Archive

Category Archives for "Networking"

Disowning a process in Linux

When you want a process to continue running even after you log off a Linux system, you have a couple options.One of them is to use the disown command. It tells your shell to refrain from sending a HUP (hangup) signal to the process when you log off. So, the process continues running. This can be very handy whenever you start a process and then, for some reason, you can’t stay logged in and wait until it finishes.[Get regularly scheduled insights by signing up for Network World newsletters.] The disown command is a shell built-in. This means that you don’t have to install it to use it, but it also means that it won’t be available if you use a shell that doesn’t support it. For those of us using bash and related shells (zsh, ksh etc.), disown should be available and you can verify this with a command like this that lists shell built-ins and then looks for "disown":To read this article in full, please click here

Cisco targets WAN edge with new router family

Cisco has launched a family of core and branch routers that take aim at refining secure, cloud resource access distributed at the edge.Cisco Catalyst 8000 edge router family includes three models--the high-end 8500 for data-center or colocation customers, the 8300 for branch users, and the software-based 8000 for virtual environments and feature support for advanced routing, SD-WAN,  security and secure-access service edge (SASE)--depending on customer requirements.To read this article in full, please click here

Bot Attack trends for Jan-Jul 2020

Bot Attack trends for Jan-Jul 2020
Bot Attack trends for Jan-Jul 2020

Now that we’re a long way through 2020, let’s take a look at automated traffic, which makes up almost 40% of total Internet traffic.

This blog post is a high-level overview of bot traffic on Cloudflare’s network. Cloudflare offers a comprehensive Bot Management tool for Enterprise customers, along with an effective free tool called Bot Fight Mode. Because of the tremendous amount of traffic that flows through our network each day, Cloudflare is in a unique position to analyze global bot trends.

In this post, we will cover the basics of bot traffic and distinguish between automated requests and other human requests (What Is A Bot?). Then, we’ll move on to a global overview of bot traffic around the world (A RoboBird’s Eye View, A Bot Day and Bots All Over The World), and dive into North American traffic (A Look into North American Traffic).  Lastly, we’ll finish with an overview of how the coronavirus pandemic affected global traffic, and we’ll take a deeper look at European traffic (Bots During COVID-19 In Europe).

On average, Cloudflare processes 18 million HTTP requests every second. This is a great opportunity to understand how bots shape the Continue reading

Going Postal

The Internet was not the first communications system constructed as compound service, where the end-to-end service was built using the services provided by many individual service providers. International telephony was constructed in a similar manner, and predating the telephone was the international postal service. In this article I’d like to look at the Universal Postal Union's track record of trying to construct a fair and efficient way to allow each service provider to be compensated for their part in the construction of the delivered end-to-end service. As with the Internet, it all comes down to the choice of the framework for settlement and peering between providers.

My Journey Towards the Cisco Certified DevNet Specialist – Service Provider by Nick Russo

On 14 October 2020, I took and passed the Automating Cisco Service Provider Solutions (SPAUTO) exam on my first attempt. This is the fifth DevNet exam I’ve passed and was a topic area in which I was already strong. Many people know me for my CCIE Service Provider Comprehensive Guide where I cover advanced SP technology. Others know me for my Pluralsight Ansible and Python network automation courses that implement an “infrastructure as code” solution to manage MPLS L3VPN route-targets. Suffice it to say that I’ve been doing SP stuff for a while.

Compared to the other concentration exams I’ve passed (ENAUTO and SAUTO), SPAUTO was about the same level of difficulty. The exam has a fair amount of carryover from DEVASC, DEVCOR, and ENAUTO, given the similarities of their blueprints, but is still quite heavy on SP products. Fortunately, there are only a few key products listed on the blueprint, making it narrower than SAUTO (which tested about 15 different APIs). Like ENAUTO, strong Python and network automation skills are important for this exam, and I’d strongly recommend having real-life SP design, implementation, and operations experience before attempting it.

Unlike DEVASC, DEVCOR, ENAUTO, and Continue reading

Masergy teams with Fortinet for at-home SD-WAN

Working from home is becoming more of a permanent option with each passing day, but working from home means your network is provided not by your corporate enterprise but by carriers such as Verizon, AT&T, and Comcast.Masergy this week introduced its SD-WAN Work From Anywhere portfolio that brings the benefits of SD-WAN networking to home and mobile users. The portfolio includes a home SD-WAN solution and a SASE-based mobile solution.The new offerings extend Masergy’s Managed SD-WAN Secure solutions to the remote workforce, supporting their network connections with built-in security, dual-link redundancy, load balancing, and dynamic traffic-steering capabilities.To read this article in full, please click here

