Archive

Category Archives for "Networking"

Q&A: HPE’s networking chief opens up about intelligent edge, Cisco and micro data centers

Since founding Aruba Networks in 2002 and then staying on when Hewlett Packard bought the firm in 2013,  Keerti Melkote has seen firsthand the evolution of the wireless industry.From the initial rush to bring laptops using Wi-Fi to the enterprise and the advent of Apple iPad – which Melkote says was a defining moment for enterprise mobility because of the device’s popularity and its need for pervasive enterprise Wi-Fi connectivity – the wireless world has changed dramatically. More about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT And as HPE's President, Intelligent Edge, Melkote is in a position to set the future course for the company’s wired and wireless strategy.  He recently talked with Network World Senior Editor Michael Cooney to lay out HPE’s networking challenges and strategies as it negotiates one of the most technologically and competitively challenging markets.To read this article in full, please click here

StreamSets Reaches for the Sky With Cloud Service Launch

Its namesake cloud data integration platform aims to address variables that come with ingesting and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Prevent DNS (and other) spoofing with Calico

AquaSec’s Daniel Sagi recently authored a blog post about DNS spoofing in Kubernetes. TLDR is that if you use default networking in Kubernetes you might be vulnerable to ARP spoofing which can allow pods to spoof (impersonate) the IP addresses of other pods. Since so much traffic is dialed via domain names rather than IPs, spoofing DNS can allow you to redirect lots of traffic inside the cluster for nefarious purposes.

So this is bad, right? Fortunately, Calico already prevents ARP spoofing out of the box. Furthermore, Calico’s design prevents other classes of spoofing attacks. In this post we’ll discuss how Calico keeps you safe from IP address spoofing, and how to go above and beyond for extra security.

 

ARP Spoofing

ARP spoofing is an attack that allows a malicious pod or network endpoint to receive IP traffic that isn’t meant for it. Sagi’s post already describes this well, so I won’t repeat the details here. An important thing to note, however, is that ARP spoofing only works if the malicious entity and the target share the same layer 2 segment (e.g. have direct Ethernet connectivity). In Calico, the network is fully routed at layer 3, meaning that Continue reading

Fast Reroute, Fast Convergence, WRED and WFQ

Fast Reroute , Fast Convergence , WRED and WFQ. You may think that why Orhan is putting all these mechanisms together. I will give you an analogy. Those who participate my talks., know that I love using analogies.  Before we try to understand how these mechanisms are related with each other, let me explain what …

The post Fast Reroute, Fast Convergence, WRED and WFQ appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

FTC fines YouTube, but do fines really encourage change? | TECH(feed)

The FTC hit yet another tech company with a seemingly massive fine for mishandling user data. This time, YouTube, owned by Google, is forced to pay $170 million for collecting data about children under 13 without parental consent. The Federal Trade Commission slapped Facebook with a $5 billion fine just a few months ago. In this episode of TECH(feed), Juliet asks whether or not these fines are effective in regulating the tech industry.

An MNO’s Guide to Buying a 5G-Ready Next-Generation Firewall

In the new era of 5G, mobile network operators have the opportunity to move up the value chain and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Pureport’s Multicloud Fabric Now Supports AWS Transit Gateway

The addition of AWS Transit Gateway to Pureport's Multicloud Fabric platform means users can now...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Sprint and T-Mobile US Coordinate 5G Strategies

Executives from both carriers highlighted the combined strengths of their networks at the Mobile...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

USB4 gets final approval, offers Ethernet-like speed

The USB Implementers Forum (USB-IF), the industry consortium behind the development of the Universal Serial Bus (USB) specification, announced this week it has finalized the technical specifications for USB4, the next generation of the spec.One of the most important aspects of USB4 (they have dispensed with the space between the acronym and the version number with this release) is that it merges USB with Thunderbolt 3, an Intel-designed interface that hasn’t really caught on outside of laptops despite its potential. For that reason, Intel gave the Thunderbolt spec to the USB consortium.Unfortunately, Thunderbolt 3 is listed as an option for USB4 devices, so some will have it and some won’t. This will undoubtedly cause headaches, and hopefully all device makers will include Thunderbolt 3.To read this article in full, please click here

Data center cooling: Electricity-free system sends excess building heat into space

We all know that blocking incoming sunlight helps cool buildings and that indoor thermal conditions can be improved with the added shade. More recently, though, scientists have been experimenting with ways to augment that passive cooling by capturing any superfluous, unwanted solar heat and expelling it, preferably into outer space, where it can’t add to global warming.Difficulties in getting that kind of radiative cooling to work are two-fold. First, directing the heat optimally is hard.“Normally, thermal emissions travel in all directions,” says Qiaoqiang Gan, an associate professor of electrical engineering at University at Buffalo, in a news release. The school is working on radiative concepts. That’s bad for heat spill-over and can send the thermal energy where it’s not wanted—like into other buildings.To read this article in full, please click here

Data center cooling: Electricity-free system sends excess building heat into space

We all know that blocking incoming sunlight helps cool buildings and that indoor thermal conditions can be improved with the added shade. More recently, though, scientists have been experimenting with ways to augment that passive cooling by capturing any superfluous, unwanted solar heat and expelling it, preferably into outer space, where it can’t add to global warming.Difficulties in getting that kind of radiative cooling to work are two-fold. First, directing the heat optimally is hard.“Normally, thermal emissions travel in all directions,” says Qiaoqiang Gan, an associate professor of electrical engineering at University at Buffalo, in a news release. The school is working on radiative concepts. That’s bad for heat spill-over and can send the thermal energy where it’s not wanted—like into other buildings.To read this article in full, please click here

IPv6 Buzz 034: Why AWS Embraces IPv6

AWS regards IPv6 as a key mechanism to enable customer agility, and to meet rising demands from new applications and devices, particularly IoT. In this episode, Scott and Tom interview Alan Halachmi, Senior Manager of Solutions Architecture at AWS. They discuss current and planned IPv6 support in AWS services, the cloud provider's challenges in deploying the protocol, and advice for cloud users on adopting IPv6.

