Archive

Category Archives for "Networking"

History Of Networking – Bob Hinden – IPv6

In this episode, Bob Hinden, credited as the co-inventor of IPv6, joins Network Collective to share his perspective on the creation of IPv6.

Bob Hinden
Guest
Russ White
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Bob Hinden – IPv6 appeared first on Network Collective.

Itential puts organizations on the path to the modern network

In the realm of enterprise computing, we have already automated the management and orchestration of software-defined compute and storage resources. Need another server or more storage capacity? Those virtual resources can be created in mere minutes — and without intervention from a human to initiate or manage the process.Need changes to the network, such as a router reconfiguration? Well, that’s going to take a lot of time and effort from a range of humans. Even something as simple as an update to a DNS or IPAM server can take three to five days to complete. A port turn-up can take just as long — not because any physical action takes that much time, but because the workflow of all the human reviews and approvals takes time.To read this article in full, please click here

Itential puts organizations on the path to the modern network

In the realm of enterprise computing, we have already automated the management and orchestration of software-defined compute and storage resources. Need another server or more storage capacity? Those virtual resources can be created in mere minutes — and without intervention from a human to initiate or manage the process.Need changes to the network, such as a router reconfiguration? Well, that’s going to take a lot of time and effort from a range of humans. Even something as simple as an update to a DNS or IPAM server can take three to five days to complete. A port turn-up can take just as long — not because any physical action takes that much time, but because the workflow of all the human reviews and approvals takes time.To read this article in full, please click here

Presenting To The D-Suite

Do you present to an audience? Odds are good that most of us have had to do it more than once in our life or career. Some of us do it rather often. And there’s no shortage of advice out there about how to present to an audience. A lot of it is aimed at people that are trying to speak to a general audience. Still more of it is designed as a primer on how to speak to executives, often from a sales pitch perspective. But, how do you present to the people that get stuff done? Instead of honing your skills for the C-Suite, let’s look at what it takes to present to the D-Suite.

1. No Problemo

If you’ve listened to a presentation aimed at execs any time recently, such as on Shark Tank or Dragon’s Den, you know all about The Problem. It’s a required part of every introduction. You need to present a huge problem that needs to be solved. You need to discuss why this problem is so important. Once you’ve got every head nodding, that’s when you jump in with your solution. You highlight why you are the only person that can do Continue reading

How to make the business case for SD-WAN

Entegra Bank, a fast-growing financial institution based in the Blue Ridge Mountains of North Carolina, switched from MPLS links for its 22 branches to SD-WAN-based broadband and slashed its WAN connectivity bill by 50%, while increasing bandwidth an average of fivefold.Loren Long, senior vice-president and CTO at the bank, says he had been eyeing both SD-WAN and broadband for some time, waiting for SD-WAN technology to mature and for rural broadband to improve in availability, dependability and security. After a positive experience with Silver Peak’s WAN optimization gear, “we felt confident to make that change,” he says.In a typical SD-WAN scenario, branch office broadband would connect directly to the public Internet. But since this a bank with heightened security and compliance responsibilities, traffic from the branches is backhauled over an encrypted VPN to internal gateways, where a third-party security services provider monitors all traffic and enforces security policies.To read this article in full, please click here

How to make the business case for SD-WAN

Entegra Bank, a fast-growing financial institution based in the Blue Ridge Mountains of North Carolina, switched from MPLS links for its 22 branches to SD-WAN-based broadband and slashed its WAN connectivity bill by 50%, while increasing bandwidth an average of fivefold.Loren Long, senior vice-president and CTO at the bank, says he had been eyeing both SD-WAN and broadband for some time, waiting for SD-WAN technology to mature and for rural broadband to improve in availability, dependability and security. After a positive experience with Silver Peak’s WAN optimization gear, “we felt confident to make that change,” he says.In a typical SD-WAN scenario, branch office broadband would connect directly to the public Internet. But since this a bank with heightened security and compliance responsibilities, traffic from the branches is backhauled over an encrypted VPN to internal gateways, where a third-party security services provider monitors all traffic and enforces security policies.To read this article in full, please click here

Using MPLS+EVPN in Data Center Fabrics

Here’s a question I got from someone attending the Building Next-Generation Data Center online course:

Cisco NCS5000 is positioned as a building block for a data center MPLS fabric – a leaf-and-spine fabric with MPLS and EVPN control plane. This raised a question regarding MPLS vs VXLAN: why would one choose to build an MPLS-based fabric instead of a VXLAN-based one assuming hardware costs are similar?

