The ‘Cisco’ gear you bought from these companies could be counterfeit

Business entities in Florida and New Jersey, plus 25 storefronts on Amazon and eBay, sold old Cisco gear that had been cosmetically altered to seem like new, more advanced models, part of a conspiracy going back eight years.The counterfeit-distribution operation was selling the networking devices for a tenth what it would cost if they were legitimate, according to the US Department of Justice. It estimated the conspiracy took in more than $100 million in revenue, and that—if the equipment had been what it was purported to be—would have retailed for more than $1 billion. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Calico workload-centric web application firewall (WAF): A better way to secure cloud-native applications

Container-based web applications built on microservices architecture, whether public-facing or internal, are critical to businesses. This new class of applications is commonly referred to as cloud-native applications. Read on to find out why traditional WAFs are no longer enough to protect cloud-native applications and how Calico’s new workload-centric WAF solves this problem.

Background

HTTP is the lingua franca for modern, RESTful APIs and microservices communication. Traditionally, organizations have deployed WAF at the perimeter level to protect web applications against external attacks. A WAF provides visibility and enforces security controls on external traffic that passes through it. However, for cloud-native applications, where the concept of a perimeter does not exist, the same visibility and control need to be provided at the workload level inside the cluster.

In a survey conducted by information security research center Ponemon Institute to probe the state of the WAF market, more than 600 respondents noted the following:

  • 86% of organizations experienced application-layer attacks that bypassed their WAF in the last 12 months.
  • While 66% of respondents consider WAF to be an important security tool, over 40% use their WAFs only to generate alerts (not to block attacks).

Source: Ponemon Institute – “The State of Web Application Continue reading

AWS WAN service aims to simplify global network deployments

A new managed WAN service from AWS promises to make it faster and easier for enterprises to build, manage, and monitor a global network that seamlessly connects cloud and on-premises environments.AWS Cloud WAN, which the company previewed in December, lets customers link cloud resources in on-premises data centers, branch offices or colocation sites and manage that environment through a single dashboard. Using the dashboard, networking teams can apply policies, automate configuration and security tasks across their entire network.To read this article in full, please click here

The average US 5G connection is getting faster

T-Mobile is still the fastest 5G provider in the US by some distance, but all three of the major national mobile service providers recorded major increases in their average connection speed between March and June of this year, according to a report released today by Opensignal.Much of the across-the-board increase, the report said, is due to the carriers beginning to use the mid-band 5G spectrum that was auctioned off recently by the FCC. Opensignal said that areas where C-band spectrum is available have seen noticeable improvements to average connection speeds.Other areas of mid-band spectrum, however, are the reason why T-Mobile continues to boast a substantial lead over both AT&T and Verizon in Opensignal’s speed tests. T-Mobile averages 171Mbps over a 5G connection, compared to 72Mbps for Verizon and 53Mbps for AT&T, thanks in large part to its early acquisition of 2.5GHz spectrum, the researchers said.To read this article in full, please click here

Ansible For Network Automation Lesson 1: Why Ansible? – Video

Welcome to Ansible For Networking! There are ten video lessons in this course. This course provides a detailed overview of how Ansible works, how to create playbooks and modules, the importance of idempotency, and a walk-through using Ansible to automate tasks in a Meraki WLAN. It’s intended for network administrators and engineers who want to […]

The post Ansible For Network Automation Lesson 1: Why Ansible? – Video appeared first on Packet Pushers.

Waiting Room Event Scheduling protects your site during online events

Waiting Room Event Scheduling protects your site during online events
Waiting Room Event Scheduling protects your site during online events

You've got big plans for your ecommerce strategy in the form of online events — seasonal sales, open registration periods, product drops, ticket sales, and more. With all the hype you've generated, you'll get a lot of site traffic, and that's a good thing! With Waiting Room Event Scheduling, you can protect your servers from being overloaded during your event while delivering a user experience that is unique to the occasion and consistent with your brand. Available now to enterprise customers with an advanced Waiting Room subscription, Event Scheduling allows you to plan changes to your waiting room’s settings and custom queueing page ahead of time, ensuring flawless execution of your online event.

