Author Archives: Denise "Fish" Fishburne
Author Archives: Denise "Fish" Fishburne
There is just something, for me, that is truly magical about CiscoLive in the United States. Every year I look forward to it even more than the previous year. There is a true glorious and wonderful magical world at #CLUS.... Read More ›
The post CiscoLive 2019: Let the Magic Begin! appeared first on Networking with FISH.
The BGP Table Version is the most unknown and unexplained BGP concept/value that I rarely ever troubleshoot without. Seriously, I cannot imagine troubleshooting BGP without understanding the BGP table version. I always “eyeball” it at the very least when I’m... Read More ›
The post Understanding the BGP Table Version (3 part Blog Series) appeared first on Networking with FISH.
Time to have some fun in the lab with Inter-AS Option AB. Let’s get our geek on! Inter-AS Option AB – where the data traffic uses the VRF interfaces (or sub-interfaces) and the control plane (BGP VPNv4) uses the... Read More ›
The post Inter-AS Option AB: Fun in the Lab appeared first on Networking with FISH.
For over 30 years I’ve been in the playing in the “world of IT” and wow has that world changed a great deal in those years. But through all that change, there has been a thread, for me, that has always remained... Read More ›
The post Tips from a Network Detective appeared first on Networking with FISH.
RSA 2019 SanFrancisco….. ready or not… here I come! I am so beyond belief excited about being asked by Cisco to go to the RSA Conference in SanFran the week of March 4th and work the Cisco Threat Wall during the event!... Read More ›
The post Cisco Threat Wall Booth Duty – RSA 2019 Here I Come! appeared first on Networking with FISH.
Ever wanted to sit down and talk with a major Stealthwatch expert… just ask questions and get a “reader’s digest version” of what it is all about? If so you are going to love this video Walk-Through series. A little... Read More ›
The post Stealthwatch Video Series Live on Cisco.com! Woot! appeared first on Networking with FISH.
It all started in early December on twitter. Community I could not have said it better than David said it, This is what community is! You, me, all of us, nobody gets left behind and we get to contribute so... Read More ›
The post Community: #One4All #All4One appeared first on Networking with FISH.
I’d like to share something with you. Something I learned (the hard way) in my life. Beware the tangled web you weave. There is a price to pay. I didn’t see this when I was in my 20s and 30s. ... Read More ›
The post Oh What a Tangled Web We Weave…… appeared first on Networking with FISH.
Four 1/2 years ago Networking with Fish as a web site was born. To say I knew nothing about having a web site would be a massive understatement. All I knew was I needed to “give back“. I needed to... Read More ›
The post Networking with Fish Update: Site Refresh appeared first on Networking with FISH.
I was asked the other day what my New Year’s Resolutions for 2019 were. The truth is I don’t actually have any. I haven’t, in my life, been the best at “using New Year’s Resolutions” in the “healthiest of ways“. What do I mean by that? Well for example, one... Read More ›
The post 2019: Taking One Day at a Time appeared first on Networking with FISH.
Network segmentation…. air gap segmentation… the names go on and on. But no matter what you call it, you designed it and deployed it for a reason. Likely a very good reason. Potentially even a reason with fines and consequences should the segmentation not work. So once you deploy it…. what then? Just trust it is working and will always stay working?
I admit I am likely viewed as boringly logical when it comes to the network. It just doesn’t seem logical to me to spend so many hours in the design and the deploy phase and then just trust that it is working.
Don’t just trust. Verify.
Use whatever tool you want. Just please… know what is really going on in your network. Know reality.
In this blog I’m going to show you how you can use Stealthwatch to get visibility into what is REALLY going on in your networking in reference to your segmentation.
How can Stealthwatch tell you if your segmentation is working or not? I refer to Stealthwatch as “Your Network Detective Command Center”. If Continue reading
Rogue DNS kinda reminds of me of a crime scene show I saw once. The killer was hijacking the GPS mapping system in the rental cars of their victims.
Imagine that who you think is your valid DNS server actually isn’t. Yeah… i know – scary. …. If you are not familiar with the term “Rogue DNS” … maybe you might know the exposure via other terms like DNS hijacking or DNS redirection to name just a few.
In this blog I’m not going to teach about what Rogue DNS… DNS hijacking… or DNS redirection. Nor am I going to talk about solutions like OpenDNS (Cisco’s Umbrella). I’m going to just show you how you can use Stealthwatch to get visibility into what is REALLY going on in your network in reference to DNS. We are going to cover 2 situations where having a tool like Stealthwatch could help you with your DNS.
How does Stealthwatch do this? I refer to Stealthwatch as “Your Network Detective Command Center”. If there are rogue DNS in your network and your end devices are Continue reading
R1 and R2 are cabled up twice to each other via their gig0/0/1 interfaces and their gig0/0/7 interfaces. Each connection is in its own subnet, and each interface configured for OSPF and MPLS. But while we have 2 OSPF neighbors between them… we only have 1 LDP neighbor.
