Creating a Dynamic Lab Environment with vEOS and GNS3 – Part II

SETTING UP A DHCP AND FILE SERVER FOR USE WITH ZTP

Now that we have a couple vEOS instances configured and able to communicate, and we have our out-of-band network set up, we can now begin to use ZTP to provide an initial startup config.


NOTE
Notice that we did not connect the Management1 interface of either vEOS instance to anything inside of GNS3.  If you remember when we created the VMs, their first interface is a host-only adapter connected to the vboxnet in VirtualBox, so it’s automatically connected and there’s nothing additional we need to do there, but GNS3 doesn’t know that so it considers the interface disconnected, and that’s OK.  That saves us from having to add our management server(s) to the topology and cluttering it up (Just imagine trying to have a nice clean-looking topology in GNS3 if you had to have a connection from every vEOS instance to the management server(s) ), which is distracting and ugly - we’re better than that.


ZTP is enabled as a default on the vEOS instances, but we still need to set up a server to provide DHCP and File services.  For servers, Ubuntu is my go-to and I usually Continue reading

Creating a Dynamic Lab Environment with vEOS and GNS3 – Part I

GETTING STARTED

Preliminary Installation Setup

Install GNS3
Install VirtualBox
Get ahold of the .vmdk and aboot.iso files


It is recommended to install VirtualBox AFTER you install GNS3 to avoid problems with GNS3 detecting VirtualBox.


Go to www.arista.com, and go to Support > Software Download.  The two files you’ll want are the .vmdk file as well as the Aboot .iso file:




Creating the Management Network

To simulate an out-of-band management network, we will create a vboxnet interface, similar to a loopback interface, on our laptop.  This will also allow us to interact with our virtual machines via SSH, etc.


Open VirtualBox, go to Preferences, and click Network. Select “Host-only Networks”, and then click the NIC adapter image with a plus symbol on it to add a new host-only network if there isn’t one already:




Select your newly-created vboxnet and click the screwdriver icon to configure it:




We’re going to be using ZTP to provision our switches, so select “DHCP Server”, ensure “Enable Server” is unchecked, and then click OK:




Verify you have a new interface reflecting your vboxnet configuration:




SETTING UP vEOS

Creating a Base Image

You’ll want a nice, clean base image to create clones Continue reading

Sometimes techy details matter

How terrorists use encryption is going to become central to the Cryptowars 2.0 debate. Both sides are going to cite the case of Reda Hame described in this NYTimes article. On one hand, it shows that terrorists do indeed use encryption. On the other hand, the terrorists used TrueCrypt, which can't be stopped, no matter how many "backdoor" laws the police-state tries to pass.

The problem with the NYTimes article is that the technical details are garbled. (Update: at the bottom, I correct them). Normally, that's not a problem, because we experts can fill in the details using basic assumptions. But the technique ISIS used is bizarre, using TrueCrypt containers uploaded to a file-sharing site. This is a horrible way to pass messages -- assumptions we make trying to fill in the blanks are likely flawed.

Moreover, there is good reason to distrust the NYTimes article. Small details conflict with a similar article in the French newspaper Le Monde from January 6. Both articles are based on the same confession by Reda Hame from last August.

For example, in discussing a training accident with a grenade, the NYTimes article says "Mr. Hame did not throw it far Continue reading

Rules, smules, classified, smashified: Those things don’t seem to apply to Clinton

Rules, smules...they don't seem to apply to Hillary Clinton. The Washington Post has an excellent piece about the Clinton email scandal.For “personal comfort” reasons, she wanted to use her personal unencrypted BlackBerry for all her email, despite warnings that it could be vulnerable. She even took it overseas, although she supposedly said she “gets it” being a security risk. Don’t be silly and expect her to use a PC; oh no, she was seemingly a CrackBerry fanboy. She also didn’t bother to tell officials that her BlackBerry was tied to her infamous private email server. That server was supposedly also for her comfort – for her “convenience.”To read this article in full or to leave a comment, please click here

Former NSA deputy director says Edward Snowden lacks courage

In the first segment of an interview with Chris Inglis, former deputy director of NSA, the Irari Report talks with him about his perceptions of Edward Snowden’s motivations and intentions in committing his acts of espionage. In the video segment, Inglis discusses his impressions of Snowden, and theorizes as to why Snowden left for China, and to where he intended to defect.Edward Snowden's defection occurred during Inglis' tenure as Deputy Director of NSA, and as such, Inglis was extremely involved in overseeing the investigation incident and mitigation of the resulting damage. Inglis states that Snowden was indiscriminate in his release of information, and is full of rage. When asked to comment on why Snowden has not released any documents about Russian or Chinese domestic surveillance efforts, which are plentiful throughout NSA, and would have been readily available to Snowden while he was at NSA, Inglis stated that Snowden lacks any courage to speak up about any concerns while he might be held accountable.To read this article in full or to leave a comment, please click here

Survey: With all eyes on security, talent shortage sends salaries sky high

Jason Hoffman started his career as an internal auditor, but after 7 years he was ready to leave the job he was "really good at" and try something different. The transition to security more than 18 years ago "was probably the best decision I made in my career," says Hoffman, who is now CSO at marketing automation software vendor Marketo. "I don’t think anyone in 1998 could have predicted how important security would be today." "Company executives and their boards are more acutely aware that security is not just an IT problem but it’s a business problem," says Hoffman. "As a result, security is getting more emphasis across all companies regardless of sector."To read this article in full or to leave a comment, please click here(Insider Story)

