IPsec is a critical element in building a scalable and secure SD-WAN fabric. The right IPsec is key to making it happen. Robert Sturt published an article title “SD-WAN vs. VPN: How do they compare?” While Robert tried to illustrate when and how to use SD-WAN vs. VPN, the objective of this blog is t..
VMware has taken the wraps off a firewall it says protects enterprise applications and data inside data centers or clouds. Unlike perimeter firewalls that filter traffic from an unlimited number of unknown hosts, VMware says its new Service-defined Firewall gains deep visibility into the hosts and s..
There’s a lot of hype around the next Wi-Fi standard, 802.11ax, more commonly known as Wi-Fi 6. Often new technologies are built up by the vendors as being the “next big thing” and then flop because they don’t live up to expectations. In the case of Wi-Fi 6, however, the fervor is warranted because ..
As edge computing deployments get under way, organizations need to make their edge computing sites resilient. As the saying goes, “you’re only as good as your weakest link,” so if edge computing locations are allowed to be the weakest link in a multi-location environment, the entire network surely w..
Ethernet networking technology is flawed, say some engineers. The problem is it doesn’t have any inherent security built in to it. Ethernet also hard to manage because it's centralized. It’s out-of-date, and it needs revamping, researchers say. One attempt to address the issue is the Marconi pr..
The wireless industry has always had to deal with regular (and alarming) pronouncements that we're somehow running out of radio spectrum. We’re not. But the misconception regardless gives many IT and network managers pause. After all, if the availability, reliability and especially the capacity..
Cisco has bundled 25 security advisories that describe 26 vulnerabilities in Cisco NX-OS switch and Firepower FXOS firewall software. While the 26 alerts describe vulnerabilities that have a Security Impact Rating of “High,” most –23 – affect Cisco NX-OS software, and the remaining three involve bot..
This week Juniper Networks plunked down $405 million to acquire Wi-Fi vendor Mist Systems. As always, Network World's Michael Cooney did a fine job covering the news, so I won’t rehash that. What I want to look at is something specific that Cooney wrote — that “Mist touts itself as having devel..
There are plenty of reasons for organizations to embrace edge computing. By moving applications, data, and computing services to the edge of a network, as opposed to a large data center or cloud, organizations can lower operating costs, improve application performance, reduce network traffic, and ac..
IP addresses on Linux systems are often assigned automatically by Dynamic Host Configuration Protocol (DHCP) servers. These are referred to as "dynamic addresses" and may change any time the system is rebooted. When a system is a server or will be remotely administered, however, it is generally more..