Disaster Recovery with VMware NSX-V and Zerto

NSX-V Disaster Recovery with VMware NSX-V and Zerto Note, this is a reposting of the blog that I initially posted here on humairahmed.com. In a prior blog, VMware NSX and SRM: Disaster Recovery Overview and Demo, I described and demoed how VMware NSX and SRM with vSphere Replication combined provide for an enhanced disaster recovery (DR) solution. SRM... Read more →

Episode 10 – Grassroots Automation

In episode 10 we look at how to take the first steps towards automating your network. What tools should you use? Should you learn a programming language? And if so, which one? Should you buy or build your automation? Do you need to become a full fledged programmer in addition to being a network engineer? Our excellent panel of guests addresses all of the above and more!

—–
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Kirk Byers
Guest
Ken Celenza
Guest
Ryan Booth
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 10 – Grassroots Automation appeared first on Network Collective.

Episode 10 – Grassroots Automation

In episode 10 we look at how to take the first steps towards automating your network. What tools should you use? Should you learn a programming language? And if so, which one? Should you buy or build your automation? Do you need to become a full fledged programmer in addition to being a network engineer? Our excellent panel of guests addresses all of the above and more!

—–
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Kirk Byers
Guest
Ken Celenza
Guest
Ryan Booth
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 10 – Grassroots Automation appeared first on Network Collective.

AfPIF 2017 Kicks Off In Abidjan

The annual Africa Peering and Interconnection Forum (AfPIF) kicked off at the Azalai Hotel in Abidjan, Ivory Coast.

The first day is known as “Peering Coordinators Day” where peering managers from various networks, operators, and policy makers meet and deliberate on the various ways to exchange content locally, lower the cost of connectivity, and increase the number of internet users in the region.

Betel Hailu

How to protect your network from ransomware attacks

Ransomware attacks are becoming more rampant now that criminals have learned they are an effective way to make money in a short amount of time. Attackers do not even need any programming skills to launch an attack because they can obtain code that is shared among the many hacker communities. There are even services that will collect the ransom via Bitcoin on behalf of the attackers and just require them to pay a commission. This all makes it more difficult for the authorities to identify an attacker.+ Also on Network World: Network vulnerability analysis 101: Free online training + Many small and medium-size businesses pay ransoms because they do not backup their data and do not have any other options available to recover their data. They sometimes face the decision of either paying the ransom or being forced out of business. Also, hospitals that do not back up all their critical patient data and are not able to retrieve it in a timely manner will immediately pay the ransom because it is critical to access records of patients who require immediate care. It can become a life-or-death situation for someone in intensive care.To read this article in full Continue reading

How to protect your network from ransomware attacks

Ransomware attacks are becoming more rampant now that criminals have learned they are an effective way to make money in a short amount of time. Attackers do not even need any programming skills to launch an attack because they can obtain code that is shared among the many hacker communities. There are even services that will collect the ransom via Bitcoin on behalf of the attackers and just require them to pay a commission. This all makes it more difficult for the authorities to identify an attacker.+ Also on Network World: Network vulnerability analysis 101: Free online training + Many small and medium-size businesses pay ransoms because they do not backup their data and do not have any other options available to recover their data. They sometimes face the decision of either paying the ransom or being forced out of business. Also, hospitals that do not back up all their critical patient data and are not able to retrieve it in a timely manner will immediately pay the ransom because it is critical to access records of patients who require immediate care. It can become a life-or-death situation for someone in intensive care.To read this article in full Continue reading

65% off Etekcity 2 Pack Portable Collapsible LED Camping Lantern – Deal Alert

The Etekcity collapsible LED Lantern provides up to 12 hours of bright omnidirectional lighting for your surroundings. It’s lighter, brighter, and more portable than most flashlights while still featuring the rugged durability to withstand the outdoors. The military-grade exterior is water resistant for more practical use in a high range of environments. Save time, energy, and luggage weight with its simple design and practicality. The fold-out collapsible handles make the lantern portable and easy to hang. Keep it on a table or hanging on a branch to illuminate your environment, and the lantern will take care of the rest. Right now a 2-pack of lanterns, with batteries included, is discounted 65% to just $13.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

New Coder: Getting Started and Finding Your Path

Having decided it’s time to learn how to code, and having chosen the right language to use, the next step is to find some resources and start programming that masterpiece. But what’s the best way to learn that language?

