<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Networking Archives - ICT News</title>
	<atom:link href="https://www.ict-news.org/category/networking/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ict-news.org</link>
	<description>Information &#38; Communication technology world news</description>
	<lastBuildDate>Sat, 11 Mar 2017 14:37:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.9.3</generator>

<image>
	<url>https://www.ict-news.org/wp-content/uploads/2018/03/ICT-icon-3.png</url>
	<title>Networking Archives - ICT News</title>
	<link>https://www.ict-news.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>HPE acquires security startup Niara to boost its ClearPass portfolio</title>
		<link>https://www.ict-news.org/hpe-acquires-security-startup-niara-boost-clearpass-portfolio/</link>
					<comments>https://www.ict-news.org/hpe-acquires-security-startup-niara-boost-clearpass-portfolio/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Wed, 08 Feb 2017 09:38:46 +0000</pubDate>
				<category><![CDATA[analytics]]></category>
		<category><![CDATA[HP]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://newsroom.ict-hardware.com/?p=7462</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://www.ict-news.org/hpe-acquires-security-startup-niara-boost-clearpass-portfolio/">HPE acquires security startup Niara to boost its ClearPass portfolio</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="container-wrap  main-color "  style="padding-top:40px;padding-bottom:40px" ><div class="section-container container"><div class="vc_row vc_row-fluid row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner "><div class="wpb_wrapper">
	<div class="kleo_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<section class="deck viewability">
<h2>Niara’s software helps enterprises detect and protect from threats that have penetrated perimeter defenses</h2>
</section>
<div class="ad viewability">
<p>Hewlett Packard Enterprise has acquired Niara, a <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">startup</span></span> that uses machine learning and big data analytics on enterprise packet streams and log streams to detect and protect customers from advanced cyberattacks that have penetrated perimeter defenses.</p>
<p>The financial terms of the deal were not disclosed.</p>
<p>Operating in the User and Entity Behavior Analytics (UEBA) market, Niara’s technology starts by automatically establishing baseline characteristics for all users and devices across the enterprise and then <a href="https://www.hpe.com/us/en/newsroom/news-archive/featured-article/2017/02/HPE-Acquires-Niara-to-Deliver-Behavioral-Analytics-for-Enhancing-Protection-on-the-Intelligent-Edge.html">looking for anomalous, inconsistent activities</a> that may indicate a security threat, Keerti Melkote, senior vice president and general manager of HPE Aruba and cofounder of Aruba Networks, wrote in a blog post on Wednesday.</p>
<aside id="fsb-917" class="fakesidebar fakesidebar-auto">[ <a href="http://www.cio.com/article/3152659/free-security-tools-to-support-cyber-security-efforts.html#tk.ciofsb">Free security tools to support cybersecurity efforts</a> ]</aside>
<p>The time taken to investigate individual security incidents has been reduced from up to 25 hours using manual processes to less than a minute by using machine learning, Melkote added.</p>
<aside class="nativo-promo smartphone"></aside>
<p>Hewlett Packard <a href="https://www.sec.gov/Archives/edgar/data/1173752/000119312515192854/d928044d8k.htm">acquired wireless networking company Aruba Networks</a> in May 2015, ahead of its corporate split into HPE, an enterprise-focused business and HP, a business focused on PCs and printers.</p>
<p>The strategy now is to integrate Niara’s behavioral analytics technology with Aruba’s <a href="http://www.arubanetworks.com/assets/ds/DS_ClearPass_PolicyManager.pdf">ClearPass Policy Manager</a>, a role and device-based network access control platform, so as to to offer customers advanced threat detection and prevention for network security in wired and wireless environments, and internet of things (IoT) devices, Melkote wrote.</p>
<p>For Niara’s CEO Sriram Ramachandran and Vice President for Engineering Prasad Palkar and several other engineers it is a homecoming. They are part of the team that developed the core technologies in the ArubaOS operating system.</p>
<p>Niara technology addresses the need to monitor a device after it is on the internal network, following authentication by a network access control platform like ClearPass. Niara claims that it detects compromised users, systems or devices by aggregating and putting into context even subtle changes in typical IT access and usage.</p>
<aside class="nativo-promo tablet desktop"></aside>
<p>Most networks today allow the traffic to flow freely between source and destination once devices are on the network, with internal controls, such as Access Control Lists, used to protect some types of traffic, while others flow freely, Melkote wrote.</p>
<p>“More importantly, none of this traffic is analyzed to detect advanced attacks that have penetrated perimeter security systems and actively seek out weaknesses to exploit on the interior network,” she added.</p>
