Packet Pushers: A Recap

A couple weeks ago I had the honor of joining the Packet Pushers Podcast for a discussion on networking careers and the more general IT field. First of all, that was Awesome! I’ve been listening to Ethan Banks and Greg Ferro for going on two years and it was a blast to have the ear of these gentlemen when they’ve had mine for so long. Michael Sweikata and Ryan Booth of Moving Ones and Zeroes also joined in the fun. Together, those four engineers have on the order of 70ish years in IT, and I have four years, six if I include tech support. It felt great to have these 4 guys express interest and concern in my opinions. I came prepared with my thoughts and the input of many of my colleagues, who share in common my lack of tenure and wealth of questions about the future. These four packet pros in turn assuaged many fears and reinforced my love of all things IT. On to the Recap!

What’s a young network pro to do?

When I asked these engineers for advice aimed towards someone in my position as he/she considers a networking career Greg summed it up beautifully: “don’t.” He wasn’t being short or fatalist; instead he and the other 3 addressed my fears that networking is dying. In short, yes, it’s dying. Not the career of building the paths on which data travels; data will always need mobility. Instead, the Network is evolving from a sum of a million parts just barely glued together into essentially a giant mainframe, with some exceptions. With Ethernet speeds shaming the rest of the system one would first think “wow, I’ll be able to transfer this file so fast.” but in reality, why would you move the data to a weak host when those time sensitive bits are already sitting in a bare metal beast?  This mentality has driven progress in computing for about the last ten years. Networking, on the other hand, is finally tuning into the speed IT. Most of the networking field is likely to move into either automation. We all wanted a better way to provision a vlan on 200 switches in a moment, right? Well, it’s finally coming. Add in cloud-integrations, server-centric thin-client workstations, and wireless everywhere and there simply are not as many cables being run at businesses.

But like I said, Data still needs to move. Be it in a hypervisor or a controller, networking pros will still have to lay down paths between hosts, instances, and containers. The rise of automation is simplifying that process, but we still have to make all of the interconnections. Are the jobs going to go away? They say, and I say, No. But the amount of time networking pros spend in front of an SSH terminal is going to steadily decrease in exchange for time spent banging out python, tuning your puppet/chef/ansible deployment, or learning the new SDN solution designed to do it all in a distributed manner.

Cisco, certs, and the future of IT learning.

So what does this do to beloved Cisco? Well, they are going to have to get flexible. Cisco has spent many years conforming the industry to itself, but now we have options. Not just Juniper or HPE, but options to make a network from scratch or from the opensource compilations of many other network pros who want to break the vendor bonds.

So if companies are branching out, what does that do to the cert environment? Nothing, as Ethan Banks explained in the podcast. Cisco’s training arm is a profit model which has adapted over the years to the changes in technology. Quite simply, Cisco is likely continue revamping their cert system to reflect the industry while also seeding a Cisco preference into those certified by Cisco.

But obviously Cisco, Juniper, HPE, etc., are not going to write a “OpenStack Associate” certification. The open and whitebox communities instead going to pull a greater variety of skills for network support. Soon, more job listing will include “Python/Java preferred” or “Security Experience” under “CCNA certified.” Computer science and IT sec are re-entering the network and the jobs will follow that trend.

Let there be Gripes!

If you haven’t ready my post about my attempts at ICND2, check them out. I was incredibly relieved to hear Ethan Banks say he would have trouble passing the CCNA. I’m not going to beat that dead horse, as my mind is geared towards passing the revised ICND2 by Valentines day.

There’s a great bit of conversation on the lack of vendor accountability, insight, and integrity and how that’s driving customers away from the traditional vendors. I don’t have the experience to speak on that topic, but the conversation was still fascinating.

That’s it!

This is just a bit of what was pertinent to me, as a lot of the conversation was above my experience and understanding. All in all, this was a great conversation that addressed much of my aspirations and worries. Link below, check it out, and I recommend the Packet Pushers to any IT pros who want a view beyond their own data-center.


Fixed it!

Fixed the website. Too bad I didn’t get it back up until 3 weeks after the chat with the guys at the Packet Pushers Podcast!

I found the backup file right before I was about to wire a drive and put it in a raid array on my new desktop. Good thing I looked before I lept!

An Unfortunate Opportunity

I have been given the chance to compare the retired CCNA 200-120 test with the new CCNA 200-125. Did Steve score a sweet deal with Cisco? Nope. Then, you must be retaking the test with the purpose of writing a compare and contrast post. Wrong again. Actually, I don’t have a choice…at least if I want my CCNA.

I failed ICND2. Actually I failed it twice and chose not to write about it until a month later. I needed some time to let the bitter fade.

