What is a firewall?

Network World

Network-based firewalls have become almost ubiquitous across US enterprises for their proven defense against an ever-increasing array of threats. A recent study by network testing firm NSS Labs found that up to 80% of US large businesses run a next-generation firewall. Research firm IDC estimates the firewall and related unified threat management market was a $7.6 What is a firewall?

5 open source alternatives for routing/firewall

Network World

These open source products deliver simple routing and networking features, plus they are combined with security functionality, starting with a basic firewall and possibly including antivirus, antispam and Web filtering.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Review: 5 open source alternatives for routers/firewalls

Network World

Plus, they are combined with security functionality, starting with a basic firewall and possibly including antivirus, antispam and Web filtering. These products can be downloaded and deployed on your own hardware, on a virtual platform, or in the cloud. Open source software offers an economical and flexible option for deploying basic home, SMB or even enterprise networking. These open source products deliver simple routing and networking features, like DHCP and DNS.

On Network Virtualization and SDN

Scott Lowe

Is there a difference between network virtualization and Software-Defined Networking (SDN)? So, in a similar fashion to my post on network overlays vs. network virtualization , I thought I’d weigh in with some thoughts. My purpose, as John put it when he invited me, was to “gently introduce” the community to the idea of network virtualization, which is where I now spend most of my time since joining VMware in early February. Or virtualized firewalls?

Network Virtualization as I understand it

Virtualized Greek

For some reason, I had a difficult time with the basic concept of Network Virtualization. VMware equates network virtualization to Server Virtualization. You can easily manage OS images, clone virtual machines, create entire test environments with almost a push of a button.

A Flicker Of Light: A new security stack points the path to safety

CTOvision

In panic, many organizations deployed more security products or utilized capabilities like Virtual Desktop Infrastructure (VDI) to create virtual air gaps. Before connectivity is provisioned, the hardware identity and software hashes from the user’s device are checked.

COMS002: Next Generation Cloud Infrastructure with Data Plane Virtualization

Scott Lowe

This is session COMS002, titled “Next Generation Cloud Infrastructure with Data Plane Virtualization.” Verplanke believes that DPDK (Data Plane Development Kit) and virtualization are key to virtualizing workloads that move around lots and lots of packets, such as firewalls, routers, and other similar functions. Devices first started as tightly-coupled hardware and software solutions. This is quite different from virtualizing an endpoint device.

Technology Short Take #84

Scott Lowe

Sjors Robroek describes his nested NSX-T lab that also includes some virtualized network equipment (virtualized Arista switches). Servers/Hardware. Here’s an interesting article on the role that virtualization is playing in the network functions virtualization (NFV) space now that ARM hardware is growing increasingly powerful. Virtualization. Welcome to Technology Short Take #84! This episode is a bit late (sorry about that!),

IPv6 60

Technology Short Take #84

Scott Lowe

Sjors Robroek describes his nested NSX-T lab that also includes some virtualized network equipment (virtualized Arista switches). Servers/Hardware. Here’s an interesting article on the role that virtualization is playing in the network functions virtualization (NFV) space now that ARM hardware is growing increasingly powerful. Virtualization. Welcome to Technology Short Take #84! This episode is a bit late (sorry about that!),

IPv6 60

Technology Short Take #32

Scott Lowe

I try to keep the information linked to data center technologies like networking, storage, virtualization, and the like, but occasionally other items slip through. Ranga Maddipudi ( @vCloudNetSec on Twitter) has put together two blog posts on vCloud Networking and Security’s App Firewall ( part 1 and part 2 ). Servers/Hardware. It will be interesting to see how the support of a “Tier 1″ hardware vendor like HP affects the adoption of ARM in the enterprise.

