Archive

Category Archives for "Networking"

Connecting RasPBX via SIP Trunk

The previous tutorial has covered RasPBX installation on Raspberry Pi 3 board. At the end of the tutorial we have tested local calls between chan_sip extensions 1010 and 1020 that are registered to RasPBX. This time we will go further and connect RasPBX with another FreePBX VOIP system via PJSIP trunk. The FreePBX is running on VirtualBox and it is in version 14 with Asterisk 13. As the last step of the tutorial, we will test VOIP calls  between RasPBX with FreePBX that are interconnected by PJSIP trunk.

As we have mentioned, a complete RasPBX and Zoiper softphones installation and configuration is covered in a previous tutorial (except the SIP trunk).  Also, the tutorial does not cover installation of FreePBX on VirtualBox VM. So far, our inventory contains RasPBX and FreePBX with the following components.

RasPBX - Asterisk on Raspberry PI board:
- Asterisk 13.22.0
- FreeBPX 14.0.3.13
- Zoiper softphone on Ubuntu 18.0.4, IP 172.17.100.2/16, ext. 1010
- Zoiper softphone on Android 5.1, IP 172.17.100.5/16, ext. 1020

FreePBX - Installed  on VirtualBox VM
- Asterisk 13.19.1
- FreeBPX 14.0.3.13
Continue reading

Deploying Workers with GitHub Actions + Serverless

Deploying Workers with GitHub Actions + Serverless

If you weren’t aware, Cloudflare Workers, our serverless programming platform, allows you to deploy code onto our 165 data centers around the world.

Want to automatically deploy Workers directly from a GitHub repository? Now you can with our official GitHub Action. This Action is an extension of our existing integration with the Serverless Framework. It runs in a containerized GitHub environment and automatically deploys your Worker to Cloudflare. We chose to utilize the Serverless Framework within our GitHub Action to raise awareness of their awesome work and to enable even more serverless applications to be built with Cloudflare Workers. This Action can be used to deploy individual Worker scripts as well; the Serverless Framework is being used in the background as the deployment mechanism.

Before going into the details, we’ll quickly go over what GitHub Actions are.

GitHub Actions

GitHub Actions allow you to trigger commands in reaction to GitHub events. These commands run in containers and can receive environment variables. Actions could trigger build, test, or deployment commands across a variety of providers. They can also be linked and run sequentially (i.e. ‘if the build passes, deploy the app’). Similar to many CI/CD tools, these commands run Continue reading

The Open Compute Project is quickly gaining ground

Eight years ago, Facebook launched the Open Compute Project (OCP), an open-source hardware initiative to design the most energy-efficient server gear for massive, hyperscale data centers. The promise was flexibility of hardware and software and designs for greater power efficiency.Very quickly, Intel, Rackspace, Goldman Sachs and Sun Microsystems' co-founder Andy Bechtolsheim joined with Facebook to launch the OCP project, with Microsoft joining in 2014.The project has hummed along quietly with no sales figures until now, thanks to supply chain market research specialists IHS Markit. It surveyed both Facebook, Microsoft, and Rackspace, as founding partners, and looked at sales to customers beyond those three.To read this article in full, please click here

The Open Compute Project is quickly gaining ground

Eight years ago, Facebook launched the Open Compute Project (OCP), an open-source hardware initiative to design the most energy-efficient server gear for massive, hyperscale data centers. The promise was flexibility of hardware and software and designs for greater power efficiency.Very quickly, Intel, Rackspace, Goldman Sachs and Sun Microsystems' co-founder Andy Bechtolsheim joined with Facebook to launch the OCP project, with Microsoft joining in 2014.The project has hummed along quietly with no sales figures until now, thanks to supply chain market research specialists IHS Markit. It surveyed both Facebook, Microsoft, and Rackspace, as founding partners, and looked at sales to customers beyond those three.To read this article in full, please click here

New Firewall Tab and Analytics

New Firewall Tab and Analytics

At Cloudflare, one of our top priorities is to make our products and services intuitive so that we can enable customers to accelerate and protect their Internet properties. We're excited to launch two improvements designed to make our Firewall easier to use and more accessible, and helping our customers better manage and visualize their threat-related data.

New Firewall Tabs for ease of access

We have re-organised our features into meaningful pages: Events, Firewall Rules, Managed Rules, Tools, and Settings. Our customers will see an Overview tab, which contains our new Firewall Analytics, detailed below.

New Firewall Tab and Analytics

All the features you know and love are still available, and can be found in one of the four new tabs. Here is a breakdown of their new locations.

Feature New Location
Firewall Event Log Events (Overview for Enterprise only)
Firewall Rules Firewall Rules
Web Application Firewall Managed Ruleset
IP Access Rules (IP Firewall Tools
Rate Limiting Tools
User Agent Blocking Tools
Zone Lockdown Tools
Browser Integrity Check Settings
Challenge Passage Settings
Privacy Pass Settings
Security Level Settings

If the new sub navigation has not appeared, you may need to re-login to the dashboard or clear your browser’s cookies.

New Firewall Analytics for analysing events and Continue reading

Smart NICs and Related Linux Kernel Infrastructure

A while ago we did a podcast with Luke Gorrie in which he explained why he’d love to have simple, dumb, and easy-to-work-with Ethernet NICs. What about the other side of the coin – smart NICs with their own CPU, RAM and operating system? Do they make sense, when and why would you use them, and how would you integrate them with Linux kernel?

We discussed these challenges with Or Gerlitz (Mellanox), Andy Gospodarek (Broadcom) and Jiri Pirko (Mellanox) in Episode 99 of Software Gone Wild.

Read more ...

