Monday 28 September 2015

Cisco Systems Inc. During the Chinese government will win?

Cisco expands further in China, but these investments to pay?

Giant Cisco (NASDAQ: CSCO) networks recently agreed to form a joint venture with Chinese manufacturer Inspur server networks and selling cloud computing products in China. The companies announced that they would invest $ 100 million in the project, but did not disclose specific details.


The association is a clear attempt to strengthen the presence of Cisco in China, where sales fell due to competition from cheaper Chinese rivals like Huawei, exacerbated by concerns about cybersecurity US technology companies. Let's look more closely at the difficult relationship with Cisco China, and the difficulties of other high-tech companies in the United States face in the country.

Cisco and China

Once upon a time, Cisco helped build the Great Wall of China. This project has been severely criticized, but helped the company gain a lot of credibility in China. But in the last decade, it is increasing the suspicions and caused leaks ciberespionaje Snowden US high-tech companies, including Cisco, falling from grace.

The Chinese government now plans to remove all foreign technology by banks, military enterprises, state-owned and government agencies in 2020, according to Bloomberg. This means that instead of using American processors, operating systems, network equipment and servers, all companies in "high security" could be forced to use homegrown technology.

To curry favor with the government over this fundamental change, Cisco recently agreed to invest more than $ 10 million through the Development Committee of China and the Reformation in the coming years to improve technical education in schools, create jobs, fund R & D efforts, and attract investment in equities. The joint venture with Inspur is linked to this broad thrust.

In fiscal 2015, revenue from Cisco APJC region (Asia-Pacific China, Japan and) fell 2% year on year to $ 7.2 billion and accounted for 15% of its turnover. Revenue in China was reduced by 21% per year, offsetting the modest gains elsewhere. Unless Cisco can curry favor with the Chinese government while pushing cheaper Chinese rivals, these losses continue to overload your sales APJC

The associations are the preferred choice

China, usually favors more independent joint ventures with Chinese companies in the country expansions. This means that US companies should share their profits with Chinese companies, but also get the experience and significant tax benefits if local products are made in China.

In March, IBM (NYSE: IBM) has agreed to license its designs to semiconductor chips, servers and software for several high-tech companies, including Chinese Inspur.

Microsoft (NASDAQ: MSFT) has recently announced a partnership with Baidu (NASDAQ: BIDU) and private investment company Tsinghua Unigroup state to develop cloud computing technologies. This tripartite partnership was struck before the next release of Ubuntu Linux Chinese Kylin a well-developed operating system designed to replace Windows on government computers. Dell, which recently agreed to invest $ 125 billion in China over the next five years, Kylin will be installed in 40% of PCs sold in China.

These partnerships could help companies to avoid the fate of Qualcomm (Nasdaq: QCOM), which was hit by an antitrust fine of $ 975 million last year.

Wednesday 23 September 2015

200-120 Exam Question No 23

Question No 23:

What is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst switch?

A.
It creates a VLAN 999 interface.
B.
It designates VLAN 999 for untagged traffic.
C.
It blocks VLAN 999 traffic from passing on the trunk.
D.
It designates VLAN 999 as the default for all unknown tagged traffic.

Answer: B

Sunday 20 September 2015

Major attack

Major attack on Cisco routers: Protect your enterprise from SYNful Knock:

An earlier publication of this article stated that Synful Knock pressed a Cisco IOS vulnerability. FireEye and Cisco indicates that this can not be exploited by physical access, discovery of the administrator password, or use a default password. Cisco has published this guide on the detection and removal of the implant material in question.

Security research firm FireEye announced September 15, 2015, a major vulnerability in Cisco IOS called Synful Knock and allows attackers to take control of enterprise-class routers, allowing attackers to monitor all network communications, and provide a way more easy to infect other network devices.

At the time of release, there are 14 known infected routers across India, Mexico, the Philippines and Ukraine. Routers known models affected include the Cisco 1841, 2811 and 3825 routers, which are products that are no longer sold by Cisco. In an interview with Reuters, CEO Dave DeWalt said FireEye based on logs from affected routers, attacks have continued since "at least a year."

According FireEye, similarities in basic features and IOS software indicates that other router models are likely vulnerable to this exploit.

How does this vulnerability

According to the bulletin published by FireEye:

The implant consists of a modified image Cisco IOS that allows the attacker to load different functional modules of the anonymity of the Internet. The implant also provides unlimited access door using a stolen password secret. Each of the modules are activated via HTTP (not HTTPS) using a specially designed TCP packets sent to the router interface. The packages have a nonstandard sequence and the corresponding acknowledgment numbers. The modules can manifest executable code or hooks as an independent in the IOS routers that offer similar functionality to the backdoor password. The backdoor password allows access to the router through the console and Telnet.

 The implant persists on the restart, but the modules loaded by the attackers exist only in RAM, and therefore are cleared after a reboot. Routers concerned retain the basic features of routers, making the existence of infected systems hard to notice.

