Three reports show cyberattacks continue to mutate along with the COVID-19 pandemic, and they...
The Swedish vendor raised its prediction for 5G subscriptions from 2.6 billion to 2.8 billion by...
Taking advantage: Cyberattackers are reconfiguring the Remcos trojan, which allows them full access to victims’ computers, to include COVID-19 warnings in spam and phishing emails, Security Boulevard reports. “With the economy directly affected by the pandemic, people pay more attention to emails pretending to offer solutions, loans and other types of financial support. Another effective approach is to scare people with threats of account closures or company furloughs.”
The impact of a shutdown: An ongoing phone and Internet service shutdown in the Kashmir region is hurting the ability to distribute information and supplies during the COVID-19 pandemic, Greater Kashmir says. “People in need of essentials used to reach out to us on our helplines which have turned defunct,” said the chairman of an aid agency. “We used to make phone calls to our existing 750 beneficiaries for conveying them about timings to pick up their quota of essentials. But suspension of mobile networks has disturbed this entire process.”
Cooperative Internet service: The Christian Science Monitor has a story about small rural cooperatives building their own Internet services. Cooperatives, which are private businesses owned by customers, are common in parts of the U.S. Midwest, some providing electricity and Continue reading
The company also claims the new Teralynx 8 platform is the first generation of switch silicon to...
Hello my friend,
Some time ago we have covered in-depth OpenConfig with NETCONF configuration as well as the OpenConfig telemetry with NETCONF. Today we want to make a next step and start discussion about another approach to manage the network elements in a programmatic way, which is gNMI.
1
2
3
4
5 No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.
Following your asks we open a new format for the network automation training – self-paced format:
You decide on your own when, how often and how quickly you can learn.
However, if you want to join groups, that is something we are happy to offer you as well.
At this training we teach you all the necessary concepts such as YANG data modelling, working with JSON/YAML/XML Continue reading
Imagine a life where you would be able to…
… and be able to do all that in a multi-vendor environment without writing tons of Ansible playbooks or Python code.
Juniper devices have a default ARP policer that drops ARP requests and responses over 150kbps. By default, this is an aggregate policer that applies to all interfaces. This can lead to unexpected behavior when high levels of ARP on one interface lead to BGP session drops on another interface. You can’t change the default policer limits, but you can create a new policer, with higher limits.
I was investigating a problem reported by one of our Transit providers. Once a day or so, our IPv4 BGP session with them would flap. The interface itself was stable, and the IPv6 session remained up. One particular site was seeing this more than others. The sites used different platforms, but were running the same code version.
The curious thing was the logs - we saw log messages saying that we had a notification message saying NOTIFICATION received from 192.0.2.188 (External AS 64498): code 4 (Hold Timer Expired Error)
. The syslog included this hold timer 30s, hold timer remain 0s, last sent 2s
. So our router thought it was sending regular KEEPALIVE messages, but the remote end thought it had missed too many.
Looking Continue reading
Juniper devices have a default ARP policer that drops ARP requests and responses over 150kbps. By default, this is an aggregate policer that applies to all interfaces. This can lead to unexpected behavior when high levels of ARP on one interface lead to BGP session drops on another interface. You can’t change the default policer limits, but you can create a new policer, with higher limits.
I was investigating a problem reported by one of our Transit providers. Once a day or so, our IPv4 BGP session with them would flap. The interface itself was stable, and the IPv6 session remained up. One particular site was seeing this more than others. The sites used different platforms, but were running the same code version.
The curious thing was the logs - we saw log messages saying that we had a notification message saying NOTIFICATION received from 192.0.2.188 (External AS 64498): code 4 (Hold Timer Expired Error)
. The syslog included this hold timer 30s, hold timer remain 0s, last sent 2s
. So our router thought it was sending regular KEEPALIVE messages, but the remote end thought it had missed too many.
Looking Continue reading
Nokia faced a hostile takeover bid; Google eyeing a D2iQ purchase; T-Mobile to slash $30M in cloud...
A tweet by Corey Quinn pointed me to his hilarious riff on the you are not Google and don’t have the same problems theme. Enjoy!
"We might be slowed down on the number of base stations that we are able to construct, but I...
Mat Jovanovic decided to follow my lead and migrate his blog from Blogger to Hugo, using Docsy theme, AWS Amplify as the CI/CD pipeline, and AWS S3 as the hosting platform.
Nice job… but he did way more than that - he documented the whole process, including tool selection, setup, and Blogger migration.
Thank you Mat! Every time I see someone publishing blog posts about open-source tools on Medium I’ll send them a link to your blog (with a comment “this is how you should blog about open-source solutions").
Network Tracing sometimes is really important, although most of the times tcpdump utility is quite handy there are other tools that can make life much easier.
while am no expert in eBPF and scripts, i do know how to use bcc-tools in some scenarios.
https://github.com/iovisor/bcc/blob/master/INSTALL.md#ubuntu—binary
Alright What is the scenario:
Let’s start with something small, you want to measure TCP connection latency.
Other interesting options, you can capture lifetime, stats and most importantly TCP-Retransmissions
Ebpf filters are safer and more powerful to implement, give this a consideration during any Linux troubleshooting scenarios.
-Rakesh
Cisco patched firewall bugs; Amazon threw another JEDI tantrum fit ; and Dish fought off critics,...
On today's Heavy Networking podcast, guest Cory Steele visits the podcast to make the case that overlays such as LISP offer unique benefits for the network. Greg Ferro disagrees, and makes the case for protocols like QUIC, TLS, and IPSec, and argues for the concept of end-to-end connectivity as the IP network was intended.
The post Heavy Networking 516: Is LISP The Overlay Of The Future? appeared first on Packet Pushers.