So why was I bitter? That test was hard. Really hard. I’m an excellent test taker and I enjoy the challenge of a good test, but both attempts were utterly draining. I know Cisco is hard charging to foil the test question banks, but this is getting ridiculous. I noticed when taking CCENT that a lot of questions left me with staring at the screen with a “huh?” in my brain, but I made it through nonetheless. My CCNA attempts were ten times worse.  On my first attempt, I almost ran out of time and scored a 740. I wasted a ton of time just trying to wrap my head around questions. The second time around, I made up for lost time by piling a month of studying on topics where I knew I had trouble, but I still only hit 784. 40 points short. I’m still a tad bitter, both at myself for not studying better and at Cisco. I’m not perfect by any means, but I can ace any practice test on the first attempt; that’s actually the bar I use to determine when to take an exam. Further, I’ve been working in networking for a minute, so I’m comfortable with most topics and I’ve supplemented the technologies I’m short on experience with labs.

So why didn’t I pass? I simply couldn’t figure out the best answer. There was not a single gimme question on the exam. Fortunately, it wasn’t multiple answer heavy, but I was left doubting almost ever choice I made. It was like every question had three good answers and I could have chosen one with just a little more information. Instead, I went with my gut reaction on nearly half of the test.

I could have done better, period. The test was passable and I blame myself for not knowing the material well enough. I do not, however, think I could have had enough preparation and experience to have done well.

But I am still hopeful. I’m hoping the revision of the CCNA exam will have taken a bit of esoteric head-scratching out of the test. I plan to take the revised exam in about six months, but first I want to knock out the CWTS. I need a change of study material for a minute.

I’m way too lazy for this

I broke my website….

As you can tell, I host my website on WordPress. While many of you cringe at the very name, I like WordPress. WordPress may have only recently dropped from the security chatter, mostly due to shouts of “YAHOO” raising the noise floor, and WordPress can be very clunky, but I like it. So, as a bit of a personal challenge, I wanted to host my site myself.


I really only have a few, and I mean a few, regular readers, all of whom I interact with regularly, so I took the site down at my lease-lapse to save a little coin while I built. Exported the config, saved to my daily PC, Dropbox, and my home Samba server. Safe and sound.

Now it’s time to bring it SteveInIT back up.

But, as you can see, there are not 20 posts behind this one. I broke (fixed) it. Well, I lost it. The hard drive in my PC crashed, so the local copy is gone. I can’t find it in my Dropbox at all, which is weird because I don’t ever delete anything from Dropbox. But I still have the Samba server, right? Wrong! Well, maybe wrong. I can’t find it there either. What I can find is the notepad I took to log where I put the exported config copies.I have the filename of the config in my log, so I can search for it, but no luck yet. My Dropbox is even installed in the Samba server, so I should be able to search the whole array and find 2 copies of the config. Again, haven’t yet, but I’ll upload it when I find it.

I have a few things to talk about, so I’m doing that first.

*Edited, since I fixed it.

CompTIA Security+: Fresh look at the Test

Early last week I mentioned that I would be sitting the CompTIA Security+ exam soon. Well, soon has passed and so did I. While I feel I could have done a little better, I’m more than satisfied with my score, but we’ll break down why I feel that way in a moment.

First, disclaimer! This article does not intend to teach any course nor do my opinions of the exam comprehensively address the topics or format of the CompTIA SYO-401 exam. Further, my only experience with taking this exam is in the 401 series exam current to only my experience. CompTIA’s website states that (paraphrasing) they reserve the right to change the exam at any time, and do so even between major revisions, to best keep the exam current.

Glad that’s over, both the exam and the disclaimer.

So, my plan was to go over my final review of annoying tidbits of deprecated protocols evening last, get to bed around 10, have a good night’s rest, and then go rock the test. Didn’t quite happen that way. My seven month old daughter got her six month vaccines a few days ago, so the little febrile ball of adorable decided we were staying up until half-after midnight. I have to give credit to my wife for addressing the baby’s fussiness for the rest of the night, she tried really hard to let me rest before the test, but I was still woken up by her cries every half hour until 4:30a.m. at which point I gave up. I plodded into my office and began to study drooled over the Homeseer home automation system for the next four hours. Trudged my way through the morning and to the testing center we go!

Nothing new to see here. Same place I went to take ICND1, same setup, so let’s get into the meat of it.

I have to hand it to CompTIA because that was one of the more difficult tests I’ve had the pleasure of taking. Yes, pleasure. The exam began with what would be the hardest 3 questions I can remember on any exam. These 3 consecutive lab-like scenarios easily covered two-thirds (objectives 1-4) of the information in my books. They were a very serious brain drain and time burner. No preparation, other than understanding the material, could get you through those. You may find more, less, or none of these questions when you sit, but seriously, do not underestimate the lab questions. I would say that real-world experience with packet analyzers, signing, network design and config, PKI, 802.1x, and Linux command line saved my butt on these. These three alone took a little more than 10 minutes.

