Network Break 361: US Government Targets Spyware Maker; Ericsson Spends $6.2 Billion For Vonage

In this week's Network Break we discuss how an Israeli spyware maker ran afoul of the US government, why Ericsson is dropping $6.2 billion in cash for Vonage, new IPv6 subnets available in AWS, and more tech news.

The post Network Break 361: US Government Targets Spyware Maker; Ericsson Spends $6.2 Billion For Vonage appeared first on Packet Pushers.

Tech Bytes: How Pluribus Automates Data Center Fabrics With SDN And BGP EVPN (Sponsored)

Today on the Tech Bytes podcast we’re talking about data center fabrics and BGP EVPN with sponsor Pluribus Networks. A BGP EVPN deployment can be a heavy lift, but Pluribus is here to talk about how it can simplify and automate this process.

The post Tech Bytes: How Pluribus Automates Data Center Fabrics With SDN And BGP EVPN (Sponsored) appeared first on Packet Pushers.

Attack Maps now available on Radar

Attack Maps now available on Radar
Attack Maps now available on Radar

Cloudflare Radar launched as part of last year’s Birthday Week. We described it as a “newspaper for the Internet”, that gives “any digital citizen the chance to see what’s happening online [which] is part of our pursuit to help build a better, more informed, Internet”.

Since then, we have made considerable strides, including adding dedicated pages to cover how key events such as the UEFA Euro 2020 Championship and the Tokyo Olympics shaped Internet usage in participating countries, and added a Radar section for interactive deep-dive reports on topics such as DDoS.

Today, Radar has four main sections:

  • Main page with near real-time information about global Internet usage.
  • Internet usage details by country (see, for example, Portugal).
  • Domain insights, where searching for a domain returns traffic, registration and certificate information about it.
  • Deep-dive reports on complex and often underreported topics.

Cloudflare’s global network spans more than 250 cities in over 100 countries. Because of this, we have the unique ability to see both macro and micro trends happening online, including insights on how traffic is flowing around the world or what type of attacks are prevalent in a certain country.

Radar Maps will make this information even richer Continue reading

SmartNICs set to infiltrate enterprise networks

Enterprise infrastructure that supports data center, cloud and edge networks could someday be dominated by one of its tiniest components--the smartNIC or data processing unit (DPU).Use of smartNICs in the enterprise is still evolvinging, but the idea behind them--offloading server CPU duties onto a separate device to free up server cycles--is not new. Specialized hardware accelerators such as graphics processing units (GPU), field-programmable gate arrays (FPGA), and focused NICs have offloaded CPU workloads in telco, financial, and scientific application processing. NaaS is the future but it's got challenges Looking ahead, users and vendors see a way to reduce enterprise costs, improve performance and increase security with smartNICs.To read this article in full, please click here

SmartNICs set to infiltrate enterprise networks

Enterprise infrastructure that supports data center, cloud and edge networks could someday be dominated by one of its tiniest components--the smartNIC or data processing unit (DPU).Use of smartNICs in the enterprise is still evolvinging, but the idea behind them--offloading server CPU duties onto a separate device to free up server cycles--is not new. Specialized hardware accelerators such as graphics processing units (GPU), field-programmable gate arrays (FPGA), and focused NICs have offloaded CPU workloads in telco, financial, and scientific application processing. NaaS is the future but it's got challenges Looking ahead, users and vendors see a way to reduce enterprise costs, improve performance and increase security with smartNICs.To read this article in full, please click here

SmartNICs set to infiltrate enterprise network, security worlds

Enterprise infrastructure that supports data center, cloud and edge networks could someday be dominated by one of its tiniest components--the smartNIC or data processing unit (DPU).Use of smartNICs in the enterprise is still evolvinging, but the idea behind them--offloading server CPU duties onto a separate device to free up server cycles--is not new. Specialized hardware accelerators such as graphics processing units (GPU), field-programmable gate arrays (FPGA), and focused NICs have offloaded CPU workloads in telco, financial, and scientific application processing. NaaS is the future but it's got challenges Looking ahead, users and vendors see a way to reduce enterprise costs, improve performance and increase security with smartNICs.To read this article in full, please click here

First steps with pyATS

pyATS

Have you ever wanted to compare the operational state of a bunch of network devices between two specific times? Not only if the interfaces are up or down, but the number and status of BGP peers, the number of prefixes received, the number of entries into a MAC-address table, etc? This is something quite laborious to do with classical NMS or Do-It-Yourself scripts. And this is where pyATS can become a real asset. Here are my first steps with pyATS: Network Test & Automation Solution. What is pyATS? pyATS (pronounced…

The post First steps with pyATS appeared first on AboutNetworks.net.

