Port-breakout deployments have become a popular networking tool and are driving the large industry demand for parallel optics transceivers. Today, port breakout is commonly used to operate 40/100Gbps (40/100G) parallel optics transceivers as four 10/25Gbps (10/25G) links. Breaking out parallel ports is beneficial for multiple applications, such as building large scale spine-and-leaf networks and enabling…
Since we enabled IPv6 on our mail servers in 2013 and then on our web site in 2014, we have seen increased growth of our external IPv6 traffic. We are currently working on enabling IPv6 on our all of our internal networks and applications in order to begin removing IPv4 internally, beginning in 2018. The…
That’s at least five-major cloud application and infrastructure data breach incidents for 2017, and we’re only in July. Add in the number of ransomeware and other attacks during the first half of this year and it’s clear the cloud has a real security problem. By now, most everyone recognizes the benefits of the cloud; bringing…
Since the average startup founder who makes it to Series A earns more than a large company employee, many believe that early-stage startup employees also earn more (albeit less than founders). Dustin Moskovitz has even claimed that startup early employees have better earnings prospects than founders. We’ve looked at the data, and this does not…
We’d like to introduce you to one of the most devastating ways to cause service instability in modern micro-service architectures: application DDoS. A specially crafted application DDoS attack can cause cascading system failures often for a fraction of the resources needed to conduct a more traditional DDoS attack. This is due to the complex, interconnected…
During the lifetime of an IPv4 datagram inside the Linux kernel, one important step is the route lookup for the destination address through the fib_lookup() function. From essential information about the datagram (source and destination IP addresses, interfaces, firewall mark, …), this function should quickly provide a decision. —Vincent Bernat @MTU Ninja
Over the years hackers have hijacked many domain names by manipulating their DNS records to redirect visitors to malicious servers. While there’s no perfect solution to prevent such security breaches, there are actions that domain owners can take to limit the impact of these attacks on their Web services and users. —Lucisn Constantin @ The…
One of the several capabilities provided by IPv6 is that hosts are provided two options to configure their IPv6 addressles) and other parameters like the Recursive DNS Server(RDNSS) information [2]; that is either by using the stateless address autoconfiguration [3] or by obtaining the information from aDHCPv6server(4]. IPv6 hosts are advised as for the environment…
When Cisco announced its intent to acquire leading SD-WAN vendor Viptela in May of 2017, the network industry buzzed with conversation. Now, we’re in the quiet purgatory while we wait for regulatory approval. Since the deal hasn’t been finalized yet, neither company can say much about their plans for integration. But it’s clear that a…
Following the success of the first course ‘Introduction to Cybersecurity’, the APNIC Academy has launched its second course: ‘Internet Resource Management’. The course is for anyone interested in managing their Internet number resources more effectively, familiarising themselves with the Internet ecosystem, and finding out new ways to engage with the Internet community. —APNIC