This episode looks at 2023 milestones for IPv6, including overall adoption levels, security advancements, and the state of IPv6-only in the enterprise.
With each successive Intel Xeon SP server processor launch, we can’t help but think the same thing: it would have been better for Intel and customers alike if this chip was out the door a year ago, or two years ago, as must have been planned. …
In order for one device to talk to other devices on the Internet using the aptly named Internet Protocol (IP), it must first be assigned a unique numerical address. What this address looks like depends on the version of IP being used: IPv4 or IPv6.
IPv4 was first deployed in 1983. It’s the IP version that gave birth to the modern Internet and still remains dominant today. IPv6 can be traced back to as early as 1998, but only in the last decade did it start to gain significant traction — rising from less than 1% to somewhere between 30 and 40%, depending on who’s reporting and what and how they’re measuring.
With the growth in connected devices far exceeding the number of IPv4 addresses available, and its costs rising, the much larger address space provided by IPv6 should have made it the dominant protocol by now. However, as we’ll see, this is not the case.
Cloudflare has been a strong advocate of IPv6 for many years and, through Cloudflare Radar, we’ve been closely following IPv6 adoption across the Internet. At three years old, Radar is still a relatively recent platform. To go further back in time, we Continue reading
TL&DR: If you’re using netlab to build labs for your personal use, you can skip this one, but if you plan to use it to create training labs (like my BGP labs project), you might want to keep reading.
Like any complex enough tool, netlab eventually had to deal with inconsistent version-specific functionality and configuration syntax (OK, topology attributes). I stumbled upon this challenge when I wanted to make labs that use two types of configurable devices.
TL&DR: If you’re using netlab to build labs for your personal use, you can skip this one, but if you plan to use it to create training labs (like my BGP labs project), you might want to keep reading.
Like any complex enough tool, netlab eventually had to deal with inconsistent version-specific functionality and configuration syntax (OK, topology attributes). I stumbled upon this challenge when I wanted to make labs that use two types of configurable devices.
Fileless malware attacks are extremely hard to detect and the time it takes for them to be discovered is growing. The best approach to dealing with it is preventing the malware from infecting a network by adopting a zero-trust approach.
Our KubeConversations series continues with a two-part episode on securing Kubernetes and cloud-native infrastructure. I attended KubeCon 2023 in Chicago and had the opportunity to speak with vendors and open-source maintainers about the work they’re doing to help protect your Kubernetes environments. In this episode we’ll talk about a Kubernetes Bill of Materials, protecting K8s... Read more »
Our KubeConversations series continues with a two-part episode on securing Kubernetes and cloud-native infrastructure. I attended KubeCon 2023 in Chicago and had the opportunity to speak with vendors and open-source maintainers about the work they're doing to help protect your Kubernetes environments. I talk about a Kubernetes Bill of Materials, protecting K8s from ransomware, protecting APIs and Web front-ends from attacks, and the state of cloud-native security.
As the technology landscape continues to evolve, the latest release of the Red Hat Ansible Certified Content Collection for amazon.aws introduces a suite of powerful modules that redefine the boundaries of automation within Amazon Web Services (AWS) while redefining how organizations approach security deployments and seamless migrations within the AWS ecosystem.
In our previous blog post, "What's New: Cloud Automation with amazon.aws 7.0.0," we presented the latest release, outlining the changes, new features and newly supported modules. In this blog post, we embark on an exploration of two interesting use cases that highlight the capabilities of these new Ansible-supported modules included in the amazon.aws 7.0 release. Let’s dive into it!
Looking to get started with Ansible for Amazon Web Services?
Use Case #1: Implementing Security Best Practices and Access Control for AWS Resources
Security in AWS is more critical than ever before, and the collection for AWS, amazon.aws 7.0, is up to the challenge with a host of new Identity and Access Continue reading
A previous BGP lab focused on the customer side of BGP communities: adding them to BGP updates to influence upstream ISP behavior. Today’s lab focuses on the ISP side of the equation: using BGP communities in a routing policy to implement RFC 1998-style behavior.
A previous BGP lab focused on the customer side of BGP communities: adding them to BGP updates to influence upstream ISP behavior. Today’s lab focuses on the ISP side of the equation: using BGP communities in a routing policy to implement RFC 1998-style behavior.
Connected networks allow every stakeholder to see exactly how different parts of the ecosystem interact and impact the customer experience and business outcomes.
Studying for a certification exam is also about grasping real-world concepts. And that’s exactly the approach David Coleman and David Westcott took when writing their CWNA study guide, now in its sixth edition. “The Davids” talk about the process of writing their book, the research involved, and the importance of making complex topics understandable for... Read more »
Studying for a certification exam is also about grasping real-world concepts. And that’s exactly the approach David Coleman and David Westcott took when writing their CWNA study guide, now in its sixth edition