Archive

Category Archives for "Networking"

Deloitte: 5G to drive edge, open RAN to the forefront in 2021

Edge computing is flagged as a key networking technology for 2021 as well as open radio-access framework, both of which are fundamentally driven forward by mobile data carriers and their rush to deploy 5G, according to Deloitte.The EdgeEdge computing, including compute workloads being handled on or close to endpoints deployed outside the data center, will be among the biggest technological growth areas in 2021. Deloitte predicts that the global market for edge products will rise to $12 billion in 2021, and will continue to grow at a rate of 35% per year thereafter. Close to three-quarters of all businesses, by 2023, will deploy some form of edge computing, the researchers said.To read this article in full, please click here

Navigating Supply-Chain Vulnerabilities with a Zero-Trust Architecture

In light of the SolarWinds breach, we want to help our customers who may have questions on how a Zero Trust Architecture can act as an effective approach to limit the impact of such attacks. VMware has been steadfastly monitoring the evolving situation as we learn more about the supply chain compromise.  

The SolarWinds Compromise 

At this point, the consensus is that organizations with a SolarWinds product that downloaded the SolarWinds-Core-v2019.4.5220-Hotfix5.msp update package should consider themselves breached and start an investigation. In addition, given the extent of the breach, every organization that uses SolarWinds products should be on alert for the possibility of an intrusion.   

Note that the update package was signed on March 24, 2020, which means that the victims of this attacks might have been compromised in late March or early April 2020. Once the attackers successfully compromised the SolarWinds Orion hosts, they may have moved laterally to the hosts monitored by the tool, and possibly beyond those hosts by using additional credentials collected in the exploitation process. Some actions to be taken in order to address this breach are provided by DHS CISA’s Continue reading

On Important Things

I tend to be a very private person; I rarely discuss my “real life” with anyone except a few close friends. I thought it appropriate, though, in this season—both the season of the year and this season in my life—to post something a little more personal.

One thing people often remark about my personality is that I seem to be disturbed by very little in life. No matter what curve ball life might throw my way, I take the hit and turn it around, regain my sense of humor, and press forward into the fray more quickly than many expect. This season, combined with a recent curve ball (one of many—few people would suspect the path my life has taken across these 50+ years), and talking to Brian Keys in a recent episode of the Hedge, have given me reason to examine foundational principles once again.

How do I stay “up” when life throws me a curve ball?

Pragmatically, the worst network outage in the world is not likely to equal the stresses I’ve faced in the military, whether on the flight line or in … “other situations.” Life and death were immediately and obviously present in those times. Continue reading

The Week in Internet News: Google Faces Third U.S. Antitrust Lawsuit

Another game of monopoly: Attorneys general from 38 U.S. states and territories have filed an antitrust lawsuit against Google, just days after 46 states and the U.S. Federal Trade Commission filed antitrust lawsuits against Facebook. The new lawsuit against Google is the third recent antitrust action against the company in recent weeks, CNet says. Ten states previously filed a lawsuit related to Google’s ad auctions, and the U.S. Department of Justice previously filed a lawsuit on Google’s browser deals with smartphone makers. The newest lawsuit targets Google’s search functionality, saying it delivered results that favored its own products over those of competitors.

Order from chaos: Meanwhile, the European Commission is threatening new regulation of big tech firms with rules to aim to “curb the hegemony of dominant multinationals and force them to be more transparent about how content is ranked, advertised and removed,” Euronews reports. Part of the goal is to allow European businesses to “freely and fairly compete online just as they do offline,” said Margrethe Vestager, executive vice president for a Europe Fit for the Digital Age.

The perimeter is breached: Hackers have gotten into the IT systems of several U.S. government agencies and Continue reading

NTC – Damien Garros – Source Of Truth

In this episode, we talk with Damien Garros from Network to Code. Damien works with clients on a daily basis architecting and implementing Source of Truth strategies for network automation solutions.  We spend time talking through how to best approach source of truth, how to solve the age-old problem of populating the source of truth, and talk about several open source projects that can help you on your source of truth journey.

Reference Links:

Damien Garros
Guest
Jason Edelman
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post NTC – Damien Garros – Source Of Truth appeared first on Network Collective.

Configure identity-based policies in Cloudflare Gateway

Configure identity-based policies in Cloudflare Gateway
Configure identity-based policies in Cloudflare Gateway

During Zero Trust Week in October, we released HTTP filtering in Cloudflare Gateway, which expands protection beyond DNS threats to those at the HTTP layer as well. With this feature, Cloudflare WARP proxies all Internet traffic from an enrolled device to a data center in our network. Once there, Cloudflare Gateway enforces organization-wide rules to prevent data loss and protect team members.

However, rules are not one-size-fits-all. Corporate policies can vary between groups or even single users. For example, we heard from customers who want to stop users from uploading files to cloud storage services except for a specific department that works with partners. Beyond filtering, security teams asked for the ability to audit logs on a user-specific basis. If a user account was compromised, they needed to know what happened during that incident.

We’re excited to announce the ability for administrators to create policies based on a user’s identity and correlate that identity to activity in the Gateway HTTP logs. Your team can reuse the same identity provider integration configured in Cloudflare Access and start building policies tailored to your organization today.