<p>By <span class="fn"><a href="http://www.cio.com/author/John-Ribeiro/" rel="author">John Ribeiro</a>, source by <a href="http://www.cio.com">CIO</a></span></p>
<p>Visit <a href="https://www.ict-hardware.com/">ICT Hardware</a> website to check <a href="https://www.ict-hardware.com/">HP Products</a>. We are one of <a href="https://www.ict-hardware.com/">HP Partners</a>.</p>
</div>

		</div> 
	</div> </div></div></div></div></div></section><!-- end section -->
<p>The post <a rel="nofollow" href="https://www.ict-news.org/hpe-acquires-security-startup-niara-boost-clearpass-portfolio/">HPE acquires security startup Niara to boost its ClearPass portfolio</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/hpe-acquires-security-startup-niara-boost-clearpass-portfolio/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco patches critical flaw in Prime Home device management server</title>
		<link>https://www.ict-news.org/review-3-services-managing-cloud-storage-accounts/</link>
					<comments>https://www.ict-news.org/review-3-services-managing-cloud-storage-accounts/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Fri, 03 Feb 2017 10:44:03 +0000</pubDate>
				<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Management]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://newsroom.ict-hardware.com/?p=7446</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://www.ict-news.org/review-3-services-managing-cloud-storage-accounts/">Cisco patches critical flaw in Prime Home device management server</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="container-wrap  main-color "  style="padding-top:40px;padding-bottom:40px" ><div class="section-container container"><div class="vc_row vc_row-fluid row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner "><div class="wpb_wrapper">
	<div class="kleo_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<h2>The vulnerability could allow hackers to take over servers used by ISPs to manage subscribers and their gateway devices</h2>
<p>Cisco Systems has fixed a critical vulnerability that could allow hackers to take over servers used by telecommunications providers to remotely manage customer equipment such as routers.</p>
<p>The vulnerability affects Cisco Prime Home, an automated configuration server (ACS) that communicates with subscriber devices using the TR-069 protocol. In addition to remotely managing customer equipment, it can also &#8220;automatically activate and configure subscribers and deliver advanced services via service packages&#8221; over mobile, fiber, cable, and other ISP networks.</p>
<p>&#8220;A vulnerability in the web-based GUI of Cisco Prime Home could allow an unauthenticated, remote attacker to bypass authentication and execute actions with administrator privileges,&#8221; Cisco said in <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-prime-home" target="_blank">its advisory</a>.</p>
<p>Attackers could exploit the vulnerability by sending API commands over HTTP to a particular URL without requiring authentication. The flaw is caused by a processing error in the role-based access control of URLs, Cisco explained.</p>
<aside class="nativo-promo smartphone"></aside>
<p>In the past, security researchers found vulnerabilities in the TR-069 implementation of many routers that could have allowed hackers to remotely take over those devices. However, a vulnerability in an ACS like Cisco Prime Home is much worse, because it can be used to take control of entire groups of subscriber devices at once.</p>
<p>According to Cisco&#8217;s <a href="https://www.cisco.com/c/en/us/td/docs/net_mgmt/prime/home/5-1/user/guide/cisco_prime_home_5-1_user_guide/prime_home_5-1_ug_ch1_intro.html" target="_blank">documentation</a>, the admin role on the Cisco Prime Home has access to the server&#8217;s customer support, administration, and audit functions, as well as the ability to perform bulk operations and access utilities and reports.</p>
<p>The vulnerability affects Cisco Prime Home versions 6.3.0.0 and above. Customers are advised to migrate to the latest, fixed version: 6.5.0.1.</p>
<p>The company has also <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-psc" target="_blank">warned customers</a> of a medium-risk URL redirect vulnerability in the Cisco Prime Service Catalog, a product that allows companies to set up self-service portals, provide IT service catalogs for data center and application services, and manage service requests.</p>
<aside class="nativo-promo tablet desktop"></aside>
<p>An attacker could exploit the vulnerability to redirect a user logged into the Cisco Prime Service Catalog to a phishing site in order to steal their credentials.</p>
<p>By <span class="fn"><a href="http://www.computerworld.com/author/Lucian-Constantin/" rel="author">Lucian Constantin</a>, source by <a href="http://www.computerworld.com/">ComputerWorld</a></span></p>
<p>Visit <a href="https://www.ict-hardware.com/">ICT Hardware</a> to get more info about <a href="https://www.ict-hardware.com/">Cisco Products</a></p>

		</div> 
	</div> </div></div></div></div></div></section><!-- end section -->
