Archive

Category Archives for "Packet Pushers Podcast"

Link Propagation 116

Welcome to Link Propagation, a Packet Pushers newsletter. Link Propagation is included in your free membership. Each week we scour the InterWebs to find the most relevant practitioner blog posts, tech news, and product announcements. We drink from the fire hose so you can sip from a coffee cup. Blogs WISP Design – Building Highly […]

Show 387: AWS Networking – A View From The Inside

In this episode of Packet Pushers, it’s AWS networking. You use AWS and think you know what you need to know? Maybe, but our guest today can probably share a thing or two you didn t even know were things when it comes to networking in the Amazon public cloud.

Our guest is Nick Matthews, Principal Solutions Architect at Amazon Web Services. Nick focuses on networking and security.

Nick pinged us, hoping to share  his perspective on cloud networking from the inside. Come and have a look.

We talk about how networking basics do–and don’t–map to the cloud, and how the architecture of cloud applications influence network design and operations.

We also explore AWS networking elements under the hood, such as Hyperplane, and how trends such as SD-WAN and SDN influence Amazon networking.

Show Links:

AWS re:Invent 2015 | (NET403) Another Day, Another Billion Packets – Amazon (via YouTube): Eric Brandwine talks about how Amazon’s overlay network works in detail.

AWS re:Invent 2017: Another Day, Another Billion Flows (NET405) – Amazon (via YouTube): Colm MacCarthaigh talks about how AWS Hyperplane works.

Introducing the AWS Networking Competency – AWS

Firewall Deployment Continue reading

PQ 147: Connecting Security And GDPR Compliance (Sponsored)

On this episode of Priority Queue, which is sponsored today by Cisco, we tackle the General Data Protection Regulation, or GDPR.

This new regulation lays out data privacy and protection obligations for organizations that handle data of EU citizens, including loss prevention, breach notification requirements, and serious fines and penalties for violations.

We delve into GDPR requirements with Equilibrium Security and ePlus/IGX Global, two Cisco partners who share practical insight and advice for dealing with GDPR.

Our guests are Anish Chauhan, Director at Equilibrium Security; and Alex Goldstein, Security Architect at ePlus/IGX Global.

We’ll discuss how to break down and understand requirements, the importance of a risk assessment and gap analysis, and how to use security and management tools to comply with the regulations.

Show Links:

General Data Protection Regulation (GDPR) – Cisco

Equilibrium Cyber Security Services

Equilibrium on Twitter

Equilibrium Cyber Security Podcasts – Equilibrium

IGX Global

2017 DBIR: Understand Your Cybersecurity Threats – Verizon Enterprise Solutions

Cisco Encrypted Traffic Analytics – Cisco

The post PQ 147: Connecting Security And GDPR Compliance (Sponsored) appeared first on Packet Pushers.

Datanauts 131: Masters And Mentorship

Today on the Datanauts podcast, we land on planet Mentorship to drive around in our exploratory rovers. Why? Mentoring came up on Twitter a while back.

Some of you are for it. You invest in your co-workers and your organization by sharing with others what you know. Some of you are against mentoring, arguing that you don t have the time and aren t getting paid to teach other people.

And then the Twitterverse connected us to Don Jones, who wrote a book called, Be The Master. Seems like a great excuse to fire up the microphone on our rovers and explore planet Mentorship in more detail.

Besides being an author, Don is an an IT pro and PowerShell expert who has created a variety of PowerShell training materials.

We talk about how a master/apprenticeship approach can be more effective than formal education, selfish reasons for being a mentor, how to address imposter syndrome, and how to get support for mentorship at work.

Show Links:

Don Jones.com

Be The Master.com

Don Jones on Twitter

Become The Master Or Go Away – Don Jones.com

Be the Master with Don Jones – RunAsRadio

The post Datanauts 131: Masters Continue reading

Network Break 181: Russia Accused Of Infrastructure Attacks; US Targets ZTE

Take a Network Break! The US and British governments have accused Russian state actors of compromising routers and other network infrastructure, the United States forbids American companies from selling components to Chinese telecom firm ZTE, and Huawei rethinks its US strategy.

Cisco releases notes on its 9500 switches and UADP silicon, IBM releases a mainframe that takes the same space as a traditional 19-inch server rack, and VMware shares rise on rumors that Dell won’t reverse-merge with it.

Arista’s share price stumbles, and then recovers; Cisco ditches the Spark brand name; a Cisco security exec says we’re all screwed; and the United States is the leading source of botnet attacks in the world.

Find links to all these stories just after our sponsor message.

Sponsor: InterOptic

InterOptic offers high-performance, high-quality optics at a fraction of the cost. Find out more at InterOptic.com, and if you re attending Interop 2018 in Vegas, stop by the InterOptic booth to learn how they can help you spec the right optics for your network.

Show Links:

Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices – US-CERT

Huawei, Failing to Crack U.S. Market, Signals a Change in Tactics – The New York Times

Continue reading

Link Propagation 115

Welcome to Link Propagation, a Packet Pushers newsletter. Link Propagation is included in your free membership. Each week we scour the InterWebs to find the most relevant practitioner blog posts, tech news, and product announcements. We drink from the fire hose so you can sip from a coffee cup. Blogs On Old Configs and Automation […]

Show 386: Building Trusted Network Infrastructure With IOS XR (Sponsored)

If you were a black hat hacker considering targets of opportunity, a service provider network might seem very interesting. The infrastructure is critical for commerce and governmental operations. The data carried is potentially interesting and valuable. And indeed, we know that carrier networks are highly targeted.

