Archive

Category Archives for "Networking"

Displaying dates and times your way in Linux

The date command on Linux systems is very straightforward. You type “date” and the date and time are displayed in a useful way. It includes the day-of-the-week, calendar date, time and time zone:$ date Tue 26 Nov 2019 11:45:11 AM EST As long as your system is configured properly, you’ll see the date and current time along with your time zone.[Get regularly scheduled insights by signing up for Network World newsletters.] The command, however, also offers a lot of options to display date and time information differently. For example, if you want to display dates in the most useful format for sorting, you might want to use a command like this:To read this article in full, please click here

Displaying dates and times your way

The date command on Linux systems is very straightforward. You type “date” and the date and time are displayed in a useful way. It includes the day-of-the-week, calendar date, time and time zone:$ date Tue 26 Nov 2019 11:45:11 AM EST As long as your system is configured properly, you’ll see the date and current time along with your time zone.[Get regularly scheduled insights by signing up for Network World newsletters.] The command, however, also offers a lot of options to display date and time information differently. For example, if you want to display dates in the most useful format for sorting, you might want to use a command like this:To read this article in full, please click here

What Is a Man in the Middle (MITM) Attack?

Simply put, MITM is an attack in which a third party gains access to the communications between two other parties, without either of those parties realising it. The third party might read the contents of the communication, or in some cases also manipulate it. So, for example, if Gerald sends Leila a message, intending it to be private, and Max intercepts the message, reads it, and passes it on to Leila, that would be a MITM attack. If Gerald wants to transfer £100 to Leila’s bank account, and Max intercepts the transaction and replaces Leila’s account number with his own, that would also be a MITM attack (in this case, Max is putting himself ‘in the middle’ between Gerald and his bank).

Why should I care?

Partly because MITM attacks can undermine so much of our modern way of life. In a connected life, we depend on the reliability and security of every connection. It’s not just about your conversations, messages and emails, either. If you can’t trust the connections you make to websites and online services, you may be vulnerable to fraud or impersonation, and if your connected devices and objects can’t communicate securely and reliably, they may put Continue reading

Guest blog on network automation at THG Tech

Hello my friend,

I’m very proud of working for THG as we are developing really outstanding technical solutions with a high level of automation. If you run massive-scale networks (like we do in the data centre field), the automation is a single option to survive.

These days many people speak about network automation, but what is it in a nutshell? What role does it play? What are the customer expectations to the network and IT business related to the network automation.

Some answers to these questions and many more useful and interesting information you can find in my guest blog in THG Tech blog

Follow me there as well, if you like the post.

Support us





P.S.

If you have further questions or you need help with your networks, I’m happy to assist you, just send me message. Also don’t forget to share the article on your social media, if you like it.

BR,

Anton Karneliuk 

Congratulations to Roy Lexmond on Passing CCDE Practical Exam!

I am very glad to announce that Roy Lexmond from my April CCDE training class passed CCDE Practical exam yesterday in France.

Below is his success story and here is his earlier feedback for the class. I should say that He really likes the design and open to learn new things and very clever.

Please join me to congratulate Roy for his great achievement!

On 19th May in France (Paris) I passed CCDE practical exam. My preparation was done with the cisco learning network excelsheet, Ciscolive video’s, internetworkexpert SP&CCDE courses, Orhan Ergun CCDE Bootcamp and www.orhanergun.net. I attended the Orhan Ergun bootcamp in April-May with lots of great people which helped me prepare well. I really think that the bootcamp helped me to focus on key technologies and discuss them with other people (very important for me) and to understand how to approach the exam.

It was a challenge and took me 2 years, my satisfaction is extreme! and learned alot during those 2 years and still learning. My next goal will be CCIE-SP wich covers some great content inline with the topics the CCDE already covered.

Roy Lexmond

Senior Network Engineer at Routz

CCIE#26557/CCDP/CCDE

I promise to Continue reading

Flat/Single Area OSPF network is not a problem!

Flat OSPF network, or single area OSPF networks are real. In fact most of the OSPF network today deployed, is flat OSPF networks. But how many routers can be placed safely in an OSPF area ? Any number from the real world OSPF deployment ? I will share in this post.

Let me explain what it is first and then will share you some numbers from the real network which I engaged recently.

As you might know, OSPF has two levels of hierarchy. Backbone and Non-Backbone areas.

 

Why Non-Backbone Areas are used in OSPF?

