Archive

Category Archives for "Networking"

Heavy Networking 519: Let’s Meet Wi-Fi 6E

Just as we're getting comfortable with Wi-Fi 6, along comes 6E, an extension that enables the use of newly available unlicensed spectrum in the 6GHz frequency band (at least here in the US). Our guest to introduce us to Wi-Fi 6E is Wes Purvis. We discuss the properties of the spectrum, how it might be used, when to expect products, and more.

The post Heavy Networking 519: Let’s Meet Wi-Fi 6E appeared first on Packet Pushers.

Heavy Networking 519: Let’s Meet Wi-Fi 6E

Just as we're getting comfortable with Wi-Fi 6, along comes 6E, an extension that enables the use of newly available unlicensed spectrum in the 6GHz frequency band (at least here in the US). Our guest to introduce us to Wi-Fi 6E is Wes Purvis. We discuss the properties of the spectrum, how it might be used, when to expect products, and more.

How Nutanix and HPE’s Partnership Delivers Simplicity, with Brian Cox and Abhi Karmakar

Abhi Karmakar and Brian Cox, of Nutanix, sat down to share their thoughts on the ongoing...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

GSMA, O-RAN Forge Alliance

“The growth of the open networking ecosystem will be essential to meeting enterprise coverage and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

The Week in Internet News: Executive Order Targets Social Media

Trump vs. Twitter: U.S. President Donald Trump, one of Twitter’s most prolific users, has signed an executive order directing government agencies to target social media sites after Twitter fact-checked one of his tweets about voting by mail. The executive order argues social media platforms should lose their lawsuit protections for content posted by users, by directing the Federal Communications Commission to begin a rule-making proceeding to determine when those protections should be stripped away, NPR reports.

Internet freedom? Meanwhile, Business Insider notes that Trump said he’d shut down Twitter if he could, even as he tried to emphasize his “commitment to free and open debate on the Internet.” Trump, with more than 80 million followers on Twitter, complained about social media platforms stifling conservative voices.

Robots vs. COVID-19: A shopping center in Thailand is deploying artificial intelligence-powered robots to fight COVID-19, Euronews.com reports. The mall has thermal scanners to check shoppers’ temperatures, and robots carry public health messages and hand sanitizer.

AI on the beach: In Israel, startup Sightbit is using AI and video cameras to help lifeguards on busy beaches, NoCamels reports. The company is running a pilot program at one of Israel’s most popular beaches. Continue reading

The Hook Brings You Back

If I asked you to summarize the great works of literature in a few paragraphs, how would you do it? Would you read over the whole thing and try to give a play-by-play of the book? Would it be more like Cliff’s Notes, summarizing the major themes but skipping over the details? Maybe you’d offer up the conclusion only and leave it as an exercise to the reader to find out? There are a lot of ways to do it and almost all of them seem insurmountable.

What if there was an easy way to jump right into starting to discuss a topic or summarize something? What if you could find a way to easily get people interested in your ideas? Believe or not, it’s not as hard as you might think. People usually freak out because they feel like there are too many places to start when they want to write something. They decide to try and figure out the perfect way to get going and, more often than not, they paralyze themselves with inaction.

So how do you get things moving? You have to find the hook.

By Hook or Crook

What’s the hook? Most people think it’s Continue reading

Export logs from Cloudflare Gateway with Logpush

Export logs from Cloudflare Gateway with Logpush

Like many people, I have spent a lot more time at home in the last several weeks. I use the free version of Cloudflare Gateway, part of Cloudflare for Teams, to secure the Internet-connected devices on my WiFi network. In the last week, Gateway has processed about 114,000 DNS queries from those devices and blocked nearly 100 as potential security risks.

I can search those requests in the Cloudflare for Teams UI. The logs capture the hostname requested, the time of the request, and Gateway’s decision to allow or block. This works fine for one-off investigations into a block, but does not help if I want to analyze the data more thoroughly. The last thing I want to do is click through hundreds or thousands of pages.