HP 102

Technology Short Take #70

Scott Lowe

In this post you’ll find a collection of links to articles discussing the major data center technologies—networking, hardware, security, cloud computing, applications, virtualization…you name it! (If Numan Siddique describes the native DHCP support available in OVN (Open Virtual Network). Thinking of using a hardware VTEP (VXLAN Tunnel Endpoint) with VMware NSX? Servers/Hardware. Virtualization. Welcome to Technology Short Take #70!

eBook 60

Technology Short Take #46

Scott Lowe

Servers/Hardware. While all the attention is “up the stack,” there are still some occasions when you need to worry about the details in the hardware. I’m not sure if this falls into storage or virtualization, but we’ll place it here in the Storage section. Virtualization. It will be nice when the virtualization industry converges on some common set of disk formats for virtual machines. Welcome to Technology Short Take #46.

Step-by-Step: Build a FREE SharePoint 2013 Dev/Test Lab in the.

IT Pros Rock!

Tommy Patterson - Virtually Cloud 9. MVP Virtual Machine. Virtual. Virtualization. To determine the specific costs associated with higher resource levels after your free trial has concluded, please visit the Windows Azure Pricing Calculator for Virtual Machines.

Technology Short Take #79

Scott Lowe

Tony Sangha took PowerNSX (a set of PowerShell cmdlets for interacting with NSX) and created a tool to help document the NSX Distributed Firewall configuration. Servers/Hardware. I just noticed this article about using Nova flavor extra-specs to pass QoS data down to the virtualization layer. Virtualization. Thinking of virtualizing Linux on Hyper-V? Welcome to Technology Short Take #79! There’s lots of interesting links for you this time around. Networking.

Technology Short Take #77

Scott Lowe

Michael Kashin has a great article on how Open Virtual Network (OVN, part of the Open vSwitch project) implements virtual networks in OpenStack. Servers/Hardware. Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Virtualization. Networking Hardware Security Storage Virtualization NSX VMware OVN OpenStack Macintosh vSphere Linux CLI Microsoft SSH Docker VirtualBox SSL

IPv6 60

Technology Short Take #71

Scott Lowe

Dmitri Kalintsev is back with another article in a series of articles on using hardware VXLAN tunnel endpoints (VTEPs) with VMware NSX. Servers/Hardware. The use of VMware NSX for microsegmentation is a really popular use case, and so the topic of scripting distributed firewall (DFW) rules often comes up. Virtualization. Networking Hardware Security Storage Virtualization NSX VXLAN Intel Windows Microsoft HyperV OpenStack Ansible Docker Linux CoreOS RedHat VMware

Technology Short Take #68

Scott Lowe

If you like geeking out over the hardware side of networking, you may find this Ars Technica article on the physical infrastructure of the global Internet to be an interesting read. (I Servers/Hardware. In the event you accidentally locked yourself out of vCenter using NSX’s distributed firewall, this post by Roie Ben Haim provides a workaround for getting yourself out of this pickle. Virtualization.

Technology Short Take #66

Scott Lowe

Servers/Hardware. In the event you’re interested in an idea of how much latency the use of in-kernel hypervisor firewalling (such as that offered by VMware NSX) adds, have a look at this article by Sean Howard. Virtualization. Jon Benedict has three posts (so far) on deploying Red Hat Enterprise Virtualization (RHEV) 3.6 ( part 1 , part 2 , and part 3 ). Networking Hardware Security Storage Virtualization NSX VMware AWS Docker OpenStack Linux Windows EMC Ansible

Technology Short Take #63

Scott Lowe

Servers/Hardware. Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall. Two articles in particular stood out to me: one by Christos Karamanolis on erasure coding with VSAN 6.2 , and one by my good friend Jase McCarty on the use of sparse virtual swap files. Finally, you might find the VMware Virtual SAN 6.2 Virtualization. Welcome to Technology Short Take #63.

Technology Short Take #33

Scott Lowe

Tom Nolle asks the question , “Is virtualization reality even more elusive than virtual reality?” This post by Ranga Maddipudi shows you how to use App Firewall in conjunction with VXLAN logical networks. Next, Jason dives a bit deeper on the relationship between network overlays and hardware , and shares his thoughts on where it does—and doesn’t—make sense to have hardware terminating overlay tunnels. Servers/Hardware.

