In 2009 Cisco acquired Pure Digital Technologies was not the brave move, eventually it led to back away from the consumer market by the closure of Flip as part of restructuring. Cisco is expected to reduce its headcount by 550 workers.
May be a better idea for Cisco Systems to concentrate on its core business, especially when there is a rising competition from its rival Juniper Networks and Huawei. I am seeing Huawei gradually making its strong presence in the Middle East market.
According Analysts Flip flopped due to its lack of Internet connectivity, and the proliferation of high end smartphones.
“We have disappointed our investors and we have confused our employees. Bottom line, we have lost some of the credibility that is foundational to Cisco’s success – and we must earn it back. Our market is in transition, and our company is in transition. And the time is right to define this transition for ourselves and our industry. I understand this. It’s time for focus.” said John Chambers CEO of Cisco Systems.
I am looking forward to see how Umi home telepresence going to perform.
A report called ‘In the Dark: Crucial Industries Confront Cyber-attacks’, produced by McAfee and the Center for Strategic and International Studies (CSIS) has revealed that 40% of 200 IT security executives polled believe a major cyber-attack on critical infrastructures may occur over a span of year.
This report surveyed 200 IT security executives from critical electricity infrastructure enterprises in 14 counties, focused on the critical civilian energy infrastructure that depends most heavily on industrial control systems.
Forty percent of the IT security executives from critical electricity infrastructure enterprises believed that the industry’s vulnerability had increased almost 30% and believed that their company was not ready for cyber-attacks.
“We found that the adoption of security measures in important civilian industries badly trailed the increase in threats over the last year,” said Stewart Baker, who led the study for CSIS.
“Ninety to 95% of the people working on the smart grid are not concerned about security and only see it as a last box they have to check,” said Jim Woolsey, former United States director of Central Intelligence.
Some of the key findings of this report
- Eighty percent of respondents have faced a large-scale denial of service attack
- Twenty-five percent of respondents have been victims of extortion attempts
- More than 40 percent of executives believe that their industry’s vulnerability has increased
- Almost 30 percent believe their company is not prepared for a cyber-attack
- More than 40 percent expect a major cyber-attack within the next year
- Energy sector increased its adoption of security technologies by only a single percentage point, at 51 percent
- Oil and gas industries increased by only three percentage points, at 48 percent
- Nearly 70 percent of respondents frequently found malware designed to sabotage their systems
- A quarter of respondents reported daily or weekly DDoS attacks
After reading the complete report it’s evident that there has been an increase in cyber-attacks on critical infrastructure and still most of the organizations are unprepared. Time has come to design the critical infrastructure systems with cyber-security in mind, and organizations need to implement stronger network controls, to avoid being vulnerable to cyber-attacks.
Since its arrival Android is giving a tough time for Apple, plenty of new tablets invented working on Android platform; never the less, Blackberry with its Playbook is expected to do well at least at Enterprise level, HP TouchPad seems to give a tough fight as well. Microsoft is working on Windows 8 eyeing the tablet market and expected to have a demo in June. When all these developments are happening how come Apple can stay idle?
According Reuters the next version of iPhone will go on sale in September 2011, citing three sources with direct knowledge of Apple’s supply chain, the news agency said that production of the iPhone 5 is likely to start in July or August.
The Apple’s next-generation iPhone will have a faster processor but it will be similar in appearance to the iPhone 4, Reuters identified a number of components suppliers for the new phone, namely camera module maker Largan Precision for camera, Wintek to supply the touchscreen, and Foxconn Technology to supply the casing, but none of the vendors would confirm the reports.
Some market observers have suggested that the new phone will be unveiled at an as-yet unscheduled Apple event in September, as Apple has normally held a music-related product launch event in that month. It’s too early to predict the move Apple is going to take; at least I would love to see some restrictions pertained to flash and additional memory expansion are overcome in the new version of iPhone. Not to forget Android is doing an amazing job and its market share is increasing day by day.
Perhaps Apple can come out with a new version of iPad by testing the success of it’s new version of iPhone. Especially when the tablet market is growing exponentially.
In my previous post I was talking about the DNS query problem we were facing with Windows 2008 R2 server. The solution is quite simple. Immediately I started monitoring the logs in the Cisco PIX 525 firewall using ADSM and syslog. I figured out the DNS queries were replied back from the ISP but were dropped by the Cisco PIX 525 Firewall.
%PIX-4-410001: Dropped UDP DNS reply from outside:x.x.x.x/53 to
inside:y.y.y.y/49746; packet length 768 bytes exceeds configured limit of 512
I was wondering what might be the reason, then figured out the packets received from ISP is of 768 bytes whereas by default the Cisco PIX 525 Firewall allows 512 bytes as shown below.
