Welcome CCNA Collaboration, Goodbye CCNA Voice & CCNA Video!

Well folks, it has finally been announced! Cisco has retired the CCNA Voice and CCNA Video certifications in favor of a new, all-encompassing CCNA Collaboration certification. It will be comprised of two separate exams—one with a focus on Unified Communications solutions and one emphasizing the implementation and troubleshooting of video infrastructures.

The first exam is called “Implementing Cisco Collaboration Devices” and corresponds to exam number 210-060 CICD. Topics to note within this exam will be call signaling and media flows, VoIP quality implications, user account creation and modification, calling privileges, IM and Presence, RTMT and CDR/CMR-based reporting, and typical end user support scenarios. The focus of this exam is now on becoming a well-rounded engineer, with knowledge in more than just CUCM. For more information, visit this link here.

The second exam is called “Implementing Cisco Video Network Devices” and corresponds to exam number 210-065 CIVND. Topics on this exam that should carry great importance will be streaming video, media convergence, desktop and immersive systems, troubleshooting methodologies, media quality, and multi-point control units. With the focus here being solely on video and its integration with voice networks, candidates for the exam will gain a breadth of knowledge during the studying Continue reading

Critical remote code execution flaw patched in Samba

Security researchers are urging users to install new Samba security updates in order to address a critical vulnerability that allows attackers to execute arbitrary code with root privileges.Samba is an implementation of the SMB/CIFS networking protocol that enables Unix-like systems, including Linux, BSD, Solaris and Mac OS X to share files and printers with Windows computers. It also allows such systems to be integrated into Microsoft Active Directory environments and even act as domain controllers.The new vulnerability is located in the smbd file server and was discovered by Richard van Eeden of Microsoft Vulnerability Research.“It can be exploited by a malicious Samba client, by sending specially-crafted packets to the Samba server,” the Red Hat security team said in a blog post. “No authentication is required to exploit this flaw. It can result in remotely controlled execution of arbitrary code as root.”To read this article in full or to leave a comment, please click here

Review: Google’s Nexus 9 is an awesome tablet, with some caveats

Google's Nexus 9 is a nearly perfect device that, with the addition of the (optional) keyboard case, straddles the line between "little tablet" and "laptop replacement."When I say nearly perfect, put a heavy emphasis on the "nearly" part.I've spent about two weeks with this little Android-powered rig and, for the last few days at least, I've been attempting to use it as my primary machine. As both my tablet and my laptop. The results were… mixed. But overall quite good.The size of the tablet is great, though it is a bit too big to fit in (even rather baggy) pockets. But when you buy a 9-inch tablet, you know you're not going to be able to slip it into your pants pocket anyway. So this isn't really a problem.To read this article in full or to leave a comment, please click here

OSPF as a PE-CE Routing Protocol

OSPF as a PE-CE routing protocol can be used in the MPLS Layer 3 VPN design between customer and the service provider. If the customer receives an MPLS Layer 3 VPN service , routing protocol is enabled between the customers and the Service Providers. Don’t forget that static routing is a routing protocol ! This VPN… Read More »

The post OSPF as a PE-CE Routing Protocol appeared first on Network Design and Architecture.

TLS Session Resumption: Full-speed and Secure

At CloudFlare, making web sites faster and safer at scale is always a driving force for innovation. We introduced “Universal SSL” to dramatically increase the size of the encrypted web. In order for that to happen we knew we needed to efficiently handle large volumes of HTTPS traffic, and give end users the fastest possible performance.

CC BY 2.0 image by ecos systems

In this article, I’ll explain how we added speed to Universal SSL with session resumptions across multiple hosts, and explain the design decisions we made in this process. Currently, we use two standardized session resumption mechanisms that require two different data sharing designs: Session IDs RFC 5246, and Session Tickets RFC 5077.

Session ID Resumption

Resuming an encrypted session through a session ID means that the server keeps track of recent negotiated sessions using unique session IDs. This is done so that when a client reconnects to a server with a session ID, the server can quickly look up the session keys and resume the encrypted communication.
At each of CloudFlare’s PoPs (Point of Presence) there are multiple hosts handling HTTPS traffic. When the client attempts to resume a TLS connection with a Continue reading

Cumulus Networks Could Be The New Microsoft

CumulusMSTurtle

When I was at HP Discover last December, I noticed a few people running around wearing Cumulus Networks shirts. That had me a bit curious, as Cumulus isn’t usually on the best of terms with traditional networking vendors unless they have a partnership. After some digging, I found out that HP would be announcing a “britebox” branded whitebox switch soon running Cumulus Linux. I wrote a post vaguely hinting about this in as much detail as I dared leak out.

