Archive

Category Archives for "Networking"

State Consistency in Distributed SDN Controller Clusters

Every now and then I get a question along the lines of “why can’t we have a distributed SDN controller (because resiliency) that would survive network partitioning?” This time, it’s not the incompetency of solution architects or programmers, but the fundamental limitations of what can be done when you want to have consistent state across a distributed system.

TL&DR: If your first thought was CAP Theorem you’re absolutely right. You can probably stop reading right now. If you have no idea what I’m talking about, maybe it’s time you get fluent in distributed systems concepts after you’re finished with this blog post and all the reference material linked in it. Don’t know where to start? I put together a list of resources I found useful.

Meraki-CLI – Command Line Utility for the Meraki Dashboard

Meraki changed the industry years ago as one of the first platforms to use a cloud portal for all configuration; forgoing the typical local CLI/GUI administration of network appliances. One of the first things a traditional network engineer (like myself) may notice about Meraki equipment is their complete lack of a command-line interface. For the […]

The post Meraki-CLI – Command Line Utility for the Meraki Dashboard appeared first on Packet Pushers.

How COVID-19 is shaping enterprise networking

The COVID-19 pandemic has influenced the networking arena in a number of ways, including the rise of fully automated remote offices, the need to support a "branch of one," and the growth of new communications software tools."One of the biggest trends we are seeing is business agility. That is, IT looking at the tech they have deployed and evaluating it not just in terms of speeds and feeds, but how agile it is to handle whatever's coming next," said Todd Nightingale, Cisco's Enterprise Networking & Cloud business chief. "Software APIs are a huge part of that trend, because it is amazingly easier to handle changes through APIs and software that make it possible to change things in a day rather than months."To read this article in full, please click here

How COVID-19 is shaping enterprise networking

The COVID-19 pandemic has influenced the networking arena in a number of ways, including the rise of fully automated remote offices, the need to support a "branch of one," and the growth of new communications software tools."One of the biggest trends we are seeing is business agility. That is, IT looking at the tech they have deployed and evaluating it not just in terms of speeds and feeds, but how agile it is to handle whatever's coming next," said Todd Nightingale, Cisco's Enterprise Networking & Cloud business chief. "Software APIs are a huge part of that trend, because it is amazingly easier to handle changes through APIs and software that make it possible to change things in a day rather than months."To read this article in full, please click here

How COVID-19 is shaping enterprise networking

The COVID-19 pandemic has influenced the networking arena in a number of ways, including the rise of fully automated remote offices, the need to support a "branch of one," and the growth of new communications software tools."One of the biggest trends we are seeing is business agility. That is, IT looking at the tech they have deployed and evaluating it not just in terms of speeds and feeds, but how agile it is to handle whatever's coming next," said Todd Nightingale, Cisco's Enterprise Networking & Cloud business chief. "Software APIs are a huge part of that trend, because it is amazingly easier to handle changes through APIs and software that make it possible to change things in a day rather than months."To read this article in full, please click here

Jassy’s Replacement At AWS Matters

As Andy Jassy takes over the CEO role at Amazon, the question is asked, “Does it matter who takes over at AWS, the position Jassy is vacating?” The idea is that AWS is such a dominant force in public cloud, an untrained monkey could sit at the helm and AWS would continue printing billions of dollars. So who cares who replaces Jassy? Whoever the new human is, they can’t get it wrong.

That might be exactly right, but for the thought exercise, I decided to go a different direction. For purposes of this opinion article, I choose to entertain the idea that Jassy’s replacement does matter, and matters a lot.

Growing A Gargantuan Gorilla

We can all agree that AWS is the 800 pound gorilla of public cloud. However, I believe AWS will see increasing pressure from all quarters. By way of comparison, let’s consider Cisco Systems of the last ten years.

Cisco has dominated the networking space in a variety of categories for a very long time. The last decade has seen them as the target all of their competitors aim at. In that context, did it matter who replaced John Chambers when he moved on? You Continue reading

Master Class: Security in the Design of DC Fabrics

I’m teaching another master class over at Juniper on February the 10th at 12 noon PT (3PM ET):

It’s typical to think about scale, speed, oversubscription, and costs when designing a data center fabric. But what about security in a world increasingly focused on privacy, data protection, and preventing downtime caused by cyber breaches? This session will consider how data center fabric software and control plane components can impact security, including the ability to effectively manage segmentation policy, controlling failure domains, and the impact host-based routing has on fabric security.

You can register here.

SD-WAN Config Is Not Mystical – Video

Michael Shepherd, CTO at Rogers-O’Brien Construction, talks through his SD-WAN experience. He points out that it wasn’t hard to configure a full-mesh architecture. That’s a stark contrast to hugging your router dearly to your chest while reciting DMVPN configuration stanzas and staring at your phone in case you need to call TAC…who you have on […]

The post SD-WAN Config Is Not Mystical – Video appeared first on Packet Pushers.

It is Easier to Move a Problem than Solve it (RFC1925, Rule 6)

Early on in my career as a network engineer, I learned the value of sharing. When I could not figure out why a particular application was not working correctly, it was always useful to blame the application. Conversely, the application owner was often quite willing to share their problems with me, as well, by blaming the network.

A more cynical way of putting this kind of sharing is the way RFC 1925, rule 6 puts is: “It is easier to move a problem around than it is to solve it.”

