Skip to main content

Posts

How do you assure security of your internal network?

Hello there, When it comes to network security, probably all of us would say 'firewall', as that comes to our minds firstly. That's true, you have to protect yourself from the entire spectrum of risks that are lurking from outside your network edge and trying to either get to your devices to make them botnet slaves, or to get to your data so it can be sold or used for identity theft or anything else. That's true and valid. But what about the other edge? The edge of your local network? What if your employer takes his laptop for a business trip, stops to enjoy a cup of coffee at the airport or shopping center, and uses public wireless network for Internet connectivity? Let's go back couple of quarters, when WannaCry was at its best and tried to make people cry. Your employee would get his laptop infected with ransomware or any other type of malware and bring that to your company network. Then, if your employee wasn't upgrading his OS frequently (...

Network Basics EP 1: From the scratch

Hello there, Shall I introduce you to basic networking terminology in an "immersive" way while more real things are discussed, or should you be provided with a list of terms you have to get familiar with as a homework, if you really want to gain knowledge in networking field? I know that you would like to experience with the hardware as soon as possible, so I don't want you to get bored too quickly. Because of that I also won't duplicate the content which you have plenty of on the Internet, so you won't find here full-blown descriptions of ISO OSI model or anything else, I will just briefly point them out and describe them so you can get familiar and google for more knowledge if you are interested. Some of the terms however might be difficult for me to introduce inline, so at the very end of some Network Basics posts you will find "things to google" section for further reading. Alright, after kinda long introduction, it's time for takeoff. Genera...

Half-MLAG design

Hello there, Recently I was providing class to a customer, when at some point we went off the topic to discuss their brand new Extreme-based infrastructure they are about to move to. This doesn't happen much often, as we have very experienced VARs as partners, so I would like to cherish the moment by making note on this. One of the ideas of the deployment was to utilize MLAG on Core-ToR connections.