IDG Contributor Network: What does a next-generation WAN look like?

After years of sitting in the shadow of virtualization, SaaS, containers, and all the other exciting IT trends, the wide area network is finally getting some attention. These other trends are actually drivers for this change in many cases; while WAN architectures have remained relatively static in recent years, the applications they need to support have changed beyond recognition. This is driving the need to re-think what the WAN looks like and how it operates.The phrase 'next-generation WAN' will mean different things to different enterprises, but let's identify some of the characteristics that are starting to become more common. Some of these are new, but in many cases the next-generation WAN is a new network methodology or mindset. This can impact the technologies used, insourcing/outsourcing decisions, and functionality provided by the network.To read this article in full or to leave a comment, please click here

Breach Presumption: The East-West Data Center Security Problem

A recurring trend in security briefings I've taken over the last year is that breaches are assumed. If you don't assume your infrastructure has been breached, you're ignorant, and probably willfully so. Ostrich, meet sand. A weird response my brain had to this is to ponder that if we've lost the war, why are we still fighting?

Fiber bandits: FBI hunting serial fiber-cutting vandals in California

AT&T recently announced a $250,000 reward to anyone with information on whoever entered its underground facilities in Livermore, California – a San Francisco suburb – and severed two of its fiber cables earlier this week, USA Today reported yesterday. The vandalism echoes 14 similar attacks that have destroyed damaged fiber cables and disrupted internet service for customers of several service providers in the northern California region dating back to July 2014. USA Today also reported a similar attack in late June, when "someone broke into an underground vault and cut three fiber-optic cables belonging to Colorado-based service providers Level 3 and Zayo," according to an earlier USA Today report. The FBI confirmed at the time that it was investigating connections between that attack and 11 similar outages in the region over the year prior. To read this article in full or to leave a comment, please click here

Fiber bandits: FBI hunting repeated fiber-cutting vandals in California

AT&T recently announced a $250,000 reward to anyone with information on whoever entered its underground facilities in Livermore, California – a San Francisco suburb – and severed two of its fiber cables earlier this week, USA Today reported yesterday. The vandalism echoes 14 similar attacks that have destroyed damaged fiber cables and disrupted internet service for customers of several service providers in the northern California region dating back to July 2014. USA Today also reported a similar attack in late June, when "someone broke into an underground vault and cut three fiber-optic cables belonging to Colorado-based service providers Level 3 and Zayo," according to an earlier USA Today report. The FBI confirmed at the time that it was investigating connections between that attack and 11 similar outages in the region over the year prior. To read this article in full or to leave a comment, please click here

The Texas Tribune: Our Docker Journey

written by Daniel Craigmile, System Architect at The Texas Tribune  We’re fans of Docker at The Texas Tribune. We’ve been playing with it since well before the 1.0 release and immediately started incorporating it into our infrastructure when the first production-ready code … Continued

Managing Junos Commit Time

I’ve been working with an ISP that is going to be using a large amount of configuration in the ‘groups’ section.  The statements there will be inherited into the main configuration using the ‘apply-groups’ statement.

This is a clever way of writing commands once and having them apply to multiple parts of the configuration.  At a basic level you could match on interfaces beginning with ‘ge-‘ or ‘xe-‘ and set an MTU on them all using one group statement. This MTU setting would not appear in the main configuration unless the configuration was displayed using “show | display inheritance”. There’s a nice explanation of how groups work over at this Packetpushers blog.

The downside is that if large amounts of configuration work is done in groups, applying the config can become slow during the ‘commit’ process.  

What happens under the hood when the user issues a commit in Junos?  You can see what happens if you issue a ‘commit | display detail’.  There is an example in this KB article.   As you can see there is a lot of parsing for commit-scripts, interface ranges and apply-groups at the start.  The config in these needs to be expanded and incorporated Continue reading

Managing Junos Commit Time

I’ve been working with an ISP that is going to be using a large amount of configuration in the ‘groups’ section.  The statements there will be inherited into the main configuration using the ‘apply-groups’ statement.

This is a clever way of writing commands once and having them apply to multiple parts of the configuration.  At a basic level you could match on interfaces beginning with ‘ge-‘ or ‘xe-‘ and set an MTU on them all using one group statement. This MTU setting would not appear in the main configuration unless the configuration was displayed using “show | display inheritance”. There’s a nice explanation of how groups work over at this Packetpushers blog.

The downside is that if large amounts of configuration work is done in groups, applying the config can become slow during the ‘commit’ process.  

What happens under the hood when the user issues a commit in Junos?  You can see what happens if you issue a ‘commit | display detail’.  There is an example in this KB article.   As you can see there is a lot of parsing for commit-scripts, interface ranges and apply-groups at the start.  The config in these needs to be expanded and incorporated Continue reading

F5 Virtual Appliance – How to install the VE LTM on ESXi

Original content from Roger's CCIE Blog Tracking the journey towards getting the ultimate Cisco Certification. The Routing & Switching Lab Exam
In my opinion F5 are the market leader in load balancing appliances. If you are just starting out and want to get some experience on the platform how do you do it? With a new F5 4000s coming in around $30,000 its not a cheap box to put in your lab. The answer is the F5 virtual […]

Post taken from CCIE Blog

Original post F5 Virtual Appliance – How to install the VE LTM on ESXi

Risky Business #383 — Inside FireEye’s research gag

On this week's show we take a look at what the hell it happening in Germany, where FireEye sought and obtained an ex parte injunction against a bunch of security researchers over a presentation they were about to do at 44Con. We speak with infosec lawyer Alex Urbelis -- he was at 44Con when all this came to light and he shares his insights.

read more