After the brain-burners, the rest of the exam was all multiple choice and multiple answer. Let’s break down what I did and didn’t see.

Let me say again that your experience would likely be very different from mine. This was my experience with the question the engine generated for me. This isn’t a study guide.

Topics Encountered and Expected

  • Secure Network Design and Config (VLANs and Firewall/IPS/IDS placement)
  • Preventing Physical Breach, Mitigating Damage. These had really cool backstories to the questions. im deliberately obfuscating “Hackers drove a bulldozer through you data center to defeat K12 rated fence you implemented in response to a recent breach in which a greenpeace member drove a prius through the wall of your power hungry data-center. Which technique would you implement to stop this in the future?” Anti-tank Mines or High Explosive Mines. Anti-tank, which use shaped-charges resulting in a less powerful shockwave while still disabling locomotion; important because no one will authorize new hard drives and the HE mines may exceed the G rating of the bubblegum holding together your 20 gig disks, resulting in an outage.* In all seriousness, I actually would recommend knowing your physical controls in just a tad more detail than your study guide addresses.
  • Management Controls (literally addressed each control that show up in my books)
  • AAA systems and their appropriate use case. I think I saw LDAP, AD, multiple 802.1x strategies, radius v tacacs/+ v MS DC stuff, and a few questions about which wireless encryption best protects ____ authentication scenario.
  • A surprisingly high number of scenarios addressing wireless encryption and wireless MITM attacks.
  • Mobile Device Risks, in nearly all aspects, especially asset loss management and data leakage/theft management.
  • PKI/certs. A ton or PKI fundamentals, controls, architectures, on-wire identification. (If XXXXX data was captured, where the hash, key, data, etc.)

Topics Not Encountered, but Expected

  • Well Knows Ports. There may have been 1, but I wouldn’t bet anything on that. I really think there may not have been a single port question on the test. That’s disappointing, as the previously mentioned deprecated protocols were the ports I was reviewing the night before.
  • Input Validation Techniques. I expected to see a question or two addressing secure php forms or the like. Nope.
  • Data Sharing Relationships. I few years ago I would have told you I hate the corporate jargon and and goings-on of conducting business relations. On the contrary, I discovered that I’m so interested in the security side of this stuff, I was honestly looking forward to these questions.
  • Hardening…anything. Beyond “hey do you care if I put this heavy DMZ just anywhere?” which I wouldn’t quite call hardening anyways, and a round-about mention of port security, Nothing.
  • BYOD.

Topics Encountered and Unexpected

  • Is it foggy or is that just CLOUDS! From reviewing my score-sheet, this is the only area I struggles with, and I knew it when it happened. I used a plethora or different study techniques, guides, and self-study courses. I still did not know enough about cloud security methods. This bugs me so bad, I’ve already looked through 3 books, CompTIA Certmaster and Prof Messer’s vids. None, repeat none, make any mention of the slew of acronyms I’ve never seen before. I’ll have to dig into the Cloud+ and CCNA Cloud materials in my Safari Books Online to try and see where my deficiency is.
  • Fire Suppression Methods. Don’t know why but I didn’t expect to see it. Studied it, but honestly didn’t think it would make the exam.

Topics Not Encountered and Unexpected

Wait, what?

The Test in General

Overall, the test was actually quite well rounded. While not every buzzword and definition appeared as a choice, most of my materials either framed a question, fuzzed the question, or appeared as an answer. I get the feeling CompTIA fuzzed these questions quite a lot to both create confusion in those who spent a bit less time preparing and also just to try to get everything in the exam. I think the average question was 4-6 sentences with only one or two sentences of useful information.

Process of elimination would have also been hit or miss. Many potential answers were similarly worded, the correct acronym was often mixed into alphabetically alike groups, or there would be two or three very correct answers. With wordplay, I tend to do best going with my gut. On the other hand, when more than one answer is correct, often a small clue stood out on the fourth read through or the correct answers would all make up items in the more correct group. Some questions were very subjective, but I tried to imagine what the best practice would be if I was the IEEE and this critical production system could wait 10 years for RFCs to address the issue. I’m not joking. I tried to think “what would a room full of more experienced engineers likely do if no one was yelling at them.”

