Archive

Category Archives for "Networking"

What’s hot at the edge for 2020? Everything

Few areas of the enterprise face as much churn as the edge of the network.  Experts say a variety of challenges drive this change – from increased SD-WAN access demand to cloud interconnected resources and IoT, the traditional perimeter of the enterprise is shifting radically and will continue to do so throughout 2020.One indicator: Gartner research that says by 2023, more than 50% of enterprise-generated data will be created and processed outside the data center or cloud, up from less than 10% in 2019.To read this article in full, please click here

Celebrating a Successful Chapterthon 2019!

We are incredibly inspired by the collaborative projects brought to life by our Chapters for the 2019 Chapterthon, the global contest in which Internet Society Chapters develop a project within a set timeline and budget to achieve a common goal for the development of the Internet. This year’s theme was “Connecting the Unconnected” – because every last person on the planet is part of having an Internet for “everyone”, and we won’t rest until each person has the option of choosing to be connected.

Internet Society Chapters from all corners of the world developed innovative solutions that will continue to serve as inspiration for communities everywhere working to connect the unconnected. At the end of the contest, each project presented a three-minute video about the project specifics and its benefits to the community. Winning projects received a prize.

See how they addressed this global issue through local community initiatives!


Announcing the Winners!

1st Prize (USD 3000)
US New York Chapter
First Annual NYC Mesh Installathon: This project aims to mobilize a large team of volunteers on a single day to expand the NYC Mesh community network to at least six new locations, and connect underserved areas of New York City.

2nd Prize (USD 2000)
South Africa Chapter
Qokolweni Wi-fi Hotspots: This Continue reading

Asset Inventories

PCI365

How do you know what you need to apply your PCI DSS controls to? Simple, you check your asset inventory. You do have one, right? You know, PCI DSS requirement 2.4? Oh. You haven’t got one, have you.

Never fear, creating one is relatively simple providing you know your scope. Creating the asset inventory is really just a case of listing all the components that are in-scope for you. What should you include though?

Well, all system components so that’s things like network devices, firewalls, servers, desktops, laptops, wireless access points (important enough they get their own requirement, 11.1.1) and POI machines. You should also include at least key software that is used within your environment (think operating systems, payment applications, server software etc.)

You also need to include enough information to satisfy PCI DSS so for each item that is:

  • Enough information to uniquely identify the component (host…

View original post 263 more words

IPv6 Buzz 041: IPv4 Address Exhaustion And You!

The Regional Internet Registry for Europe (RIPE) recently announced its supply of public IPv4 addresses was officially depleted.
In today's IPv6 Buzz podcast, we discuss what that means and why it's impactful for companies everywhere. We also discuss the history of IPv4 address exhaustion and why IPv6 is key to avoiding or mitigating the negative effects.

The post IPv6 Buzz 041: IPv4 Address Exhaustion And You! appeared first on Packet Pushers.

IPv6 Buzz 041: IPv4 Address Exhaustion And You!

The Regional Internet Registry for Europe (RIPE) recently announced its supply of public IPv4 addresses was officially depleted. In today's IPv6 Buzz podcast, we discuss what that means and why it's impactful for companies everywhere. We also discuss the history of IPv4 address exhaustion and why IPv6 is key to avoiding or mitigating the negative effects.

How we used our new GraphQL Analytics API to build Firewall Analytics

How we used our new GraphQL Analytics API to build Firewall Analytics
How we used our new GraphQL Analytics API to build Firewall Analytics

Firewall Analytics is the first product in the Cloudflare dashboard to utilize the new GraphQL Analytics API. All Cloudflare dashboard products are built using the same public APIs that we provide to our customers, allowing us to understand the challenges they face when interfacing with our APIs. This parity helps us build and shape our products, most recently the new GraphQL Analytics API that we’re thrilled to release today.

By defining the data we want, along with the response format, our GraphQL Analytics API has enabled us to prototype new functionality and iterate quickly from our beta user feedback. It is helping us deliver more insightful analytics tools within the Cloudflare dashboard to our customers.

Our user research and testing for Firewall Analytics surfaced common use cases in our customers' workflow:

  • Identifying spikes in firewall activity over time
  • Understanding the common attributes of threats
  • Drilling down into granular details of an individual event to identify potential false positives

We can address all of these use cases using our new GraphQL Analytics API.

GraphQL Basics

Before we look into how to address each of these use cases, let's take a look at the format of a GraphQL query and how our Continue reading

Introducing the GraphQL Analytics API: exactly the data you need, all in one place

Introducing the GraphQL Analytics API: exactly the data you need, all in one place
Introducing the GraphQL Analytics API: exactly the data you need, all in one place

Today we’re excited to announce a powerful and flexible new way to explore your Cloudflare metrics and logs, with an API conforming to the industry-standard GraphQL specification. With our new GraphQL Analytics API, all of your performance, security, and reliability data is available from one endpoint, and you can select exactly what you need, whether it’s one metric for one domain or multiple metrics aggregated for all of your domains. You can ask questions like “How many cached bytes have been returned for these three domains?” Or, “How many requests have all the domains under my account received?” Or even, “What effect did changing my firewall rule an hour ago have on the responses my users were seeing?”

The GraphQL standard also has strong community resources, from extensive documentation to front-end clients, making it easy to start creating simple queries and progress to building your own sophisticated analytics dashboards.

