Archive

Category Archives for "Networking"

Graceful Restart 101

In the Non-Stop Forwarding (NSF) article, I mentioned that the routers adjacent to the device using NSF have to play along to make the idea work. That capability is called Graceful Restart. Today we’ll explore its intricate details, be diplomatic, and leave the shortcomings and tradeoffs for the next blog post.

The Problem

Imagine an access (provider edge) router providing connectivity services to its clients and running a routing protocol with one or more upstream devices.

Graceful Restart (GR) 101

In the Non-Stop Forwarding (NSF) article, I mentioned that the routers adjacent to the device using NSF have to play along to make the idea work. That capability is called Graceful Restart. Today we’ll explore its intricate details, be diplomatic, and leave the shortcomings and tradeoffs for the next blog post.

The Problem

Imagine an access (provider edge) router providing connectivity services to its clients and running a routing protocol with one or more upstream devices.

Nornir – The Basics

If you have an understanding of Python and have been working with Ansible it is likely at some point you will get to the stage where you ask yourself ‘there has to be something better’. For network automation that better could well be Nornir.

Learn How to Implement Stronger Multi-Cloud Security at VMworld 2021

One of the major focuses at VMworld 2021 is to educate network security teams on how they can achieve the strongest security posture by enabling Zero Trust. The Zero Trust model is essential to securing your entire digital footprint and to remain secure as it grows. Leaders like the White House, CISOs, and industry analysts of all kinds, agree that the Zero Trust approach to network architecture is the best way to protect not only the existing perimeter but also the critical apps and workloads inside.  

During the Never Trust: Building Zero Trust Networks VMworld 2021 session, industry leaders will take a practical look at what it takes to adopt Zero Trust at scale, offer a blueprint to the Zero Trust Architecture model, and suggest next steps to implement Zero Trust for your organization. 

An extension of learning to build Zero Trust networks is sharing tangible solutions to get your business the strength and security it needs. VMware leaders Christopher Kruegel, VP of Security Services, and Vivek Bhandri, Senior Director of Product Marketing, share VMware’s NSX Distributed Firewall service that will strengthen your East-West security to protect any workload in any cloud. Add A Modern Firewall For Any Cloud and Any Workload [SEC2688] to your VMworld itinerary now.   

To gain visibility and control within the network via Zero Trust, means giving enterprises room to breathe.  Eliminating any hesitation when it comes to threat prevention hardens your organization’s security infrastructure Continue reading

Tech Bytes: Getting Performance Visibility Into The Last 6 Feet (Sponsored)

You’ve heard of the last mile problem. Today on the Tech Bytes podcast we’re talking problems with the last six feet. With work-from-anywhere becoming commonplace, one of the hardest challenges for IT is how to measure user experience and troubleshoot problems happening somewhere between the desktop and a home router. Our sponsor AppNeta has some ideas on how to help.

The post Tech Bytes: Getting Performance Visibility Into The Last 6 Feet (Sponsored) appeared first on Packet Pushers.

Tech Bytes: Getting Performance Visibility Into The Last 6 Feet (Sponsored)

You’ve heard of the last mile problem. Today on the Tech Bytes podcast we’re talking problems with the last six feet. With work-from-anywhere becoming commonplace, one of the hardest challenges for IT is how to measure user experience and troubleshoot problems happening somewhere between the desktop and a home router. Our sponsor AppNeta has some ideas on how to help.

Network Break 352: Nokia Announces 800G Routing Silicon; Pica8 Enticingly Prices Its Campus Controller, Switches

This week's Network Break podcast discusses Nokia's new beefed-up routing silicon, how Pica8 is pursuing campus switching with a controller/switch pricing bundle, and the latest critical security patches from Cisco. We also look at the latest ransomware attacks against US agricultural companies, a MacOS bug, and more tech news.

The post Network Break 352: Nokia Announces 800G Routing Silicon; Pica8 Enticingly Prices Its Campus Controller, Switches appeared first on Packet Pushers.

