Archive

Category Archives for "Packet Pushers Podcast"

Juniper’s Conscious Uncoupling Of Junos & The QFX5200

Juniper plans to disaggregate its Junos switch OS from the new QFX5200 switches. The QFX5200 line will be the first from Juniper that lets customers choose to run Junos or a third-party network OS. Junos will also run on non-Juniper hardware. Juniper hasn't yet announced third-party partners.

The post Juniper’s Conscious Uncoupling Of Junos & The QFX5200 appeared first on Packet Pushers.

Juniper’s Conscious Uncoupling Of Junos & The QFX5200

Juniper plans to disaggregate its Junos switch OS from the new QFX5200 switches. The QFX5200 line will be the first from Juniper that lets customers choose to run Junos or a third-party network OS. Junos will also run on non-Juniper hardware. Juniper hasn't yet announced third-party partners.

The post Juniper’s Conscious Uncoupling Of Junos & The QFX5200 appeared first on Packet Pushers.

Risky Business #391 — Dell fails hard

On this week's show we're chatting with Darren Kemp of Duo Security. He's one of the authors of a post about the latest example of computer manufacturer shitware introducing catastrophic vulnerabilities into shipped systems. This time it's Dell's turn.

If you haven't heard what they actually did you'll hardly even believe it. That's this week's feature interview.

read more

FlexVPN configuration

In this post we’ll have a look at the process of configuring a FlexVPN network (unofficially known as DMVPN phase 4). I’ll show what components are involved in configuration and how they all tie together. For most patient readers there’s a bonus at the end of this post. FlexVPN network topology The network we’ll be looking at is […]

The post FlexVPN configuration appeared first on Packet Pushers.

Show 264: Design & Build 8: NSX Deployment

NSX has become a popular option for data center network virtualization. If you do choose to go with NSX, what should you be thinking about? Our focus for today's show is what to consider when designing an NSX implementation, why planning is so essential, and what will change operationally once NSX is in production.

The post Show 264: Design & Build 8: NSX Deployment appeared first on Packet Pushers.

Risky Business #390 — Crypto derpery abounds in wake of Paris attacks

In this week's feature interview we're checking in with FireEye's Jonathan Wrolstad. He's a threat intelligence guy at FireEye and they've just published a really interesting report about what a threat group is doing in terms of target recon. They're using marketing company tricks to recon all sorts of high value targets. It's very interesting stuff, and it's likely tied to the Russian state.

read more