<p>The post <a rel="nofollow" href="https://www.ict-news.org/review-3-services-managing-cloud-storage-accounts/">Cisco patches critical flaw in Prime Home device management server</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/review-3-services-managing-cloud-storage-accounts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Coming soon to the enterprise: The self-driving network</title>
		<link>https://www.ict-news.org/coming-soon-enterprise-self-driving-network/</link>
					<comments>https://www.ict-news.org/coming-soon-enterprise-self-driving-network/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Tue, 31 Jan 2017 09:52:05 +0000</pubDate>
				<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Cisco Digitization]]></category>
		<category><![CDATA[Networking]]></category>
		<guid isPermaLink="false">https://newsroom.ict-hardware.com/?p=7429</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://www.ict-news.org/coming-soon-enterprise-self-driving-network/">Coming soon to the enterprise: The self-driving network</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="container-wrap  main-color "  style="padding-top:40px;padding-bottom:40px" ><div class="section-container container"><div class="vc_row vc_row-fluid row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner "><div class="wpb_wrapper">
	<div class="kleo_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p>You&#8217;ve heard about self-driving cars. What about a self-driving enterprise network?</p>
<p>According to Cisco, it&#8217;s coming—and right on time. In the quest for an agile IT infrastructure, enterprise networking has not kept pace with the likes of data center and cloud. While these technologies have seen transformative change in recent years, enterprise networks are still built and managed in much the same way as 25 years ago.</p>
<p>&#8220;Now that is changing,&#8221; says Ravi Chandrasekaran, senior vice president of Cisco&#8217;s Core Software Group. &#8220;The network is on the road to transformation—from a siloed, manual, hardware-centric infrastructure, to a coherent, automated and software-driven new network that intuitively aligns to business intent.&#8221;</p>
<p>Cisco calls this new, software-driven model the Digital Network Architecture (DNA), and it&#8217;s being driven by the needs of customers grappling with digital transformation. By contrast, the network of the early 1990s was the metaphorical equivalent of a stick shift. It focused mainly on connecting people, and the tasks were simple enough that humans could monitor and manage it. Make no mistake, these networks got the job done and along the way drove huge leaps in productivity and transformed entire industries. It&#8217;s the basis of the enterprise networks we know today.</p>
<p>But over the last few years, there have been major shifts in what happens on top of the network. Today, mobility is changing the way we work. The complexity of security threats is expanding daily. Applications are migrating to the cloud. And, on top of all this, billions of things will be joining the network over the next few years.</p>
<p>&#8220;The network is starting to be impacted by all these changes,&#8221; Chandrasekaran says. &#8220;It&#8217;s become too big, too complex and with too many moving pieces to manage manually. So we&#8217;ve had to rethink the network—to change its DNA.&#8221;</p>
<h3><strong>Speaking the language of business</strong></h3>
<p>A self-driving network is fully virtualized and software-defined, with an underlying infrastructure that&#8217;s open, flexible, malleable and automated. It also needs to be easy to program, and capable of monitoring and correcting itself.</p>
<p>&#8220;It&#8217;s able to speak and listen in the language of business, and adjust at the speed of business,&#8221; Chandrasekaran says. &#8220;It would fully automate user onboarding, device onboarding, application onboarding and process onboarding. It&#8217;s no longer about creating business-level policies and then manually translating and configuring the network to support them.&#8221;</p>
<h3>Consider the following scenarios:</h3>
<ul class="custom-list">
<li><span class="custom-list-content-inner"><span class="custom-list-title">Scenario #1: A snowstorm forces an organization&#8217;s employees to work from home.</span></span><span class="custom-list-content-inner"><strong>With today&#8217;s network:</strong> The employees can connect using their home video conferencing systems. But the spike in users results in reduced quality and connectivity problems, which in turn puts a dent in productivity.</span><span class="custom-list-content-inner"><strong>With a self-driving network:</strong> The network anticipates the storm because its analytics engine is connected to external feeds such as weather forecasts and road condition reports. As a result, it dynamically sets up end-to-end quality of service (QoS) for new video conferencing sessions and requests additional bandwidth to meet the demand. When the snowstorm is over, the network reverts to its previous state. Productivity lost: zero.</span></li>