On the Solarwinds Thwack Geek Speak blog I spoke about how I started learning to code, and look at some of the different resources out there to kickstart your programming mastery. Please do take a trip to Thwack and check out my post, “New Coder: Getting Started and Finding Your Path“.

New Coder: Getting Started and Finding Your Path

 

Please see my Disclosures page for more information about my role as a Solarwinds Ambassador.

If you liked this post, please do click through to the source at New Coder: Getting Started and Finding Your Path and give me a share/like. Thank you!

Hiding the information from network core

Hiding the information from network core is important.   But why hiding the information is important ? What type of information we are trying to hide ? Why from network core only ? How we can hide the information from network core ?   Let’s start, why information hiding is important.   One of the […]

The post Hiding the information from network core appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

How log rotation works with logrotate

Log rotation on Linux systems is more complicated than you might expect. Which log files are rotated, when and how often, whether or not the rotated log files are compressed, and how many instances of the log files are retained all depend on settings in configuration files.Rotating log files is important for several reasons. First, you probably don't want older log files eating up too much of your disk space. Second, when you need to analyze log data, you probably don't want those log files to be extremely large and cumbersome. And last, organizing log files by date probably makes spotting and analyzing changes quite a bit easier (e.g., comparing last week's log data to this week's).To read this article in full or to leave a comment, please click here

NAT64check proves popular

We’ve already mentioned this a few times this year, but we’ve just published an more in-depth article about NAT64check over on the RIPE Labs and APNIC websites.

NAT64check is a tool developed by the Internet Society, Go6, SJM Steffann and Simply Understand that allows you to enter the URL of a particular website, and then run tests over IPv4, IPv6 and NAT64 in order to check whether the website is actually reachable in each case, whether identical web pages are returned, and whether all the resources such as images, stylesheets and scripts load correctly. The rationale behind NAT64check is also explained, how it works, and how you can use it.

If you just want to take a look at the tool, then please go to either https://nat64check.go6lab.si/ or https://nat64check.ipv6-lab.net/, type the URL you wish to check into the box at the top of the page, and the result should be returned within a few seconds. It’s simple and easy, and will help you identify what needs to be done to make your website accessible with IPv6.

Deploy360 also want to help you deploy IPv6, so please take a look at our Start Here page to learn more.

 

The post Continue reading

Introducing Host Pack — host software essentials for fabric-wide connectivity + visibility

From day one, Cumulus Networks has always believed in making data center networking easier and better. To us, that never stopped at just an operating system. Our goal has always been to unify the entire stack on Linux and bring web-scale principles to all aspects of the data center networking process — from network to operations; from host to switch. This was one of the many key drivers behind our introduction of NetQ, a fabric validation system designed to make network operator’s lives easier by ensuring the network is behaving as intended. Today, we launch the next critical step in web-scale networking — Cumulus Host Pack.

Host Pack offers software essentials that bring the host into the network. It optimizes visibility and connectivity into Cumulus Linux network fabric from end to end. Your entire stack can now be unified with the same language and the same tooling using the Linux networking model. Host Pack ensures real-time reliability and uptime to the container by leveraging NetQ to enhance visibility of the host. In addition to visibility, Host Pack enhances network scalability and connectivity by enabling the host to be part of the layer 3 network, while completely supporting popular layer 2 Continue reading

VxLAN on the CSR1Kv

By now, VxLAN is becoming the standard way of tunneling in the Datacenter.
Using VxLAN, i will show how to use the CSR1Kv to extend your Datacenter L2 reach between sites as well.

