A Docker networking rant coming from my good friend Marko Milivojević triggered a severe case of Deja-Moo, resulting in a flood of unpleasant memories caused by too-successful “disruptive” IT vendors.
Imagine you’re working for a startup creating a cool new product in the IT infrastructure space (if you have an oversized ego you would call yourself “disruptive thought leader” on your LinkedIn profile) but nobody is taking you seriously. How about some guerrilla warfare: advertising your product to people who hate the IT operations (today we’d call that Shadow IT).
Read more ...MACsec is an interesting alternative to existing tunneling solutions, that protects Layer 2 by performing integrity, origin authentication and, optionally, encryption. Normal use-case is to use MACsec between hosts and access switches, between two hosts or between two switches. This article is a leftover from MACsec on Linux that I first tested in 2016 when support for MACsec was just included in the kernel. I will describe how MACsec is used together with a Layer 2 GRE tunnel to protect the traffic between two remote sites, over WAN or Internet, like a site-to-site VPN at Layer 2.
Datadog Barks Back to Cisco’s $7B Offer, Fetches $648M in IPO: GitLab Inhales $268M Series E,...
Anti-encryption demands: Government officials from the U.S., U.K., and Australia have asked Facebook to put a hold on its plans to expand encryption on services like Messenger, CNet reports. “We are writing to request that Facebook does not proceed with its plan to implement end-to-end encryption across its messaging services without ensuring that there is no reduction to user safety and without including a means for lawful access to the content of communications to protect our citizens,” says a letter signed by U.S. Attorney General William Barr and other officials.
This law is not fake: A new fake news law in Singapore has taken effect, SPDP Radio says. The law includes penalties of up to US $60,000 and 10 years in prison for people found guilty of spreading what the government considers to be fake news. Web sites could face fines of more than $720,000 for not taking down so-called fake news after being ordered to do so. Free speech advocates have major problems with the law, as you might expect.
The lines are cut: Internet access in most of Iraq was shut down after violent protest in the country, CNet says. Some people were Continue reading
The partnership is focused on ensuring that SD-WAN vendors are developing products that meet the...
On today's sponsored Tech Bytes episode we talk with MidSouth Bank CIO Daniel Hereford about how he's using SD-WAN from Silver Peak to support the bank's transformation to a hybrid cloud model, while also improving network visibility and performance for mission-critical applications.
The post Tech Bytes: MidSouth Bank Invests In Network Performance, Visibility With Silver Peak SD-WAN (Sponsored) appeared first on Packet Pushers.
Vodafone, an early proponent of the Telecom Infra Project’s OpenRAN initiative, says it started...
Register now for Attend Open Source Summit + Embedded Linux Conference Europe held October 28 - 30,...
The technology cocktail can support smart city initiatives without having to rip up streets to...
Today's Network Break analyzes Adtran's entry into the SD-WAN market, a new IBN product from Lumina Networks, the latest software upgrade from NTOP, Google's timeline for blocking HTTP elements in HTTPS sessions in Chrome, plus a couple of detailed follow-ups, and a Tech Bytes show.
The post Network Break 255: Adtran Gets Into SD-WAN; Google Preps Chrome To Block HTTP Mixed With HTTPS appeared first on Packet Pushers.
Don't underestimate engineers. They are smarter than people comprehend.
The post Kill the restructure | The IT Skeptic appeared first on EtherealMind.
Have you ever seen an Ansible playbook where 90% of the code prepares the environment, and then all the work is done in a few template and assemble modules? Here’s an alternative way of getting that done. Is it better? You tell me ;)
Convincing research that wireless chargers aren't good (yet)
The post How you charge your mobile phone could compromise its battery lifespan appeared first on EtherealMind.
The tutorial discusses configuration of site-to-site VPN on VyOS using preshared-key. Static key configuration offers the simplest setup, and is ideal for point-to-point VPNs or proof-of-concept testing. The advantages of using static key are simple setup and no X509 PKI (Public Key Infrastructure) to maintain. The disadvantages are limited scalability - one client, one server setup and the lack of perfect forward secrecy - key compromise results in a total disclosure of previous sessions. Also, a secret key must exist in plain-text form on each VPN peer and it must be exchanged using a pre-existing secure channel.
Our lab consists of two remote sites (Picture 1). The router running network OS - VyOS is presented on each side, connecting computers PC and PC2 to to a particular LAN network. The both VyOS routers are configured forOpenVPN site-to-site mode and the routers also perform NAT (PAT) and firewall services.
Picture 1 - Network Topology
1. VyOS Site1 Configuration
1.1 Hostname, IP addresses, SSH
vyos@vyos:~$ configure
vyos@vyos# set system host-name Site1
yos@vyos# commit
vyos@vyos# save
vyos@Site1# set interfaces ethernet eth1 address 10.0.0.254/24
vyos@Site1# set interfaces ethernet eth0 address 11.0.2.1/24
vyos@Site1# set service ssh
vyos@Site1# commit
Continue reading
Primera storage will help the financial firm to reduce its data center footprint and improve its...
Anycast (advertising the same IP address from multiple servers/locations) has long been used to implement scale-out public DNS services (the whole root DNS system runs on massive anycast), but it’s not as common in enterprise networks.
The blog posts written by Tom Bowles should get you there. He started with the idea and described his implementation using Infoblox DNS.
Want to know even more? I covered numerous load balancing mechanisms including anycast in Data Centers Infrastructure for Networking Engineers webinar.