<li><span class="custom-list-content-inner"><span class="custom-list-title">Scenario #2: A series of machines on the manufacturing floor are connected over the network to an Internet of Things (IoT) diagnostics application in the data center or cloud.</span></span><span class="custom-list-content-inner"><strong>With today&#8217;s network:</strong> The network needs to be manually segmented so that the IoT devices and application are isolated from the other data and users on the network. Additionally, the service-level requirements of the application need to be set manually for each device in the network. This is time consuming and prone to error.</span><span class="custom-list-content-inner"><strong>With a self-driving network:</strong> Service-level and security policies are communicated directly from the application and devices to the network-controller via open APIs. The fully programmable, abstracted network responds by instantly creating a new, highly secure virtual segment and applies QoS and security policies for all the IoT devices and applications. It also continues tracking the performance of all other applications, making automatic adjustments if any falls below required service levels. This saves time and improves operations and user experience.</span><span class="custom-list-content-inner">The scenarios are numerous. In retail or hospitality, a self-driving network might leverage location-based services on mobile devices to predict customer trends and provide a customized experience. For a financial institution, it could facilitate faster and more secure digitization through automated provisioning and application of security policies. In buildings, it could reduce costs through smart lighting and climate control solutions enabled through IoT sensors.</span></li>
</ul>
<h3><strong>The Network as hero</strong></h3>
<p>Many customers are already making plans for—and reaping business benefits from—networks that are more digital-ready. <a href="http://b2me.cisco.com/LP=1468?keycode=001461962" target="_blank">According to IDC</a>, 45 percent of global organizations plan to progress to advanced stages of <a href="http://www.cisco.com/go/dnaadvisor" target="_blank">digital network readiness</a> within the next two years.</p>
<p>And according to recent analysis <a href="http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/digital-network-architecture/idc-business-value-of-dna-solutions-white-paper.pdf" target="_blank">conducted by IDC</a>, organizations that upgrade their networks with Cisco DNA solutions are projected to see benefits that add up to more than $48,000 per 100 users annually. That results in a five-year ROI of over 400 percent. Other benefits include more efficient IT networking teams (28 percent), faster delivery of applications (17 percent) and faster WAN branch deployments (42 percent).</p>
<p>&#8220;The network is the hero of this story,&#8221; Chandrasekaran says. &#8220;In our journey to digital transformation, we must advance the network as a driver for digital innovation. Evolving into a truly self-driving network won&#8217;t happen overnight, but those that don&#8217;t embark on the journey today risk being left behind.&#8221;</p>
<p>Is your network ready for digital transformation? Cisco can help you get there. Go <a href="http://ciscodna.cycloneinteractive.net/interactive/" target="_blank">here</a> to get started.</p>
<p>By <span class="by-line-author"><a id="gtm-author" href="https://newsroom.cisco.com/authorbio-detail?articleId=252072">Laurence Cruz</a></span><span class="follow"><a href="http://twitter.com/zasque5" target="_blank"><i class="fa fa-twitter"></i> @zasque5</a>, source by <a href="https://newsroom.cisco.com/">Cisco</a></span></p>
<p>Visit <a href="https://www.ict-hardware.com/">ICT Hardware</a> to see more <a href="https://www.ict-hardware.com/">Cisco Products</a></p>
<div class="by-share-count hidden-xs"></div>

		</div> 
	</div> </div></div></div></div></div></section><!-- end section -->
<p>The post <a rel="nofollow" href="https://www.ict-news.org/coming-soon-enterprise-self-driving-network/">Coming soon to the enterprise: The self-driving network</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/coming-soon-enterprise-self-driving-network/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Network Recipes for an Evolving Data Center</title>
		<link>https://www.ict-news.org/network-recipes-evolving-data-center/</link>
					<comments>https://www.ict-news.org/network-recipes-evolving-data-center/#respond</comments>
		
		<dc:creator><![CDATA[Lama]]></dc:creator>
		<pubDate>Sun, 16 Oct 2016 15:13:57 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Virtualization]]></category>
		<category><![CDATA[network virtualization]]></category>
		<guid isPermaLink="false">https://newsroom.ict-hardware.com/?p=7221</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://www.ict-news.org/network-recipes-evolving-data-center/">Network Recipes for an Evolving Data Center</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="container-wrap  main-color "  style="padding-top:40px;padding-bottom:40px" ><div class="section-container container"><div class="vc_row vc_row-fluid row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner "><div class="wpb_wrapper">
	<div class="kleo_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<h4>Introduction</h4>
