VMware bundles support for the branch-of-one workforce

VMware has unveiled an integrated package of cloud security, access control and networking software aimed at addressing the key needs of today's COVID-19-driven remote workforce.VMware Anywhere Workspace brings together the company’s core enterprise software products, including its Workspace ONE unified endpoint management, Carbon Black Cloud cloud-native endpoint security, and secure access service edge (SASE) components, into a single system to support a widely distributed workforce. Read more: Who's selling SASE, and what do you get? "Enterprises are moving from simply supporting remote work to becoming distributed, anywhere organizations. Companies are rethinking where teams work, how they work, and how they support customers from wherever they are," Sanjay Poonen, chief operating officer, customer operations with VMware, wrote in a blog about the announcement. "To be successful, this means investing in technology and a long-term strategy to be a stronger, more focused and more resilient organization."  To read this article in full, please click here

VMware bundles support for the branch-of-one workforce

VMware has unveiled an integrated package of cloud security, access control and networking software aimed at addressing the key needs of today's COVID-19-driven remote workforce.VMware Anywhere Workspace brings together the company’s core enterprise software products, including its Workspace ONE unified endpoint management, Carbon Black Cloud cloud-native endpoint security, and secure access service edge (SASE) components, into a single system to support a widely distributed workforce. Read more: Who's selling SASE, and what do you get? "Enterprises are moving from simply supporting remote work to becoming distributed, anywhere organizations. Companies are rethinking where teams work, how they work, and how they support customers from wherever they are," Sanjay Poonen, chief operating officer, customer operations with VMware, wrote in a blog about the announcement. "To be successful, this means investing in technology and a long-term strategy to be a stronger, more focused and more resilient organization."  To read this article in full, please click here

The Future of Connectivity: Wi-Fi 6 and Smart Homes Explained

Wi-Fi has transformed the way we live, allowing us to work from any location, shop from the comfort of our armchairs, and benefit from a wide range of connected devices that would have been impossible if we were constrained by cables.The number of connected devices is growing faster than the number of global Internet users with  smart home devices like thermostats, smoke alarms and lighting systems making life more comfortable, safer, and more convenient.By 2023, Internet of Things (IoT) will account for half of the global device market and connected home applications will be the largest category. This is a huge opportunity for Communications Service Providers (CSPs) to offer additional services and generate revenues.To read this article in full, please click here

Feedback Requested: Chartering the MANRS Community

While MANRS has gone from strength to strength since its beginning in 2014, gaining attention, interest, and credibility from network operators worldwide, for the initiative to be sustainable and impactful in the long run there should be a stronger sense of ownership by the community. MANRS is an industry-led initiative whose participants set and develop […]

The post Feedback Requested: Chartering the MANRS Community appeared first on Internet Society.

Start building your own private network on Cloudflare today

Start building your own private network on Cloudflare today
Start building your own private network on Cloudflare today

Starting today, your team can create a private network on Cloudflare’s network. Team members click a single button to connect to private IPs in environments that you control. Cloudflare’s network routes their connection through a data center in one of over 200 cities around the world. On the other side, administrators deploy a lightweight software connector that replaces traditional VPN appliances.

Cloudflare’s private network combines IP level connectivity and Zero Trust controls. Thick clients like RDP software, SMB file viewers, or other programs can connect to the private IPs already in use in your deployment without any additional configuration. Coming soon, you’ll be able to layer additional identity-based network-level rules to control which users, from which devices, can reach specific IPs.

We are launching this feature as a follow-up to Cloudflare’s Developer Week because we are excited to give your development team, and your entire organization, a seamless platform for building and connecting your internal resources. We built this solution based on feedback from customers who want to move to a Zero Trust model without sacrificing some of the convenience of a private network.

We’re excited to give any team the ability to run their internal network on Cloudflare’s global Continue reading

Using Unequal-Cost Multipath to Cope with Leaf-and-Spine Fabric Failures

Scott submitted an interesting the comment to my Does Unequal-Cost Multipath (UCMP) Make Sense blog post:

How about even Large CLOS networks with the same interface capacity, but accounting for things to fail; fabric cards, links or nodes in disaggregated units. You can either UCMP or drain large parts of your network to get the most out of ECMP.

Before I managed to write a reply (sometimes it takes months while an idea is simmering somewhere in my subconscious) Jeff Tantsura pointed me to an excellent article by Erico Vanini that describes the types of asymmetries you might encounter in a leaf-and-spine fabric: an ideal starting point for this discussion.

