Review: Gigabit Wi-Fi access points for SMBs

Last year we reviewed five of the first Gigabit Wi-Fi access points to hit the market. This time around, we’re testing three new entrants: the Cisco WAP371, D-Link’s DAP-2695, and the Edimax WAP-1750.D-Link DAP-2695In addition to the regular access point mode, this Edimax unit supports WDS with or without the access point functionality running concurrently. It supports up to 32 SSIDs, 16 for each band. The access point also offers a simple load balancing feature and rogue access point detection. Like the D-Link access point, this unit has a built-in RADIUS server so you can easily utilize enterprise-class Wi-Fi security. However, the Edimax unit supports up to 256 user accounts. Another simple yet potentially very useful feature is its built-in beeper so you can make access points sound from the web GUI and physically locate them in the building.To read this article in full or to leave a comment, please click here(Insider Story)

New products of the week 03.16.2015

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. Allworx ConnectPricing: Connect 320: $1,230; Connect 324: $1,355; Connect 530: $1,665; Connect 536: $1,875; Connect 731: $3,250To read this article in full or to leave a comment, please click here

New products of the week 03.16.2015

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. Allworx ConnectPricing: Connect 320: $1,230; Connect 324: $1,355; Connect 530: $1,665; Connect 536: $1,875; Connect 731: $3,250To read this article in full or to leave a comment, please click here

We Have to Get Away from the Box-Focused Mentality

I had a great SDN-focused conversation with Terry Slattery during last Interop New York, ago and of course we came to the argument that the CLI is the root of all evil, which started my usual rant. Guess what: not surprisingly that wasn’t what Terry had in mind. He was using the “CLI mentality is bad” as a synonym for “we’re used to configuring our networks one box at a time” (so we should really be talking about box-focused mentality).

Read more ...

Alibaba uses facial recognition tech for online payments

E-commerce giant Alibaba Group and affiliated online payment service Alipay are aiming to use facial recognition technology to take the place of passwords.On Sunday, Alibaba chairman Jack Ma showed off the new feature while speaking at the Cebit trade fair in Hanover, Germany.Using Alipay, Ma bought a souvenir stamp from Alibaba’s e-commerce site in China. But to confirm the purchase, Ma scanned his face using the front camera on his smartphone.“Online payment to buy things is always a big headache,” he said. “You forget your password, you worry about your security. Today we show you a new technology.”Alibaba, which reigns as China’s largest e-commerce player, said Monday that the facial recognition feature was still under development.To read this article in full or to leave a comment, please click here

Alibaba uses facial recognition tech for online payments

E-commerce giant Alibaba Group and affiliated online payment service Alipay are aiming to use facial recognition technology to take the place of passwords.On Sunday, Alibaba chairman Jack Ma showed off the new feature while speaking at the Cebit trade fair in Hanover, Germany.Using Alipay, Ma bought a souvenir stamp from Alibaba’s e-commerce site in China. But to confirm the purchase, Ma scanned his face using the front camera on his smartphone.“Online payment to buy things is always a big headache,” he said. “You forget your password, you worry about your security. Today we show you a new technology.”Alibaba, which reigns as China’s largest e-commerce player, said Monday that the facial recognition feature was still under development.To read this article in full or to leave a comment, please click here

BGP RR Design – Part 2

This is a continuation from Part 1 9. ACME VPN RR’s Design: So the current total number of PE’s dedicated for VPN functionality is around 400 (2 PE’s in each POP x 200). A full iBGP mesh between 400 PE’s comes around 79,800 sessions ((400×399) /2). By introducing two  VPN RR’s each PE will have only two iBGP sessions […]

Author information

Diptanshu Singh

Diptanshu Singh

Diptanshu Singh,(3xCCIE,CCDE) is a Sr. Engineer mostly focused on service providers , data center and security. He is a network enthusiast passionate about network technologies so not only is it his profession, but something of a hobby as well.

The post BGP RR Design – Part 2 appeared first on Packet Pushers Podcast and was written by Diptanshu Singh.

BGP RR Design – Part 1

1. Introduction In this post we will be looking at large scale RR design by using a fictional ISP ACME  as a reference. As usual, I am assuming that the reader has familiarity with BGP and basic RR concepts. 2. Setting the Stage ACME is a communications company providing communications and data services to residential, business, governmental and wholesale customers. […]

Author information

Diptanshu Singh

Diptanshu Singh

Diptanshu Singh,(3xCCIE,CCDE) is a Sr. Engineer mostly focused on service providers , data center and security. He is a network enthusiast passionate about network technologies so not only is it his profession, but something of a hobby as well.

The post BGP RR Design – Part 1 appeared first on Packet Pushers Podcast and was written by Diptanshu Singh.

