unique. It is possible to automate configuring each speaker—but it would be better if we could get closer to autonomic operation.
To move BGP closer to autonomic operation in a DC fabric, there are several things we can do. First, we can allow a BGP speaker to peer with any other BGP speaker it receives an open message from—this is often called promiscuous mode. While each router in the fabric will still need to be configured with the right autonomous system, at least we won’t need to configure the correct peers on each router (including the Continue reading
On today's Network Break we discuss a slate of Juniper announcements around new integrations with its Mist platform, plus new switches. HPE acquires a SaaS company for controlling cloud and infrastructure costs, US telcos spend $81 billion on spectrum for 5G, and we dive into the latest round of financial results from SolarWinds, VMware, and Nutanix.
The post Network Break 322: Juniper Mist-ifes 128 Technology; US Telcos Spend Big For 5G Spectrum appeared first on Packet Pushers.
This article discusses how to deploy the DDoS Protect application in a Juniper Networks environment. Juniper has a long history of supporting BGP Flowspec on their routing platforms and Juniper has added support for sFlow to their entire product range, see sFlow available on Juniper MX series routers.
First, Junos doesn't provide a way to connect to the non-standard BGP port (1179) that sFlow-RT uses by default. Allowing sFlow-RT to open the standard BGP port (179) requires that the service be given additional Linux capabilities.
docker run --rm --net=host --sysctl net.ipv4.ip_unprivileged_port_start=0 \
sflow/ddos-protect -Dbgp.port=179
The above command launches the prebuilt sflow/ddos-protect Docker image. Alternatively, if sFlow-RT has been installed as a deb / rpm package, then the required permissions can be added to the service.
sudo systemctl edit sflow-rt.serviceType the above command to edit the Continue reading
On today's Tech Bytes podcast, sponsored by Aruba, we talk with Scott Shaw, Chief Technology Officer at law firm FordHarrison about his SD-WAN deployment. Shaw was able to retire legacy routers, boost performance of critical applications, and enable the law firm's work-from-anywhere strategy.
The post Tech Bytes: Law Firm Relies On Aruba EdgeConnect To Support Work-From-Anywhere (Sponsored) appeared first on Packet Pushers.
In this week's IPv6 Buzz episode, Ed, Scott, and Tom follow up on episode 44 and talk more about what it takes to build an IPv6 lab—both dual-stack and IPv6-only—as well as with physical hardware and in the cloud).
The post IPv6 Buzz 070: Building An IPv6 Lab, Revisited appeared first on Packet Pushers.
Traffic cops: The government of Cambodia has moved to establish a national Internet gateway with a single point of entry for traffic into the country, regulated by a government-appointed operator, The Diplomat reports. The Washington Post’s editorial board said the move “strikes at one of the nation’s last vestiges of democratic life.” The move also points to a larger threat to “the entire globe,” led by censorship efforts in China, the editorial board wrote. “China wishes to establish a freedom-crushing model of cyber-sovereignty by which every country sets its own rules for a Web that serves those in power, rather than the people, without any regard for civil liberties or due process of law.”
A deal on the news: Facebook had prohibited Australian users from sharing news on the social media site because of a proposal that would require it and other online services to pay news outlets, but the company has reached a deal with the government there that again allows users to post news articles, the New York Times reports. The deal allows more time for negotiations, but the Australian Senate passed the law anyway, CNet reports.
Help with the bills: The U.S. Federal Communications Continue reading
The post NFA v 21.02 is here with support for eBGP appeared first on Noction.
We are pleased to announce the release of the Noction Flow Analyzer v 21.02 today. This version comes with support for eBGP, custom
The post Announcing NFA v 21.02 with support for eBGP appeared first on Noction.
Back in 2010, Cloudflare was introduced at TechCrunch Disrupt as a security and performance solution that took the tools of the biggest service providers and made them available to anyone online. But simply replicating these tools wasn’t enough — we needed to make them ridiculously easy to use.
When we launched Cloudflare for Teams almost ten years later, the vision was very much the same — build a secure and powerful Zero Trust solution that is ridiculously easy to use. However, while we talk about what we’re building with a regular cadence, we often gloss over how we are designing Cloudflare for Teams to make it simple and easy to use.
In this blog post we’ll do just that — if that sounds like your jam, keep scrolling.
First, let's back up a bit and introduce Cloudflare for Teams.
We launched Cloudflare for Teams in January, 2020. With Teams, we wanted to alleviate the burden Cloudflare customers were feeling when trying to protect themselves and their infrastructure from threats online. We knew that continuing to rely on expensive hardware would be difficult to maintain and impractical to scale.
At its core, Teams joins two products together — Continue reading
Ping is one of the fundamental pillars of networking. It’s simple, universally supported, and is normally one of the f