<p>The networking world is rife with buzz words like SDN, NFVs, Cloud, and Virtualized everything for network switches, routers, firewalls, load balancers, web servers, and other communication functions. In recent years, market trends have been moving away from expensive, specialized hardware, which is not easily scalable and quickly becomes obsolete, to using relatively inexpensive network interface cards (NIC) on common server systems. Meanwhile, these commodity NICs and their related software drivers have gained advanced functions that can offload from the CPU more complex routing and traffic processing. The result is that a single NIC can replace the specialized devices for much less cost and can easily be reconfigured as requirements change.</p>
<p>The transformation to achieve this goal had to occur both in the NIC hardware design and in the supporting software. With this combination we have general purpose building blocks that can understand and utilize hardware’s capabilities to provide an extremely powerful network. However, the system and network administrators must know how to configure these tools to get the most out of their investments.</p>
<p>Although the idea of building specialized networks and network components from commodity NICs is discussed in many places, this information often doesn’t include the details that tell us where to start, what to use, and the choices we will have to make. Configuration of a server becomes a complex task that must be achieved with minimal overhead. What is needed are some detailed examples to guide us through what we might need for our networks. In this article we describe several recipes for building such network functions.</p>
<h4>Setting the Table</h4>
<p>Network design and optimization is the fine art of tuning network throughput, data latency, and CPU utilization while scaling a single device to multiple endpoints and making it fit any network device profile. Any general purpose network device that can provide the hardware and software support to configure these characteristics qualifies to be a building block for making software-defined networks (SDN) a reality.</p>
<p><strong>Plates and Napkins</strong></p>
<p>As CPUs have evolved to support multicore parallel operations, similar transformations have happened in network chips: they have gone from single function, single queue to multifunction, multiqueue devices. Various network device vendors have raced to make more and more parallelized HW flows, while adding capabilities to do a lot more of the network stack&#8217;s work, also known as HW offloads. With virtualization support in the platform, these network devices can show up as multiple devices either through Single Root I/O Virtualization (SR-IOV) support or through Virtual Machine Device Queues (VMDq) support, both to improve virtual machine (VM) performance.</p>
<p>Early data centers invested in specialized pieces of equipment such as switches,routers, and firewalls. With the advent of high-speed CPUs, low-latency caching and high-speed commodity server NICs, building these specialized gateway modules with general purpose components provides similar performance at a fraction of the cost. This solution has the added benefits of configuration flexibility and virtualization. High-speed processing is enhanced by distributing the flows to allow parallel processing on the platform.</p>
<p>The data centers, too, have evolved to cater to multi-tenant, multi-application configurations. The hypervisor supporting the tenant VMs provides secure isolation between the VMs along with value-added services such as ACL and metering support. The networking between these isolated VMs also needs isolation, and our advanced devices include support for specialized tunneling and traffic routing to help with this.</p>
<p>To provide these features, the new server NICs have programmable parts that can be configured to any specialized role on the fly, and many network function roles can be played by a single NIC. But how do we access these bits?</p>
<p><strong>Knives, Forks, and Spoons</strong></p>
<p>The Linux* operating system tends to be a major player in the data center world, so we’ll use it and its tools in this discussion in order to give specific descriptions. Some of the basic tools we use include</p>
<ul>
<li><strong>Ethtool</strong>. Queries and sets various network driver and hardware settings, such as reading device statistics, adjusting interrupt handling, and setting special receive filters.</li>
<li><strong>ifconfig/ifup/ifdown</strong>. Configures a network interface, such as for setting an IP address. Note that this tool has been deprecated and replaced by ip addr and ip link.</li>
<li><strong>vconfig</strong>. Sets vlan tagging and filtering on a network interface.</li>
<li><strong>ip link and ip addr</strong>. These are parts of the iproute2 package, a collection of several facilities that manipulate network interfaces. They are newer functions meant to be more flexible than the ifconfig and vconfig tools that they replace.</li>
<li><strong>brctl</strong>. Manages Ethernet bridge configurations.</li>
</ul>
<p>Using these tools in standard setups is usually unnecessary—Linux distributions today usually do a good job of setting up the networking system by default. Startup scripts using dhclient and NetworkManager usually can take care of finding and connecting to the local network. However, our tools come in handy when we need to do something “different” in order to set up our special needs.</p>
