Archive

Category Archives for "Networking"

Cumulus Streamlines Deployments, Maintenance in Latest Release

With NetQ 3.0, Cumulus adds lifecycle management capabilities to make it easier to roll out updates...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

IoT Video Security Networks, Simplified.

Today we announced a new networking solution to simplify IoT video surveillance and security. Video surveillance has become a mission-critical element of security strategies in smart cities, utilities, transportation, universities and other highly distributed environments.

Kids Need Encryption Too

With most of the world on lockdown, children are likely spending more time than ever online. Between virtual classrooms and keeping up with friends on social media, many kids are depending on the Internet to maintain a semblance of normal life amidst the global health crisis.

While parents may worry about how this might affect their children’s well-being, experts have warned that the surge in screen time could also expose kids to safety risks online more often.

In Asia-Pacific, a recent UNICEF report found that 32% of children between 10 to 17 years old in Bangladesh have faced cyberbullying, violence, and harassment online. Meanwhile, a McAfee study in India found that 70% of youngsters have posted their personal details on the Internet, making them an easy target for cybercriminals.

Earlier this month, the Internet Society ran a short webinar, Kids, the Internet and COVID-19, to show parents how they can protect their kids’ privacy and security online through encryption.

Encryption is a way of ‘scrambling’ information to make it unreadable to malicious actors who might want to access it, and works much like the codes that we used as children to send secret messages to each other – but better. Encryption protects our emails, our Continue reading

Modernizing your network has never been easier with Cumulus NetQ Lifecycle Management

Upgrade and configuration management with push button simplicity

Network operations is all about keeping the network running smoothly and without problems. It includes monitoring the network for performance problems and faults, as well as fixing problems before they affect end users, or at least in the timeliest manner possible. Managing network assets correctly is critical to avoiding application-impacting network outages, performance degradation and security incidents.

However, network operators often struggle with operational challenges such as network disruptions caused by maintenance and configuration changes. Furthermore, business networks are often fairly large and complex, which means the set of tasks a network administrator will need to perform can quickly overwhelm manual efforts. This requires a shift, not only to modern networking, but also to modern operational tools as well.

To help solve these issues, Cumulus Networks has added new lifecycle management (LCM) capabilities to Cumulus NetQ 3.0, offering a simple GUI-driven workflow for provisioning, operating, maintaining and retiring network switches running Cumulus Linux.

Figure 1: NetQ Lifecycle Management

With the addition of full lifecycle management functionality, NetQ 3.0 now combines the ability to easily upgrade, configure and deploy network elements with a full suite of operations capabilities, such as visibility, Continue reading

Creating a True One-Stop Solution for Companies to Go Global: Announcing a Partnership Between Cloudflare and JD Cloud & AI

Creating a True One-Stop Solution for Companies to Go Global: Announcing a Partnership Between Cloudflare and JD Cloud & AI
Creating a True One-Stop Solution for Companies to Go Global: Announcing a Partnership Between Cloudflare and JD Cloud & AI

It’s well known that global companies can face challenges doing business in and out of China due to the country’s unique rules, regulations, and norms, not to mention recent political and trade complications. Less well known is that China’s logistical and technical network infrastructure is also quite different from the rest of the world’s. With global Internet traffic up 30% over the past month due to the pandemic, these logistical and technical hurdles are increasing the burden for global businesses at exactly the wrong time. It’s now not unusual for someone based in China to have to wait extended periods and often be unable to access applications hosted elsewhere, or vice-versa, due to the lower performance of international Internet traffic to and from China. This affects global companies with customers, suppliers or employees in China, and Chinese companies who are trying to reach global users.

Our mission is to help build a better Internet, for everyone, everywhere. So, today we’re excited to announce a significant strategic partnership with JD Cloud & AI, the cloud and intelligent technology business unit of Chinese Internet giant JD.com. Through this partnership, we’ll be adding 150 data centers in mainland China, an increase in Continue reading

CML-P – Why 20 Nodes Is Not Enough

Intro

Cisco recently announced that they are releasing CML-P, which is version two of the product formerly known as VIRL. First of all, I’ve seen the product demoed and helped with feedback on it, it looks stunning! The architecture looks great, it’s fully leveraging APIs and it’s an entirely different beast than VIRL. This is a great product and I want to see it succeed. Unfortunately, this product is never going to be as successful as it could be. Why?