No surprise that HP has formally announced their partnership with Cumulus. This is a great win for HP in the long run, as it gives customers the option to work with an up-and-coming network operating system (NOS) along side HP support and hardware. Note that the article mentions a hardware manufacturing deal with Accton, but I wouldn’t at all be surprised to learn that Accton had been making a large portion of their switching line already. Just a different sticker on this box.

Written Once, Runs Everywhere

The real winner here is Cumulus. They have partnered with Dell and HP to bring their NOS to some very popular traditional network vendor hardware. Given that they continue to push Cumulus Linux Continue reading

Minus 8 degrees is pretty nippy for these parts

I took the above picture after dropping the kids off at school this morning.Now I understand that in places where some of you folks live a temperature reading of eight degrees below zero is called Tuesday. I do get that.However, I am also certain that this is the coldest outdoor temperature that I have ever experienced personally in my 50-plus years of living here in Massachusetts.In fact, I don’t recall anything close.The good news? It took my mind off all the snow for a few minutes. To read this article in full or to leave a comment, please click here

Many attackers lurk undetected for months, then pounce, study finds

Attackers who penetrate company networks often pose as legitimate users for long periods of time, causing lengthy delays before victims figure out they’ve been hacked.FireEye’s Mandiant forensics service found that it took a median of 205 days for an organization to detect a compromise, down slightly from 229 days in 2013, according to its 2015 Threat Report.The drop is nearly insignificant. “I don’t think it’s enough to make a claim that people are getting better at this,” said Matt Hastings, a senior consultant with Mandiant who works on incident response.To read this article in full or to leave a comment, please click here

Avaya extends SDN offerings

Avaya this week extended its SDN arsenal with an architecture and supporting products designed to simplify enterprise connectivity and application provisioning.Avaya’s SDN Fx architecture is comprised of new and existing products intended to ease the onboarding of users and devices to the network. The Fx architecture is built on Avaya’s existing Shortest Path Bridging-based fabric networking technology but also includes new offerings to extend SDN from the data center to the network edge.Those new products and features include an Open Networking Adapter, which is designed to provide a plug-n-play network connection for any device with an Ethernet port, including medical devices, manufacturing machines and branch office switches. The ONA is a card deck-sized appliance that Avaya says provisions a QoS-customized virtual path across the network and manages thousands of devices.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Tuesday, February 24

As HP reports numbers, questions will be on its splitHewlett-Packard is due to report its first-quarter results on Tuesday afternoon, but analysts will be more interested in hearing updates from CEO Meg Whitman on plans for the company’s split into two, says re/code. The company’s earnings are expected to hit $27.4 billion.GOPers on FCC want to delay net neutrality voteThe two Republican members of the Federal Communications Commission want to put a last-minute roadblock in the way of a proposal to reclassify the Internet as a utility and put stronger net neutrality protections in place. In a move that’s unlikely to succeed, Commissioners Ajit Pai and Mike O’Rielly want to delay the vote scheduled for Thursday, and have the FCC open the 332-page proposal to the public for comment. An agency spokeswoman said that the FCC already has already gotten “unprecedented levels of public comment on a variety of options” for net neutrality rules.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Tuesday, February 24

As HP reports numbers, questions will be on its splitHewlett-Packard is due to report its first-quarter results on Tuesday afternoon, but analysts will be more interested in hearing updates from CEO Meg Whitman on plans for the company’s split into two, says re/code. The company’s earnings are expected to hit $27.4 billion.GOPers on FCC want to delay net neutrality voteThe two Republican members of the Federal Communications Commission want to put a last-minute roadblock in the way of a proposal to reclassify the Internet as a utility and put stronger net neutrality protections in place. In a move that’s unlikely to succeed, Commissioners Ajit Pai and Mike O’Rielly want to delay the vote scheduled for Thursday, and have the FCC open the 332-page proposal to the public for comment. An agency spokeswoman said that the FCC already has already gotten “unprecedented levels of public comment on a variety of options” for net neutrality rules.To read this article in full or to leave a comment, please click here