<h4>Starters</h4>
<p><strong>Simple NIC</strong></p>
<p>Our starting point is the simple NIC, a single path for all the packets. In this case, all the incoming and outgoing packets use a single traffic flow, and processing typically happens on a single CPU core. The</p>
<p>NIC is not meant for heavy traffic handling, so we don’t worry much about tuning for performance. The only real consideration is to be sure the network port has a useful network address. If DHCP is not available on the network or dhclient is not running on the NIC’s port, we’ll need to set the address and start the device:</p>
<ul>
<li>ifconfig eth1 192.168.101.13<img class="wp-image-7222 alignright" src="http://ict-news.org/wp-content/uploads/2016/10/network-recipes-for-an-evolving-datacenter-1.png" alt="network-recipes-for-an-evolving-datacenter-1" width="130" height="126" /><br />
Set the IP address for the device.</li>
</ul>
<ul>
<li>ifconfig eth1 up<br />
Turn the device on and start processing packets.</li>
</ul>
<p><strong>Multiqueue</strong></p>
<p>With newer devices, we add multiqueue processing in the NIC, which can offload some of the traffic placement processing from the CPUs. In the simplest case, the NIC can provide load balancing across the CPU cores by inspecting the incoming packet header and sorting the traffic by “conversation” into core specific message queues. If the NIC knows that a consumer for messages on TCP port 80 (web server) is on core 3, the NIC can put those packets in the core 3 packet queue. This process would then be separate from the database traffic being handled on core 2 and the video traffic on core 0. Each packet queue has its own interrupt line assigned to the related cores, and now video traffic and interrupts can be processed without bothering the database or web server processing. This process also helps with cache locality, keeping data on a single core instead of needing to move it around from cache to cache.</p>
<p>There are several ways to filter the traffic, but the primary tools are Receive Side Scaling (RSS) and Flow Director (FD). In most devices, these are setup automatically to work with the kernel to spread the processing load. However, they can be configured by hand using ethtool. For example:</p>
<ul>
<li>ethtool -L eth1 combined 64               <img loading="lazy" class="wp-image-7223 alignright" src="http://ict-news.org/wp-content/uploads/2016/10/network-recipes-for-an-evolving-datacenter-2.png" alt="network-recipes-for-an-evolving-datacenter-2" width="130" height="137" /><br />
ethtool –l eth1<br />
By default, the device tends to set up as many Tx and Rx queues as there are CPU cores. The -L command can override this and change to more or fewer queues. The “combined” tag keeps the Tx count equal to the Rx. The -l command prints the current setting.</li>
<li>ethtool -X eth1 equal 32<br />
ethtool -X eth1 weight 10 20 30<br />
ethtool -x eth1<br />
The -X command configures how the RSS hashing is spread across the receive queues. “equal 32” will spread the load across 32 queues, which might be done to keep the traffic off of the other 32 queues in a 64-core server. The “weight …” tag sets the load proportions across the cores. The -x command prints the current distribution.</li>
<li>ethtool -N eth1 flow-type tcp4 src-ip 192.168.60.109 dst-ip 192.168.60.108 src-port 5001 dst-port 5001 action 4 loc 1<br />
ethtool –n eth1<br />
The FD configuration command allows very specific targeting of traffic to a core, allowing you to select by traffic source and destination, port number, message types, and a few other specifiers. In this example, an IPv4 TCP message coming from 192.168.60.109 and using port 5001 is put into queue number 4, and this rule will be stored as rule 1.</li>
</ul>
<h4>Main Dishes</h4>
<p><strong>VMDq</strong></p>
<p>Another way to offload traffic decisions is to set up VMDq handling, which is primarily for supporting VMs with different network addresses from the server on which they are hosted. With a simple command you can set up “virtual” network devices (for example, eth1, eth2, eth3, …) all on top of the a single hardware NIC. In those NICs that support it, the new virtual network devices can have their own MAC addresses and network traffic queues, and can then be assigned to specific jobs (VMs, containers, etc.) in the host server.</p>
<p>The NIC is able to sort the inbound traffic into a set of queues set aside<br />
specifically for that VMDq path. This can be used by full-<img loading="lazy" class=" wp-image-7224 alignright" src="http://ict-news.org/wp-content/uploads/2016/10/network-recipes-for-an-evolving-datacenter-3.png" alt="network-recipes-for-an-evolving-datacenter-3" width="130" height="137" /></p>
<p>fledged VMs, lightweight containers, or other similar entities that would have a different address from the host server. This allows for separate control and configuration of the traffic. Specifying different “modes” of<br />
connection—bridge, passthru, private, or vepa—control whether the VMDq ports can talk to each other and how they connect outside the server.</p>
<p>The easiest to use is the MAC-VLAN style, which will support most standard TCP and UDP type messaging. First create a VMDq device (the MAC address is generated for you), then give it an IP address:</p>