The problem was with the default DNS inspection policy-map. By default in Cisco PIX 525, Cisco ASA it’s configured to 512 bytes
The moment I changed the default DNS inspection policy-map from 512 bytes to 1000 bytes things were normal the Windows 2008 R2 Server was resolving the DNS queries.
The commands I used to change the default DNS inspection policy-map is as follows.
MBGF-DAC-525-FW01# configure t
MBGF-DAC-525-FW01(config)# class-map inspection_default
MBGF-DAC-525-FW01(config-cmap)# match default-inspection-traffic
MBGF-DAC-525-FW01(config-cmap)# policy-map global_policy
MBGF-DAC-525-FW01(config-pmap)# class inspection_default
MBGF-DAC-525-FW01(config-pmap-c)# inspect dns maximum-length 1000
In our new Data Center we added new HP Blade servers and installed Windows 2008 R2 on those servers. Our Servers are connected inside our network behind a Cisco PIX 525 firewall. We are looking to resolve all our DNS queries for the external network using a DNS IP address provided by our ISP which is 212.x.x.2.
In windows 2008 Server we have specified the DNS forwarder as shown in the below diagram.
But it always fails to resolve the DNS queries from internal network to external network using nslookup command from the command prompt of the Windows 2008 Server as well when we are testing the simple and recursive query to other DNS Servers it’s failing as demonstrated below
We have done the following to
1) The internal IP address for the Windows 2008 R2 server is PATed in our PIX 525 Firewall, I could browse the internet.
2) In Windows 2008 R2 Server we have specified the DNS IP Address provided by our ISP.
3) All our servers in the DMZ zone are working fine.
I am working on this issue; meanwhile if any one of you knows who to resolve this issue, your comments are always welcomed.
Cisco Systems new appliance Cisco ISE: Identity Service Engine , which can be deployed as an appliance or a Virtual machine basically designed to help Organizations to gain enterprise wide visibility into their network, allowing authentication, authorization, accounting, posture profiling gathering real-time contextual information from the network, users, and devices, and make proactive governance decisions by enforcing policy across the network infrastructure.
The Cisco Identity Services Engine (ISE) is a next-generation identity and access control policy platform that enables enterprises to enforce compliance, enhance infrastructure security, and streamline service operations. It is an integral part of the overall Cisco TrustSec® solution and SecureX architecture.
The Cisco Identity Services Engine (ISE)is a policy-based service-enablement platform which ensures corporate and regulatory compliance.
Some of the highlights of Cisco Identity Services Engine (ISE are as follows
- Context-aware enforcement: Gathers information from users, devices, infrastructure, and network services to enable organizations to enforce contextual-based business policies across the network.
- Business-relevant policies: Create and enforce consistent policy from the head office to the branch office.
- Systemwide visibility: Let IT see who and what is on the network for advanced discovery and troubleshooting.
- Flexible architecture: Combine authentication, authorization, and accounting (AAA), posture, profiling, and guest management
Currently the Cisco Identity Services Engine (ISE) is available in following models and platforms
|Appliance||Identity Services Engine 3315 (small) 1000-endpoint target|
|Software/virtual machine||1, 5, or 10 virtual machines|
For further info please check the Cisco Identity Services Engine (ISE) home page at Cisco Systems.
According Cisco they will release an updated v3.0 CCIE Service Provider written and Lab exams in all testing location worldwide and the v2.0 exam will retire simultaneously. CCIE Service Provider aspirers willing to take exam on or after April 18th 2011 should expect to be tested on the CCIE SP v3.0 Written and CCIE SP v3.0 Lab Exam topics, which were released in October 2010.
To brief the updated exam will cover configuration and optimization of IP core technologies, aggregation and edge technologies, and remote access technologies-all of which are key to service provider infrastructures. The exams will also cover managing services for voice, video, and security traversing the core IP network.
For further info check Cisco Learning Network.
Whenever you are preparing for the Cisco CCNA ®, Cisco CCNP®, and Cisco CCIP® certifications especially when you are doing a self-study the major concern is lab experience to answer the simulated questions. Often many of us end up looking for real Cisco hardware from eBay, as most of the present day simulators fail to fulfill our requirements. To certain extent GNS3 did an amazing job by emulating the power of Cisco IOS in our machines. But GNS3 does have some limitations; when it comes to switching GNS3 have no answer.
Current high end systems fail to handle most complex GNS3 topologies. To ease all these hurdles Cisco has an answer. Yeah you can experience the Cisco real labs. A more flexible option is here known as Cisco Learning Labs. For the first time, Cisco certifications aspirers can secure hands-on Cisco IOS® Software lab practice for both routing and core switching.
Cisco Learning Labs are powered by Cisco IOS® Software on UNIX and enable critical, hands-on lab experience for future networking engineers interested in attaining Cisco certifications.