ARM, IBM offer starter kit for making IOT devices

ARM and IBM want hobbyists to make their own connected devices in a matter of minutes with a new development kit announced Monday.The ARM mbed IoT Starter Kit -- Ethernet Edition will allow users to make cloud-ready Internet of Things products that could receive or transmit data for analysis or alerts. The development kit will come with ARM's mbed OS and connect into IBM's BlueMix cloud, which will help in the development of applications and services.The kit is for those with little to no experience in embedded or Web development. Prototype designs will guide enthusiasts through the process of making a device and connecting to IBM's BlueMix cloud service.To read this article in full or to leave a comment, please click here

How to turn your old phone into a basic PC for cheap

Your old smartphone has a greater destiny than your junk drawer. Believe it or not, you can turn it into, say, a mini-PC or media streamer. Assuming it packs both USB On The Go support (OTG) and a Mobile High-Definition Link (MHL) compatible port, there’s a ton of additional functionality lurking under that its hood. Heck, you can even use a smartphone with a broken screen for this.Without further ado, here’s how to transform your old smartphone into the brains of an Android-powered PC.It starts with MHL ports and USB OTG support Many smartphones from companies like Google, Samsung, LG, HTC, and Sony—among others—ship with MHL ports and have built-in compatibility for USB OTG as well.To read this article in full or to leave a comment, please click here

How to turn your old phone into a basic PC for cheap

Your old smartphone has a greater destiny than your junk drawer. Believe it or not, you can turn it into, say, a mini-PC or media streamer. Assuming it packs both USB On The Go support (OTG) and a Mobile High-Definition Link (MHL) compatible port, there’s a ton of additional functionality lurking under that its hood. Heck, you can even use a smartphone with a broken screen for this.Without further ado, here’s how to transform your old smartphone into the brains of an Android-powered PC.It starts with MHL ports and USB OTG support Many smartphones from companies like Google, Samsung, LG, HTC, and Sony—among others—ship with MHL ports and have built-in compatibility for USB OTG as well.To read this article in full or to leave a comment, please click here

Samsung holds smartphone lead in India, Apple trails

Samsung Electronics led the Indian smartphone market with a 22 percent share last quarter, while global rival Apple didn’t even make the top five in this price-sensitive market.The South Korean company is, however, facing strong competition at the low end from Indian players like Micromax, which had an 18 percent share of the market in the fourth quarter of 2014, and also from brands like Xiaomi that sold exclusively online, according to IDC.The rankings are the subject of some dispute, however. Earlier this month research firm Canalys said that Micromax had already overtaken Samsung, with a 22 percent share of the Indian smartphone market in the fourth quarter to Samsung’s 20 percent share. Samsung contested the figures and said its share had been far higher at about 34 percent, citing data from another research firm, GfK.To read this article in full or to leave a comment, please click here

Using custom fields in phpipam

phpipam has support for creating custom fields to be used in address, subnets, vlans, devices and users tables. This is useful when you need to add some custom data to your tables. You can set your custom fields under Administration > Custom fields.

 

It supports following types of data and it representations:

  • varchar: normal input field
  • integer: input field that must be an integer
  • boolean: true/false field, that is interpreted with dropdown
  • text: textarea input field, that holds bigger data than varchar
  • date: adds date field, that is represented with date dropdown
  • datetime: adds datetime field, that is represented with date and time dropdown
  • set: set field adds dropdown options, you control options in size/length field. For example, to have dropdown with three options you set ‘site1′,’site2′,’site3′ in size/length field.

 

Besides setting field type there are some other variables that can be set for each:

  • size / length: depends on field type this controls maximum length of input field or text, maximum size of integer, options for set field etc.
  • default: adds default value if field is left blank.
  • required: controls weather field is required to be filled in, if Continue reading

Docker Command One Liners

I love the code snippets, it’s how I learn any syntax by rolling up the sleeves, hacking and breaking while taking notes along the way. It’s probably not the most efficient but the muscle memory is how I learn. Here is a list of one liners from my notes in no particular order (even though I tried to in a ... The post Docker Command One Liners appeared first on NetworkStatic | Brent Salisbury's Blog.

...

Telegram dimisses claim of a flaw in its secure messaging application

Telegram, a messaging application that markets itself as a secure communication tool, doesn’t handle encrypted conversations securely, according to the founder of a mobile security company.Zuk Avraham of Zimperium wrote in a blog post Monday that he found several weak points that allowed him to recover plain text messages.Avraham didn’t try to directly crack messages encrypted by Telegram, which is backed by Pavel Durov, founder of the popular Russian social networking site Vkontakte. Instead, Avraham focused on an alternative attack using a kernel exploit to gain root access on an Android device and then looking at how Telegram handled messages in memory.To read this article in full or to leave a comment, please click here