Recently in Networking Category

Note: And here I thought getting my office's network backbone to 10G was grand!
---

Juniper Networks has announced the industry's first 100Gbps Ethernet router interface card.

The networking company unveiled the 100Gbps Ethernet interface on Monday. The card will be sold as part of Juniper's T1600 core router, which is a high-performance product aimed mostly at telecommunications providers, but also usable by cloud-infrastructure companies and others rolling out large-scale virtualization.

"[100Gbps Ethernet] has always been inevitable, it has just been a question of when--now trends such as cloud computing, data center consolidation and virtualization are making the need for [100Gbps Ethernet] more acute and urgent than ever before," Opher Kahane, Juniper's general manager of high-end systems, said in a statement.

The 100Gbps Ethernet standard has not been published yet. Right now, it is being incubated, alongside 40Gbps Ethernet, by the IEEE's P802.3ba Ethernet task force, with final publication not expected for a year, at least. The fastest currently published Ethernet standard is 10Gbps.

Juniper's 100Gbps Ethernet interface card is "expected to be deployed in customer pilot networks before the end of 2009", the company said, but did not say why the product was being released before the standard is finalised.


Note: I followed this story because I've been considering outsourcing (cloud computing) several core applications and services. When a provider like Google has a massive outage like this, it requires that I further scrutinize hosted service providers.

---

Updated at 12:25 p.m. PDT with word that Google has confirmed an error on its end caused the outage, and at 3:30 p.m. PDT with Google's comment on McAfee's description of the events.

Widespread outages involving several Google services--including search, Google Docs, and Gmail--were caused by an upgrade gone awry inside of Google, according to engineers.

Dmitri Alperovitch, vice president of threat research for McAfee, said that Google this morning attempted to make changes to key Internet routing numbers--known as autonomous system numbers--as part of its ongoing transition from an older networking standard to a newer one called IPv6. An unknown "bug" inside Google's network involving some sort of hardware failure or glitch prevented Internet service providers from finding Google's new ASNs on the Internet--effectively sealing it off from many customers, he said.

Not all Internet users were affected, but some that use larger providers--such as AT&T or Verizon--appeared to be disproportionately hurt because large ISPs "peer" with Google, or interconnect their networks with Google's networks in order to improve speed and reduce bandwith costs, Alperovitch said. Not all customers at those providers were affected, and smaller ISPs that didn't interconnect their networks were able to route around the problem. But just like when a bad car accident shuts down a key highway, the ripple effects were felt elsewhere.

The outage began at 8:13 a.m. PDT, according to McAfee's data, and was fixed by 9:14 a.m. PDT. The issue was discussed inside forums dedicated for ISPs and their engineers, such as the North American Network Operators Group. McAfee's customers reported the issue to the security company, which monitors network traffic for some customers.

Google is a major fan of IPv6 and makes many of its services available through the new network technology. However, IPv6 has been slow to arrive overall, in part because it's a very difficult transition from the current IPv4 network.

Google spokesman Eitan Bencuya wouldn't confirm what caused the problem but said the company plans to detail what happened in a company blog to be published "shortly."

Update at 12:25 p.m. PDT: Google has confirmed that "an error in one of our systems caused us to direct some of our Web traffic through Asia, which created a traffic jam." The company did not elaborate on what caused the error in a blog post, but claimed just 14 percent of users were affected.

"We've been working hard to make our services ultrafast and 'always on,' so it's especially embarrassing when a glitch like this one happens. We're very sorry that it happened, and you can be sure that we'll be working even harder to make sure that a similar problem won't happen again," Google wrote.

Updated 3:30 p.m. PDT: Google has denied that work on the transition to IPv6 is to blame for this morning's outage, but will not specify what was to blame. "This issue is unrelated to any work we are doing in transitioning toward supporting IPv6," a spokesman said. McAfee said it obtained its information from Google on a private mailing list for networking professionals of which Google is a member, but declined to provide a copy of the thread in question.


Metasploit Project is a tool I'm using to test our external facing systems. Embedded is a YouTube video showing how this tool could be used.






Concerned about security for your home or work network? SANS provides an updated list of top ports and IP sources that you can block.

SANS

Top 10 Ports

by Reports
by Targets
by Sources
PortReports
1211574775
445572786
53483606
1434430111
1433380242
139225499
135175036
80169658
51413108341
2597657
PortTargets
1434134510
143378657
13572252
489954835
8034662
44531531
13721828
5319712
2312959
2210510640
PortSources
44597245
1425623672
2699320381
6059117888
3005016697
4557015881
6422115648
4219014131
6169213231
1367612393
port report

Top 10 Source IPs

IP AddressReportsAttacksFirst SeenLast Seen
218.095.047.083738,101 144,7372009-02-16 2009-03-03
219.139.130.1391,029,114 141,6072009-01-08 2009-03-03
202.099.011.0991,439,621 141,0872007-11-01 2009-03-03
221.233.242.0041,266,350 140,7312008-11-09 2009-03-03
218.098.106.053908,165 140,6612009-02-04 2009-03-03
059.081.064.229885,662 140,4662009-01-17 2009-03-03
061.139.054.0941,359,981 139,6492008-09-02 2009-03-03
058.020.222.030376,434 138,4492008-10-15 2009-03-03
059.173.247.106768,991 137,9312008-11-03 2009-03-03
218.075.199.0501,023,808 136,6582008-06-30 2009-03-03

Top Sources Apply the Top 10 blocklist automatically to your firewall via ThreatSTOP.



 Where is James King?


 

Language Translation




 

Other Links:


 Main
 Archives
 CMS
 About/Contact
 Twitter @BruteForce
 Facebook
 LinkedIn
 Geocaching
 View DGP stats

 

My Audio & Video:


 Flickr
 YouTube
 Pandora

 

Elsewhere:


 ATV Utah
 Our ATV Obsession
 Bogley Outdoor Community
 ATV Escape
 Trish's Cake Shop
 Dennis Udink's Site
 Army Ranger
 Alex's World
 Grizzly Guy
 Adventure World TV
 WeatherCam: UofU
 Delta Bravo Sierra Comics  
 PowerPoint Ranger Comics
 Reversaroller ATV Winch

March 2017

Sun Mon Tue Wed Thu Fri Sat
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  

Recent Photos

  • 15741045_10211847655930488_6166834380531438589_n.jpg
  • 15781367_10211847655650481_5094478667750837819_n.jpg
  • 15822526_10211847185038716_8397481358920193705_n.jpg
  • 14264913_10210650130713106_8283099820865646291_n.jpg
  • 14199490_10210650131073115_5502141936581324540_n.jpg
  • 20150816_112615.jpg
  • 20150816_095008.jpg
  • 20150816_085102.jpg
  • 20150816_083916.jpg
  • 20150816_083905.jpg

About this Archive

This page is an archive of recent entries in the Networking category.

Exploits and Security is the previous category.

Server Operating Systems is the next category.

Find recent content on the main index or look in the archives to find all content.