From many APIs...

Providing insights has always been a core part of Cloudflare’s offering. After all, by using Cloudflare, you’re relying on us for key parts of your infrastructure, and so we need to make sure you have the data to manage, monitor, and troubleshoot your website, Continue reading

Liquid cooling and edge computing are featured at Gartner show

Research firm Gartner is holding its IT Infrastructure, Operations, and Cloud Strategies Conference (IOCS) in Las Vegas this week, and a few news announcements from the show give an indication as to where data-center technology is headed.First up, Schneider Electric and Iceotope formally introduced their integrated rack with chassis-based immersive liquid-cooling designs. The deal was announced in October but now the details are out. In addition to Schneider and Iceotope, the alliance also includes Avnet, an electronic-component distributor.To read this article in full, please click here

Liquid cooling and edge computing are featured at Gartner show

Research firm Gartner is holding its IT Infrastructure, Operations, and Cloud Strategies Conference (IOCS) in Las Vegas this week, and a few news announcements from the show give an indication as to where data-center technology is headed.First up, Schneider Electric and Iceotope formally introduced their integrated rack with chassis-based immersive liquid-cooling designs. The deal was announced in October but now the details are out. In addition to Schneider and Iceotope, the alliance also includes Avnet, an electronic-component distributor.To read this article in full, please click here

You Don’t Need IP Renumbering for Disaster Recovery

This is a common objection I get when trying to persuade network architects they don’t need stretched VLANs (and IP subnets) to implement data center disaster recovery:

Changing IP addresses when activating DR is hard. You’d have to weigh the manageability of stretching L2 and protecting it, with the added complexity of breaking the two sites into separate domains [and subnets]. We all have apps with hardcoded IP’s, outdated IPAM’s, Firewall rules that need updating, etc.

Let’s get one thing straight: when you’re doing disaster recovery there are no live subnets, IP addresses or anything else along those lines. The disaster has struck, and your data center infrastructure is gone.

Read more ...

Day Two Cloud 027: Do Enterprises Need Kubernetes?

As an IT practitioner, do you actually need to know more about Kubernetes? Does Kubernetes and its ecosystem materially matter to your organization? Is K8s just stepping stone to more advanced technologies? We tackle these questions on today's episode of Day Two Cloud with guests Keith Townsend and Justin Warren.

The post Day Two Cloud 027: Do Enterprises Need Kubernetes? appeared first on Packet Pushers.

Cisco Rolls Out New Silicon, Router for ‘Internet for the Future’

Cisco Silicon One is a new programmable silicon architecture that the vendor claims can serve...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

7 ways to remember Linux commands

Some Linux commands are very easy to remember. The names may have only a couple letters and they often relate directly to what you want to do – like cd for changing directories or pwd for displaying the present working directory. Others can be very difficult to remember, especially if what you want to do relies on using a series of options.So, let’s look at some commands and tricks that can help you remember commands that do just what you need them to do and that make issuing those commands so much easier.Use aliases The best way to nail down a complicated command is to turn it into an alias. Just take a command that works for you and assign it an easy name. In fact, there is nothing wrong with using the name of the command itself as the alias as long as this doesn’t interfere with other ways you might want to use that command. For example, grep and egrep are often aliased to include using color to highlight your search term.To read this article in full, please click here

Telefónica Defies US, Selects Nokia, Huawei for 5G

With the blessing of German authorities, all three of the country's leading operators decided to...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

IDG Contributor Network: Secure SD-WAN: The security vendors and their SD-WAN offerings

During its inception, we had the early adopters and pure SD-WAN players. Soon it became obvious that something was missing, and that missing component was “security.” However, security vendors have highlighted the importance of security from the very beginning.Today, the market seems to be moving in the direction where the security vendors are focusing on delivering SD-WAN features around pervasive security. The Magic Quadrant for WAN Edge Infrastructure has made a substantial prediction. It states, “By 2024, 50% of new firewall purchases in distributed enterprises will utilize SD-WAN features with the growing adoption of cloud-based services, up from less than 20% today.”To read this article in full, please click here

Verizon CEO: Network Virtualization Is 60% Complete

Verizon’s organizational structure and network position has changed more during the last 12...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

VMware vSphere Key to Slicing Red Hat’s Kubernetes Head Start

“Maybe the national anthem is still playing in this game of containers and it’s very early,”...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Claudio Jeker Honored by Internet Security Research Group with Radiant Award

This week another Radiant Award has been awarded by the Internet Security Research Group, the folks behind Let’s Encrypt. The award puts the limelight on the heroes who make the Internet more secure and trustworthy each day.

The newest Radiant Award winner is Claudio Jeker, who receives the prize for his work of a BGP4 implementation on OpenBSD. This makes me horrendously enthusiastic. Why?

OpenBSD is a open-software based operating system that is focused on being secure and feature complete. It comes with a set of tools that make it ideally suited to be deployed, for instance, as a secure route server in an Internet Exchange Point (IXP). A route server is a service that an IXP can host in order to make the participating network service providers lives a little easier. They do not have to get the routing information from each other, but can simply talk to this piece of centralized infrastructure. OpenBSD allows this type of infrastructure to be build from commodity components in a scalable and secure way.

With a route server in place, an IXP can take additional measures to secure the Internet, namely by taking the MANRS actions.

Ultimately this would not be Continue reading