First off, what is VxLAN?
It stands for Virtual Extensible LAN. Basically you have a way of decoupling your vlan’s into a new scheme.

You basically map your VLAN into a VNI (Virtual Network Identifier), which in essence makes your VLAN numbering scheme locally significant.

Also, since the numbering for VNI’s is a 24 bit identifier, you have alot more flexibility than just the regular 4096 definable VLAN’s. (12 Bits .1q tags)

Each endpoint that does the encapsulation/decapsulation is called a VTEP (VxLAN Tunnel EndPoint). In our example this would be CSR3 and CSR5.

After the VxLAN header, the packet is further encapsulated into a UDP packet and forwarded across the network. This is a great solution as it doesnt impose any technical restrictions on the core of the network. Only the VTEPs needs to understand VxLAN (and probably have hardware acceleration for it as well).

Since we wont be using BGP EVPN, we will rely solely on multicasting in the network to establish who is the Continue reading

IDG Contributor Network: The future of disaster recovery lies in a future without the public internet

What is it that’s driving enterprises to the cloud?That’s a long list: Web-based storage, stability, easier remote access and reductions in maintenance and associated costs are a few of the most frequently cited reasons. But, the number one application on organizations’ minds when they’re mapping out cloud migration strategies is disaster recovery (DR). Consequently, disaster recovery has become a primary source of value for enterprises who are not only pursuing cloud adoption, but who are also building out hybrid- or multi-cloud strategies.To read this article in full or to leave a comment, please click here

ROI is not a cybersecurity concept

In the cybersecurity community, much time is spent trying to speak the language of business, in order to communicate to business leaders our problems. One way we do this is trying to adapt the concept of "return on investment" or "ROI" to explain why they need to spend more money. Stop doing this. It's nonsense. ROI is a concept pushed by vendors in order to justify why you should pay money for their snake oil security products. Don't play the vendor's game.

The correct concept is simply "risk analysis". Here's how it works.

List out all the risks. For each risk, calculate:

  • How often it occurs.
  • How much damage it does.
  • How to mitigate it.
  • How effective the mitigation is (reduces chance and/or cost).
  • How much the mitigation costs.

If you have risk of something that'll happen once-per-day on average, costing $1000 each time, then a mitigation costing $500/day that reduces likelihood to once-per-week is a clear win for investment.

Now, ROI should in theory fit directly into this model. If you are paying $500/day to reduce that risk, I could use ROI to show you hypothetical products that will ...

  • ...reduce the remaining risk to once-per-month for an additional $10/day.
  • ... Continue reading

Inside View: Tokyo Tech’s Massive Tsubame 3 Supercomputer

Professor Satoshi Matsuoka, of the Tokyo Institute of Technology (Tokyo Tech) researches and designs large scale supercomputers and similar infrastructures. More recently, he has worked on the convergence of Big Data, machine/deep learning, and AI with traditional HPC, as well as investigating the Post-Moore Technologies towards 2025.

He has designed supercomputers for years and has collaborated on projects involving basic elements for the current and more importantly future Exascale systems. I talked with him recently about his work with the Tsubame supercomputers at Tokyo Tech. This is the first in a two-part article. For background on the Tsubame 3 system

Inside View: Tokyo Tech’s Massive Tsubame 3 Supercomputer was written by Nicole Hemsoth at The Next Platform.

Docker brings containers to mainframes

Docker announced the first major update to its flagship Docker Enterprise Edition 17.06, with a clear eye to on-premises data centers and DevOps. Docker rolled out the rebranded Docker EE in March, based on what was previously known as the Docker Commercially Supported and Docker Datacenter products. With that launch, Docker added the ability to port legacy apps to containers without having to modify the code.The major new feature of this update — which seems to borrow from Microsoft’s year/month naming convention for Windows 10 updates — is support for IBM z Systems mainframes running Linux. Now containerized apps can be run on a mainframe, with all of the scale and uptime reliability it brings, and they run with no modifications necessary.To read this article in full or to leave a comment, please click here