How to configure a static IP address on Linux

IP addresses on Linux systems are often assigned automatically by Dynamic Host Configuration Protocol (DHCP) servers. These are referred to as "dynamic addresses" and may change any time the system is rebooted. When a system is a server or will be remotely administered, however, it is generally more convenient for these systems to have static addresses, providing stable and consistent connections with users and applications.Fortunately, the steps required to change a Linux system's IP address from dynamic to static are fairly easy, though they will be a little different depending on the distribution you are using. In this post, we'll look at how this task is managed on both Red Hat (RHEL) and Ubuntu systems.To read this article in full, please click here

History of Networking: George Swallow on MPLS/TE

Traffic engineering (TE) is one of the most complex technologies used in large scale networks today. George Swallow joins us for a look at how and why TE was invented, and where some of the ideas came from.

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

Sponsored Post: Software Buyers Council, InMemory.Net, Triplebyte, Etleap, Stream, Scalyr

Who's Hiring? 


  • Triplebyte lets exceptional software engineers skip screening steps at hundreds of top tech companies like Apple, Dropbox, Mixpanel, and Instacart. Make your job search O(1), not O(n). Apply here.

  • Need excellent people? Advertise your job here! 

Fun and Informative Events

  • Join Etleap, an Amazon Redshift ETL tool to learn the latest trends in designing a modern analytics infrastructure. Learn what has changed in the analytics landscape and how to avoid the major pitfalls which can hinder your organization from growth. Watch a demo and learn how Etleap can save you on engineering hours and decrease your time to value for your Amazon Redshift analytics projects. Register for the webinar today.

  • Advertise your event here!

Cool Products and Services

  • Shape the future of software in your industry. The Software Buyers Council is a panel of engineers and managers who want to share expert knowledge, contribute to improvement of software, and help startups in their industry. Receive occasional invitations to chat with for 30 minutes about your area of expertise and software usage. No obligations, no marketing emails or sales calls. Upcoming topics include infrastructure and application monitoring, AI/ML platforms, and more. Learn Continue reading

Mobile World Congress: The time of 5G is (almost) here

If there was one common theme to the blizzard of announcements, demonstrations and general public happenings going on at MWC 2019 in Barcelona this year, it was that everyone from smartphone makers to mobile carriers to hardware manufacturers is wildly excited about the advent of 5G technology.Wireless equipment vendors, like Nokia and Ericsson, both announced slates of 5G customers and rolled out new capabilities aimed at helping 5G reach the critical inflection point. Smartphone manufacturers touted the pending availability of 5G-capable handsets, and silicon vendors trumpeted their 5G-ready chipsets and SIM cards.To read this article in full, please click here

Heavy Networking 433: An Insider’s Guide To AWS Transit Gateways

AWS Transit Gateways, an evolution of Transit VPCs, centralize VPN connectivity to multiple VPCs, allowing for greater scale and simpler connectivity and management. Today's Heavy Networking drills into this topic with guest Nick Matthews, an AWS solutions architect. We also examine Global Accelerator and TLS termination on Network Load Balancer.

The post Heavy Networking 433: An Insider’s Guide To AWS Transit Gateways appeared first on Packet Pushers.

The data center is being reimagined, not disappearing

I have documented more than once that the data center is not going away; it’s being reimagined. And now comes a report with greater details on that change.Spiceworks has released its 2019 State of Servers report that examines on-premises server infrastructure in the workplace, including purchase plans, brand prevalence, and perceptions. The results of the survey, which was conducted in February and included 530 IT buyers from organizations across North America and Europe, show that 98 percent of businesses currently run on-premises servers, and 72 percent of businesses plan to purchase new server hardware within the next three years. To read this article in full, please click here

The data center is being reimagined, not disappearing

I have documented more than once that the data center is not going away; it’s being reimagined. And now comes a report with greater details on that change.Spiceworks has released its 2019 State of Servers report that examines on-premises server infrastructure in the workplace, including purchase plans, brand prevalence, and perceptions. The results of the survey, which was conducted in February and included 530 IT buyers from organizations across North America and Europe, show that 98 percent of businesses currently run on-premises servers, and 72 percent of businesses plan to purchase new server hardware within the next three years. To read this article in full, please click here

BrandPost: Network Analytics and AI: How to Choose a Solution that Best Aligns with Your Adoption Strategy

