How do you capture all the flows entering or exiting a data center if your core Nexus 7000 switch cannot do it in hardware? You take an x86 server, load nProbe on it, and connect the nProbe to an analysis system built with ELK stack… at least that’s what Clay Curtis did (and documented in a blog post).
Obviously I wanted to know more about his solution and invited him to the Software Gone Wild podcast. In Episode 39 we discussed:
Read more ...Let me start this out by saying that I was thrilled to see Intel present at a NFD event! While Intel is well known in the network space for their NICs, they are most well known for their powerful line of processors, boards, and controllers. Most would argue that this doesn’t make them a ‘traditional’ network vendor but, as we all know, things are rapidly changing in the network space. As more and more network processing moves from hardware to software the Intel’s of the world will have an increasingly large role to play in the network market.
Check out the following presentations they gave at the recent NFD10 event…
Intel Open Network Platform Solutions for NFV
Intel Software Defined Infrastructure: Tips, Tricks and Tools for Network Design and Optimization
Here are some of my thoughts on the presentations that I thought were worth highlighting…
The impact of software and NFV
Intel made some interesting observations comparing telco companies using big hardware to Google using SDN and NFV. Most telco companies are still heavily reliant on big, high performance, hardware driven switches that can cost into the 10s of millions of dollars. Continue reading
Former Cisco and VMware exec joins the VC world
Firewalls are an essential part of network security, yet Gartner says 95% of all firewall breaches are caused by misconfiguration. In my work I come across many firewall configuration mistakes, most of which are easily avoidable. Here are five simple steps that can help you optimize your settings:
* Set specific policy configurations with minimum privilege. Firewalls are often installed with broad filtering policies, allowing traffic from any source to any destination. This is because the Network Operations team doesn’t know exactly what is needed so start with this broad rule and then work backwards. However, the reality is that, due to time pressures or simply not regarding it as a priority, they never get round to defining the firewall policies, leaving your network in this perpetually exposed state.
To read this article in full or to leave a comment, please click here
Martin Lund brings a semiconductor pedigree to the software company.