Merging firms appealing targets for attackers

Companies going through a merger or acquisition, as well as their lawyers, financial advisers, and other associated firms are all tempting targets for cyberattackers, according to a new report from Digital Shadows.The attackers use public sources for the first round of information gathering, then spearphishing and malware campaigns against targeted individuals. They are often undetected because many companies still ignore cybersecurity when doing due diligence, the report said.ALSO ON CSO: How to respond to ransomware threats The attackers are "apex predators" said Rick Holland, the company's vice president of strategy.To read this article in full or to leave a comment, please click here

The CORD Architecture

Edge provider networks, supporting DSL, voice, and other services to consumers and small businesses, tend to be more heavily bound by vendor specific equipment and hardware centric standards. These networks are built around the more closed telephone standards, rather than the more open internetworking standards, and hence they tend to be more expensive to operate and manage. As one friend said about a company that supplies this equipment, “they just print money.” The large edge providers, such as AT&T and Verizon, however, are not endless pools of money. These providers are in a squeeze between the content providers, who are taking large shares of revenue, and consumers, who are always looking for a lower price option for communications and new and interesting services.

If this seems like an area that’s ripe for virtualization to you, you’re not alone. AT&T has been working on a project called CORD for a few years in this area; they published a series of papers on the topic that make for interesting reading:

US has asked Apple, Google to help unlock devices in more than 70 cases

U.S. government agencies have filed more than 70 orders requiring Apple or Google to help law enforcement agencies unlock mobile devices since 2008, despite the agency insisting its fight with Apple in a recent terrorism case was limited in scope.The Department of Justice dropped its California case against Apple after the FBI found a way to break into one of the San Bernardino shooters' iPhone without assistance.But the American Civil Liberties Union has identified 64 cases where representatives of the DOJ have filed All Writs Act orders seeking assistance from Apple or Google to unlock mobile devices. The ACLU's numbers are on top of 12 cases identified by Apple lawyer Marc Zwillinger in mid-February, the group said. To read this article in full or to leave a comment, please click here

Should Apple Build their Own Cloud?

This is one of the most interesting build or buy questions of all time: should Apple build their own cloud? Or should Apple concentrate on what they do best and buy cloud services from the likes of Amazon, Microsoft, and Google?

It’s a decision a lot of companies have to make, just a lot bigger, and because it’s Apple, more fraught with an underlying need to make a big deal out of it.

This build or buy question was raised and thoroughly discussed across two episodes of the Exponent podcast, Low Hanging Fruit and Pickaxe Retailers, with hosts Ben Thompson and James Allworth, who regularly talk about business strategy with an emphasis on tech. A great podcast, highly recommended. There’s occasional wit and much wisdom.

Dark Clouds Over Apple’s Infrastructure Efforts

Custom developed Dripion backdoor used in highly targeted attacks in Asia, US

A new custom developed backdoor program has been used in highly targeted attacks against organizations from Taiwan, Japan, South Korea and the U.S. over the past year.Malware researchers from Symantec first came across the program, which they've named Dripion, in August 2015. However, due to its custom nature and sparse use, it has managed to fly under the radar since as early as November 2013.When their analysis began, the Symantec researchers believed Dripion was a local threat used against organizations in Taiwan, where most of its victims were found. However, since then, they have found computers infected with the backdoor in other countries as well.To read this article in full or to leave a comment, please click here

Docker Birthday #3: Thank you Docker community!

Gracias, merci, danke, obrigado, рақмет сізге, tak, धन्यवाद, cảm ơn bạn, شكرا, mulțumesc, asante, ευχαριστώ, thank you Docker community! While we originally planned for 40 Docker Birthday #3 celebrations worldwide with 1,000 attendees, over 8,000 people registered to attend one … Continued

Video And The Death Of Dialog

video

I was reading a trivia article the other day about the excellent movie Sex, Lies, & Videotape when a comment by the director, Stephen Soderbergh, caught my eye. The quote, from this article talks about how people use video as a way to distance ourselves from events. Soderbergh used it as a metaphor in a movie made in 1989. In today’s society, I think video is having this kind of impact on our careers and our discourse in a much bigger way.

Writing It Down In Pictures

People have become huge consumers of video. YouTube gets massive amounts of traffic. Devices have video recording capabilities built in. It’s not uncommon to see a GoPro camera attached to anything and everything and see people posting videos online of things that happen.

My son is a huge fan of videos about watching other people play video games. He’ll watch hours of video of someone playing a game and narrating the experience. When I tell him that he’s capable of playing the game himself he just tells me, “It’s not as fun that way Dad.” I, too, have noticed that a lot of things that would normally have been written down are Continue reading

How to set up a portable, non-cloud-based password manager

Nothing helps strong passwords become a central tenet of your electronic life than conscientious use of a password manager. However, the compromise of at least one cloud-based password manager last year and recent actions by a government agency may have given you second thoughts about using the cloud for something that instinctively feels like it should be managed locally.Those incidents aside, password managers remain the best way to avoid reusing weak passwords which is as commonplace as the number of password leaks that happen every year, even on large, reputable websites. And, if you don’t mind putting in a modicum of effort, you can still establish a non-cloud-based password manager that can be utilized across multiple devices.To read this article in full or to leave a comment, please click here

Expert: Comprehensive software security for cars will take years

Software security for automobiles is improving but it will take another three or four years until manufacturers can put overarching security architecture in place, says Stefan Savage, winner of the 2015 ACM-Infosys Foundation Award in the Computing Sciences.“We’re at a point where the industry has to recognize that this is a real issue for them,” says Savage, a professor in the Computer Science and Engineering department at the UC San Diego Jacobs School of Engineering.+ MORE CAR SECURITY: Car hackers urge you to patch your Chrysler, Ram, Durango, or Jeep +To read this article in full or to leave a comment, please click here