<ul>
<li>ip link add veth1 link eth0 type macvlan mode bridge<br />
Split off a VMDq device named “veth1” from the existing “eth0” device. Using “bridge” mode allows this to talk with other bridge mode VMDq devices from the same eth0.</li>
<li>ip addr add 10.10.10.88/24 broadcast 10.10.10.255 dev veth1<br />
Instead of using the deprecated ifconfig command, here we use the newer iproute2 command to assign the address and broadcast mask for the new virtual device.</li>
</ul>
<p>The MAC-VTAP device can give you more low-level control, such as choosing your own specific MAC address.</p>
<ul>
<li>ip link add macvtap2 link eth0 address 00:22:33:44:55:66 type macvtap mode passthru<br />
ip addr add 10.10.12.88/24 broadcast 10.10.12.255 dev macvtap2<br />
ip link set macvtap2 up<br />
Set up a new macvtap link with a specific MAC address, set the IP address, and start the processing.</li>
<li>ip link show macvtap2<br />
Print the details on the new device.</li>
</ul>
<p><strong>Tunneling</strong></p>
<p>In building larger, more complex data centers that will support many <img loading="lazy" class="wp-image-7225 alignright" src="http://ict-news.org/wp-content/uploads/2016/10/network-recipes-for-an-evolving-datacenter-4-300x228.png" alt="network-recipes-for-an-evolving-datacenter-4" width="139" height="106" srcset="https://www.ict-news.org/wp-content/uploads/2016/10/network-recipes-for-an-evolving-datacenter-4-300x228.png 300w, https://www.ict-news.org/wp-content/uploads/2016/10/network-recipes-for-an-evolving-datacenter-4.png 456w" sizes="(max-width: 139px) 100vw, 139px" />customers, traffic must be separated so that individual customers cannot see each other’s network traffic. The hard way to do this is to have completely separate wires and computers for each customer. Since this approach is rather impractical and inflexible, other methods are required.</p>
<p>With “tunneling” we hide each network message inside of another message by adding additional message headers. These headers are used for routing around the data center and then are stripped off when the message is delivered to the appropriate customer’s applications. The customers’ loads can now be spread across compute servers as needed to manage the data center, and yet the network traffic seen by the customer remains constant and private. These become virtual “overlays” on the physical network.</p>
<p>There are several different types of tunneling, such as VXLAN, GRE, Geneve, and IPinIP, and the ip link commands are able to set them up.</p>
<p>For example, for a VXLAN tunnel into a local virtual switch:</p>
<ul>
<li>ip link set eth1 mtu 1600<br />
Set the MTU (maximum transmission unit size) to a larger value to make room for the extra tunneling header.</li>
<li>ip link add br200 type bridge<br />
Create a local bridge named br200 to work as a virtual switch.<img loading="lazy" class="wp-image-7226 alignright" src="http://ict-news.org/wp-content/uploads/2016/10/network-recipes-for-an-evolving-datacenter-5-261x300.png" alt="network-recipes-for-an-evolving-datacenter-5" width="140" height="161" srcset="https://www.ict-news.org/wp-content/uploads/2016/10/network-recipes-for-an-evolving-datacenter-5-261x300.png 261w, https://www.ict-news.org/wp-content/uploads/2016/10/network-recipes-for-an-evolving-datacenter-5.png 297w" sizes="(max-width: 140px) 100vw, 140px" /></li>
<li>ip link add vx200 type vxlan id 5000 group 239.1.1.1 dstport 4789 dev eth1<br />
Create the VXLAN tunnel endpoint named vx200 attached to the physical network interface, using an id number of 5000 and passing the traffic through the physical interface on UDP port 4789.</li>
<li>brctl addif br200 vx200<br />
Attach the tunnel endpoint to the virtual switch.</li>
<li>ip link set br200 up<br />
Start the bridge processing.</li>
<li>ip link set vx200 up<br />
Start the tunnel processing.</li>
<li>ifconfig eth1 172.16.10.7/24<br />
Set the physical device’s IP address.</li>
<li>ip link set eth1 up<br />
Start the physical network device processing.</li>
</ul>
<p><img loading="lazy" class="wp-image-7227 aligncenter" src="http://ict-news.org/wp-content/uploads/2016/10/network-recipes-for-an-evolving-datacenter-6-261x300.png" alt="network-recipes-for-an-evolving-datacenter-6" width="139" height="160" srcset="https://www.ict-news.org/wp-content/uploads/2016/10/network-recipes-for-an-evolving-datacenter-6-261x300.png 261w, https://www.ict-news.org/wp-content/uploads/2016/10/network-recipes-for-an-evolving-datacenter-6.png 297w" sizes="(max-width: 139px) 100vw, 139px" /></p>
<p>The above example requires the OS to do the sorting for which messages go to eth1 and which go to the tunnel endpoint. We can make use of the NIC’s traffic handling to do the sorting without impacting the CPU by building a VMDq channel and directing the tunnel messages into the VMDq device.</p>
<p><strong>Single Root IO Virtualization</strong></p>
<p>One of the issues with these networking paths is that they add some amount of processing load in the host OS. Worse, when supporting VMs, the message traffic gets copied from host buffers to VM buffers, and then processed again in the VM OS.</p>