CML-P

CML-P, where P stands for Private, supports a maximum of 20 nodes. This is supposed to be a differentiator to the the -E version, which is for enterprises that wish to run this product at larger scale, including support. First of all, I don’t agree that a node limit is the proper way to differentiate -P from -E. That can be done through support, training and other means.

CML-P Competition

CML-P’s competition is going to be GNS3 and EVE-NG. These are freely available, but also offer paid versions with a more advanced feature set. There is no node limit with these products. You can run as much as your server can handle. If CML-P is going to compete Continue reading

Webinars in May 2020

Being stuck at home like most everyone else we’re continuing the increased pace of content production in May 2020:

  • I’ll continue the Introduction to Containers and Docker update. We got through the basics the last time and will cover Linux namespaces and how Docker uses them on May 5th.
  • We finally found an independent guest speaker familiar with Cisco ACI. Mario Rosi will start the Cisco ACI series with an introductory webinar on May 12th.
  • Dinesh Dutt will continue his Network Automation Tools update on May 19th.
  • Hoping to get through Introduction to Docker on May 5th, I plan to do a deep dive into Docker Networking on May 26.
  • Finally, I’m positive I won’t cover all the bridging and routing material I created in today’s webinar, so we’ll continue with routing protocol basics on May 28th.

Introducing Suzieq

“Observation, not old age, brings wisdom” - Publilius Syrus In the time that we have both collectively spent in the industry, one on the vendor side and the other on the operator side, one of the lasting impressions on both of us is the paucity of tools that a network...

UPDATE 4-28: How enterprise networking is changing with a work-at-home workforce

As the coronavirus spreads, public and private companies as well as government entities are requiring employees to work from home, putting unforeseen strain on all manner of networking technologies and causing bandwidth and security concerns.  What follows is a round-up of news and traffic updates that Network World will update as needed to help keep up with the ever-changing situation.  Check back frequently!UPDATE 4.27According to the April 22 Verizon Network Report, overall data volume across its networks has increased 19% compared to pre-COVID levels. While data usage remains elevated, the changes in how people are using the network has stabilized, the company stated.   To read this article in full, please click here

Guide to virtual tech conferences, including Cisco Live, IBM Think and VMworld

COVID-19 has squashed in-person events worldwide. Red Hat Summit, Cisco Live, and VMware's VMworld are just a few of the upcoming network industry events that will now be held virtually.A digital event doesn't offer the same opportunities to mingle and network with industry peers that an in-person event provides, but there are some silver linings. Attendees don't have to travel, and in many cases, they don't have to pay to register.Stay on top of product roadmaps, hear from technical experts, and keep your skills sharp – all from the comfort of home – at these upcoming virtual events.Red Hat Summit 2020 Red Hat is planning a blend of live and recorded content for its big summit, which will be held April 28-29. The event, dubbed Red Hat Summit 2020 Virtual Experience, is free for attendees and will include keynotes, breakout sessions, ask-the-expert sessions, and collaboration opportunities, Red Hat says. So far, more than 58,000 people have registered to attend, according to the company. More information is available here.To read this article in full, please click here

Daily Roundup: WiFi 6 Fuels Speed With 5X Spectrum Boost

Untangle added predictive routing; AWS gave AI workloads a human touch; and a new Aryaka survey...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Microsoft Azure, Intel Keep Cloud Data Confidential

The new Azure confidential computing service allows companies to process data in hardware-based...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

AWS Gives AI Workloads a Human Touch

The managed service is designed to make it easier for users of Amazon's various AI capabilities to...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Microsegmentation product snapshots: Edgewise Networks, VMware and ShieldX Networks

Interest in microsegmentation is growing rapidly. Vendors are stepping forward to help enterprises update their infrastructure security to prevent catastrophic intrusions and data thefts. Here's a look at three microsegmentation market players, showing what they offer, how they work and the ways they differ. READ MORE: How microsegmentation architectures differ | 3 early adopter stories | Defining microsegmentationTo read this article in full, please click here

Discussion Paper Now Available about the New-IP Proposal

In the run up to the ITU World Telecommunication Standardization Assembly (WTSA-20) later this year there has been some discussion about a proposal called the “New IP.” It is positioned as a top-down architecture to solve a number of use cases that are currently been developed in the ITU-T’s Future Network 2030 Focus Group.