Network Break 352: Nokia Announces 800G Routing Silicon; Pica8 Enticingly Prices Its Campus Controller, Switches

This week's Network Break podcast discusses Nokia's new beefed-up routing silicon, how Pica8 is pursuing campus switching with a controller/switch pricing bundle, and the latest critical security patches from Cisco. We also look at the latest ransomware attacks against US agricultural companies, a MacOS bug, and more tech news.

Easily creating and routing email addresses with Cloudflare Email Routing

Easily creating and routing email addresses with Cloudflare Email Routing
Easily creating and routing email addresses with Cloudflare Email Routing

Over four billion people — or half of the world’s population — have at least one email address, many of whom use it as an essential tool to stay on top of their personal and professional matters. More than 300 billion emails are sent and received every day, but seeing email as just a communications tool wouldn’t do it justice. Its impact in our lives goes far beyond being a vessel for messages — its use cases also cover being a common way of validating one’s identity online, and serving as the gateway for other communication platforms.

Today, most people use their email for sensitive purposes, such as logging in to their bank account, or communicating with governmental entities. At the same time, they will use that email to sign up for a 10% off coupon they found online, which will surely spam them for months to come. Despite these two use cases being polar opposites in relation to importance and security, people take the risk, usually for the sake of conveniently managing one account.

Much in the same way, businesses want to have different email addresses for different types of inquiries, such as sales and support, but often find Continue reading

Tackling Email Spoofing and Phishing

Tackling Email Spoofing and Phishing
Tackling Email Spoofing and Phishing

Today we’re rolling out a new tool to tackle email spoofing and phishing and improve email deliverability: The new Email Security DNS Wizard can be used to create DNS records that prevent others from sending malicious emails on behalf of your domain. This new feature also warns users about insecure DNS configurations on their domain and shows recommendations on how to fix them. The feature will first be rolled out to users on the Free plan and over the next weeks be made available for Pro, Business and Enterprise customers, as well.

Tackling Email Spoofing and Phishing

Before we dive into what magic this wizard is capable of, let’s take a step back and take a look at the problem: email spoofing and phishing.

What is email spoofing and phishing?

Spoofing is the process of posing as someone else which can be used in order to gain some kind of illicit advantage. One example is domain spoofing where someone hosts a website like mycoolwebpaqe.xyz  to trick users of mycoolwebpage.xyz to provide sensitive information without knowing they landed on a false website. When looking at the address bar side by side in a browser, it’s very hard to spot the difference.

Tackling Email Spoofing and Phishing

Then, there is Continue reading

Report: The chip shortage’s next victim is data-center switching

Enterprise looking to buy data-center switches face longer lead times and lack of stock over the course of the next year or so as demand continues to substantially outpace supply, according to a report from the Dell’Oro Group.Sameh Boujelbene, leader of the analyst firm’s campus and data-center research team, said that one canary in the coal mine was Broadcom’s announcement earlier this year that 90% of its total chip output for 2021 had been spoken for as early as March. That’s the result not just of material shortages that have affected the semiconductor market as a whole, but of human behaviors that arose in response.Chip shortage will hit hardware buyers for months to years Whether they’re smaller enterprises or big hyperscalers building out capacity, IT decision makers tend to rush into pre-orders whenever headlines about shortages appear, Boujelbene said, and Dell’Oro projects that will true in 2022.To read this article in full, please click here

Report: The chip shortage’s next victim is data-center switching

Enterprise looking to buy data-center switches face longer lead times and lack of stock over the course of the next year or so as demand continues to substantially outpace supply, according to a report from the Dell’Oro Group.Sameh Boujelbene, leader of the analyst firm’s campus and data-center research team, said that one canary in the coal mine was Broadcom’s announcement earlier this year that 90% of its total chip output for 2021 had been spoken for as early as March. That’s the result not just of material shortages that have affected the semiconductor market as a whole, but of human behaviors that arose in response.Chip shortage will hit hardware buyers for months to years Whether they’re smaller enterprises or big hyperscalers building out capacity, IT decision makers tend to rush into pre-orders whenever headlines about shortages appear, Boujelbene said, and Dell’Oro projects that will true in 2022.To read this article in full, please click here