IPv6 Buzz 034: Why AWS Embraces IPv6

AWS regards IPv6 as a key mechanism to enable customer agility, and to meet rising demands from new applications and devices, particularly IoT. In this episode, Scott and Tom interview Alan Halachmi, Senior Manager of Solutions Architecture at AWS. They discuss current and planned IPv6 support in AWS services, the cloud provider's challenges in deploying the protocol, and advice for cloud users on adopting IPv6.

The post IPv6 Buzz 034: Why AWS Embraces IPv6 appeared first on Packet Pushers.

Fast WordPress Sites with Bluehost & Cloudflare Workers

Fast WordPress Sites with Bluehost & Cloudflare Workers
Fast WordPress Sites with Bluehost & Cloudflare Workers

WordPress is the most popular CMS (content management system) in the world, powering over a third of the top 10 million websites, according to W3Techs.

WordPress is an open source software project that many website service providers host for end customers to enable them to build WordPress sites and serve that content to visitors over the Internet.  For hosting providers, one of the opportunities and challenges is to host one version of WordPress on their infrastructure that is high performing for all their customers without modifying the WordPress code on a per customer basis.

Hosting providers are increasingly turning to Cloudflare’s Serverless Workers Platform to deliver high performance to their end customers by fixing performance issues at the edge while avoiding modifying code on an individual site basis.

One innovative WordPress hosting provider that Cloudflare has been working with to do this is Bluehost, a recommended web host by WordPress.org. In collaboration with Bluehost, Cloudflare’s Workers have been able to achieve a 40% performance improvement for those sites running Workers. Bluehost started with Cloudflare Workers code for Fast Google Fonts which in-lines the browser-specific font CSS and re-hosts the font files through the page origin. This removes the multiple Continue reading

Exploit found in Supermicro motherboards could allow for remote hijacking

A security group discovered a vulnerability in three models of Supermicro motherboards that could allow an attacker to remotely commandeer the server. Fortunately, a fix is already available.Eclypsium, which specializes in firmware security, announced in its blog that it had found a set of flaws in the baseboard management controller (BMC) for three different models of Supermicro server boards: the X9, X10, and X11.[ Also see: What to consider when deploying a next-generation firewall | Get regularly scheduled insights: Sign up for Network World newsletters ] BMCs are designed to permit administrators remote access to the computer so they can do maintenance and other updates, such as firmware and operating system patches. It’s meant to be a secure port into the computer while at the same time walled off from the rest of the server.To read this article in full, please click here

Flaw found in Supermicro motherboards could allow for remote hijacking

A security group discovered a vulnerability in three models of Supermicro motherboards that could allow an attacker to remotely commandeer the server. Fortunately, a fix is already available.Eclypsium, which specializes in firmware security, announced in its blog that it had found a set of flaws in the baseboard management controller (BMC) for three different models of Supermicro server boards: the X9, X10, and X11.[ Also see: What to consider when deploying a next-generation firewall | Get regularly scheduled insights: Sign up for Network World newsletters ] BMCs are designed to permit administrators remote access to the computer so they can do maintenance and other updates, such as firmware and operating system patches. It’s meant to be a secure port into the computer while at the same time walled off from the rest of the server.To read this article in full, please click here

Flaw found in Supermicro motherboards could allow for remote hijacking

A security group discovered a vulnerability in three models of Supermicro motherboards that could allow an attacker to remotely commandeer the server. Fortunately, a fix is already available.Eclypsium, which specializes in firmware security, announced in its blog that it had found a set of flaws in the baseboard management controller (BMC) for three different models of Supermicro server boards: the X9, X10, and X11.[ Also see: What to consider when deploying a next-generation firewall | Get regularly scheduled insights: Sign up for Network World newsletters ] BMCs are designed to permit administrators remote access to the computer so they can do maintenance and other updates, such as firmware and operating system patches. It’s meant to be a secure port into the computer while at the same time walled off from the rest of the server.To read this article in full, please click here

Exploit found in Supermicro motherboards could allow for remote hijacking

A security group discovered a vulnerability in three models of Supermicro motherboards that could allow an attacker to remotely commandeer the server. Fortunately, a fix is already available.Eclypsium, which specializes in firmware security, announced in its blog that it had found a set of flaws in the baseboard management controller (BMC) for three different models of Supermicro server boards: the X9, X10, and X11.[ Also see: What to consider when deploying a next-generation firewall | Get regularly scheduled insights: Sign up for Network World newsletters ] BMCs are designed to permit administrators remote access to the computer so they can do maintenance and other updates, such as firmware and operating system patches. It’s meant to be a secure port into the computer while at the same time walled off from the rest of the server.To read this article in full, please click here

What is AIGP – Accumulated IGP Metric Attribute? Where AIGP is used?

What is AIGP – Accumulated IGP Metric Attribute? Where AIGP is used? AIGP stands for Accumulated IGP Metric Attribute which is specified in RFC 7311. IGPs (Interior Gateway Protocols) are designed to run within a single administrative domain and they make path-selection decision based on metric value. This post is written based on the information in BGP …

The post What is AIGP – Accumulated IGP Metric Attribute? Where AIGP is used? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.