F5 BIG-IP HA LTM in Azure

This post goes through the deployment of a HA pair of F5 BIG-IP LTMs in Azure. Like with most vendors the F5 solutions is documented as part of ARM templates, I personally prefer to pick these things apart and first build them manually to better understand what is going on under the hood. A more cynical person may suggest they do this on purpose to try and hide all the fudges needed to make their solution work in a public cloud.

Hedge 169: Network Address Translation with Steinn

Network Address translation is one of those phrases that strikes fear into the hearts of some network engineers … and joy into the hearts of others! Steinn Bjarnarson joins us to discuss the history of NAT, its uses, its misuses, and how NAT fits into the big picture of network design today. Steinn just finished writing a paper on the history of NAT.

download

Saving commands to a file using Ctrl-x-e

One very interesting trick that you may not know is that you can type a line of text (presumably a command) on the Linux command line and immediately save it to a file by pressing just three keys. The editor that will open up will depend on your $EDITOR setting that you can view using the command shown below:$ echo $EDITOR nano If you prefer to use a different editor, use a command like this before typing or moving back to the command that you want to save:$ export EDITOR=vi And don't forget to save this change to your .bashrc (or other start-up file) if you want to make this change permanent. For example:To read this article in full, please click here

Saving commands to a file using Ctrl-x-e

One very interesting trick that you may not know is that you can type a line of text (presumably a command) on the Linux command line and immediately save it to a file by pressing just three keys. The editor that will open up will depend on your $EDITOR setting that you can view using the command shown below:$ echo $EDITOR nano If you prefer to use a different editor, use a command like this before typing or moving back to the command that you want to save:$ export EDITOR=vi And don't forget to save this change to your .bashrc (or other start-up file) if you want to make this change permanent. For example:To read this article in full, please click here

Aruba to prioritize SASE, private 5G, data-center networking

Aruba Networks plans to prioritize development of a short list of key networking technologies – including data-center switching, private 5G, and secure access service edge (SASE) – that it finds are top of mind for enterprise customers.Hewlett Packard Enterprise’s network subsidiary is fresh off a successful first quarter that saw revenue climb 31% year over year. Aruba general manager Phil Mottram attributes the record revenue in large part to the company’s Intelligent Edge strategy, which includes technologies to help customers adopt and manage network and application resources.To read this article in full, please click here

Aruba to prioritize SASE, private 5G, data-center networking

Aruba Networks plans to prioritize development of a short list of key networking technologies – including data-center switching, private 5G, and secure access service edge (SASE) – that it finds are top of mind for enterprise customers.Hewlett Packard Enterprise’s network subsidiary is fresh off a successful first quarter that saw revenue climb 31% year over year. Aruba general manager Phil Mottram attributes the record revenue in large part to the company’s Intelligent Edge strategy, which includes technologies to help customers adopt and manage network and application resources.To read this article in full, please click here

Xcitium’s Endpoint Virtual Jail Aims To Lock Up Mystery Malware

Xcitium is an Endpoint Detection and Response (EDR) vendor that sells client software that uses multiple methods to protect endpoints. Methods include anti-virus, a host firewall, a Host Intrusion Protection System (HIPS), and a technique it calls ZeroDwell Containment. The first three components are straightforward. The AV software relies on signatures to detect known malware. […]

The post Xcitium’s Endpoint Virtual Jail Aims To Lock Up Mystery Malware appeared first on Packet Pushers.

Netherlands to restrict export of ‘advanced’ chip-making tech to China

Following similar moves by the US, the Netherlands government is moving forward with plans for new restrictions on exports of advanced chip-making technology to China, which are expected to affect the manufacture of advanced logic and DRAM modules.The Netherlands export restrictions have been in the works for some time, and on Wednesday the Dutch government posted more information on its plans. "These new export controls focus on advanced chip manufacturing technology, including the most advanced deposition and immersion lithography tools," according to an announcement by Netherlands-based ASML, a leading global manufacturer of semiconductor manufacturing equipment.To read this article in full, please click here

Netherlands to restrict export of ‘advanced’ chip-making tech to China

Following similar moves by the US, the Netherlands government is moving forward with plans for new restrictions on exports of advanced chip-making technology to China, which are expected to affect the manufacture of advanced logic and DRAM modules.The Netherlands export restrictions have been in the works for some time, and on Wednesday the Dutch government posted more information on its plans. "These new export controls focus on advanced chip manufacturing technology, including the most advanced deposition and immersion lithography tools," according to an announcement by Netherlands-based ASML, a leading global manufacturer of semiconductor manufacturing equipment.To read this article in full, please click here

Kubernetes Security And Networking 3: Helpful Tips For Securing Your Kubernetes Cluster – Video

Michael Levan reviews security essentials for protecting your Kubernetes infrastructure, including worker nodes. He discusses server hardening using CIS Benchmarks as a guide, running a scanner (using Kubescape as an example), and employing role-based access control (RBAC). You can subscribe to the Packet Pushers’ YouTube channel for more videos as they are published. It’s a […]

The post Kubernetes Security And Networking 3: Helpful Tips For Securing Your Kubernetes Cluster – Video appeared first on Packet Pushers.

IPv6 Buzz 121: Uncovering IPv6 Host Default Address Selection

Today's IPv6 Buzz podcast explore the topic of default address selection with IPv6 hosts as defined in RFC 6724. It's very common for a host to have multiple IPv6 addresses of different types (as well as an IPv4 address in dual-stack environments) and RFC 6724 includes rules for which addresses are used first.

The post IPv6 Buzz 121: Uncovering IPv6 Host Default Address Selection appeared first on Packet Pushers.

DHCP Relaying Details

Chinar Trivedi asked an interesting question about DHCP relaying in VXLAN/EVPN world on Twitter and my first thought was “that shouldn’t be hard” but when I read the first answer that turned into “wait a minute, how exactly does DHCP relaying works?

I’m positive there’s a tutorial out there somewhere, but I decided to go back to the sources of wisdom: the RFCs. It turned out to be a long walk down the IETF history lane.

DHCP Relaying Details

Chinar Trivedi asked an interesting question about DHCP relaying in VXLAN/EVPN world on Twitter and my first thought was “that shouldn’t be hard” but when I read the first answer that turned into “wait a minute, how exactly does DHCP relaying works?

I’m positive there’s a tutorial out there somewhere, but I decided to go back to the sources of wisdom: the RFCs. It turned out to be a long walk down the IETF history lane.