Other than what I mentioned above, the test and questions were well structured. I got the impression that the test become less difficult as I went on. It honestly seems to follow objectives 1-6 in order, but that’s probably all in my head. The questions managed to both camouflage the details while also somehow being very succinct and reasonable to comprehend. Challenging, but not hard as long as you understand the material. I am more than satisfied with my score, but I was very unsure when I ended the test. I feel like a test capable of vouching for skills should shake up the test-taker even if you score a perfect 900. That’s the hallmark of a test capable of conveying your skills to an employer.

That’s all I remember right now. As with A+ and CCENT, I used many study tools. The ones I recommend are at the bottom of this post, though I will go ahead and say to try finding the most recent references possible, assuming a reputable source, as I imagine my cloud deficiency has something to do with my 2 year old books. I cannot stress the importance of exposing yourself to security chatter, especially if you’re a more junior engineer, like myself, with a limited exposure to the material. There are a ton of Sec news sites, relays, and blogs like Krebs on Security, Daily Dave, CSO Online, etc., but my favorite way to stay current is by listening to podcasts. Details also below. I will likely annotate this post after looking back through some materials, so give yourself a reminder to check back in a couple weeks or you can always subscribe to my blog. I would be quite humbled, and I could use a good humbling.

*Don’t use mines. Bad form.

My Favorite Study Aids

I’m subjectively scoring them on how well they prepare you for the test including material, costs, and how closely the medium addresses/simulates the exam.

  • (7/10) Web – CompTIA Certmaster for Security+ SYO-401
  • (8/10) Web – Security+ Practice Quizes
  • (9/10) Android App – CompTIA Security+ SYO-401 Prep by Darril Gibson and Konnect L.L.C.
  • (8/10) CompTIA Security+ Certification Guide SYO-401, 2nd Edition by Glen E. Clarke
  • (6/10) Mike Meyers’ CompTIA Security+ Certification Guide Newer, but put me to sleep. Better cloud coverage and slightly more real-world relevance, but more detail than tested.
  • (infinite/10) 3 Podcasts: Risky Business, TWIT’s SecurityNow, and Defensive SecurityA great way to turn your commute into a general background and goings-on of IT Sec.

Supporting my Path

My desk bookshelf looks awesome. A+, Sec+, Network+, Linux+, CWTS, CEH, command line guides for Cisco and HP, python and html guides, a stack of LinuxUser magazines, MCSA 2012, O’Reilly, Cisco Press, ExamCram, Odom, Lammle, Tracy, a few printed comical RFCs, and that’s without getting into the mess that is my Safari Books Online queue. Am I going to get certified is each topic? No, likely not, but I really hope to use something from each.

I have my CCENT, next week I test for Security+, then after I will finish the second half of CCNA R&S. I have optimistic plans of getting both CCIE R&S and Sec as well as CASP in the next 8 years. I am very interested in ISP or Big Data network security right now, though I reserve the right to change my interest. Specifically I like learning about the configuration of those, distinctly different, networks and their threats. So, what’s with the rest of the alphabet soup plaguing my shelves?

The majority of my book collection is non-networking and non-security. My last full-time job was as a network/sysadmin, with a large portion of my time on the support and systems side. So why am I, as a driven and focused IT dude, wasting so much time on everything else? Simply: Understanding.

When I first moved into the Cisco world, I optimistically planned to have a CCNA in under 3 months. I was set-back a bit by medical issues in my family, but the biggest barrier has been my lack of knowledge around supporting systems. There’s no point in having a network without packets to move. With that in mind, each book focuses on a personally novel skill-set in my overall understanding of how the layer 1-4 network provides services to the layer 4-7 computing infrastructure. For example, My A+ books taught me far more about how all computer, from switches all the way to mainframes, actually work. Server+ and MCSA helped me with domain administration in my last job, which opened me up to light up a FreeRadius server in my home lab, expanding my understanding of AAA, on an Ubuntu 14.04 server I learned how to use from Linux+ books. That job also allowed me to build skills desktop virtualization, including VMware Player and Oracle Virtualbox; skills I would need to troubleshoot images in GNS3.

Now, I know what you’re thinking: “You can Google much of how to do this.” That’s true, very true, but on listening to Ethan, Greg, and Drew of the Packet Pushers Podcast, as well as Steve Gibson of TWIT’s Security Now, I’ve decided to try my best to be a well-rounded “Full-Stack” engineer. Yes, I’m tooting my own horn a bit, but I also think this is a requirement for the IT pros of the future, especially for small and medium sized companies. Will a company want to consult an expensive net engineer for each Vmotion? No, they will want their virtualization team to have the skills needed to complete the job. Do you as the IPS pro want to break something each time you tweak a rule? Of course not, so you have an understanding of the application traffic on your network and how that application interacts with supporting services both on your network and in the cloud. Best of all, what beautiful world would we live in if most Java or (god-forbid) Flash devs had an in-depth understanding of application attacks, defensive code, and security in depth? Imagine a corporate application designed to cooperate with NIPS, HIPS, host firewall/AV, the expensive black box, and everything in between. Told you it’s a beautiful image!