In this sponsored show with Cisco, we discuss how to think deeply about security on mission critical networks and protecting routers and other devices not behind a firewall.

That means making certain that the network operating system is running exactly the code we think it is. That the devices on the network are devices we know and can trust. And then once we ve secured the network, how we can use it as a platform to deliver additional security services.

Our guests are Dan Backman and Kaarthik Sivakumar of Cisco. Dan is a Technical Marketing Engineer on the Service Provider team, and Kaarthik is a Security Architect for IOS XR Engineering.

We discuss the general risks service providers face and why trusted network devices are essential. Then we dive into technical details on how Cisco protects IOS XR, including the Trust Anchor Module, how to audit trusted networks, and how to build Continue reading

PQ 146: Practical Python For Deploying BFD

Today on the Priority Queue, some practical Python for network engineers.

My guest is Billy Downing, and we walk through an example of how to use Python to deploy BFD, or Bidirectional Forwarding Detection.

We start by describing BFD and how it works, and then explore how to use Python to make it go in your network.

Billy is a data center engineer who works for the Department of Defense. Check out his blog at NetworkTechStudy.com.

Show Links:

NetworkTechStudy.com – Billy Downing’s blog

Learning Python from a Network Engineer’s Perspective – NetworkTechStudy.com

Bidirectional Forwarding Detection (BFD) – IETF

The post PQ 146: Practical Python For Deploying BFD appeared first on Packet Pushers.

FreeZTP: Zero-Touch Provisioning for Cisco Catalyst

Configuring Cisco IOS switches the “old-fashioned” way can be a time consuming and tedious task. Pull out the serial cable and USB adapter, connect your laptop to the switch, and sit on the cold raised floor banging away at the keyboard until you have remote access and can escape to a more terran-friendly environment. There […]

Datanauts 130: The Good, Bad And Ugly Of The VAR Life

If you work for a Value Added Reseller (VAR) as an engineer, the value being added is YOU.

What is VAR life? Projects, customer meetings, deadlines, bills of materials, RFP responses, and trying to turn the promises of sales unicorns into an actual design you can install for the customer.

We’ve worked for VARs at one time or another, as has our guest Eric Gullickson, who is now Enterprise Architect at Vortex Optics. We thought we d run down the good, the bad, and the ugly of the VAR life on this episode of the Datanauts podcast.

We start the show by distinguishing the different roles a VAR can have. Then we dive into the good, which includes access to new technology, paid certifications, a flexible work schedule, and exposure to a wide variety of businesses and operating environments.

For the bad, the Datanauts and Eric discuss the blunt reality that you have to generate profit, and you may find yourself having to navigate the competing interests of manufacturers, sales, distributors, and customers.

On the ugly side, we swap stories about greasy salespeople, bad project management, and other nightmares.

Show Links:

Eric Gullickson.com

Eric Gullickson on Twitter

The Continue reading

Network Break 180: Tetration In The Cloud; Attackers Target Cisco Switches

Take a Network Break! Cisco puts its Tetration workload protection product into the cloud by announcing a SaaS version, and attackers target Cisco’s Smart Install feature on the IOS and IOS XE operating systems.

Juniper aims to entice service providers by integrating telemetry, AppFormix, and its NorthStar WAN SDN controller for improved remediation, HPE acquires a cloud consultancy, and Riverbed CEO and cofounder Jerry Kennelly retires.

Cradlepoint partners with Webroot for secure SD-WAN, an activist investor target MicroFocus to go private, and cryptomining attacks increasingly target the enterprise.

Last but not least, Gartner predicts explosive cloud growth, and IDC says lines of business will outspend IT departments on technology.

Sponsor: ThousandEyes

ThousandEyes gives you performance visibility from every user to every app over any network, both internal and external, so you can smoothly migrate to the cloud, transform your WAN, troubleshoot faster and deliver exceptional user experiences. Sign up for a free account at thousandeyes.com/packetpushers and choose a free ThousandEyes t-shirt.

Show Links:

Cisco Tetration Now Available As A Cloud Service And Virtual Appliance – Packet Pushers

Cyber-Espionage Groups Are Increasingly Leveraging Routers in Their Attacks – Bleeping Computer

Attackers Exploit Cisco Switch Issue as Vendor Warns of Yet Continue reading

PQ 145: Greg And Ivan Have A Chat

In the ten or so years I ve been blogging, Ivan Pepelnjak has been constant figure in the tech industry. His prolific blogging and sharing of knowledge is one of the inspirations for my own entry into blogging. Over the years, we have usually agreed violently on most things and disagreed on others.

His ipSpace website has grown from a blog into a membership and more recently into a consulting service.

On today’s Priority Queue, Ivan and I talk about automation, intent, product quality and what can be done to improve it, the direction private clouds might take, and whatever else catches our fancy.

Sponsor: Paessler AG

Paessler AG is the maker of PRTG Network Monitor. PRTG monitors your whole IT infrastructure 24/7 and alerts you to problems before users even notice. Find out more about the monitoring software that helps system administrators work smarter, faster, better. Visit paessler.com today.

Show Links:

IPSpace.net

Blog.ipspace.net

Ivan Pepelnjak on Twitter

The post PQ 145: Greg And Ivan Have A Chat appeared first on Packet Pushers.