Fine-grained rule enforcement

Until today, organizations could protect their users' Internet-bound traffic by configuring DNS and HTTP Continue reading

How Ansible Configuration Parsing Made Me Pull My Hair Out

Yesterday I wrote a frustrated tweet after wasting an hour trying to figure out why a combination of OSPF and IS-IS routing worked on Cisco IOS but not on Nexus OS. Having to wait for a minute (after Vagrant told me SSH on Nexus 9300v was ready) for NX-OS to “boot” its Ethernet module did’t improve my mood either, and the inconsistencies in NX-OS interface naming (Ethernet1/1 is uppercase while loopback0 and mgmt0 are lowercase) were just the cherry on top of the pile of ****. Anyway, here’s what I wrote:

Can’t tell you how much I hate Ansible’s lame attempts to do idempotent device configuration changes. Wasted an hour trying to figure out what’s wrong with my Nexus OS config… only to find out that “interface X” cannot appear twice in the configuration you want to push.

Not unexpectedly, I got a few (polite and diplomatic) replies from engineers who felt addressed by that tweet, so it’s only fair to document exactly what made me so angry.

How Ansible Configuration Parsing Made Me Pull My Hair Out

Yesterday I wrote a frustrated tweet after wasting an hour trying to figure out why a combination of OSPF and IS-IS routing worked on Cisco IOS but not on Nexus OS. Having to wait for a minute (after Vagrant told me SSH on Nexus 9300v was ready) for NX-OS to “boot” its Ethernet module did’t improve my mood either, and the inconsistencies in NX-OS interface naming (Ethernet1/1 is uppercase while loopback0 and mgmt0 are lowercase) were just the cherry on top of the pile of ****. Anyway, here’s what I wrote:

Can’t tell you how much I hate Ansible’s lame attempts to do idempotent device configuration changes. Wasted an hour trying to figure out what’s wrong with my Nexus OS config… only to find out that “interface X” cannot appear twice in the configuration you want to push.

Not unexpectedly, I got a few (polite and diplomatic) replies from engineers who felt addressed by that tweet, and less enthusiastic response from the product manager (no surprise there), so it’s only fair to document exactly what made me so angry.

Update 2020-12-23: In the meantime, Ganesh Nalawade already implemented a fix that solves my problem. Thanks you, awesome job!

Goodbye 2020… and never come back!

As we approach the end of the year, we can finally say goodbye to 2020. Goodbye 2020… and never come back! But, it is also time to look back at 2020 and try to see what the year 2021 promises us. So, in 2020…   COVID-19! The first thing that comes to mind when we talk about this year, and I think this will be the case for a long time, is the COVID-19! Who could have foreseen at the beginning of January that the entire world would be masked…

The post Goodbye 2020… and never come back! appeared first on AboutNetworks.net.

Add Font Awesome 5 to a Rails 6 App

Font Awesome is a collection of great looking icons that we can use to spice up the look of our app. Software The following software versions were used in this post. Rails - 6.0.3.4 Font Awesome (Free) - 5.15.1 Installation Firstly add the fontawesome-free package via yarn. Next,...

Add Bootstrap 5 to a Rails 6 App

In this post I will show you how to add the Bootstrap CSS framework to your Rails 6 application. Bootstrap is a solid CSS framework that allows us to make our app look really nice and work across a multitude of device types and browsers without having to get bogged down in the...

Declare Your Application State with Tanzu Service Mesh

YES! You can declare your application resiliency state and keep it like that with a combination of Kubernetes and the new application resiliency capabilities in Tanzu Service Mesh.

First things first: what is Tanzu Service Mesh?

Tanzu Service Mesh allows you to create and isolate a logical structure in a Kubernetes cluster, or across different clusters, to achieve an application layer 7 networking and security fabric that you can add values on top of. Just by connecting the dots, we get service discovery, observability, security, and encrypted connectivity for all objects in that global namespace structure. More about TSM global namespaces in excellent blogs here and here.

In this blog, I focus on a new feature that (in my opinion) is a real game-changer for the way we operate and manage application resiliency. As background, I used to work on the customer side for most of my technical career, in operations and infrastructure roles, and the thing I was mostly concerned with was the application and user experience. We had multiple application monitoring solutions that continuously tested user experience via methods such as synthetic transactions (not real user ones) or tap the transaction to get the live experience. Once we Continue reading

An Introduction to WebSockets with Ballerina

Ballerina language to demonstrate how you can effectively use WebSocket features. The Dynamic Web: Looking Back Anjana Fernando Anjana is Director of Developer Relations at WSO2. His latest venture is his role in the Ballerina project, where he has been involved extensively in the design and implementation of the language and its runtime, and now primarily works on its ecosystem engineering and evangelism activities. HTTP is commonly used for a typical request/response scenario. Using JavaScript, the Fetch API help send requests from the client to servers in the background. This allows us to execute data operations without refreshing or loading another web page. However, this doesn’t support the need for server push scenarios, where requests are initiated from the server and sent to the client. So people came up with workarounds to make Continue reading