Archive

Category Archives for "Networking"

Example: Securing AWS Deployment

Nadeem Lughmani created an excellent solution for the securing your cloud deployment hands-on exercise in our public cloud online course. His Terraform-based solution includes:

  • Security groups to restrict access to web server and SSH bastion host;
  • An IAM policy and associated user that has read-only access to EC2 and VPC resources (used for monitoring)
  • An IAM policy that has full access to as single S3 bucket (used to modify static content hosted on S3)
  • An IAM role for AWS CloudWatch logs
  • Logging SSH events from the SSH bastion host into CloudWatch logs.

Many ad hocWi-Fi networks from the outset of COVID-19 still in use

The onset of the pandemic caught most organizations unware, and IT departments were no exception. They had to address that workers could suddenly no longer safely come into the office, doctors needed to stand up telemedicine services, and professional and amateur sports were just generally scrambling.Groups like the Information Technology Disaster Resource Center have been at the forefront of many such efforts, particularly those being undertaken by municipalities and school districts. The group helps provide technological know-how through volunteer workers, and help keep organizations connected in the wake of disasters.[Get regularly scheduled insights by signing up for Network World newsletters.] After COVID, the group has been a lot more active, according to operations director Joe Hillis.To read this article in full, please click here

Many ad hoc Wi-Fi networks from the outset of COVID-19 still in use

The onset of the pandemic caught most organizations unware, and IT departments were no exception. They had to address that workers could suddenly no longer safely come into the office, doctors needed to stand up telemedicine services, and professional and amateur sports were just generally scrambling.Groups like the Information Technology Disaster Resource Center have been at the forefront of many such efforts, particularly those being undertaken by municipalities and school districts. The group helps provide technological know-how through volunteer workers, and help keep organizations connected in the wake of disasters.[Get regularly scheduled insights by signing up for Network World newsletters.] After COVID, the group has been a lot more active, according to operations director Joe Hillis.To read this article in full, please click here

Mitigating the Risks of Instance Metadata in AWS EKS

Compromising a pod in a Kubernetes cluster can have disastrous consequences on resources in an AWS Elastic Kubernetes Service (EKS) account if access to the Instance Metadata service is not explicitly blocked. The Instance Metadata service is an AWS API listening on a link-local IP address. Only accessible from EC2 instances, it enables the retrieval of metadata that is used to configure or manage an instance. Although you can only access instance metadata and user data from within the instance itself, the data is not protected by authentication or cryptographic methods.

A recent blog described a scenario where an attacker compromised a pod in an EKS cluster by exploiting a vulnerability in the web application it was running, thus enabling the attacker to enumerate resources in the cluster and in the associated AWS account. This scenario was simulated by running a pod and attaching to a shell inside it.

By querying the Instance Metadata service from the compromised pod, the attacker was able to access the service and retrieve temporary credentials for the identity and access management (IAM) role assigned to the EC2 instances acting as Kubernetes worker nodes. At that point, the attacker was able to pursue multiple exploits, Continue reading

Alleged leaks from AMD indicate big performance gains in upcoming Epyc refresh

A German tech site claims to have internal AMD documents that show the next generation of AMD Epyc server processors will boast a significant performance gain. AMD declined to comment on the veracity of the article.Hardwareluxx posted what it said were details from internal AMD slides revealing the performance potential of AMD's next-gen server processors, codenamed “Milan,” otherwise known as Zen 3, due to ship later this year.According to the slides, Zen 3 is in many ways similar to the Zen 2 generation (aka “Rome”) currently on the market. It will be socket-compatible with the first and second generation of Epycs, so current owners can swap out the older chips for newer. It will have a maximum of 64 cores, which is the same as Rome. It will support DDR4 memory and PCI Express 4.0 interconnects, like Rome. One difference is that instead of two 16MB L3 caches, Milan will have one 32MB L3 cache.To read this article in full, please click here