The Internet Society is carefully following the developments in the run-up to WTSA-20. We are trying to understand if and how the New IP works with the Internet as we know it, if it actually solves problems that cannot be solved in the Internet, and, if the ITU-T is developing standards, where other standards development organizations (SDOs) have change control.

In order to get a sense of the environment we commissioned a discussion paper, “An analysis of the ‘New IP’ proposal to the ITU-T.” The paper helps inform us and the broader community whilst the public debate around these proposals shapes up. It also aims to inform and shape the discussion from the Internet’s Society’s perspective. Eventually the debate around it will inform our position and the potential further evolution of the discussion paper itself.

We would like to thank Chip Sharp for authoring the paper, with input Continue reading

Network Break 281: FCC Opens 6Ghz Band For Unlicensed Use; Arista Boosts WLAN Software

The FCC makes swathes of new spectrum available for Wi-Fi, Arista upgrades its WLAN software, Cisco and Google announce plans to partner on an SD-WAN solution for Google Cloud, Google rolls out a remote access product for the enterprise, and more tech news analysis on today's Network Break podcast.

The post Network Break 281: FCC Opens 6Ghz Band For Unlicensed Use; Arista Boosts WLAN Software appeared first on Packet Pushers.

The Week in Internet News: Schools Still Face Equipment Challenges for Virtual Learning

Equipment shortages: As schools in the U.S. and other countries attempt to switch over to virtual learning during the COVID-19 pandemic, some are still trying to get students Internet access or devices to use to access the Internet. In Chicago, only about half of the 115,000 public school students who need a computer have received one, WBEZ reports. Another 43,000 computers will be handed out, and 10,000 have been ordered and will be coming “over the next few weeks.”

Equipment shortages, part 2: In California, the state is planning to distribute laptops, Chromebooks, or tablets to more than 70,000 students so they can participate in distance learning, MercuryNews.com reports. The state has requested funding and devices from companies, business leaders and philanthropists around the state.

Getting creative: Some schools are exploring alternatives when students don’t have Internet access or devices, NBC News says. A teacher in Tennessee turned to using a copy machine to print out packets and mail them to students. In Arkansas, where 23 percent of households lack Internet service, a local PBS affiliate is providing daily television programming tied to the state’s distance learning curriculum.

Pumping up encryption: Popular video conferencing app Zoom will Continue reading

Releasing kubectl support in Access

Releasing kubectl support in Access

Starting today, you can use Cloudflare Access and Argo Tunnel to securely manage your Kubernetes cluster with the kubectl command-line tool.

We built this to address one of the edge cases that stopped all of Cloudflare, as well as some of our customers, from disabling the VPN. With this workflow, you can add SSO requirements and a zero-trust model to your Kubernetes management in under 30 minutes.

Once deployed, you can migrate to Cloudflare Access for controlling Kubernetes clusters without disrupting your current kubectl workflow, a lesson we learned the hard way from dogfooding here at Cloudflare.

What is kubectl?

A Kubernetes deployment consists of a cluster that contains nodes, which run the containers, as well as a control plane that can be used to manage those nodes. Central to that control plane is the Kubernetes API server, which interacts with components like the scheduler and manager.

kubectl is the Kubernetes command-line tool that developers can use to interact with that API server. Users run kubectl commands to perform actions like starting and stopping the nodes, or modifying other elements of the control plane.

In most deployments, users connect to a VPN that allows them to run commands against that Continue reading

HS. Part 4. Forging Microsoft SONiC configuration out of the network graph.

Hello my friend,

The visualisation of the network graph is an important part of the network development and management, but we need to move on. Today we will focus on the configuration for Microsoft SONiC running as Docker containers.


1
2
3
4
5
No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.

Network automation training – boost your career

To be able to understand and, more important, to create such a solutions, you need to have a holistic knowledge about the network automation. Come to our network automation training to get this knowledge and skills.

At this training we teach you all the necessary concepts such as YANG data modelling, working with JSON/YAML/XML data formats, Linux administration basics, programming in Bash/Ansible/Python for multiple network operation systems including Cisco IOS XR, Nokia SR OS, Arista EOS and Cumulus Linux. All the most useful things such as NETCONF, REST API, OpenConfig and many others are there. Don’t miss the opportunity to improve your career.

Brief description

As we pointed out Continue reading