I want to be the network engineer who can sit at the table with the dev folks, systems guys, database team, and management and work together with an understanding of how my piece of the puzzle best fits together with not just the adjacent pieces, but the overarching picture. I’m young and naive, but I think my assortment of books supports that goal and it’s who I’m striving to be.

Charter acquires Time Warner Cable: The Modern David and Goliath


You really can’t keep track of everything in the tech world, there’s just too much to possibly see, hear, and read it all. This, however, how did I miss this?

I was helping a friend shut down a local office and he asked if I would mind calling Charter on his behalf. So I call them up, go through the security questionnaire, place the cancellation order, and then Charter rep does the normal  scripted “Please don’t leave! Why are you leaving? I can be better! Are you moving this office to another location to which we can move the service?” “No, the office was combined with another office and they already have a Time Warner contract at that location.” “Oh, well that’s good to hear Since we recently acquired Time Warner.” Suddenly my heart’s skipping beats, I break out in a cold sweat, and I can’t catch my breath as I utter “oh, ok…” and try to get off the phone quickly.

I used to work in ISP tech support, so I know the acquisition rumor-wheel well enough; I cling to the hope that it’s all a sick joke. Nope. Reuters, LA Times, Business Weekly, etc. They all say the same thing. Charter has acquired Time Warner Cable, and many smaller ISPs as well. Oh yeah, and this all happened in the last two months while I was blissfully ignorant.

I’m shocked and scared. Charter has disappointed me with fragile infrastructure, terribly inconsistent line tech and premises tech resolutions for the same issue (5 different guys, 5 different problems?), and the fact that after I punch in an account number on their IVR the support person still asks me for the number again. It’s like five hundred digits long! Yes, this is anecdotal, I know.

Time Warner, on the other hand, oh my dear sweet Time Warner. Okay, so I’ve actually only worked with them 3 times, so grain-of-salt warning. Two were run-of-the-mill: one IP address issue and one truck roll with the line tech arriving within a half hour of my call (yeah, I know he was probably just around the corner). Now, what really impressed, I had a business issue that required collaboration with Time Warner engineering, and an engineer called me within five minutes of placing the request, spent half on hour on the line without every sounding frustrated or annoyed, and seriously had the knowledge-base of like a CCNP/CCIE.

But Charter has gobbled them up, positioning themselves as the second largest digital cable/data provider, for subscriber count. What does this even mean? My personal experiences aside, let’s break this down.

In this corner, the heavyweight champion, Comcast Xfinity!

Comcast is huge and expensive, even more-so than Donald Trump’s hands. Comcast pioneered the aggressive tactics that allowed it to eat up so many cute little small/medium sized ISPs. This put them in the position to collaborate with AT&T to form a lobbying Goliath who could stomp out any attempt to form WISPs or municipal ISPs. The strategy of legislatively emaciating competition while buying up the little guys has lent Comcast the opportunity to slowly deprecate their lower-bandwidth packages without lowering prices. AT&T picks up the scraps with their data packages typically below 12Mbps (the limit of unbonded DSL) and Comcast gets to keep raising the cost.

But, you’re paying for more bits, so you should pay more, right? Sort-of. We are conditioned to think that getting more of something means paying more for it, but the issue is more complex than that. ISP level networking infrastructure seems comparable in price for the last 15 years. The big boxes process more bandwidth with less latency, but their overall cost is typically about the same just because that’s how computing evolves over time: more data processed with less power, materials, and expenses. So over time, the actual cost to move a bit of data (ha) drops like a rock, courtesy of Moore’s Law and the wave of “efficiency” that is Software-Defined Networking, while Comcast raises package prices. The other ISPs see the ridiculous profit margin and follow suit.  Comcast has set atop the golden throne that is high bandwidth for too long. Enter David.

And the Contender, Charter Spectrum!

I don’t like Charter, but as a man of science, I reserve the right to change my mind based on breaking or better quality information. Charter is putting itself in a position to do just that.

Worst case scenario first. Should Charter team up with the lobbying supergiants, we end up with a situation in which Goliath pummels congress and consumer with right fist Comcast and left fist AT&T, all the while Charter, our David, slings lobbyist after lobbyist into the mayhem from atop Goliath’s shoulders. Should things go that way, it’s gonna get ugly.