Introducing IPv6 in NSX-T Data Center 2.4

With the latest release for VMware NSX-T Data Center 2.4, we announced the support for IPv6. Since the advent of IPv4 address space exhaustion, IPv6 adoption has continued to increase around the world. A quick look at the Google IPv6 adoption statistics proves the fact that IPv6 adoption is ramping up. With the advances in IoT space and explosion in number of endpoints (mobile devices), this adoption will continue to grow. IPv6 increases the number of network address bits from its predecessor IPv4 from 32 to 128 bits, providing more than enough globally unique IP addresses for global end-to-end reachability. Several government agencies mandate use of IPv6. In addition to that, IPv6 also provides operational simplification.

NSX-T Data Center 2.4 release introduces the dual stack support for the interfaces on a logical router (now referred as Gateway). You can now leverage all the goodness of distributed routing or distributed firewall in a single tier topology or multi-tiered topology. If you are wondering what dual stack is; it is the capability of a device that can simultaneously originate and understand both IPv4 and IPv6 packets. In this blog, I will discuss the IPv6 features that are made generally available Continue reading

Cisco warns a critical patch is needed for a remote access firewall, VPN and router

Cisco is warning organizations with remote users that have deployed a particular Cisco wireless firewall, VPN and router to patch a critical vulnerability in each that could let attackers break into the network.The vulnerability, which has an impact rating of 9.8 out of 10 on the Common Vulnerability Scoring System lets a potential attacker send malicious HTTP requests to a targeted device. A successful exploit could let the attacker execute arbitrary code on the underlying operating system of the affected device as a high-privilege user, Cisco stated. More about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT The vulnerability is in the web-based management interface of three products: Cisco’s RV110W Wireless-N VPN Firewall, RV130W Wireless-N Multifunction VPN Router and RV215W Wireless-N VPN Router. All three products are positioned as remote-access communications and security devices.To read this article in full, please click here

Cisco warns a critical patch is needed for a remote access firewall, VPN and router

Cisco is warning organizations with remote users that have deployed a particular Cisco wireless firewall, VPN and router to patch a critical vulnerability in each that could let attackers break into the network.The vulnerability, which has an impact rating of 9.8 out of 10 on the Common Vulnerability Scoring System lets a potential attacker send malicious HTTP requests to a targeted device. A successful exploit could let the attacker execute arbitrary code on the underlying operating system of the affected device as a high-privilege user, Cisco stated. More about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT The vulnerability is in the web-based management interface of three products: Cisco’s RV110W Wireless-N VPN Firewall, RV130W Wireless-N Multifunction VPN Router and RV215W Wireless-N VPN Router. All three products are positioned as remote-access communications and security devices.To read this article in full, please click here

New chemistry-based data storage would blow Moore’s Law out of the water

Molecular electronics, where charges move through tiny, sole molecules, could be the future of computing and, in particular, storage, some scientists say.Researchers at Arizona State University (ASU) point out that a molecule-level computing technique, if its development succeeds, would slam Gordon Moore’s 1965 prophesy — Moore's Law — that the number of transistors on a chip will double every year, and thus allow electronics to get proportionally smaller. In this case, hardware, including transistors, will conceivably fit on individual molecules, reducing chip sizes much more significantly than Moore ever envisaged.[ Now read: What is quantum computing (and why enterprises should care) ] “The intersection of physical and chemical properties occurring at the molecular scale” is now being explored, and shows promise, an ASU article says. The researchers think Moore’s miniaturization projections will be blown out of the water.To read this article in full, please click here

New chemistry-based data storage would blow Moore’s Law out of the water

Molecular electronics, where charges move through tiny, sole molecules, could be the future of computing and, in particular, storage, some scientists say.Researchers at Arizona State University (ASU) point out that a molecule-level computing technique, if its development succeeds, would slam Gordon Moore’s 1965 prophesy — Moore's Law — that the number of transistors on a chip will double every year, and thus allow electronics to get proportionally smaller. In this case, hardware, including transistors, will conceivably fit on individual molecules, reducing chip sizes much more significantly than Moore ever envisaged.[ Now read: What is quantum computing (and why enterprises should care) ] “The intersection of physical and chemical properties occurring at the molecular scale” is now being explored, and shows promise, an ASU article says. The researchers think Moore’s miniaturization projections will be blown out of the water.To read this article in full, please click here

BrandPost: Why Data Center Management Responsibilities Must Include Edge Data Centers

Now that edge computing has emerged as a major trend, the question for enterprises becomes how to migrate the data center management expertise acquired over many years to these new, remote environments.Enterprise data centers have long provided a strong foundation for growth.  They enable businesses to respond more quickly to market demands. However, this agility is heavily dependent on the reliability and manageability of the data center.  As data center operational complexity increases, maintaining uptime while minimizing costs becomes a bigger challenge.To read this article in full, please click here

Kernel of Truth season 2 episode 2: The future of the Linux Kernel

Subscribe to Kernel of Truth on iTunes, Google Play, SpotifyCast Box and Sticher!

Click here for our previous episode.

This episode, host Brian is joined by two of our in-house Linux Kernel experts David and Roopa. Joining them is Attilla who, like many of you, is curious about what’s coming down the line in regards to the Linux Kernel. Since they’re working ahead of everyone, what can we look forward to in the future? We promise you won’t need a crystal ball to find out, just listen here!

Guest Bios

Brian O’Sullivan: Brian currently heads Product Management for Cumulus Linux. For 15 or so years he’s held software Product Management positions at Juniper Networks as well as other smaller companies. Once he saw the change that was happening in the networking space, he decided to join Cumulus Networks to be a part of the open networking innovation. When not working, Brian is a voracious reader and has held a variety of jobs, including bartending in three countries and working as an extra in a German soap opera. You can find him on Twitter at @bosullivan00.

David Ahern is a Member of Technical Staff at Cumulus Networks. He traded Continue reading