- Cisco Learning Labsare currently available forCisco CCNA®,CCNP®andCCIP®study, through theCisco Learning Network Storeand Cisco Authorized Learning Partners.
- Accessible from the convenience of the user’s PC,Cisco Learning Labsprovide complete lab preparation experience for routing and switching skills.
- Multiple labs are available in each lab bundle, accessible anytime for 90 days, for up to 25 hours. Supplemental lab time is available in increments of five hours.
According to Cisco, Cisco Network Academy has enrolled its 1 millionth student for the first time. The Cisco Network Academy offers the program in partnership with educational institutions, government administrations and community based organizations globally and delivers information and communications technology (ICT) education through classroom-based and cloud-based curricula.
One of the programs offered at the Academy is teaching students how to design, build, troubleshoot, and secure computer networks for increased access to career and economic opportunities in communities around the world.
I have seen few CCIE’s who started their Cisco Certification path form Cisco Network Academy, while they were studying in their Universities and now they are flurshing in their career and doing an exceptional job for their organization.
- The Networking Academy began in 1997 with 64 schools and has grown to become one of the “world’s largest classrooms”with 10,000 academies in 165 countries, and nearly 4 million studentshaving participated in the program to date.
- A pioneering example of cloud-based education delivery, the Networking Academy teaches students how to design, build, troubleshoot, and secure computer networks for increased access to career and economic opportunities in communities around the world.Students who complete the program often go on to secure entry-level career opportunities, participate in continuing education and achieve globally recognized career certifications.
- Networking Academy courses are delivered in multiple languages through a cloud-based learning system. Courses are supported by classroom instruction, hands-on learning activities, and interactive online assessments that provide personalized feedback. Networking Academy instructors receive extensive training and support to help ensure a consistently-enriching learning experience for students around the world.
- Cisco is celebrating thismilestone by offering Networking Academy students and alumni the chance toshow the benefits of this unique classroom experience through a videocontest titled “Why is The Cisco Networking Academy Classroom like No other?”
Amy Christen, vice president of Cisco Corporate Affairs and Networking Academy
“Networking Academy is truly the world’s largest classroom. The unique delivery model combines the power of the network and the cloud with the global need for ICT skills-based education to address the critical need for networking professionals around the world.”
Key Networking Academy Statistics:
- 1 million Networking Academy students worldwide concurrently engaged in learning this year
- Nearly 4 million students reached by the Networking Academy to date
- 10,000 Networking Academies operating in 165 countries
- 1 million online assessments delivered monthly
- 100 million online assessments delivered to date
- 175,000 Facebook fans, whose numbers are growing daily
[kml_flashembed movie="http://www.youtube.com/v/rcW41PvuV2g" width="425" height="350" wmode="transparent" /]
When you are preparing for Cisco CCNP- Switch Exam, IP SLA is one of the key topics included at quite later stage even surprised David Hucaby the author of the title “CCNP Switch Official Certification Guide” Even he included the supplementary material for the “CCNP Switch Official Certification Guide”
The Cisco IOS IP Service Level Agreement better known as IPSLA is a feature which was introduced in the IOS version 11.2 under the name of Response Time Responder (RTR). Later on Cisco sensed RTR is creating some sort of confusion as some of reference texts referred RTR as Real time responder; hence they renamed RTR as Service Assurance Agent (SAA). Even SAA didn’t stick for long time and now it’s known as IP SLA. IP SLA is truly excellent for built-in network testing. In fact, it is a key ingredient for sophisticated implementations of Performance Routing (PfR).
At its introduction in IOS 11.2 version under the name of RTR it had very limited offerings
- ICMP Ping
- ICMP Echo Path
- IBM SNANativeEcho
The Cisco IOS IP Service Level Agreement (IP SLA) feature can be used to gather realistic information about how specific types of traffic are being handled end-to-end across a network. To do this, an IP SLA device runs a preconfigured test and generates traffic that is destined for a far end device. As the far end responds with packets that are received back at the source, IP SLA gathers data about what happened along the way.
IP SLA is capable of running following tests in Cisco Switches and routers
|Test Type||Description||IP SLA Required on Target?|
|icmp-echo||ICMP Echo response time||No|
|path-echo||Hop-by-hop and end-to-end response times over path discovered from ICMP Echo||No|
|path-jitter||Hop-by-hop jitter over ICMP Echo path||Yes|
|dns||DNS query response time||No|
|dhcp||DHCP IP address request response time||No|
|ftp||FTP file retrieval response time||No|
|http||Web page retrieval response time||No|
|udp-echo||End-to-end response time of UDP echo||No|
|udp-jitter||Round trip delay, one-way delay, one-way jitter, one-way packet loss, and connectivity using UDP packets||Yes|
|tcp-connect||Response time to build a TCP connection with a host||No|