But, I don’t think it will. Charter has already agreed to place nice with consumers and content providers alike in exchange for antitrust approval from the DOJ. “Charter would not be permitted to charge usage-based prices or impose data caps and would be prohibited from charging interconnection fees, including to online video providers…” Upon further research, it turns capping seems not to carry much weight in Charter’s strategy. This agreement, however, addresses a Time Warner strategy reminiscent of cellular data plans. Further clarification from Artechnica “…Charter doesn’t impose data caps and overage fees on its Internet customers, TWC offers optional plans with limits of 5GB or 30GB a month. The plans ostensibly provide discounts of $5 to $8 a month, but customers who go over the limits can be charged another $25 per month. Charter said it would get rid of these overage fees, pledging that the merged Charter/TWC would not impose any data caps.

Charter plays ball with the Dept of Justice and becomes a giant of it’s own.

What does this mean for us?

Bandwidth is stupid expensive. Comcast is setting the bar for rates, and they have no real competition. Had. Charter doesn’t even need to slash prices. I think they should just hold off on price hikes for a few years. Now that Charter and Comcast share many large cities, they are going to have to duke it out. I imagine Comcast will attempt to use legislation and community investment to throw the heavy right hook while Charter pummels the giant with a storm of low prices. Who will win in the end? Hopefully us. I would be perfectly happy with one dollar per Mbps and that’s still like a 50% profit margin. Businesses and consumers alike would be able to redirect those savings into, well, stuff. Buying stuff is good for the economy. Therefore, Charter’s acquisition of Time Warner is good for the economy*.

*I’m not an economist and yes I am aware of the composition logical fallacy. I’m trying to be an optimist. Don’t take this from me.

Why I DON’T support Fiber in the Data-Center

Sales Reps, plug your ears.

It’s Fast!

It’s Long Range!

But, It’s Expensive!

That’s why I don’t recommend fiber in small to medium sized data centers. Sorry for the title shock, but we are excluding big data, where I wouldn’t use an ounce of copper.

GBICs have come WAY down in price. You can get a Cisco compatible SFP+ for almost under $60, which is awesome, but fiber is so expensive! Two meter patch cables in SMF/MMF run anywhere from $25 to $120 depending on the environment and connector. That’s ridiculous. A gigabit quality two meter CAT5e costs…nothing. Admit it, you have this lying around just about everywhere; there’s plenty to cannibalize.

But but…my Cisco rep says blah blah fiber ten gig. A two meter CAT6a cable is a whopping four bucks.

But vMotion and DDOS and containers and other buzzwords! CAT7a and CAT8a may not be floating around your IT closet yet, but they are rapidly picking up use, they’re cheaper, and have been tested all the way up to 40Gbps.

But Steve, if that’s true, my sales rep lied to me.

No they didn’t they just dint tell you everything. Cisco, Juniper, HPE, etc., they all need to make a buck if we want them to stay in business…and we do. Unfortunately, IT Depts all over the world are seen as the disgusting back office in which money flows the wrong way. This is even more apparent at small scale. Our parts are expensive and that hurts the small-medium business owners.

So, what can you do to save business owner tears? Help them filter the sales rep noise. Just because you have 500 employees and you know who Oracle is doesn’t mean you need a fiber switch or SMF between each piece of metal. Get some bubble gum, a metal coat hangar, an RJ-45 clip (preferably one with the clip still attached), and make your own gigabit ethernet cable.

^Dont actually do that, you’ll need 4-8 hangers for a successful pinout.

Here’s what inspired this mini-rant.


Way to go Time Warner!

Semi-pleasant surprise today. We had a modem connected up for client and strange things started happening. Applications were failing, a few users were complaining, and the internet was downright wonky.

So I remote in to one of the client’s computers and start poking around. Everything is normal till I run an ipconfig. Are those IPv6 addresses on the Ethernet interface? It’s not a MAC address…It’s not fe80 link local…

Okay, open google,

Your IPv6 Address Is: redacted
Your IP Details:
ISP: Time Warner Cable
Services: None Detected
City: redacted
Region: redacted
Country: United States

Holy frickin crap the modem pulled IPv6

The PCs pulled IPv6


Well sort of. We still have services to migrate to v6. The client isn’t v6 ready, which caused all the wonkiness in the network. So unfortunately we had to request switching to IPv4 only service at this site, but I’m still ridiculously excited.

I may be overdoing it a bit, but I don’t get to see this often. I primarily deal with Charter-Spectrum and Comcast. Both companies do their job well; however, I have yet to see a native IPv6 pull from either one. Both claim to have a large v6 footprint. I’ve talked to both companies too many times in reference to public facing modem IPs when helping people set up web servers or remote services, and it’s always public v4 or a private 10 dot for ISP/Carrier-grade NAT. So, all three companies say they have rolled out v6, but, in my experience, I’ve only seen v6 from Time Warner.