Ciena Mina Paik, Director of Portfolio Marketing, Blue Planet Integrating AI and advanced analytics into your network processes and operations can seem like a daunting task. Mina Paik provides three guidelines for choosing a solution that best fits your company’s unique requirements.Artificial intelligence (AI) is undoubtedly a very hot topic across many industry segments and verticals, with one analyst even pointing out that “it will empower the fourth industrial revolution.” In the telco world, AI when used together with analytics is now associated with powering intelligent and “self-aware” digital networks (which Ciena and Blue Planet refer to as the “adaptive network”). While there are substantial discussions and write-ups around the topic of AI-driven analytics, our VP of Blue Planet Solutions & Engineering, Kailem Anderson, made a very important point in one of his recent blog posts—namely, that the term “AI” must avoid becoming a cliché.To read this article in full, please click here

Cryptocurrency miners exploit Docker flaw

According to Imperva research, a container flaw reported last month (CVE-2019-5736) in Docker's remote API has already been taken advantage of by hundreds of attackers.Imperva claims that they were able to locate 3,822 Docker hosts with the remote API (port 2735) publicly exposed. Of these, approximately 400 were accessible, and most of these were running a cryptocurrency miner for a lesser-known form of cryptocurrency called Monero. [ Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ] Monero (ticker symbol XMR) is an open-source cryptocurrency that was created in April 2014. It focuses on fungibility (individual units are essentially interchangeable), privacy, and decentralization. It also takes advantage of an obfuscated public ledger. That means anyone can broadcast or send transactions, but outside observers cannot tell the source, amount, or destination of the funds.To read this article in full, please click here

Cryptocurrency miners exploit Docker flaw

According to Imperva research, a container flaw reported last month (CVE-2019-5736) in Docker's remote API has already been taken advantage of by hundreds of attackers.Imperva claims that they were able to locate 3,822 Docker hosts with the remote API (port 2735) publicly exposed. Of these, approximately 400 were accessible, and most of these were running a cryptocurrency miner for a lesser-known form of cryptocurrency called Monero. [ Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ] Monero (ticker symbol XMR) is an open-source cryptocurrency that was created in April 2014. It focuses on fungibility (individual units are essentially interchangeable), privacy, and decentralization. It also takes advantage of an obfuscated public ledger. That means anyone can broadcast or send transactions, but outside observers cannot tell the source, amount, or destination of the funds.To read this article in full, please click here

Last Month in Internet Intelligence: February 2019

This post is presented in conjunction with The Internet Society.

February was a surprisingly quiet month for major Internet disruptions. In contrast to previous months, we observed few full outages or multi-day disruptions in the Oracle Internet Intelligence Map during the month. As always, there were a number of brief and unattributed disruptions observed over the course of the month, but the issues highlighted below were related to fiber cuts (and repairs) and likely problems with satellite connectivity. And while not yet a visible disruption, reportssurfaced in February that Russian authorities and major Internet providers are planning to disconnect the country from the global Internet as part of a planned experiment.

Fiber

Kicking off the month, Burkina Faso experienced brief partial disruptions to its Internet connectivity on February 1 & 2, as shown in the Country Statistics graphs below. The disruptions are also evident in the Traffic Shifts graphs below for AS25543 (Onatel), which is the country’s National Office of Telecommunications, holding a monopoly on fixed-line telecommunications there. Facebook posts from Onatel (February 12) indicated that road work between the towns of Sabou and Boromo had resulted in a fiber cut, and subsequent posts made Continue reading

Meet the VMware Service-defined Firewall: A new approach to firewalling

VMware has had front row seats to the digital transformation that has touched virtually every organization. We’ve been there (and helped drive!) the journey from monolithic applications hosted on a single server, to distributed apps running in VMs, to further decentralization in the form of cloud-native apps composed of microservices. Now, we’re watching the proliferation of public clouds, the up and coming space of serverless and the adoption of functions as a service as ways to build and deploy applications faster than ever.

 

It’s this vantage point that also gives us clear line of sight to one of the biggest cyber security challenges that modern enterprises face: as their applications become more distributed, an organization’s attack surface significantly increases. Despite all of the advancements and innovation in the way applications are built, we have not seen the same rate of progress with respect to the way applications are secured. Adopting a zero-trust network security model in an enterprise environment remains incredibly hard to achieve. How do you know what security policies to create? How do you enforce those policies consistently across on-premises physical and virtual environments, let alone the public cloud? How do you enforce them across different Continue reading