R1#show mpls int
Interface IP Tunnel BGP Static Operational
Gi0/0/1 Yes (ldp) No No No Yes
Gi0/0/7 Yes (ldp) No No No Yes
R1#
So as you can see from the output of show mpls interface, gig0/0/1 and gig0/0/7 are both configured for MPLS LDP. Why then if we look below do we see only 1 MPLS LDP neighbor between them?
What is the problem? Actually… in this situation there isn’t a problem. This is actually expected behavior.
R1#sh mpls ldp neighbor
Peer LDP Ident: 10.100.100.2:0; Local LDP Ident 10.100.100.1:0
TCP connection: 10.100.100.2.22592 - 10.100.100.1.646
State: Oper; Msgs sent/rcvd: 184/184; Downstream
Up time: 02:32:11
LDP discovery sources:
GigabitEthernet0/0/1, Src IP addr: 10.1.1.2
GigabitEthernet0/0/7, Src IP addr: 10.1.7.2
Addresses bound to peer LDP Ident:
Continue reading
Ready for part 2 of our Network Detective MPLS L3VPN Ride-Along? In part 1 we were presented with the “Case of the Failed L3VPN Ping”. We started, like any ping troubleshooting, on the IP subnets themselves – do they exist in the... Read More ›
The post Troubleshooting Basic MPLS L3VPN – Part 2 – MPLS appeared first on Networking with FISH.
Time for a little more fun in the Network Detective series! Today’s “Network Detective Ride-Along” will bring us into the config setup of someone very new to MPLS L3VPNs. As we go along remember the Network Detective Mantra “Be Prepared,... Read More ›
The post Troubleshooting Basic MPLS L3VPN – Part 1 – BGP appeared first on Networking with FISH.
I am a huge believer in “knowledge is key”. Yeah… I know… just reading that statement you are probably saying “well yeah… duh”.
Of course knowledge is key… duh, Fish! We know that! We love knowledge. We are knowledge seekers and we love to learn! I mean… if we didn’t love learning and knowledge why would we be reading this? Okay… got it. You love knowledge. You want to grow your knowledge. I hear you. You are basically saying… bring on the knowledge… max the setting! Got it.
So you most likely extend that desire for knowledge to most of the areas in your life.
For example….
Let’s Continue reading
Stealthwatch, to me, is like having a Network Detective working in my very own network! I truly love Stealthwatch and I am playing with every chance I can get.
Disclaimer: I do not get commissions from you buying Stealthwatch nor am I part of the Cisco Business Unit for Stealthwatch. I just really honestly and for realsies super love it.
I tossed together a ~31 minute YouTube. Obviously you can watch the entire thing. Or… here you go for the big sections.
In my previous blog (Fun in the Lab: FTDv & FMC – Install and Deploy) we deployed a FMC VM and a FTDv VM and ended the blog with the FTDv successfully added to the FMC.
Now? Now let’s add IP addressing for the FTDv and also set up routing protocol neighbor relationships. I learned what I am about to show you from my co-worker and friend, Keith Brister. So don’t thank me, thank Keith.
I tossed together a ~29 minute YouTube. Obviously you can watch the entire thing. Or… here you go for the big sections.
Done and Done. Easy Peasy!
This is my Stealthwatch playground…. errrr… I mean … ahem… “work environment” for a Technical Solution Workshop I am working on for Stealthwatch.
Going to set up FTDv and FMC today. A co-worker and friend, Scott Barasch, helped me get jump started… so figure I’ll pass on what I just learned to you.
What this blog will cover is
So let’s begin. What I have to host my FMC & FTDv VMs is a UCS M4 with a NIC connected to a Cat4948 in vlan 1. That NIC is tied to vSwitch0 in the UCS. Continue reading
June 28th… wow…. lol… my last blog out here was June 28th! Too funny! So where have I been and what have I been doing?
Well June was CiscoLive in the beginning and then SharkFest at the end. I think i hit some “being social” limit and became a hermit for most of July and August. Then 2 weeks of vacation for the first 2 weeks of September. Two full weeks. It was AWESOME! Then Florence came to visit… She hung around for a little while. Like one of those visitors who come stay with you at your house and just won’t leave. Oh.. and then breaking a finger September 15th and struggling to type for the rest of the month.
Hello! I’m BACK!
And I have REALLY missed being here! At the same time… that break was REALLY needed! Awesome summer with the wife and family! Woot woot! Work hard… play hard!
So what am I up to? Stealthwatch Baby! Woot woot! Been with Cisco for 22 years and I have NEVER loved a product and a GUI so Continue reading