Cisco FlexVPN DMVPN, Part 1 – Overview and Design

This post will introduce a new type of DMVPN – FlexVPN, unofficially called “DMVPN phase 4″ .  We will go through the basic building blocks of Cisco FlexVPN DMVPN and some of the design best practices for a typical enterprise WAN network. FlexVPN Introduction FlexVPN is a configuration framework (a collection of CLI/API commands) aimed to […]

The post Cisco FlexVPN DMVPN, Part 1 – Overview and Design appeared first on Packet Pushers.

Momentum in Motion: $35 Million in Funding, Solid Partnerships, Customer Wins, Switching on New Technology

I can’t believe how fast 2015 is flying by. It seems like we were just making our networking predictions for the year. If you’ve been following the blog or keeping up with us on social media, you may have noticed we’ve been busy here in Nashua in terms of our growth and expansion as well as the products we’re delivering. We are rapidly evolving Plexxi to keep pace with today’s competitive technology landscape.

I’m excited about the prospects for the future. And the reason has to do with three key accomplishments in 2015 (so far): today’s big news —$35 million in funding to accelerate our growth plans and product development; our new strategic partnerships along with our customer growth in targeted vertical markets; and the introduction of our Switch 2 Series. We’re set to make 2015 our best year yet.

1. Financing to Accelerate our Growth. Today, we announced we raised $35 million to continue our rapid growth in the software-defined agile datacenter market. The infusion of capital will help fuel the rapid expansion of our sales, marketing, customer support, and research and development efforts to deliver on our vision of a software-defined architecture in datacenters and service provider networks. Continue reading

REVIEW: Threat Intelligence could turn the tide against cybercriminals

In recent reviews, we looked at the advancements in endpoint security, including new ways companies are employing technology like virtual machines to get a leg up on potential attackers. But despite impressive new defensive technologies, the bad guys still seem to be getting through. According to security engineers we’ve talked with, the problem with network defense these days is two-fold. First, no matter how innovative the defensive technology deployed, it will eventually be breached or circumvented. And because most of the top attackers and groups collaborate, the tools and techniques used to successfully break down defenses are quickly shared.To read this article in full or to leave a comment, please click here(Insider Story)

New products of the week 09.14.15

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.HiveManager NG Virtual AppliancePricing: HiveManager NG Virtual Appliance requires the purchase of a 1-, 3-, or 5-year support contract, the price of a 1-year support contract is $1,000. Additionally, each managed access point requires a perpetual license at $80 per access point and a 1-, 3-, or 5-year support contract per access point.To read this article in full or to leave a comment, please click here

How We Extended CloudFlare’s Performance and Security Into Mainland China

CloudFlare launched five years ago. Within a year of our launch, the biggest surprise was the strong global demand for our service. From nearly the beginning, China was the second largest source of traffic by country to our network, behind only the United States.

In retrospect, that shouldn't have been a surprise. In 2010, the year we launched, 34% of China's population, or 450 million people, were online. Today, nearly half the country is online. To put it another way, with 700 million people online, China represents a quarter of all Internet users. If your mission is to help build a better Internet, like CloudFlare's is, then China is a country you cannot ignore.

Consequently, starting in 2011, we began to investigate how CloudFlare could bring our service to the Chinese Internet. Four years later, we're excited to announce the extension of CloudFlare's performance and security platform across mainland China. This is the story of how we did it.

The Challenges

There are three major challenges to extending a service like CloudFlare's across mainland China: technical, economic, and regulatory.

Technical

From a technical perspective, the Chinese Internet, despite its many similarities, is different than the rest of the world. Unlike Continue reading

IPv6-based Wi-Fi Hotspots

Apple’s 2015 WWDC event included a great session on IPv6 & TCP changes coming with iOS 9. There is a related post to the IETF v6ops mailing list here. The new IPv6 hotspot is very interesting to me. These are my notes on how hotspot functionality can work with IPv6, and no NAT.

Disclaimer: These are my own notes, written to help my understanding. There will be mistakes. Corrections welcome.

IPv4 Hotspot – (aka the simplicity of NAT?)

The current IPv4 hotspots use simple NAT, similar to most home network setups. The mobile network assigns a public IPv4 /32 address to the handset, H. The handset picks a local RFC1918 address space for its connectivity to local clients, and hands that out via DHCP. Hide NAT is used to provide outbound internet connectivity for those clients.