Alleged leaks from AMD indicate big performance gains in upcoming Epyc refresh

A German tech site claims to have internal AMD documents that show the next generation of AMD Epyc server processors will boast a significant performance gain. AMD declined to comment on the veracity of the article.Hardwareluxx posted what it said were details from internal AMD slides revealing the performance potential of AMD's next-gen server processors, codenamed “Milan,” otherwise known as Zen 3, due to ship later this year.According to the slides, Zen 3 is in many ways similar to the Zen 2 generation (aka “Rome”) currently on the market. It will be socket-compatible with the first and second generation of Epycs, so current owners can swap out the older chips for newer. It will have a maximum of 64 cores, which is the same as Rome. It will support DDR4 memory and PCI Express 4.0 interconnects, like Rome. One difference is that instead of two 16MB L3 caches, Milan will have one 32MB L3 cache.To read this article in full, please click here

History of Networking: Networking at Google with Richard Hay

Google fascinates network engineers because of the sheer scale of their operations, and their obvious influence over the way networks are built and operated. In this episode of the History of Networking, Richard Hay joins Donald Sharp and Russ White to talk about some past designs and stories of failure and success in one of the world’s largest operating networks.

download

Two clicks to add region-based Zero Trust compliance

Two clicks to add region-based Zero Trust compliance

Your team members are probably not just working from home - they may be working from different regions or countries. The flexibility of remote work gives employees a chance to work from the towns where they grew up or countries they always wanted to visit. However, that distribution also presents compliance challenges.

Depending on your industry, keeping data inside of certain regions can be a compliance or regulatory requirement. You might require employees to connect from certain countries or exclude entire countries altogether from your corporate systems.

When we worked in physical offices, keeping data inside of a country was easy. All of your users connecting to an application from that office were, of course, in that country. Remote work changed that and teams had to scramble to find a way to keep people productive from anywhere, which often led to sacrifices in terms of compliance. Starting today, you can make geography-based compliance easy again in Cloudflare Access with just two clicks.

You can now build rules that require employees to connect from certain countries. You can also add rules that block team members from connecting from other countries. This feature works with any identity provider configured and requires no Continue reading

Docker Services 101

Last week I published an overview of how complex (networking-wise) Docker Swarm services can get. This time let’s focus on something that should have been way simpler: running container-based services on a single Linux host.

In the first part of this article I’m focusing on the basics, including exposed ports, and published ports. The behind-the-scenes details are coming in a week or so; in the meantime you can enjoy (most of them) in the Docker Networking Deep Dive webinar.

Researchers set a new world-record Internet speed

Researchers at University College London claim they’ve obtained a new top internet speed of 178Tbps – a fifth quicker than the prior record and fast enough to download the entire Netflix catalog in under a second, they say.To achieve that, the researchers used different bandwidth ranges than are typically used in commercial optical systems. Traditional fiber infrastructure uses bandwidth of 4.5THz with 9THz becoming more available commercially. In UCL experiments, the scientists used 16.8THz.[Get regularly scheduled insights by signing up for Network World newsletters.] To do this the researchers used a variety of amplifier technologies, customizing which ones they used for each wavelength to optimize its performance as measured by phase, brightness and polarization, according to a press statement put out by UCL. These customization packages are known as geometric signal constellations.To read this article in full, please click here

Researchers set a new world-record Internet speed

Researchers at University College London claim they’ve obtained a new top internet speed of 178Tbps – a fifth quicker than the prior record and fast enough to download the entire Netflix catalog in under a second, they say.To achieve that, the researchers used different bandwidth ranges than are typically used in commercial optical systems. Traditional fiber infrastructure uses bandwidth of 4.5THz with 9THz becoming more available commercially. In UCL experiments, the scientists used 16.8THz.[Get regularly scheduled insights by signing up for Network World newsletters.] To do this the researchers used a variety of amplifier technologies, customizing which ones they used for each wavelength to optimize its performance as measured by phase, brightness and polarization, according to a press statement put out by UCL. These customization packages are known as geometric signal constellations.To read this article in full, please click here

Build DSCP to ToS conversion table with Python

Contents

Introduction

In this post we're going to write Python program that generates DSCP to ToS conversion table while avoiding hardcoding values as much as possible. We will then save the final table to csv file with pre-defined column headers.

