The post Wroth Reading: Exascale might prove difficult appeared first on 'net work.
The post Worth Reading: Joining forces against mass collection appeared first on 'net work.
The post Worth Reading: IPv6 versus v4 performance map appeared first on 'net work.
My daughter has started a new fiction series on her blog; I’ll just link to it here for anyone who’s interested.
The post Nenshou Fire: Recoil appeared first on 'net work.
The post Worth Reading: Big buffers and reality appeared first on 'net work.
The post Worth Reading: Binding to an IPv6 subnet appeared first on 'net work.
A mythical conversation on firewalls, and some observations
“Let’s put the firewall here, so it can protect the servers in this part of the network.”
“How would you define a firewall?”
“You know, the appliance that, well, protects servers and other machines from outside threats…”
“And how does it do this?”
“By filtering the traffic using some sort of stateful mechanism, and network address translation, and deep packet inspection, and blocking certain ports, and…”
“In other words, it’s a bunch of services on a single device?”
“Yes…”
“Then maybe we should think in terms of services instead of appliances.”
I’ve never actually had this conversation, but I’ve had many similar ones across my times as a network engineer. I’ll admit, in fact, that it took a lot of conversations like this (with me on the receiving end) to grock the difference between a service and an appliance, and to see that my constant thinking in terms of appliances (or even devices) was actually hindering my ability to design networks. Let me give you two specific reasons you should think of security services, instead of security appliances.
First, When you disaggregate the “things a firewall Continue reading
The post Worth Reading: HPE trims back appeared first on 'net work.
The post Worth Reading: Ransomware and backups appeared first on 'net work.
The post Worth Reading: Hardware slaves to the master algorithm appeared first on 'net work.
In the last post on this topic, we traced how snaproute’s BGP code moved to the open state. At the end of that post, the speaker encodes an open message using packet, _ := bgpOpenMsg.Encode()
, and then sends it. What we should be expecting next is for an open message from the new peer to be received and processed. Receiving this open message will be an event, so what we’re going to need to look for is someplace in the code that processes the receipt of an open message. All the way back in the fifth post of this series, we actually unraveled this chain, and found this is the call chain we’re looking for—
I don’t want to retrace all those steps here, but the call to func (st *OpenSentState) processEvent()
(around line 444 in fsm.go
) looks correct. The call in question must be a call to a function that processes an event while the peer is in the open state. This call seems to satisfy both Continue reading
The post Worth Reading: gRPC appeared first on 'net work.
The post Worth Reading: On decomposing systems appeared first on 'net work.
The post Worth Reading: Do we still need OSPF areas? appeared first on 'net work.
The post Worth Reading: The Verisign DDoS Report (Q2 2016) appeared first on 'net work.