 

The reason is scalability and manageability. At least in theory. I don’t see so many multi area OSPF design though I teach in very detail in my CCDE classes. But that is for the exam purpose.

There are some very large scale networks use OSPF for scalability, so, IP but satellite (Sometimes called an Access POP) POPs are in Non-Backbone area they place.

But there is manageability aspects of having multi area OSPF design. They group their slow speed access and metro or aggregation networks in different OSPF areas and place high speed backbone/core routers in a backbone OSPF area (Area 0).

But, we generally forget Continue reading

The EVPN Dilemma

Got an interesting set of questions from a networking engineer who got stuck with the infamous “let’s push the **** down the stack” challenge:

So I am a rather green network engineer trying to solve the typical layer two stretch problem.

I could start the usual “friends don’t let friends stretch layer-2” or “your business doesn’t really need that” windmill fight, but let’s focus on how the vendors are trying to sell him the “perfect” solution:

Read more ...

How cloud providers’ performance differs

Not all public cloud service providers are the same when it comes to network performance.Each one’s connectivity approach varies, which causes geographical discrepancies in network performance and predictability. As businesses consider moving to the cloud, especially software-defined wide-area networks (SD-WAN) and multi-cloud, it’s important to understand what each public cloud service provider brings to the table and how they compare.To read this article in full, please click here

AWS: 5G Is ‘Not the Holy Grail of IoT’

“5G is an important element but it’s not the Holy Grail of IoT," said AWS IoT VP Dirk...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Prevent lateral compromise with microsegmentation

It’s an unfortunate reality of information security: Eventually, everyone gets compromised. Manufacturers, banks, tech support companies, retail giants, power plants, municipal governments … these are just some of the sectors that have been affected by high-profile data breaches in recent months. Everyone gets hacked. You will, too.

This isn’t cause for despair. It simply means that effective security has to focus on more than just intrusion prevention. Hackers will eventually get into any network, if they’re willing to spend enough time and money doing so. But whether or not they get anything useful once they’ve gained entry—that’s another story.

Good network design can minimize the damage incurred during an attack. There are more ways to approach this than will fit in a single article, so this blog will only focus on network segmentation, and its smaller sibling, microsegmentation.

What is network segmentation?

Network segmentation is the practice of dividing a network into one or more subsections. Each subsection usually contains different kinds of resources and has different policies about who has access to that segment. There are a variety of ways to accomplish the division.

Network segmentation runs along a spectrum from the purely physical to the purely logical. The Continue reading

IDG Contributor Network: SASE: Redefining the network and security architecture

In a cloud-centric world, users and devices require access to services everywhere. The focal point has changed. Now it is the identity of the user and device as opposed to the traditional model that focused solely on the data center. As a result, these environmental changes have created a new landscape that we need to protect and connect.This new landscape is challenged by many common problems. The enterprises are loaded with complexity and overhead due to deployed appliances for different technology stacks. The legacy network and security designs increase latency. In addition, the world is encrypted; this dimension needs to be inspected carefully, without degrading the application performance.To read this article in full, please click here

Amazon Challenges Pentagon’s $10B JEDI Award

While the basis of the suit isn’t clear at this time, court files indicate the case may center...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Dell Tech’s 2030 Goals Show Social Impact Makes Business Sense

Hiring women and people of color, and cutting your company’s carbon footprint are no longer just...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Tech Bytes: SolarWinds’ APM Tools Work Together To Help IT Solve Application Problems (Sponsored)

SolarWinds stops by the Tech Bytes podcast to talk about its Application Performance Management suite, which includes Web app and user experience monitoring, log management and analysis, and app infrastructure monitoring. We look at how they work together to help IT teams get to the bottom of application issues. Our guest is Denny LeCompte, senior vice president and general manager of application management at SolarWinds.

Tech Bytes: SolarWinds’ APM Tools Work Together To Help IT Solve Application Problems (Sponsored)

SolarWinds stops by the Tech Bytes podcast to talk about its Application Performance Management suite, which includes Web app and user experience monitoring, log management and analysis, and app infrastructure monitoring. We look at how they work together to help IT teams get to the bottom of application issues. Our guest is Denny LeCompte, senior vice president and general manager of application management at SolarWinds.

The post Tech Bytes: SolarWinds’ APM Tools Work Together To Help IT Solve Application Problems (Sponsored) appeared first on Packet Pushers.

5G NR Demand Skyrockets RAN Market, Dell’Oro Says

In a separate report, Ericsson says the global number of 5G subscriptions will top 2.6 billion by...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.