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

The SFN8722 OCP offers 10GbE performance, which is critical for today’s data centers where ultra scale dominates the market, supports 1000s virtual NICs and dual 10 GbE ports, and provides up to 30 million of packets per second and ultra-low latency under one microsecond. Other capabilities include: Hardware Based Packet Telemetry. Hardware Based Security (ServerLock). Unique hardware filter tables for each adapter hosted IP address. Marty Meehan.

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

Delivers 1000s Virtual NICs for Ultimate Scalability with the Lowest Possible Latency. The SFN8722 OCP offers 10GbE performance, which is critical for today’s data centers where ultra scale dominates the market, supports 1000s virtual NICs and dual 10 GbE ports, and provides up to 30 million of packets per second and ultra-low latency under one microsecond. Other capabilities include: Hardware Based Packet Telemetry. Hardware Based Security (ServerLock). Marty Meehan.

Technology and Travel

Scott Lowe

You might also consider enabling the built-in firewall (see this write-up for enabling pf on OS X Mountain Lion ; haven’t tried on Mavericks yet) for an added layer of network protection. Visit the site for more information on virtualization, servers, storage, and other enterprise technologies. Macintosh Security Hardware Cody Bunch recently posted a quick round-up of what he carries when traveling, and just for fun I thought I’d do the same.

ITAM Isn’t Sexy. But We Need It!

CTOvision

According to the International Association for IT Asset Management ( IAITAM ), ITAM is Software Asset Management (SAM), Hardware Asset Management (HAM), and Asset Portfolio Management (APM). Special software (usually with agents) discovers the hardware and the software that is installed on it.

VMworld 2013 – Keynote Day 2 – NSX, vCAC, vSAN

Virtualized Greek

The ability to virtualize the network devices such as firewalls, IPS and load balancers also means that these once physical devices that have discrete interfaces can be controlled by software. Cloud Computing Virtualization VMWare vmworld

How to Develop an IT Vulnerability Assessment

Galido

This activity is known as Vulnerability Assessment, and it aims to find weaknesses in software or hardware platforms to solve failures, before they can generate a negative impact. Once the critical processes are targeted, inventory the hardware to get an overview of your network.

How Open Hybrid Clouds Will Change Cloud Computing

CTOvision

Encompasses any number of physical and virtual servers, while supporting a huge choice of public cloud offerings. Simplifies infrastructure, enabling IT to avoiding having to create new silos, which often consist of new technologies and firewalls. Today’s enterprise infrastructure is a complex web of hardware, programs, applications, and flash storage. Rick Delgado. The cloud has evolved quickly. Businesses have weighed the perks of private, public, and even hybrid clouds.

Cloud 238

AWS’s Shared Responsibility Model at a Glance

Perficient - Digital Transformation

Generally speaking, AWS manages the security and compliance of its infrastructure, including the hardware and software that run AWS services in the cloud. Network and firewall. Firewall (virtual private cloud).

CLDS006: Exploring New Xeon E5 Optimizations for 10 Gb Ethernet

Scott Lowe

Johnson shows a great diagram that reviews all the various types of VM-to-VM communications that can exist in modern data centers: VM-to-VM (on the same host) via the software-based virtual switch (could be speeds of 30 to 40 Gbps in this use case). VM-to-VM (on the same host) via a hardware-based virtual switch in an SR-IOV network interface card (NIC). Intel VT-c actually provides a couple of different ways to work in virtualized environments.

Fountainhead: The End of the Laptop-Centric World?

Fountainhead

Insights into Data Center Infrastructure, Virtualization, and Cloud Computing. She shares these folders with her co-workers as well as client contacts within each company (and who are behind each clients firewall) as interactive project-based workspaces. Virtualization. (31).

SeanDaniel.com [tech]: Introducing a new line of Network Storage.

Sean Daniel

Only yesterday, a third product that I worked on over the past little while called Windows Storage Server 2008 R2 Essentials was announced, on hardware provided by Western Digital. The WD Sentinel DX4000 looks pretty awesome from a hardware perspective as well. Virtualization.