That problem is even more difficult for organizations attempting to keep hundreds or thousands of users and their devices secure. Whether they secure roaming devices with DoH or a static IP address, or keep users safe as they return to offices, deployments at that scale need a better option for auditing tens or hundreds of millions of queries each week.

Starting today, you can configure the automatic export of logs from Cloudflare Gateway Continue reading

Basic Linux Networking tips and tricks part-4: curl command

cURL

Here is another post of the series on basic network troubleshooting and tools under Linux. In this post, I will talk about the cURL command.   Others posts of the series This post is part of a series about basic Linux Networking tips and tricks. The others posts of this series are: The ip and nmcli commands The mtr command The ss and netstat commands The curl command   What is cURL? cURL is a Linux command-line tool for getting or sending data and files, using an URL syntax. Since cURL…

The post Basic Linux Networking tips and tricks part-4: curl command appeared first on AboutNetworks.net.

Updated: What is Cumulus Linux All About

Pete Lumbis started his Cumulus Linux 4.0 update with an overview of differences between Cumulus Linux on hardware switches and Cumulus VX, and continued with an in-depth list of ASIC families supported by Cumulus Linux.

You can watch his presentation, as well as the more in-depth overview of Cumulus Linux concepts by Dinesh Dutt, in the recently-updated What Is Cumulus Linux All About video.

You need Free ipSpace.net Subscription to watch the video.

VMware Posts Q1 Beat, Reports Triple-Digit VMC on AWS Growth

“We have seen that COVID-19 is not stopping customers from their cloud migration projects with...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco Advances Software Push With $1B ThousandEyes Buy

“This is a big step in removing the delineation between private and public networks," analyst...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco takes aim at supporting SASE

Cisco is embracing the secure-access service edge (SASE) architecture put forth by Gartner with plans to upgrade some of its existing products to reach the goal of delivering access control, security and networking to cloud services.The enterprise shift to SASE will be gradual as they figure out the best way to connect their increasingly remote workforce to distributed resources delivered from corporate data centers and as cloud services, Cisco says.Network pros react to new Cisco certification curriculum “Flexibility will be fundamental as IT chooses among multiple security and networking capabilities that best fit their operations, regulatory requirements, and types of applications,” said Jeff Reed, senior vice president of product, Cisco’s Security Business Group in a blog post. “Security services can be predominantly delivered from the cloud to provide consistent access policies across all types of endpoints. However, globally distributed organizations may need to apply security and routing services differently according to regional requirements.”   To read this article in full, please click here

Daily Roundup: Cisco Gets SASE

Cisco got SASE; Nutanix Q3 revenue jumped 11%; and Docker cozied up to Microsoft Azure.

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Instana Adds W3C API Support to APM Platform

Using these APIs the vendor claims to be able to more efficiently correlate traces, identify root...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

NetApp Revenue Hits 9-Year Low

"We are confident that the demand for our products and services will be strong as we emerge from...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Secure Bare Metal Servers with VMware NSX Data Center

Securing workloads across an entire environment is the fundamental goal of a policy. But workloads come in a variety of form factors: virtual machines, containers, and bare metal servers. In order to protect every workload, experts recommend isolating workloads wherever possible — avoiding dependency on the host operating system and its firewall. Relying on the host firewall creates the dependency of a host to defend itself.

Securing virtual workloads is a task best handled by the hypervisor. Offering security via inspection of traffic on the virtual network interfaces of the virtual workload achieves the security you want. It also delivers isolation for security enforcement. Workloads to secure bare metal servers come in many form factors and a variety of means to achieve policy enforcement.

3 Factors to Consider when Securing Bare Metal Servers

Bare Metal Servers Still Serve A Purpose

Bare metal servers remain in use for a variety of reasons. Securing these servers remains a necessary task in today’s virtualized data center. Reasons we still use bare metal servers:

  • There may be no way to virtualize various operating systems, like AIX and Solaris.
  • Device-specific systems, such as medical equipment, or systems specific to other virtual markets may not yet have been virtualized. In some cases they may not Continue reading