<p>If we know the traffic needs to go into a VM, we could get better throughput if we can bypass the host OS altogether. This is the basis of SR-IOV: with support from the NIC hardware, portions of the PCI (Peripheral Component Interconnect) device can be essentially “split off” and dedicated to the VM. We call these portions Virtual Functions, or VFs. We can set up a number of these per physical device and give them their own MAC address, and the physical NIC will do the traffic sorting and place the packets directly into the VM’s OS buffers.<img loading="lazy" class="wp-image-7228 alignright" src="http://ict-news.org/wp-content/uploads/2016/10/network-recipes-for-an-evolving-datacenter-7.png" alt="network-recipes-for-an-evolving-datacenter-7" width="130" height="137" /></p>
<p>A script for a typical setup of four VFs on the host might look something like this:</p>
<pre class="code-simple">dev=eth1
num_vfs=4
ip addr add 192.169.60.108/24 dev $dev
echo $num_vfs &gt; /sys/class/net/$dev/device/sriov_numvfs
sleep 1
for (( c=0; c&lt;$num_vfs; c++ )) ; do
    ip link set $dev vf $c mac 00:12:23:34:45:$c
done</pre>
<p>In the VM, the VF is assigned as a pass-through device and shows up just as any other PCI network device would. The simple IP address assignment in the VF then is:</p>
<p>ip addr add 192.168.50.108/24 dev eth0</p>
<h4>Fancy Feasts</h4>
<p><strong>Tunnels Revisited</strong></p>
<p>Now that we have direct traffic placement into the VM, we can add tunneling such that the VM doesn’t know that it is part of a tunnel. This gives arguably the best separation, security, and performance for customer applications.</p>
<p>Using FD again, we can select our tunnel traffic and aim it at the VF. In this case, we’ll use VF number 4. We’ll place the rule in location 4 rather than whatever would be chosen by default, so we edit the rule later as needed. We use the 64-bit user-def field to tell the driver to give traffic on port 4789 to VF number 2, and the action says to deliver it to the VF’s queue 1:</p>
<p>ethtool -N eth1 flow-type udp4 dst-port 4789 user-def 2 action 1 loc 4</p>
<p>That works well if we have a specific VF for all tunneled traffic. However, if we want to inspect the inner message for a vlan id and sort it into a specific VF, we need to make use of the upper part of the 64-bit user-def field to specify the id to be used, which in this example is 8:</p>
<p>ethtool –N eth1 flow-type ether dst 00:00:00:00:00:00 m ff:ff:ff:ff:ff:ff src 00:00:00:00:00:00 m 00:00:00:00:00:00 user-def 0x800000002 action 1 loc 4</p>
<p><strong>Network Functions Virtualization for Appliances</strong></p>
<p>A growing use of network features in support of virtualization is for SDN and Network Functions Virtualization (NFV). NFV takes what have traditionally been network appliances in separate boxes that do specific processing, such as firewalls, security inspections, network load balancing, and various DPDK-based applications, and puts them into a VM that can run on a “generic” server. This saves money as these are cheaper than the hardware network appliance. They also add flexibility, because you can move them around in the network when needs change, without physically moving a box or changing any wiring.</p>
<p>However, these are specialized VMs that need additional control over their own network addressing and traffic reception. Normally, we don’t allow these capabilities in the VMs. In these cases, we might set the default MAC address to something bogus and then give the VF the trust attribute so it can set its own MAC address and enable promiscuous traffic reception:</p>
<p>ip link set p4p1 vf 1 mac 00:DE:AD:BE:EF:01<br />
ip link set dev p4p1 vf 1 <strong>trust on</strong></p>
<h4>Just Desserts</h4>
<p>These are only a few examples of what we can do with our modern NICs. Most or all of these commands are supported by our current 10 Gigabit and 40 Gigabit network server adapters, and more variations are in the works for the future. By putting a few of these simple commands together, we can create large and complex networking structures to support a variety of data center and customer needs.</p>
<p>As the drive for centrally controlled and designed networks grows, the various SDN products will use these technologies to implement the data center’s connections. Packages such as OpenFlow*, Open Daylight*, and many vendor-specific offerings will offer management systems to handle all the heavy work of tracking and managing these connections, but knowing what they are doing will help us all to understand what’s really going on under the table.</p>
<p>By  <a href="https://software.intel.com/en-us/user/815802">Shannon Nelson</a>,<a href="https://software.intel.com/en-us/user/1347735"> Anjali S Jain</a>, <a href="https://software.intel.com/en-us/user/1345840">Manasi Deval</a></p>
<p>Source by <a href="https://software.intel.com">https://software.intel.com</a></p>
<p><a href="https://www.ict-hardware.com">Artical Intel Virtualization</a></p>

		</div> 
	</div> </div></div></div></div></div></section><!-- end section -->
<p>The post <a rel="nofollow" href="https://www.ict-news.org/network-recipes-evolving-data-center/">Network Recipes for an Evolving Data Center</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/network-recipes-evolving-data-center/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