PCI Compliance and Network Segmentation

Galido

Hardware and software components that make up the CDE include network devices, applications, and computing devices. This may involve forcing the use of strong passwords, limiting access to the networks by configuring the SSID to be hidden, setting up secure virtual firewalls, and so on.

Technology Short Take #31

Scott Lowe

Greg Ferro examines a potential SDN use case (an OpenFlow use case) in the form of enterprise firewall migrations. Servers/Hardware. He describes cloud as the synthesis of many different forms of innovation within IT , pulling together things like open source, virtualization, distributed programming, NoSQL, DevOps/NoOps, distributed teams, dynamic languages, and Big Data (among others). Virtualization.

WAN 103

VMworld 2014 Day 2 Keynote

Scott Lowe

Colbert next dives into more detail on Project Fargo, which enables vastly faster provisioning of virtual desktops by via cloning process. The hardware specification for EVO:RAIL is a 2U, four-node enclosure (think Dell C6100 or similar hardware form factor). There is a nice demo of integrations between vCAC and NSX, where vCAC creates NSX security groups (with associated firewall rules) on-demand as part of a blueprint.

HP 73

Digital Change 2007 to Now: Technical Underpinnings

Perficient - Digital Transformation

Firewall with port 80 or 8080 open. A second firewall where the rest of the corporate network resides and where any servers containing data would reside. Virtual Machines: We had at least moved beyond installing everything on the bare hardware.

Product Review: Paessler PRTG Network Monitor

Galido

Monitoring of virtual servers. As devices are discovered, probes will also detect the services and hardware it can monitor. Reducing the costs by buying only the hardware you need.

Website Server Planning Tips

Galido

Ensure that your host specializes in custom firewalls for your CMS if you are using one, and updates web server scripts and systems regularly. The term only becomes applicable when we start looking for Virtual Private Servers (VPS) and Dedicated Servers. Virtual Private Server.

Towards A Unified View Of "Software-Defined"

Chuck's Blog - EMC

A good starting point for wading into the deep end is our familiar server virtualization — something we all have experience with. The “killer app” that drove server virtualization was consolidation: cramming more work onto physical hardware.

Why I Love The Oracle Cloud Strategy

Chuck's Blog - EMC

And, finally, Oracle has figured out how to bring subsets of the public Oracle Cloud into the data center, behind your firewall. Not all applications can run well in a virtualized x86 environment, for one thing. Run legacy, run virtualized, run containers.

Oracle 142

Managing What Matters In the Cloud: The Apps » Data Center.

Data Center Knowledge

This pertains to managing the infrastructure elements on which the cloud is running – including the physical infrastructure elements such as servers, networks and storage, as well as the virtualization layer and the cloud stack. Firewall rules. Virtualization. About DCK.

Technology Short Take #35

Scott Lowe

Art Fewell takes a deeper look at the increasingly important role of the virtual switch. A discussion of “statefulness” brought me again to Ivan’s post on the spectrum of firewall statefulness. Even so, this Q&A session with Martin Casado on managing physical and virtual worlds in parallel might be worth going through the hassle. Servers/Hardware. Virtualization.

Technology Short Take 89

Scott Lowe

Russell Bryant has a post on Open Virtual Network (OVN) , a project within the Open vSwitch (OVS) community. Servers/Hardware. specifically, the new container network firewall functionality. When I was using Fedora, I needed some useful information on firewall-cmd , and found this article to be helpful. Virtualization. However, virtualization is more than that; for example, here’s an example of virtualization applied to database workloads.

Technology Short Take #84

Scott Lowe

Sjors Robroek describes his nested NSX-T lab that also includes some virtualized network equipment (virtualized Arista switches). Servers/Hardware. Here’s an interesting article on the role that virtualization is playing in the network functions virtualization (NFV) space now that ARM hardware is growing increasingly powerful. Virtualization. Welcome to Technology Short Take #84! This episode is a bit late (sorry about that!),

IPv6 60