Featured Webinar: Metaswitch GM Paul Drew Gives a Sneak Peek at “Virtualizing Voice Infrastructure”
Mark your calendar for an upcoming webinar to learn how network operators can save on CapEx and OpEx, and better compete with OTT providers.
Mark your calendar for an upcoming webinar to learn how network operators can save on CapEx and OpEx, and better compete with OTT providers.
This intuitive white paper discusses how configuring your NFV servercapable of cutting downtime by up to 97 percent.
Check what’s connected to the switch first:
#show ssh
%No SSHv1 server connections running.
Connection Version Mode Encryption Hmac State Username
0 2.0 IN aes128-cbc hmac-md5 Session started user1
0 2.0 OUT aes128-cbc hmac-md5 Session started user1
1 2.0 IN aes128-cbc hmac-md5 Session started user1
1 2.0 OUT aes128-cbc hmac-md5 Session started user1
Kill session using “disconnect” command:
#disconnect ssh ?
The number of the active SSH connection
vty Virtual terminal
#disconnect ssh 0
We are clearly moving to a software focused world — this conclusion is almost as inevitable and natural as taking your next breath (or eating that next Little Bits burger — but don’t get the big one unless you’re really hungry).
But, as with all things, there is a flip side to the world going to software. It could actually turn out that the IT world is on the path to becoming our own worst enemies. This, by the way, is what caught my eye this week, and what causes me to rant a little.
The cost and hassle of repairing modern tractors has soured a lot of farmers on computerized systems altogether. In a September issue of Farm Journal, farm auction expert Greg Peterson noted that demand for newer tractors was falling. Tellingly, the price of and demand for older tractors (without all the digital bells and whistles) has picked up. “As for the simplicity, you’ve all heard the chatter,” Machinery Pete wrote. “There’s an increasing number of farmers placing greater value on acquiring older simpler machines that don’t require a computer to fix.”
The issue at stake, at least in the United States, is the Digital Continue reading
CloudFlare protects millions of websites from online threats. One of the oldest and most pervasive attacks launched against websites is the Distributed Denial of Service (DDoS) attack. In a typical DDoS attack, an attacker causes a large number of computers to send data to a server, overwhelming its capacity and preventing legitimate users from accessing it.
In recent years, DDoS techniques have become more diversified: attackers are tricking unsuspecting computers into participating in attacks in new and interesting ways. Last year, we saw what was likely the largest attack in history (>400Gbps) performed using NTP reflection. In this attack, the unsuspecting participants were misconfigured NTP servers worldwide. This year, we’re seeing a disturbing new trend: attackers are using malicious JavaScript to trick unsuspecting web users into participating in DDoS attacks.
The total damage that can be caused by a NTP or DNS reflection attack is limited by the number of vulnerable servers. Over time, this number decreases as networks patch their servers, and the maximum size of the attack is capped at the outbound capacity of all the vulnerable servers. For JavaScript-based DDoS, any computer with a browser can be enrolled in the attack, making the potential attack volume nearly Continue reading
Whenever software switching nerds get together and start discussing the challenges of high-speed x86-based switching, someone inevitably mentions PF_RING, an open-source library that gives you blazingly fast packet processing performance on a Linux server.
I started recording a podcast with Luca Deri, the author of PF_RING, but we diverted into discussing ntopng, Luca’s network monitoring software. We quickly fixed that and recorded another podcast – this time, it’s all about PF_RING, and we discussed these topics:
Read more ...How does Internet work - We know what is networking
Please note: This has nothing to do with networking in particular! Not if you look from only one perspective. If you look from totally different perspective, with Cisco ACI and all other SDN solutions, you will probably meet with Python programming language (because you will) and then, somewhere in beginning of Python exploration this is the first question that will cross your mind. Of course, if you think like me! Although not directly related to networking, the question bothered me for some time now and the answer is not only really logical when you read it but it is also
Jason Nash is CTO of Varrow, a VMware Partner based out of the Carolinas. Previous to Varrow he was an enterprise architect for Wachovia’s investment bank. Jason has been in enterprise IT almost 20 years and originally started as a network admin working with Cisco gear. He maintains his Cisco CCNA and CCNP certifications. He is one of only a handful of double VCDX professionals, having completed his VCDX-NV last year.
When did you first start looking at network virtualization?
I started looking at network virtualization three to four years ago. I think before that, when it was just purely Nicira and some of those types of companies and projects, network virtualization was really the domain of the PayPals, the eBays, the Googles. Those types of companies. When VMware acquired Nicira, when Cisco did their Insieme spin-in, we started to see that commercial and traditional enterprise customers were going to have some very good options around network virtualization. We started to weigh our options and we really started to get serious about it over the last 18 months. Network virtualization ramps up right alongside our automation or orchestration practices and projects. So we believe that to do those properly, you Continue reading