VMware gears up for a challenging future

After a big year of change in everything from its ownership and executive suite to its cloud and network offerings, VMware is girding for battle in the challenges ahead.At the company’s VMworld 2021 conference (Oct. 5-7)  many of the technologies the company provides—from multicloud connectivity and cloud management to NSX networking, security,and other digital-transformation tools—will be front-and-center in over 900 sessions.To read this article in full, please click here

State of IT Security in 2021

Patrik Schindler sent me his views on code quality and resulting security nightmares after reading the Cisco SD-WAN SQL Injection saga. Enjoy!


I think we have a global problem with code quality. Both from a security perspective, and from a less problematic but still annoying bugs-everywhere perspective. I’m not sure if the issue is largely ignored, or we’ve given up on it (see also: Cloud Complexity Lies or Cisco ACI Complexity).

State of IT Security in 2021

Patrik Schindler sent me his views on code quality and resulting security nightmares after reading the Cisco SD-WAN SQL Injection saga. Enjoy!


I think we have a global problem with code quality. Both from a security perspective, and from a less problematic but still annoying bugs-everywhere perspective. I’m not sure if the issue is largely ignored, or we’ve given up on it (see also: Cloud Complexity Lies or Cisco ACI Complexity).

Cloudflare’s Annual Founders’ Letter

Cloudflare’s Annual Founders’ Letter
Cloudflare’s Annual Founders’ Letter

This week we celebrate Cloudflare's birthday. We launched the company 11 years ago tomorrow: September 27, 2010. It has been our tradition, since our first birthday, to use this week to launch innovative new products that we think of as our gift back to the Internet.

Since going public, it's also been an opportunity for us to update our Annual Founders' Letter and share what's on our mind. Recently we've been thinking about three things: team, the Internet, and innovation.

Team

When anyone asks us the key to Cloudflare's success, we always say the same thing: the team we've been able to attract to help us achieve our mission of helping build a better Internet. In the last year we've had more than 250,000 people apply to work for us and extended offers to less than one half of one percent of them. We continue to attract great people.

It's incredible to realize that more than half of Cloudflare's team today started since March 13, 2020, when we closed all our physical offices due to the pandemic. In the last several months, as we've started to see a light at the end of the COVID tunnel, we've been hosting what Continue reading

Private 5G Needs Complexity To Thrive

I know we talk about the subject of private 5G a lot in the industry but there are more players coming out every day looking to add their voice to the growing supporters of these solutions. And despite the fact that we tend to see 5G and Wi-Fi technologies as ships in the night this discussion isn’t going to go away any time soon. In part it’s because decision makers aren’t quite savvy enough to distinguish between the bands, thinking all wireless communications are pretty much the same.

I think we’re not going to see much overlap between these two technologies. But the reasons why aren’t quite what you might think.

Walking Workforces

Working from anywhere other than the traditional office is here to stay. Every major Silicon Valley company has looked at the cost benefit analysis and decided to let workers do their thing from where they live. How can I tell it’s permanent? Because they’re reducing salaries for those that choose to stay away from the Bay Area. That carrot is pretty enticing and for the companies to say that it’s not on the table for remote work going forward means they have no incentive to make people Continue reading

All Things Networking at VMworld 2021

Must-See Sessions for Networking 

This year’s networking sessions – based on the audience feedback from VMworld 2020 – not only feature more customers stories and interviews, but have a balance of innovation, industry trends, roadmap, and technical get-your-hands-dirty sessions. The VMworld 2021 Session Types and Levels summary gives you an idea of what’s available for you and your colleagues.  

If you’re not sure about the different learning tracks or what they will include, check out the VMworld learning index here. The robust Content Catalog will allow you to filter sessions based on topic, tracks, products, type and level; the scheduler lets you to build an itinerary.  

Lastly, we have made a list of can’t miss sessions based on your role.  

For Networking Leaders:  

 For Networking Practitioners: