One annoyance is what IP address gets used by default by the system for outbound traffic. It would be nice to have a generic OS-level way to say, “This IP on lo0 should be default for outbound IP traffic unless to the connected link subnet itself.”
That’s definitely a tough nut to crack, and Cathal described a few solutions he used in the past:
IT leaders are increasingly turning to a Software-Defined Wide-Area Network (SD-WAN) overlay. Here, we look into ten of the most popular SD-WAN providers.
The difference between training and education is signficant and technology industry often conflates these terms. They are vastly different ways to providing learning and we dive into why we need more education and less training.
The difference between training and education is signficant and technology industry often conflates these terms. They are vastly different ways to providing learning and we dive into why we need more education and less training.
Here’s a challenge in case you get bored during the Christmas break: merge two networks running BGP (two autonomous systems) without changing anything but the configurations of the routers connecting them (the red BGP session in the diagram). I won’t give you any hints; you can discuss it in the comments or a GitHub discussion.
Hopefully, you won’t have to deal with something similar in real life, but then we know that crazy requirements trump good designs any day of the week.
Here’s a challenge in case you get bored during the Christmas break: merge two networks running BGP (two autonomous systems) without changing anything but the configurations of the routers connecting them (the red BGP session in the diagram). I won’t give you any hints; you can discuss it in the comments or a GitHub discussion.
Hopefully, you won’t have to deal with something similar in real life, but then we know that crazy requirements trump good designs any day of the week.
We are thrilled about Australia’s strategic direction to build a world-leading cyber nation by 2030. As a world-leading cybersecurity company whose mission is to help build a better Internet, we think we can help.
Cloudflare empowers organizations to make their employees, applications and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare is trusted by millions of organizations – from the largest brands to entrepreneurs and small businesses to nonprofits, humanitarian groups, and governments across the globe.
Cloudflare first established a footprint in Australia in 2012 when we launched our 15th data center in Sydney (our network has since grown to span over 310 cities in 120 countries/regions). We support a multitude of customers in Australia and New Zealand, including some of Australia’s largest banks and digital natives, with our world-leading security products and services. For example, Australia’s leading tech company Canva, whose service is used by over 35 million people worldwide each month, uses a broad array of Cloudflare’s products — spanning use cases as diverse as remote application access, to serverless development, and even bot management to help Canva protect its network from attacks.
Today on the Tech Bytes podcast, sponsored by Fortinet, we dive into Fortinet Advisor. This is a new generative AI offering designed to act as an assistant to SoC analysts and security teams by providing context-aware event summaries, potential impacts, and recommended responses while also keeping humans in the loop. Episode Guest: Kevin Faulkner |... Read more »
Today on the Tech Bytes podcast, sponsored by Fortinet, we dive into Fortinet Advisor. This is a new generative AI offering designed to act as an assistant to SoC analysts and security teams by providing context-aware event summaries, potential impacts, and recommended responses while also keeping humans in the loop.
It is hard to keep a model of datacenter infrastructure spending in your head at the same time you want to look at trends in cloud and on-premises spending as well as keep score among the key IT suppliers to figure out who is winning and who is losing. …
As the conversation about Network Automation flows around us, this topic seems to be getting some traction (and quite a reaction!). Have you disabled the CLI? Should we disable the CLI? How long before the CLI is disabled? I don’t believe those are the question we should be asking but it made me examine why READ MORE
Which words captured our attention, piqued our fancy, sparked our interest, made our dreams come true, or kept us up at night in 2023? Drumroll, please ...
Broadcom’s VMware has announced an end to perpetual licensing, network automation provider Anuta Networks is adding generative AI capabilities to its Atom platform, and high-end firewall revenues dip but campus switch sales soared in Q3 2023. The Open Networking Foundation, which oversaw open projects around software-defined networking, is closing its doors and folding its projects... Read more »
On today's Network Break we discuss why Broadcom wants VMware customers on subscription licenses, whether GenAI will be a free or paid feature for network management software, how Cisco doged a multi-billion-dollar patent infringement, what a successful test of space lasers means for satellite broadband means for Amazon's Project Kuiper, and more IT news.
You’ve probably noticed that I haven’t been writing quite as much this year as I have in years past. I finally hit the wall that comes for all content creators. A combination of my job and the state of the industry meant that I found myself slipping off my self-appointed weekly posting schedule more and more often in 2023. In fact, there were several times I skipped a whole week to get put something out every other week, especially in the latter half of the year.
I’ve always wanted to keep the content level high around here and give my audience things to think about. As the year wore on I found myself running out of those ideas as portions of the industry slowed down. If other people aren’t getting excited about tech why should I? Sure, I could probably write about Wi-Fi 7 or SD-WAN or any number of topics over and over again but it’s harder to repeat yourself for an audience that takes a more critical eye to your writing than it is for someone that just wants to churn out material.
My Bruce Wayne job kept me busy this year. I’m proud of all the content Continue reading
I’m a big fan of direnv, the tool that lets you load and unload environment variables depending on the current directory. It’s so very useful! Not too terribly long ago, I wanted to find a way to “dynamically activate” the Azure CLI using direnv. Basically, I wanted to be able to have the Azure CLI disabled (no configuration information) unless I was in a directory where I needed or wanted it to be active, and be able to make it active using direnv. I finally found a way to make it work, and in this blog post I’ll share how you can do this, too.
First, you’ll need both direnv and the Azure CLI installed (obviously). I’ll leave this as an exercise for the readers, but I’ll mention that if you want to use Azure CLI in a Python virtual environment you might find this article really helpful.
Next, you’ll want to create a couple of directories. I chose to “hide” these directories in a .config directory in my home directory. This directory is very commonly found (and used) on many Linux systems, but doesn’t typically exist on a macOS system. You can use this command to create the Continue reading
Two months ago, we made Cloudflare Turnstile generally available — giving website owners everywhere an easy way to fend off bots, without ever issuing a CAPTCHA. Turnstile allows any website owner to embed a frustration-free Cloudflare challenge on their website with a simple code snippet, making it easy to help ensure that only human traffic makes it through. In addition to protecting a website’s frontend, Turnstile also empowers web administrators to harden browser-initiated (AJAX) API calls running under the hood. These APIs are commonly used by dynamic single-page web apps, like those created with React, Angular, Vue.js.
Today, we’re excited to announce that we have integrated Turnstile with the Cloudflare Web Application Firewall (WAF). This means that web admins can add the Turnstile code snippet to their websites, and then configure the Cloudflare WAF to manage these requests. This is completely customizable using WAF Rules; for instance, you can allow a user authenticated by Turnstile to interact with all of an application’s API endpoints without facing any further challenges, or you can configure certain sensitive endpoints, like Login, to always issue a challenge.
Challenging fetch requests in the Cloudflare WAF
Millions of websites protected by Cloudflare’s WAF leverage our Continue reading