How to buy Wi-Fi 6 access points

Wi-Fi 6 has some impressive improvements over its predecessor Wi-Fi 5 including lower latency, faster speeds, higher throughput, and increased range that can make it a better fit to serve both dense clusters of clients and clients running high-bandwidth applications.As Wi-Fi in general replaces wired networks in some enterprises and with the increased use of tablets, laptops, and mobile phones within enterprises, wireless-network responsiveness and versatility are becoming more desirable. Wi-Fi 6 (802.11 ax) can help. It can also improve the efficiency of IoT Wi-Fi networks by letting sensors lie idle more of the time so their batteries last longer.To read this article in full, please click here

How to buy Wi-Fi 6 access points

Wi-Fi 6 has some impressive improvements over its predecessor Wi-Fi 5 including lower latency, faster speeds, higher throughput, and increased range that can make it a better fit to serve both dense clusters of clients and clients running high-bandwidth applications.As Wi-Fi in general replaces wired networks in some enterprises and with the increased use of tablets, laptops, and mobile phones within enterprises, wireless-network responsiveness and versatility are becoming more desirable. Wi-Fi 6 (802.11 ax) can help. It can also improve the efficiency of IoT Wi-Fi networks by letting sensors lie idle more of the time so their batteries last longer.To read this article in full, please click here

Mikrotik RouterOS and VyOS Added to netsim-tools

Stefano Sasso took my “Don’t complain, submit a PR” advice seriously and did a wonderful job adding support for Mikrotik RouterOS and VyOS to netsim-tools, increasing the number of supported platforms to twelve. His additions are available in release 1.0.2 which also includes:

Interested? Start with tutorials and installation guide which includes lab building instructions.

Mikrotik RouterOS and VyOS Added to netsim-tools

Stefano Sasso took my “Don’t complain, submit a PR” advice seriously and did a wonderful job adding support for Mikrotik RouterOS and VyOS to netsim-tools, increasing the number of supported platforms to twelve. His additions are available in release 1.0.2 which also includes:

Interested? Start with tutorials and installation guide which includes lab building instructions.

Exams 1. Cisco Certified DevNet Expert Lab Exam Overview

Hello my friend,

Recently Cisco has finally announced the expert level certification in their automation and software development track named DevNet. The idea behind this certification track is to promote the DevOps mindset and culture in the traditional network engineering and to give the necessary theoretical knowledge and practical skills for engineers to start developing, maintaining and supporting network automation in Cisco Networks.


1
2
3
4
5
No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.

Brief Description

This Lab exam allows the one to earn the Expert level certification, provided the individual has already passed the theoretical exam DevCore (350-901 Developing Applications using Cisco Core Platforms and APIs). The expert level certification from Cisco is often very attractive for networking engineers as it generally well-respected across the industry and acts as a guideline of what engineer at a certain level is expected to know. The DevNet certification is yet relatively young and finding its path, as it steps in the area where it is competing with some Continue reading

PSA: Virtual Interfaces (in ESXi) Aren’t Limited To Reported Interface Speeds

There is an incorrect assumption that comes up from time to time, one that I shared for a while, is that VMware ESXi virtual NIC (vNIC) interfaces are limited to their “speed”.

In my stand-alone ESXi 7.0 installation, I have two options for NICs: vxnet3 and e1000. The vmxnet3 interface shows up at 10 Gigabit on the VM, and the e1000 shows up as a 1 Gigabit interface. Let’s test them both.

One test system is a Rocky Linux installation, the other is a Centos 8 (RIP Centos). They’re both on the same ESXi host on the same virtual switch. The test program is iperf3, installed from the default package repositories. If you want to test this on your own, it really doesn’t matter which OS you use, as long as its decently recent and they’re on the same vSwitch. I’m not optimizing for throughput, just putting enough power to try to exceed the reported link speed.

The ESXi host is 7.0 running on an older Intel Xeon E3 with 4 cores (no hyperthreading).

Running iperf3 on the vmxnet3 interfaces, that show up as 10 Gigabit on the Rocky VM:

[ 1.323917] vmxnet3 0000:0b:00.0 ens192: renamed  Continue reading

Git as a Source of Truth for Network Automation

In Git as a source of truth for network automation, Vincent Bernat explained why they decided to use Git-managed YAML files as the source of truth in their network automation project instead of relying on a database-backed GUI/API product like NetBox.

Their decision process was pretty close to what I explained in Data Stores and Source of Truth parts of Network Automation Concepts webinar: you need change logging, auditing, reviews, and all-or-nothing transactions, and most IPAM/CMDB products have none of those.

On a more positive side, NetBox (and its fork, Nautobot) has change logging (HT: Leo Kirchner) and things are getting much better with Nautobot Version Control plugin. Stay tuned ;)

Git as a Source of Truth for Network Automation

In Git as a source of truth for network automation, Vincent Bernat explained why they decided to use Git-managed YAML files as the source of truth in their network automation project instead of relying on a database-backed GUI/API product like NetBox.

Their decision process was pretty close to what I explained in Data Stores and Source of Truth parts of Network Automation Concepts webinar: you need change logging, auditing, reviews, and all-or-nothing transactions, and most IPAM/CMDB products have none of those.

On a more positive side, NetBox (and its fork, Nautobot) has change logging (HT: Leo Kirchner) and things are getting much better with Nautobot Version Control plugin. Stay tuned ;)

How to Improve Your Network Security

Information is powerful. As our reliance on technology increases, more and more companies are storing classified data on their online networks. Cloud computing is becoming the new norm – but so is cybercrime. When such delicate information is stored on computer networks, it is important for the data to be analyzed, controlled, and protected accordingly. Especially in case of financial matters, it is essential to protect financial information to prevent it from getting into the wrong hands.

Data security is becoming a great deal of concern in the modern world. While companies are paying millions of dollars to ensure network security, their data is still at risk of breaches and cyberthreats. If the network security of a company is compromised, the business risks losing billions of dollars since it betrays the trust of shareholders and customers alike.

If you are unsure regarding the safety of your network and company data, then you need to take a few extra steps to ensure network security. Here are a few simple, cost-effective steps that you can follow to protect your company data from any potential breaches:

1. Password Strategy

Every data network has a strong password encryption to it. However, one of the Continue reading