I got the idea for this blog article from the tweet posted the other day by Nick Russo. I thought it is an interesting problem to tackle as similar ones pop up all the time during early stages of Network Automation journey. What makes this challenge great is that it requires us to carry out tasks that apply to writing larger programs.

  • We need to understand the problem and possibly do some research.
  • We have to come up with plan of action.
  • We need to break down larger tasks into smaller pieces.
  • We need to implement all Continue reading

The Digital Divide May Be News, But It’s Not New

This opinion piece was originally published in Morning Consult.

Low-income Americans; Black, Hispanic and Native Americans; the elderly; Americans with a high school education or less; and rural Americans are much more likely to be on the wrong side of the digital divide. Ours remains a nation where too many people, often our most vulnerable citizens, are unconnected or under-connected.

The digital divide may have made the news during the COVID-19 pandemic, but it isn’t new.

For much of the past quarter-century, Washington policymakers have ignored the digital divide. In more recent years, some public officials, for political reasons, have identified the digital divide as primarily a rural issue, noting that approximately 5 million rural American households can’t access broadband networks. In reality, the number of rural households that can’t access broadband is dwarfed by the roughly 20 million American households that can’t afford Internet access, and that number almost certainly has increased as a result of the pandemic.

Today, Washington finally seems willing to engage in addressing the digital divide. What we need now are not the patchwork solutions of the past, but a thoughtful, fully funded, comprehensive effort to ensure broadband connectivity for all Americans.

My colleagues and Continue reading

Tech Bytes: UCT’s Global WAN Performance Sparkles With Silver Peak SD-WAN (Sponsored)

Today's Tech Bytes is a conversation with Silver Peak customer UCT about how it adopted SD-WAN to boost performance and minimize the downtime of critical business applications. With 21 sites in 8 countries, the company relies on its WAN to support in-house applications and manage the logistics of its global operations. Our guest is James Mccoll, Network Engineer at UCT.

Tech Bytes: UCT’s Global WAN Performance Sparkles With Silver Peak SD-WAN (Sponsored)

Today's Tech Bytes is a conversation with Silver Peak customer UCT about how it adopted SD-WAN to boost performance and minimize the downtime of critical business applications. With 21 sites in 8 countries, the company relies on its WAN to support in-house applications and manage the logistics of its global operations. Our guest is James Mccoll, Network Engineer at UCT.

The post Tech Bytes: UCT’s Global WAN Performance Sparkles With Silver Peak SD-WAN (Sponsored) appeared first on Packet Pushers.

Network Break 299: Cisco Acquires Audio Filter BabbleLabs; Apple Update Hits Facebook In The Ads

Today's Network Break shares listener follow-up, then dives into a new Cisco acquisition of an audio company; discusses how Facebook is responding to an Apple update that will hurt a part of Facebook's business; covers financial results from HPE, VMware, and Nutanix; and more tech news.

The post Network Break 299: Cisco Acquires Audio Filter BabbleLabs; Apple Update Hits Facebook In The Ads appeared first on Packet Pushers.

The Week in Internet News: U.S. Moves Closer to Banning Chinese Apps

Shopping for video: As U.S. President Donald Trump pushes for a ban of TikTok unless it’s sold by its Chinese owner, Walmart has joined Microsoft in a bid for the short-video sharing app, CNBC reports. TikTok is reportedly nearing an agreement to sell its U.S., Canadian, Australian, and New Zealand operations for $20 billion to $30 billion.

Boycotting an app ban: Another Chinese app that’s been targeted by Trump is WeChat, but the Chinese foreign ministry has suggested that consumers in the country could boycott Apple if the U.S. takes action against WeChat, The Straits Times says. Apple, as a large U.S. company, seems to be a convenient target for Chinese consumers.

An East/West split: As others have warned, an official with the U.K.’s National Cyber Security Centre has suggested that the Internet may split into a Western version and a Chinese-led Eastern version if Trump moves forward with a ban of Chinese apps, the Independent reports. A split could raise concerns about Western technology keeping up with the East, the official says.

Spy vs. hacker: New Zealand’s government has turned to its intelligence agency to thwart a sustained, multi-day cyberattack on the Continue reading