In FireEye bulletin on the vulnerability, that's how it breaks down the changes to the Cisco IOS binary in these four aspects:

  •     Edit Address translation buffer (TLB) read / write attributes
  •     Edit a legitimate function IOS to call and initialize the malware
  •     Overwrite legitimate protocol management functions malicious code
  •     Overwrite strings referenced by legitimate functions with strings used by the malware

How to detect and seal the vulnerable systems

In the position of Cisco vulnerability, the company said it added a Snort rule to detect the affected systems. Considering the object and the placement of routers on the network, it is advisable to check the devices connected to networks in which the vulnerability was exploited to further intrusion

 The modules loaded by the implant does not persist across reboots. For forensic purposes, collection of modules requires a core dump. FireEye said detailed instructions on how to detect the implant are coming.

As vulnerability persists across reboots, the only available option is to flash the router with the new Cisco IOS image available for the device to ensure complete removal of the implant.

Who is responsible for this attack?

 Persistent attacks on enterprise class routers have so far been mainly theoretical problems, such as using protection and security in these devices are very different routers for home users, which were found to have induced vulnerabilities suppliers.

In an interview with Reuters, DeWalt declined to speculate on the specific sources of the attack, but noted that "[This] feat is only obtainable by a handful of players in the nation state. "Reuters names on the intelligence services of Britain, China, Israel, Russia and the United States as having the technical capability to orchestrate such an attack

Thursday 17 September 2015

200-120 Exam Question No 22

Question No 22:

In a switched environment, what does the IEEE 802.1Q standard describe?

A.
The operation of VTP
B.
A method of VLAN trunking
C.
An approach to wireless LAN communication
D.
The process for root bridge selection
E.
VLAN pruning

Answer: B

Sunday 13 September 2015

Cisco rulings sink Arista stock

Arista reportedly suffered a setback in its litigation with Cisco that caused its stock to drop almost 6% this week. According to Investor’s Business Daily, International Trade Commission attorneys determined Arista infringed on three Cisco patents, causing the company’s stock to drop 5.6% Thursday.

Arista stock dropped 11% today on the ruling.

Cisco filed suit against Arista back in December, claiming copyright and patent infringement. Suits were filed in both federal court and the ITC.

The ITC action was intended to block Arista from importing and selling products in the United States that Cisco alleged infringed on its patents. It was an attempt to expedite the injunction of Arista product while Cisco patent and copyright infringement suits against the company wind their way through the court.

In July, a federal judge dismissed Cisco’s indirect infringement claims against Arista, a complaint that accompanied a patent and copyright infringement case. Just after this claim, Arista introduced its EOS+ operating system and Cisco then amended its claim to demand extra penalties for “willfulness” infringement.

The judge then ordered Cisco to amend its claim to make a stronger case that EOS+ was a new product and not a new version of an existing product.

Cisco provides an update on all of the litigation with Arista here. Here is Arista’s statement on the ITC ruling and on the cases overall:

Thursday 10 September 2015

200-120 Exam Question No 21

Question No 21:

What value is primarily used to determine which port becomes the root port on each nonroot switch in a
spanning-tree topology?

A.
Path cost
B.
Lowest port MAC address
C.
VTP revision number
D.
Highest port priority number
E.
Port priority number and MAC address

Answer: A

Sunday 6 September 2015

Stop the presses: Cisco says

Stop the presses: Cisco says Cisco CEO is in charge of Cisco:

 Cisco CEO Chuck Robbins is the guy who runs Cisco, not his predecessor and company CEO, John Chambers, according to a spokesman. Chambers, in fact, now reports to Robbins which is strange considering that the board directs Chambers Cisco Robbins says.

Included? Me neither. On Monday, Network World reported that four Cisco CSCO -1.43% engineers-key Mario Mazzola, Prem Jain, Luca Cafiero and Soni-Jiandani continued to report to the rooms after releasing the CEO on July 26, after 20 years in the helm.

Known collectively as MPLS, these frameworks have played a key role in business and the acquisition of Cisco's strategy and were richly rewarded for it.

Mazzola, Jain and Cafiero Insieme cofounded a company network as defined by Cisco software was a "spin-in." That means that Cisco was initially invested in 2012 with an option to purchase. Two years later Insieme Cisco bought for $ 863 million. The fourth direction, Jiandani, was a veteran who joined Cisco Insieme and returned to Cisco through this acquisition.

The four engineers in high state of Cisco for the year, and the participation of NetworkWorld story is to always get special treatment because it is very rare for line managers to inform a president, not the CEO.

-1.71% ORCL Oracle Chief Executive Larry Ellison still has a direct bearing on the side of technology, but also retained his title of chief technology so that the situation is different from what apparently happens in Cisco.

Cisco spokesman said he and Chambers best technicians of the company, including Pankaj Patel Executive Vice President and Chief Development Officer, Robbins report.

"The key is to understand that our CEO, Chuck defined strategy and operational decision making of the company. This is something that John said many times publicly," he said.

But he was asked specifically about MPLS, the spokesman said the company does not provide "public updates on the lines of each employee reports."