We need this. We’re out, straight up out, of IPv6 under ARIN. Business is not propelling v6 migration, but we know why. Everyone has said it and I’m going to say it again: There’s no Return-On-Investment for IPv6. Developers don’t want v6, it’s extra work. Standards aren’t doing it; instead, the IETF has spent all their time trying to fix old problems instead of pushing innovation. Someone has to drive this.

I want the ISPs to be the bigger people and force it.

I’m not saying do it overnight. I want to see ISPs quietly phase in dual-stack then set reasonable end-of-service dates for IPv4. I know that puts a financial burden on the  ISP, but it’s the ISPs who seem set to profit the most from the resale of IPv6 blocks anyways. I didn’t see ISPs doing that at the moment, but tripping over a native public v6 address today has restored my hope.

Time Warner, thank you for giving me an awesome Friday and inspiring me to continue to be an IPv6 Evangelist.

Untangle NG Firewall

Jeez, I’ve been teasing this post for a long time.

I think this is the coolest solution since sliced bread, but that’s only because it’s true. Per “Untangle’s NG Firewall enables you to quickly and easily create the network policies that deliver the perfect balance between security and productivity.”

We have all heard it before for super-object-x-v127.6, right? Hey, it may be true, but the price-tag is in the millions or you’re going to have to hire an overpaid consultant to run the thing or at best it’s terribly unstable.

Well, this isn’t the case for the Untangle Firewall.

That’s because it’s not just a Firewall. Untangle is a beautifully written software-suite which capitalizes on taking a whole mess of security functions and putting them in one place. Seriously, this thing is a *deep breath* Firewall, IPS, Phish Blocker, Virus Blocker, Ad Blocker, Application Controller, Web Filter, SSL Inspector, Bandwidth Controller, Load Balancer, Fail-over Controller, Web Cache, Captive Portal Controller, and IPsec and Open VPN node. <== Do you see that? It’s ridiculous. Best of all, I turned every single feature on in an economy hardware build, and the tower just yawns at the challenge. That’s right, Untangle Firewall can do all that stuff without breaking a sweat.

And it even it looks nice! All the applications are lined up in a graphical rack. Yep, a rack, a server rack. You move apps in and out of the rack based on the features you want. A power button turns the feature on and off and each app has a myriad of different settings and tweaks.

But does it work?

The firewall was easiest to test. Now, keep in mind, if you are NATing at the Untangle device, the firewall shouldn’t need a whole lot of tuning; NAT should stop most sad attempts to hop through onto your LAN. So I put mine in bridge mode, retuned my network, and gave the firewall real rules. It did its job fine. Now, this isn’t a hard job. My 20 year old PIX can do that part. My pix was also thousands of dollars when Cisco pushed it onto the market. Untangle is FREE. Well, FREEMIUM.

Web Filter is solid. Pick the categories you want to include, white list or black list any exceptions and go have a beer. You deserve it. What’s really nice is the low rate of false positives. I’ve fixed 2 false positives. Both times it thought it found porn and both times I imagine interesting cookies were involved. I don’t blame the Untangle in either case.

Virus Filter is awesome. I don’t have any viruses laying around, but I pulled a few defanged baddies through, compiled them, and tried to push them around. It caught all the (old) viruses, but it did let through the anti-virus test files I’ve collected. I don’t know if that’s cause for alarm on the AV vendors part or for the Untangle box. Probably the AV vendors…as I believe Symantec and McAfee are 99% unicorn tears anyways. I can tell you that the UT boxes I monitor in major deployments have a steadily ticking viruses blocked counter, occasionally corroborated by the users who complain they can’t get into their poker tournament site.

Email security is harder to test. I’m a huge proponent of keeping email on the web and in a browser, so I really don’t have a good way to test these.

IPS is pretty standard. I haven’t set it up yet, and likely wont until I finish building my packet capture box (I smell a future post). There are a crap ton of rules in there. The default comes with your standard -stuff people shouldn’t be doing- turned on, but there are an awesome number or nerd-knobs to tweak in this app.

OpenVPN and IPsec VPN just work. IPsec takes a bit more config, but it takes literally like 5 clicks to stand up a VPN tunnel. Best of all, I’ve never seen one drop since they revised their VPN app in version 9.


This is an incredibly versatile box. I work with 8 different Untangle Firewalls ranging from version 9 to (finally) 12. Each deployment has a different use case. Some are WAN links, others provide server security to a range of different servers, yet others are doing basic routing tasks and every single one of them is also carrying the Firewall, IPS, Spam/Phish, and Web Filter.

This device fits excellently on school network or in small-medium sized business, with need for a reliable, and cheap WAN solution. I’ve played with both the IPsecVPN and the OpenVPN. With over 6 years collective run time, I haven’t seen a single VPN link drop or decrypt the streams. And if you need a public face for management or whatever tickles your fancy, the Dynamic DNS has it’s own configuration page in the admin console.

