In this episode, Avaya comes on board to talk about new and efficient ways to design data centers. They bring a couple of customers along to discuss their implementations: Fujitsu Technology Solutions and the Sochi 2014 Olympic Winter Games. Speaking with host Greg Ferro are Paul Unbehagen, Chief Architect for Avaya Networking; Albert Knoll, Network […]
The post Show 179 – Avaya Efficient Data Center Design at Fujitsu & the Sochi 2014 Winter Games appeared first on Packet Pushers Podcast and was written by Ethan Banks.
This is “The Coffee Break”. A podcast on state of the networking business where we discuss vendors moves and news, analysis on product and positioning, and look at the business of networking. In the time it takes to have a coffee break.
The post Coffee Break – Show 2 appeared first on Packet Pushers Podcast and was written by Greg Ferro.
This is “The Coffee Break”. A podcast on state of the networking business where we discuss vendors moves and news, analysis on product and positioning, and look at the business of networking. In the time it takes to have a coffee break.
The post Coffee Break – Show 2 appeared first on Packet Pushers.
This is “The Coffee Break”. A podcast on state of the networking business where we discuss vendors moves and news, analysis on product and positioning, and look at the business of networking. In the time it takes to have a coffee break.
Anybody annoyed enough with massive NTP monlist floods over the weekend? If you did like I did, I believe what immediately came to your mind was, “this shouldn’t have happened if they just had put a ‘default ignore’ line in their ntp.conf file!” But unfortunately there are some people who’re not like you, including casual […]
The post One-liner iptables rule to Filter NTP Reflection on Linux Hypervisor appeared first on Packet Pushers Podcast and was written by Tamihiro Yuzawa.
Network operators – service providers, enterprises, engineers, architects, data-centers, campuses, etc. – are responsible for keeping the packets flowing across their network(s). The Internet Engineering Task Force (IETF) designs, develops, and documents the standard protocols network operators use in and on their networks. In a perfect world, operators would be part of the IETF process […]
In Part 1 we saw we can mark prefixes in CEF with certain attributes that might give us interesting things to play with. In Part 2 we found we could track traffic patterns with the traffic_index tag. We will now turn our attention to the qos-group parameters. Let’s say we would like four categories of […]
The post CEF Secret Attributes, Part 3 appeared first on Packet Pushers Podcast and was written by Dan Massameno.
Deploying OpenStack Ken Pepple OpenStack is a wide ranging initiative started by Rackspace and NASA in 2010 designed to provide open source software to build and manage IaaS cloud services. What’s often missing in open source projects like OpenStack is a definitive guide to the release schedule, the different pieces, how the different pieces interact, […]
This is “The Coffee Break”. A podcast on state of the networking business where we discuss vendors moves and news, analysis on product and positioning, and look at the business of networking. It's like a soundtrack for the network industry.
In the time it takes to have coffee break. Or so.
The post The Coffee Break – Show 1 appeared first on Packet Pushers Podcast and was written by Greg Ferro.
This is “The Coffee Break”. A podcast on state of the networking business where we discuss vendors moves and news, analysis on product and positioning, and look at the business of networking. It's like a soundtrack for the network industry.
In the time it takes to have coffee break. Or so.
The post The Coffee Break – Show 1 appeared first on Packet Pushers.
The number of overlay technologies available today for the datacenter are numerous and highly functional. The flexibility they provide enables security zone enforcement and physical portability of hosts more seamlessly (among other benefits). However, a few risks in deploying popular layer 2 overlay technologies are vendor-lockdown, scalability, specialized hardware required to mitigate bottleneck points, and […]
The post Using VRFs to maintain security zones in an Layer 3 datacenter network appeared first on Packet Pushers Podcast and was written by Paul Zugnoni.
A place for anyone to start a podcast with the Packet Pushers.
The post Introducing Community Channel – Insert Your Podcast Here appeared first on Packet Pushers Podcast and was written by Greg Ferro.
A place for anyone to start a podcast with the Packet Pushers.
The post Introducing Community Channel – Insert Your Podcast Here appeared first on Packet Pushers.
Cisco Nexus 1000V virtual switch for Microsoft Hyper-V and integrates with your existing Nexus 1000V deployment. In this episode we talk with Appaji Malla and Balaji Sivasubramanian from the Hyper-V Product team on the architecture of the product and platform.
The post Show 178 – Cisco Nexus 1000v and Microsoft Hyper-V appeared first on Packet Pushers Podcast and was written by Greg Ferro.
Cloud Architecture Patterns Bill Wilder Networks support applications. Okay, that might seem a little obvious, but it needs to be said from time to time. In that vein, I often find it useful to get a better grip on the applications people are putting on networks, and how they expect the network to behave. In […]
In this article we are going to see two features that improve the load-balancing in the MLPS Core. Why? In the networking when dealing with redundancy of links or paths we are facing the polarization issue. This problem happens when one of the link is congested. Let’s take the example of LAGs, if the hashing […]
The post FAT or Entropy Label? appeared first on Packet Pushers Podcast and was written by Youssef El Fathi.
The Internet has a trust problem. With the recent revelations of government surveillance, traffic interception and modification, compromised products, and suspect algorithms, we have serious problems. Greg and Ethan spoke to this briefly on Show 175 regarding the pwning of several firewall products by the NSA, but the issue goes much further than just compromised […]
The post Restoring Trust in the Internet – Part 1 appeared first on Packet Pushers Podcast and was written by Jonathan Strine.
A couple of times in the past month I’ve been asked where a SSL VPN appliance should be deployed in relation to the firewall. In both cases it was relating to the Juniper Secure Access / MAG platform, but best practice should apply equally to any IPSEC or SSL VPN platform, so I thought it […]
The post One leg too few? Architectural Best Practice on SSL VPNs appeared first on Packet Pushers Podcast and was written by Glen Kemp.
More Engineers talking about their day-to-day problems. We found Justin Seabrook Rocha and Shawn McGuire lurking in the #PacketPushers ITC channel complaining about stuff. Now they are doing it in front to a microphone. Bring the real world to your real world. Guests Shawn McGuire bigbash on the #Packetpushers channel on irc.freenode.net Twitter : @mcguiresm Blog: http://8bitsbytes.com […]
The post Show 177 – Current Practices appeared first on Packet Pushers Podcast and was written by Greg Ferro.