More than always-on protection

We launched Waiting Room to protect our customers' servers during traffic spikes. Waiting Room sends excess visitors to a virtual queue during traffic surges, letting visitors in dynamically as spots become available on your site. By automatically queuing traffic that exceeds your site's capacity, Waiting Room protects your origin servers and your customer experience. Additionally, the Waiting Room's queuing page can be customized to match the look and feel of your site so that your users never feel as though they have left Continue reading

5 mistakes to avoid when implementing zero-trust

Interest in zero-trust security has heightened significantly over the past two years among organizations looking for better ways to control access to enterprise data in cloud and on-premises environments for remote workers, contractors and third parties.Several factors are driving the trend, including increasingly sophisticated threats, accelerated cloud adoption and a broad shift to remote and hybrid work environments because of the pandemic. Many organizations have discovered that traditional security models where everything inside the perimeter is implicitly trusted, does not work in environments where perimeters don’t exist and enterprise data and the people accessing it are increasingly distributed and decentralized.To read this article in full, please click here

5 mistakes to avoid when implementing zero-trust

Interest in zero-trust security has heightened significantly over the past two years among organizations looking for better ways to control access to enterprise data in cloud and on-premises environments for remote workers, contractors and third parties.Several factors are driving the trend, including increasingly sophisticated threats, accelerated cloud adoption and a broad shift to remote and hybrid work environments because of the pandemic. Many organizations have discovered that traditional security models where everything inside the perimeter is implicitly trusted, does not work in environments where perimeters don’t exist and enterprise data and the people accessing it are increasingly distributed and decentralized.To read this article in full, please click here

5 mistakes to avoid when implementing zero-trust

Interest in zero-trust security has heightened significantly over the past two years among organizations looking for better ways to control access to enterprise data in cloud and on-premises environments for remote workers, contractors and third parties.Several factors are driving the trend, including increasingly sophisticated threats, accelerated cloud adoption and a broad shift to remote and hybrid work environments because of the pandemic. Many organizations have discovered that traditional security models where everything inside the perimeter is implicitly trusted, does not work in environments where perimeters don’t exist and enterprise data and the people accessing it are increasingly distributed and decentralized.To read this article in full, please click here

Kubernetes For Network Engineers: Lesson 1 – A Brief Overview Of The Kubernetes Architecture – Video

This video series introduces essential Kubernetes concepts for network engineers who want to learn more about containers and Kubernetes and how to support the networking requirements of Kubernetes-based applications. The series will cover the Kubernetes architecture; services, node ports, and load balancers; ingress and service mesh; and other topics that network engineers should be familiar […]

The post Kubernetes For Network Engineers: Lesson 1 – A Brief Overview Of The Kubernetes Architecture – Video appeared first on Packet Pushers.

Kubernetes For Network Engineers: Lesson 3 – Pod-To-Pod Networking – Video

In lesson 3, instructor Michael Levan explores the basics of connecting Kubernetes pods via kube-proxy. Michael Levan brings his background in system administration, software development, and DevOps to this video series. He has Kubernetes experience as both a developer and infrastructure engineer. He’s also a consultant and Pluralsight author, and host of the “Kubernetes Unpacked” […]

The post Kubernetes For Network Engineers: Lesson 3 – Pod-To-Pod Networking – Video appeared first on Packet Pushers.

Ericsson, Thales and Qualcomm testing satellite 5G services

Ericsson, in partnership with Qualcomm and Thales, announced today that it is jointly planning trials of a satellite-based 5G network, using low-earth orbit satellites to provide globally available connectivity.The idea is to provide a backup service to terrestrial 5G, offering coverage in remote areas where 5G may not be deployed for some time. The companies said in a joint statement that they expect national governments to be among the primary users of such a service, for national security and public safety networks. Read more: 5G: Time to get real about its useTo read this article in full, please click here

Privacy for Providers

While this talk is titled privacy for providers, it really applies to just about every network operator. This is meant to open a conversation on the topic, rather than providing definitive answers. I start by looking at some of the kinds of information network operators work with, and whether this information can or should be considered “private.” In the second part of the talk, I work through some of the various ways network operators might want to consider when handling private information.