I even have this thing doing sec in my own home. I’m quite comfortable with it. In bridge mode, it’s super easy to use. I even have it doing ad hoc parental controls.

But, Untangle Firewall has it’s limits.

This device isn’t a router. If you spend $100 on a half decent Wi-Fi router there’s a very good chance you will get support for RIP, but not here; this isn’t a router. While the Untangle device can do basic static routing, that feature is designed to help the firewall better fit into a network. The firewall also seems quite vulnerable to DOS attacks. If you turn on all those features, you start to see a few extra milliseconds or two of latency past 150Mbps on an interface. All my builds are gigabit, so I imagine this is where we pay the price for doing on software what is done on ASICs in the big brands. I don’t have the hardware to DDOS it myself, but I imagine VoIP quality will begin to suffer around 500Mbps.

Oh Wait, I forgot about the QOS. The QOS engine in this thing is rock solid too. I remember training for tech support “the VoIP is the least tolerant of loss and jitter” but if you tell Untangle to do VoIP QOS, you will notice internet issues way before your phone problems. It’s a good box.

Now it is a single point of failure; we’re used to that, though. Security has been the aggregation of all streams for quite some time. While there are solutions to this vulnerability, your going to drop serious dough on them. I’m okay with a single point on the untangle. I put the hardware together, I configured it, I ran the backup. I know this thing in and out. If it dies, I’ll unplug the ethernet from one Untangle and plug it in to an identically prepared twin. Worse case, I slid a Gbit NIC in a PC collecting dust and slap together the install in a hour. Load in the backup, and Voila! Even the VPN tunnels stand back up on their own.

The other issue I have with Untangle is the lack of a sync function. I manage quite a few of these bad boys; it would be awesome if they sync’d app changes between themselves. Untangle told me they are not ruling it out, but it’s not in the works right now. Dear Untangle, add this feature and prepare to rake in the dough!

Let’s talk Dollars

Nine-tenths of the features I listed earlier are free, or have a very strong lite version. Untangle doesn’t play with their lite apps. I have just as much trouble cracking through the lite versions as I do the full version. The full versions, however, have way more tuning knobs to get it just right.

Even with the cost of the full featured apps, the Untangle is really cheap to run. The starting full package is $50 a month for up to 25 hosts, $300 for 250, $750 for 1000, $1,200 for Unlimited, and plenty of packages in between. You also have the option of purchasing only the features you want. But you don’t have to spend a Cent! You can cobble together a PC with two GigE ports for about $200 and install the Untangle Firewall. All the best features and updates come free! I dare you to go to Cisco and try to get a firewall for $200. Even if they sold you a dying ASA, which they won’t, you would need a special administrator to run it.

Untangle also sells a variety of hardware solutions for those who don’t want to chance having issues with a build-your-own scenario. Details, here!


Untangle 12 OS

That was the easiest version upgrade ever. Clicked upgrade and a while later I had a new, but familiar, interface. On previous releases it was an entire OS rewrite. Untangle released new version, you burn the image to a disk, pop it in the tray and walk through a familiar debain style install. Further, there were some issues with openVPN changes which slightly raised the difficulty in migrating for UT v9 to UT v10. Upgrading from v11 to v12 was nothing like the other. We pre-prepped a twin with a backup UT box by exporting a backup and restoring the twin from the file. Next we pressed the upgrade button on the twin to initiate the upgrade to v12. An hour later, it was ready. Took about an hour to make sure no settings were lost and swapped it out. Didn’t use change management, didn’t give advance notice, just “Hey were going to take down the network at 6, looks like about half an hour.” Bull. We were down for 3 minutes. Three frickin minutes. Users told me it was the shortest maintenance we’ve ever had. Okay, onto the big new v12 feature.

Holy Awesome Batman, this Dashboard is sweet! I would include lots of pretty images, but I don’t feel like scrubbing all my IPs off the pictures, so you can find them here. This is so intuitive. I can now choose which reports I want graphed data on and over what period and it just compiles it into beautiful graphs. It’s not quite the depth of information you get from SNMP or net-flow, but that’s not the niche I tend to find UT boxes in. It is, however, highly configurable. Go into the reports tab, which they have conveniently moved from the rack to the sidebar, and build a report for whatever info you want to crunch. Want to watch in real time as Facebook traffic goes up? Build a report for it, collect your data, and take that info to management. What just happened? You, champ, just found Return on Investment in a Firewall!

I hate to end on a cliff, but I have no way to end this post without doing Untangle an injustice. Go, Go now! Get one! Or Fifteen!

Download NG Firewall