Using Unequal-Cost Multipath to Cope with Leaf-and-Spine Fabric Failures

Scott submitted an interesting the comment to my Does Unequal-Cost Multipath (UCMP) Make Sense blog post:

How about even Large CLOS networks with the same interface capacity, but accounting for things to fail; fabric cards, links or nodes in disaggregated units. You can either UCMP or drain large parts of your network to get the most out of ECMP.

Before I managed to write a reply (sometimes it takes months while an idea is simmering somewhere in my subconscious) Jeff Tantsura pointed me to an excellent article by Erico Vanini that describes the types of asymmetries you might encounter in a leaf-and-spine fabric: an ideal starting point for this discussion.

Water-authority network upgrade spots problems faster

The Albuquerque water authority says recent network upgrades give it greater visibility and control over its remote sites and makes for faster responses to leaks and other problems.The Albuquerque Bernalillo County Water Utility Authority manages more than 3,000 miles of water-supply pipeline covering more than 650,000 users. The authority manages 135 remote locations, which include well sites, tanks, and pump stations, all of which have programmable logic controllers (PLC) connected to a dedicated, fixed-wireless network running at 900MHz back to the core network.[Get regularly scheduled insights by signing up for Network World newsletters.] “The [main treatment] plant was built [about] 15 years ago,” said Kristen Sanders, the authority’s chief information security officer. “So if a piece of equipment went out, replacing it would be about shopping on eBay.” Also the authority’s fiber backbone that connects the sites with the main plant was past it’s service life and had to be replaced.To read this article in full, please click here

Water-authority network upgrade spots problems faster

The Albuquerque water authority says recent network upgrades give it greater visibility and control over its remote sites and makes for faster responses to leaks and other problems.The Albuquerque Bernalillo County Water Utility Authority manages more than 3,000 miles of water-supply pipeline covering more than 650,000 users. The authority manages 135 remote locations, which include well sites, tanks, and pump stations, all of which have programmable logic controllers (PLC) connected to a dedicated, fixed-wireless network running at 900MHz back to the core network.[Get regularly scheduled insights by signing up for Network World newsletters.] “The [main treatment] plant was built [about] 15 years ago,” said Kristen Sanders, the authority’s chief information security officer. “So if a piece of equipment went out, replacing it would be about shopping on eBay.” Also the authority’s fiber backbone that connects the sites with the main plant was past it’s service life and had to be replaced.To read this article in full, please click here

Get Smart About Cloud Networking – A Packet Pushers Livestream Event, April 22

There are lots of reasons to get educated about cloud networking. You might: Be responsible for connecting end users to numerous cloud services Have to link an application in Cloud A to services and data in Cloud B Support a hybrid application that has one foot in your DC and another in AWS, Azure, or […]

The post Get Smart About Cloud Networking – A Packet Pushers Livestream Event, April 22 appeared first on Packet Pushers.

How to Publish AVS Workloads on the Internet

Azure VMware Solution (AVS) is a VMwarevalidated private cloud solution, managed and maintained by Azure. It runs on dedicated, bare-metal Azure infrastructure. AVS allows customers to manage and secure applications across both VMware environments and Microsoft Azure resources with a consistent operating framework. It supports workload migration, VM deployment, and Azure service consumption.  

 As AVS private cloud runs on an isolated Azure environmentby default it is not accessible from Azure or the Internet. Users can use either ExpressRoute Global Reach (i.e., from on-prem) or a jump box (i.e., on an Azure VNet) to access AVS private cloud. This means AVS workload VMs are confined within AVS private cloud and not accessible from the Internet. If customers want to make AVS Private Cloud resources, such as web servers, accessible from the Internet, Public IP needs to be deployed. There are couple of ways to do this: (1) Destination NAT or DNAT via Azure Virtual WAN/Azure Firewall; and (2) Azure Application Gateway. This article focuses on DNAT with Azure Virtual WAN/Azure Firewall. 

Continue reading

A Networking Perspective On Zero Trust Architecture (ZTA)

Zero Trust Architecture (ZTA) is a security point of view that has gathered enough momentum in 2020 and 2021 to frequently appear in marketing literature. The big idea of zero trust in network computing is roughly, “I confidently know who you are and have applied an appropriate security policy, but I still don’t trust you.”

My understanding of ZTA continues to evolve. This post represents my understanding today, with an emphasis on what ZTA means for network engineers.

How Is ZTA Different From Firewall Rules?

At first glance, zero trust sounds mostly like a firewall policy. Of course I don’t trust you. That’s why we apply all these filtering rules to the VPN tunnel, network interface, etc. Yes, but simple filtering implies a level of trust. The trust comes in the assumption that if you get through the filter, what you’re saying is trustworthy.