How to enforce password complexity on Linux

Deploying password-quality checking on your Debian-based Linux servers can help ensure that your users assign reasonably secure passwords to their accounts, but the settings themselves can be a bit misleading.For example, setting a minimum password length of 12 characters does not necessarily mean that all your users' passwords will actually have 12 or more characters.Let's stroll down Complexity Boulevard and see how the settings work and examine some that are worth considering.[Get regularly scheduled insights by signing up for Network World newsletters.] The files that contain the settings we're going to look at will be:To read this article in full, please click here

How to enforce password complexity on Linux

Deploying password-quality checking on your Debian-based Linux servers can help ensure that your users assign reasonably secure passwords to their accounts, but the settings themselves can be a bit misleading.For example, setting a minimum password length of 12 characters does not necessarily mean that all your users' passwords will actually have 12 or more characters.Let's stroll down Complexity Boulevard and see how the settings work and examine some that are worth considering.[Get regularly scheduled insights by signing up for Network World newsletters.] The files that contain the settings we're going to look at will be:To read this article in full, please click here

How to enforce password complexity on Linux

Deploying password-quality checking on your Debian-based Linux servers can help ensure that your users assign reasonably secure passwords to their accounts, but the settings themselves can be a bit misleading.For example, setting a minimum password length of 12 characters does not necessarily mean that all your users' passwords will actually have 12 or more characters.Let's stroll down Complexity Boulevard and see how the settings work and examine some that are worth considering.[Get regularly scheduled insights by signing up for Network World newsletters.] The files that contain the settings we're going to look at will be:To read this article in full, please click here

Gartner: Top strategic technology trends for 2021

Companies need to focus on architecting resilience and accept that disruptive change is the norm, says research firm Gartner, which unveiled its annual look at the top strategic technology trends that organizations need to prepare for in the coming year.Gartner unveiled this year's list at its flagship IT Symposium/Xpo Americas conference, which is being held virtually this year. READ MORE: VMware highlights security in COVID-era networking | Essential edge-computing use cases | How AI can boost data-center availability, efficiencyTo read this article in full, please click here

Gartner: Top strategic technology trends for 2021

Companies need to focus on architecting resilience and accept that disruptive change is the norm, says research firm Gartner, which unveiled its annual look at the top strategic technology trends that organizations need to prepare for in the coming year.Gartner unveiled this year's list at its flagship IT Symposium/Xpo Americas conference, which is being held virtually this year. READ MORE: VMware highlights security in COVID-era networking | Essential edge-computing use cases | How AI can boost data-center availability, efficiencyTo read this article in full, please click here

Gartner: Top strategic technology trends for 2021

Companies need to focus on architecting resilience and accept that disruptive change is the norm, says research firm Gartner, which unveiled its annual look at the top strategic technology trends that organizations need to prepare for in the coming year.Gartner unveiled this year's list at its flagship IT Symposium/Xpo Americas conference, which is being held virtually this year. READ MORE: VMware highlights security in COVID-era networking | Essential edge-computing use cases | How AI can boost data-center availability, efficiencyTo read this article in full, please click here

Hints and Principles: Applied to Networks

While software design is not the same as network design, there is enough overlap for network designers to learn from software designers. A recent paper published by Butler Lampson, updating a paper he wrote in 1983, is a perfect illustration of this principle. The paper is caleld Hints and Principles for Computer System Design. I’m not going to write a full review here–you should really go read the paper for yourself–but rather just point out some useful bits of the paper.

The first really useful point of this paper is Lampson breaks down the entire field of software design into three basic questions: What, How, and When (or who)? Each of these corresponds to the goals, techniques, and processes used to design and develop software. These same questions and answers apply to network design–if you are missing one of these three areas, then you are probably missing some important set of questions you have not answered yet. Each of these is also represented by an acronym: what? is STEADY, how? is AID, and when? is ART. Let’s look at a couple of these in a little more detail to see how Lampson’s system works.

STEADY stands for simple, timely, efficient, Continue reading

The Week in Internet News: Seven Countries Repeat Calls for Encryption Backdoors

Here we go again: Seven countries, including the U.S., U.K., Japan, and India, are again pushing tech companies to provide encryption backdoors for law enforcement, The Verge reports. The new international statement says encryption poses “significant challenges to public safety.” The U.S. and allies have long pushed for backdoors, even as security advocates have warned that criminals will find ways to exploit holes in encryption.

ISPs protest: ISPs in Dhaka, Bangladesh, are threatening to shut down service for three hours a day over a dispute on overhead wire replacement, Dhaka Tribune reports. The city is planning to move the wires underground, but ISPs are concerned about potential problems during the switch. Threatening a blackout to protest potential blackouts seems counterproductive.

Decency police: The government of Pakistan has banned short video app TikTok over “immoral and indecent” content, Al Jazeera says. It’s unclear what TikTok content the Pakistan Telecommunication Authority found offensive. A kickboxer in the country, hoping to market his training services on TikTok, challenged the ban, however, Reuters reports. “If TikTok can be banned even though it has millions of videos because of a few offensive ones, why can’t the whole internet be shut Continue reading