IPv4 Hotspot

What about IPv6? Isn’t NAT verboten?

NAT is evil, right? We can’t use NAT to hide the local clients behind the handset. So how do we provide IPv6 hotspot functionality? One way would be to use DHCPv6 PD. When the hotspot is enabled, the mobile device could request a prefix via DHCPv6 PD. That could then be used for local devices.

Unfortunately the Continue reading

Researcher reveals remotely exploitable flaw in world’s most widely-used real-time OS

A security researcher discovered a serious yet simple flaw in VxWorks, a real-time operating system for the Internet of Things, which an attacker could remotely exploit without needing any interaction with a user. The OS is used in everyday things like network routers to critical infrastructure as well in NASA’s Curiosity Rover on Mars and Boeing 787 Dreamliners.Searching for VxWorks via Shodan reveals about 100,000 internet-connected devices running the OS, but VxWorks supposedly powers “billions of intelligent devices.” The researcher warned that the vulnerability “allows remote code execution on most VxWorks-based devices.”To read this article in full or to leave a comment, please click here

Wireshark Mac OS X v1.99.1 Waitpid() error quick fix

I had 1.99.1 beta running in Mavericks quite well, problems arose with upgrade to 10.10. Yosemite. I saw [crayon-563410ebcce3a627922708-i/]  every time wireshark started and did not see any interfaces to start capture on. Thanks I was not alone with this one, go to the link provided to see the details, or do not give a sh*t and apply this one

Intel’s latest IoT move heats up the race for low-power networks

While mobile operators often claim bragging rights to the fastest smartphone connections, another rivalry is heating up around networks that aren't fast at all: Their claim to fame is that they don't suck up power. On Friday, Intel said it would work with cellular heavyweights Ericsson and Nokia to commercialize NB-LTE (Narrow-Band LTE), a variant of the latest cellular technology that uses a small amount of radio spectrum to efficiently carry small amounts of data. Also this week, low-power network specialist Ingenu said it would build a network across the U.S. within two years. Those are just two of the systems being promoted as the perfect glue to connect the burgeoning Internet of Things. They're vying to become the network of choice for electric meters, street lamps, pipelines and other infrastructure. By 2020, nearly 1.5 million devices will be connected to LPWA (low-power wide area) networks, Machina Research estimates. LPWA will cut the cost of IoT and make it useful for more things, Machina analyst Godfrey Chua said.To read this article in full or to leave a comment, please click here

RouterJockey is launching a clothing line?!?!???

Ok maybe that title is a bit grandiose… But due to the great response I received Friday morning from the launch of the original PCAP shirt, and the IPv6 follow-up, I decided to create a few new designs and put everything into a store front. If the demand continues I will continue to publish new shirts, and keep up with relaunching original designs into their own campaigns. Not that I expect the demand for these shirts to continue long term, but you never know. Nevertheless I appreciate everyone’s support thus far.

But I need you! Yes… You! I need your ideas, and most importantly I need your feedback. So please, contact me on twitter and let me know what you think. If you like what you see, please share the url for the store.

Without further ado…

2015-09-11 at 1.47 PM-1
Click to visit the RouterJockey shop

The post RouterJockey is launching a clothing line?!?!??? appeared first on Router Jockey.

How to run Juniper vMX in UNetLab

Juniper offers its brilliant MX routers for virtual environments – namely vMX. And we cant name ourselves engineers if we wouldn’t try to run one in the Unetlab. Running vMX in the unetlab is a simple task, yet I see many complaints about vMX not working. With this being said I invite you to a journey called “running vMX

iPexpert’s Newest “CCIE Wall of Fame” Additions 9/11/2015

Please join us in congratulating the following iPexpert students who have passed their CCIE lab!

This Week’s CCIE Success Stories

  • Hesham Abdelkereem, CCIE #40790 (Dual, Wireless & Collaboration)
  • Nadeem Akbar, CCIE #11610 (Wireless)
  • Hugo Dantas, CCIE #49174 (Collaboration)

This Week’s Testimonial

Hesham Abdelkereem CCIE #40790 (Wireless & Collaboration)
The product that helped me was Video on Demand.

Nadeem Akbar CCIE #411610 (Wireless)
The CCIE Wireless Bootcamp helped me pass the exam.

We Want to Hear From You!

Have you passed your CCIE lab exam and used any of iPexpert’s self-study products, or attended a CCIE Bootcamp? If so, we’d like to add you to our CCIE Wall of Fame!