Zero trust does away with that assumption. For example…

  1. ZTA could mean that just because a VPN user passed a complex authentication scheme, their transactions are not assumed to be wholesome. Well done–your username and password check out, and we’ve applied a filtering policy to your tunnel. With that completed, we’re now going to monitor Continue reading

Tech Bytes: Optimizing Performance And IT Support For Your Distributed Workforce (Sponsored)

On today’s Tech Bytes episode, sponsored by AppNeta, we explore how IT can optimize performance and support for a highly distributed workforce and develop a sustainable strategy for a Work From Anywhere reality. Our AppNeta guests are Adam Edwards, Chief Customer Officer; and Mike Hustler, CTO.

The post Tech Bytes: Optimizing Performance And IT Support For Your Distributed Workforce (Sponsored) appeared first on Packet Pushers.

The Stars Are Aligning: Announcing our first round of speakers at DockerCon LIVE 2021

With just over a month to go before DockerCon LIVE 2021, we’re thrilled to announce our first round of speakers. We have returning favorites and compelling new first time speakers to round out your DockerCon experience. 

We received hundreds of amazing speaker proposals which made it difficult to select just a few. We set up a small team this year composed of seven Docker staff members and three Docker Captains to diligently review each proposal and deliberate once a week. We have more speakers and sessions to announce so stay tuned. 

Remember, if you haven’t registered for DockerCon, please make sure to do so now to get an early peak at the conference website.

Melissa McKay – Developer Advocate @ JFrog
The Docker and Container Ecosystem 101

Lukonde Mwila – Senior Software Engineer @ Entelect
Docker Swarm: A Journey to the AWS Cloud

Peter Mckee – Head of Developer Relations @ Docker
Event Emcee and Panel Moderator

Bret Fisher – DevOps Consultant and Docker Captain
Panel Moderator


Julie Lerman – Software Coach and Docker Captain
Panel Member

Nick Janetakis – Full-Stack Developer and Docker Captain
Best Practices around Creating a Production Ready Web App with Docker Continue reading

Cisco tool opens telemetry for advanced network, security analytics

Cisco is offering a new tool that it says democratizes the use of key telemetry streams to help customers more effectively populate analytics applications and efficiently run enterprise network management systems.Telemetry metrics are generated from enterprise resources, such as switches, routers, wireless infrastructure and IoT systems, and used by business and technology applications to monitor trends and help IT respond to threats or react to changing network conditions. Read more: Top metrics for multicloud management As use of monitoring and analytics programs grows, so does the need to grab advanced, dependable telemetry data to help feed those applications.To read this article in full, please click here

Cisco tool opens telemetry for advanced network, security analytics

Cisco is offering a new tool that it says democratizes the use of key telemetry streams to help customers more effectively populate analytics applications and efficiently run enterprise network management systems.Telemetry metrics are generated from enterprise resources, such as switches, routers, wireless infrastructure and IoT systems, and used by business and technology applications to monitor trends and help IT respond to threats or react to changing network conditions. Read more: Top metrics for multicloud management As use of monitoring and analytics programs grows, so does the need to grab advanced, dependable telemetry data to help feed those applications.To read this article in full, please click here

Complexity Reduction?

Back in January, I ran into an interesting article called The many lies about reducing complexity:

Reducing complexity sells. Especially managers in IT are sensitive to it as complexity generally is their biggest headache. Hence, in IT, people are in a perennial fight to make the complexity bearable.

Gerben then discusses two ways we often try to reduce complexity. First, we try to simply reduce the number of applications we’re using. We see this all the time in the networking world—if we could only get to a single pane of glass, or reduce the number of management packages we use, or reduce the number of control planes (generally to one), or reduce the number of transport protocols … but reducing the number of protocols doesn’t necessarily reduce complexity. Instead, we can just end up with one very complex protocol. Would it really be simpler to push DNS and HTTP functionality into BGP so we can use a single protocol to do everything?

Second, we try to reduce complexity by hiding it. While this is sometimes effective, it can also lead to unacceptable tradeoffs in performance (we run into the state, optimization, surfaces triad here). It can also make the system Continue reading

Network Break 329: Dell, VMware Consciously Uncouple; Aruba Networks Lives On The Edge

This week's Network Break podcast examines Dell's plans to spin off VMware for a healthy dose of cash, reviews Aruba Networks' Atmosphere keynotes, and dives into NVIDIA announcements around SmartNICs/DPUs and an AI security framework. We also cover a whopping-big acquisition by Microsoft, and what a drought in Taiwan means for the silicon supply chain.