Yahoo puts email encryption plugin source code up for review

Yahoo released the source code for a plugin that will enable end-to-end encryption of email messages, a planned data-security improvement prompted by disclosures of U.S. National Security Agency snooping.The company is asking security experts to look at its code, published on GitHub, and report vulnerabilities, wrote Alex Stamos, Yahoo’s chief information security officer, in a blog post.The plugin should be ready by year end, wrote Stamos, who gave a presentation on Sunday at the South by Southwest conference in Austin, Texas.To read this article in full or to leave a comment, please click here

German industry is poised to exploit rural broadband

Internet speeds of 50Mbps are nothing but a pipe dream for most inhabitants of Britain, while even 5Mbps would be a welcome boost for many living in remote areas.Yet by 2018, German Chancellor Angela Merkel wants all Germans, even those in rural communities, to have access to 50Mbps broadband connections, she said at the opening ceremony of the Cebit trade show on Sunday.This ambitious goal, if attained, could revolutionize many aspects of farming and forestry, allowing a transition from practices based on intuition and tradition to those based on big data and analytics.And German businesses, including century-old agricultural machinery maker Claas, enterprise software specialist SAP, and a new generation of mobile app developers, are ready to take advantage of it.To read this article in full or to leave a comment, please click here

Cisco Access Point Default Password

Original content from Roger's CCIE Blog Tracking the journey towards getting the ultimate Cisco Certification. The Routing & Switching Lab Exam
The Cisco Access Point Default Password is – Cisco / Cisco You could probably have guessed that, but if you are configuring a cisco wireless access point out of the box for the first time you are going to want to know the default password and if you are reading this then you haven’t been... [Read More]

Post taken from CCIE Blog

Original post Cisco Access Point Default Password

Kubernetes and Google container engine

In this blog, I will cover the Google container engine service that I tried out. Pre-requisites: Need Google cloud account. Install Google cloud SDK. Google container engine is not available in the normal gcloud SDK installation. To use container engine service, we need to update preview component. $ gcloud components update preview I followed the … Continue reading Kubernetes and Google container engine

Vodafone, Deutsche Telekom put mobile security in the spotlight

Telecom operators Vodafone and Deutsche Telekom are betting that in a post-Snowden world, “made in Germany” is more attractive than “made in U.S.A.”The need for more secure communications has been a hot topic in Germany since former U.S. government contractor Edward Snowden made his revelations about National Security Agency (NSA) snooping.The operators see the revelations, rightly or wrongly, as a golden opportunity to differentiate their products from competing U.S. offerings. As often as they can, Vodafone and Deutsche Telekom are highlighting that the German credentials of two new security products that were announced on Sunday at the Cebit trade fair in Hanover.To read this article in full or to leave a comment, please click here

Opencompute Networking – Facebook Contributions

Earlier, I had written a blog on Opencompute networking project. There were few recent contributions from Facebook to Opencompute. In this blog, I wanted to capture major Opencompute Networking contributions from Facebook. I see these contributions as pretty significant in the context of White box switches. Wedge hardware design for TOR: The goal here was to develop … Continue reading Opencompute Networking – Facebook Contributions

German IT spending forecast to rise on eve of industry’s biggest trade show

IT spending is forecast to rise faster than previously expected in Germany, a bellwether for European industry, while IT sector jobs there will total almost one million by year-end. However, forthcoming legislation could have a chilling effect, industry association Bitkom warned.The news will put a smile on the faces of exhibitors and visitors at the giant Cebit trade show in Hanover, Germany, which opens Monday.Last year, 26,000 new jobs were created in the German IT industry, more than the 10,000 expected, Bitkom said. It expects 21,000 more will find employment in the industry by year end, taking the total to 990,000.The faster-than-expected rise in employment last year has prompted the association to raise its forecast for German IT spending on IT, telecommunications and consumer electronics this year to €155.5 billion (US$163 billion), up 1.5 percent year on year compared to an earlier growth forecast of 0.6 percent.To read this article in full or to leave a comment, please click here

28 – VxLAN/EVPN MP-BGP in a DCI environment

VxLAN Evolution in the Context of DCI Requirements

Since I posted this article “Is VxLAN a DCI solution for LAN extension ?” clarifying why Multicast-based VxLAN was not suitable to offer a viable DCI solution, the DCI market (Data Center Interconnect) has become a buzz of activity around the evolution of VxLAN based on Control Plane (CP).

In this network overlay context, the Control Plane objective is to leverage Unicast transport while processing VTEP and host discovery and distribution processes. This method significantly reduces flooding for Unknown Unicast traffic within and across the fabrics.

The VxLAN protocol (RFC 7348) is aimed at carrying a virtualized Layer 2 network tunnel established over an IP network, hence from a network overlay point of view there is no restriction to transport a Layer 2 frame over an IP network, because that’s what the network overlays offers.

Consequently a question as previously discussed with MCAST-only transport in regard to a new DCI alternative solution, comes back again;

  • Does a Control Plane suffice to claim that’s VxLAN can be used as a DCI solution?

Consequently, this noise requires a clarification on how reliable a DCI solution can be when based on VxLAN Unicast transport using a Control Continue reading