Of course, the general principle applies far beyond sharing problems with your co-workers. There are many applications in network and protocol design, as well. Perhaps the most widespread case deployed in networks today is the movement to “let the controller solve the problem.” Distributed routing protocols are hard? That’s okay, just implement routing entirely on a controller. Understanding how to deploy individual technologies to solve real-world problems is hard? Simple—move the problem to the controller. All that’s needed is to tell the controller what we intend to do, and the controller can figure the rest out. If you have problems solving any problem, just call it Software Defined Continue reading

The State Of Networking With Ivan Pepelnjak

In this episode, we sit down with Ivan Pepelnjak and talk about the state of networking.  We briefly talk about cloud-networking and move onto network automation discussing the pros & cons of the various solutions and frameworks in the market highlighting the importance of extensibility.  Finally, we talk about Ivan’s new open source project targeted to simplify the process of standing up a new virtual lab environment.

Relevant Links

Ivan Pepelnjak
Guest
Jason Edelman
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post The State Of Networking With Ivan Pepelnjak appeared first on Network Collective.

Why Open Source Project Maintainers are Reluctant to use Digital Signatures, Two-Factor Authentication

We all agree that open source development methods help create better code. The Cathedral and the Bazaar,” which explained how the methodology of openness worked in Fetchmail project. But, that’s a general rule. Open source can still be abused by unscrupulous developers. So, why don’t we make sure when a programmer attempts to merge code into a program that they’re really who they say they are, by using two-factor authentication (2FA) or a digital signature? Good question. You might not think this is a real problem. Alas, it is. For example, in 2019 CursedGrabber malware was successfully Linux Foundation’s 2020 FOSS Contributor Survey, when developers were asked if the open source projects Continue reading

2020 U.S. Election: Cybersecurity Analysis

2020 U.S. Election: Cybersecurity Analysis

As the election season has ramped down and the new Presidential Administration begins, we think it’s important to assess whether there are lessons we can draw from our experience helping to provide cybersecurity services for those involved in the 2020 U.S. elections.

Cloudflare built the Athenian Project - our project to provide free services to state and local election websites - around the idea that access to the authoritative voting information offered by state and local governments is key to a functioning democracy and that Cloudflare could play an important role in ensuring that election-related websites are protected from cyberattacks intended to disrupt that access. Although the most significant challenges in this election cycle fell outside the realm of cybersecurity, the 2020 election certainly validated the importance of having access to definitive sources of authoritative election information.

We were pleased that the robust cybersecurity preparations we saw for the 2020 U.S. election appeared to be successful. From the Cloudflare perspective, we had the opportunity to witness firsthand the benefits of having access to free cybersecurity services provided to organizations that promote accurate voting information and election results, state and local governments conducting elections, and federal U.S candidates Continue reading

Random identity generation in Linux

If you need to generate a list of names and addresses to test an application or a script that you're working on, Linux can make that surprisingly easy. There's a command called "rig" that will create name, address and phone number listings. As far as I can tell, out of the box, it only works with U.S. addresses and area codes. However, if this is indeed the case, you might be able to work around this problem.To use the rig command, you can just type "rig" on the command line, and a single name and address will be generated. You will see something like this:$ rig Mavis English 1015 Tulip St Anderson, IN  46018 (317) xxx-xxxx To generate a list with many addresses, use the -c option and specify the number of addresses that you want to see.To read this article in full, please click here

Random identity generation in Linux

If you need to generate a list of names and addresses to test an application or a script that you're working on, Linux can make that surprisingly easy. There's a command called "rig" that will create name, address and phone number listings. As far as I can tell, out of the box, it only works with U.S. addresses and area codes. However, if this is indeed the case, you might be able to work around this problem.To use the rig command, you can just type "rig" on the command line, and a single name and address will be generated. You will see something like this:$ rig Mavis English 1015 Tulip St Anderson, IN  46018 (317) xxx-xxxx To generate a list with many addresses, use the -c option and specify the number of addresses that you want to see.To read this article in full, please click here

Demonstrate Small Automation Wins

Long long time ago in a country far far away when traveling was still a thing I led an interesting data center fabric design workshop. We covered tons of interesting topics, including automating network services deployments (starting with VLAN self-service for server admins).

As was often the case in my workshops, we had representatives from multiple IT teams sitting in the room, and when I started explaining how I’d automate VLAN deployments, the server administrator participating in the workshop quickly chimed in: “that’s exactly how I implemented self-service for some of our customers, it makes perfect sense to use the same approach for server port and VLAN provisioning”, and everyone else in the room agreed… apart from the networking engineer, who used a counter-argument along the lines of “we only provision a new VLAN or server port every few days, we can do it by hand” and no amount of persuasion would move him.

Don’t Make Parents Raise Kids in a World without Encryption

Natalie Campbell, Director of Public Advocacy at the Internet Society and a mother of two, warns against banning or weakening of encryption for the safety of children online. 

Governments and law enforcement agencies are trying to ban or weaken a critical tool for keeping our children safe online. As parents, we must speak up for our kids.

Children who are fortunate enough to have Internet access are online more than ever, and many are increasingly doing learning online. But these spaces are attractive targets for criminals, and parents and schools often lack resources to guide kids on how to stay safe as they learn, socialize, and discover the world online.

Luckily, encryption has our back. Whether it’s sending a confidential message to a friend, videoconferencing with grandparents, or submitting an assignment to a teacher, platforms and services that use end-to-end encryption can help keep our children safe by keeping the line of communication private between the sender and receiver.

Despite this, some governments, law enforcement agencies, and even some child protection agencies are trying take away the strongest digital tool we have as parents to keep children safe online. The United Kingdom, Germany, the European Commission, and the Continue reading