Author Archives: The ASCII Construct
Author Archives: The ASCII Construct
In this post, we pull back the curtain on this new NXOS EVPN Hybrid mode and understand how it enables interoperability with Asymmetric VTEPs.
In this post, we’ll start designing the building blocks for our data center deployment with Juniper Apstra. We’ll look at how to design a rack.
With this post, we kick off a new series based on Juniper Apstra. This post serves as an introduction to Apstra - we’ll look at what a true IBN system is, how relational and graph databases are different (and why graph databases are ideal for network infrastructure), concluding with some general workflows in Apstra.
In this post, we deploy a multivendor EVPN L2 overlay fabric, with BGP in the underlay as well. The entire fabric deployment is automated with Ansible, and Containerlab is used to define and deploy the actual topology.
In this post, we look at BGP on Junos OS and a typical BGP configuration for the underlay, for a 3-stage Clos fabric. We also introduce BGP unnumbered, which is a great way of building the underlay, without the need of any IP addressing.
In this post, we look at how Containerlab can be used to quickly spin up vQFX topologies for network validation and testing. We’ll walk through the entire process - how to build docker images from vQFX images, what happens behind the scenes when bringing these containers up and how to build/verify your topology.
In this post, we take an introductory look at the operating system used in Juniper platforms, called Junos OS. This post serves as an introduction to the CLI. We also cover basic bridging.
In this post, we look at how an Access Point is onboarded in a SD-Access fabric.
In this post, we look at how a 9800-CL WLC is integrated into a SD-Access fabric.
In this post, we look at the various access point specific configurations that are pushed to a fabric-enabled WLC.
In this post, we will look at how to leverage SXP tunnels in ISE to achieve a specific use case.
In this post, we look at how SGACLs are pushed to NADs, with clear packet captures and packet walks. We also see how SGTs are added to the VXLAN header.
In this post, we look at microsegmentation in Cisco’s SD-Access fabric, using SGTs.
In this post, we will look at macro segmentation in Cisco’s SD-Access.
In this post, we will look at a peculiar case of a SGACL not denying traffic between two hosts in a SD-Access fabric.
In this post, we look at how to generate a Nornir network inventory from DNA-Center, using Python.
In this post, we look at why BSR and Auto-RP do not work with a SD-Access fabric.
In this post, we look at how a typical user gets authenticated and authorized in a SD-Access fabric.
In this post, we look at how an ARP packet flows within a SD-Access fabric.
In this post, we take a detailed look at the L2 handoff feature in Cisco’s SD-Access.