There’s a fundamental difference between MPLS- and VXLAN-based transport: the amount of coupling between edge and core devices.

Read more ...

Fun in the Lab: FTDv & FMC – Install and Deploy

This is my Stealthwatch playground…. errrr… I mean … ahem… “work environment” for a Technical Solution Workshop I am working on for Stealthwatch.

Going to set up FTDv and FMC today.  A co-worker and friend, Scott Barasch, helped me get jump started… so figure I’ll pass on what I just learned to you. ?

What this blog will cover is

  1. DEPLOY
    1. Deploying the OVF for FTDv
    2. Deploying the OVF for FMC
  2. VMware settings
    1. Tweak for FTDv
    2. Tweak for FMC
  3. Prepping to Power On
    1. Snapshot Both Before Power On
    2. Power Both On
  4. Setup via Console
    1. FMC – console in and setup IP address
    2. FTDv – console in and step thru the prompts
  5. Test IP Connectivity
    1. Ping FMC and FTDv from the PC
    2. Notice Can’t ping FTDv
    3. Fix
    4. Ping
  6. Browse into FMC
    1. Change password
    2. Setup DNS
    3. Setup NTP
    4. Accept EULA
    5. Apply
  7. LICENSING
    1. License FMC
  8. FMC/FTDv: Make the Connection
    1. FTDv – Point FTDv to FMC
    2. FMC – bring the FTDv into the fold.  ?

 

So let’s begin.  What I have to host my FMC & FTDv VMs is a UCS M4 with a NIC connected to a Cat4948 in vlan 1.  That NIC is tied to vSwitch0 in the UCS. Continue reading

BrandPost: Top Ten Reasons to Think Outside the Router – No. 9: Sub-par SaaS Performance

In the form of the iconic David Letterman Top Ten List segment from his former Late Show, Silver Peak is counting down the Top Ten Reasons to Think Outside the Router. Click here for the #10 reason to retire traditional routers at the branch.The #9 reason it’s time to retire traditional routers at the branch: Sub-par SaaS Performance! We often hear from customers that their employees complain that Salesforce.com (or Office365 or Workday or any of myriad SaaS apps) is more responsive from home or from Starbucks than from the branch office.To read this article in full, please click here

Use Cumulus HTTP API to Help Automate Common Network Tasks

Cumulus Linux includes a RESTful programming interface for accessing network devices running that OS. It’s called HTTP API, and it implements an API to access the OpenStack ML2 driver and Network Command Line Utility, or NCLU. Understanding exactly what this means, and how it works, is essential before digging into the possibilities it presents. Here’s an overview to get this going.

The OpenStack ML2 Driver

The ML2 Driver, a.k.a. (in OpenStack’s terms) the Modular Layer 2 neutron plug-in, provides a framework. It enables OpenStack-based networking to use a variety of Layer 2 networking technologies, including those from Cumulus (for which a specific ML2 driver is available and ready to use). To use the OpenStack ML2 driver with Cumulus Linux switches, two essential ingredients must be present:

  1. The REST API, which comes installed in Cumulus Linux. This includes an ML2 HTTP Server, which recognizes and responds to such requests. This runs on Cumulus-based network nodes to which management consoles or nodes will attach to interrogate, configure, or otherwise interact underlying devices.
  2.  Elsewhere on the network, the Cumulus ML2 Mechanism Driver should be installed on a VM or system running Cumulus Linux. This is called a “controller node.” Continue reading

IETF 103, Day 3: DNS Privacy, TLS & IoT

This week is IETF 103 in Bangkok, Thailand, and we’re bringing you daily blog posts highlighting the topics of interest to us in the ISOC Internet Technology Team. Wednesday is a relatively light day in this respect, although there’s some pretty important matters being discussed today.

DPRIVE kicks off the day at 09.00 UTC+9, and will mostly be discussing user perspectives with respect to the recently introduced implementations of DNS-over-TLS and DNS-over-HTTPS, as well as the issues of DNS privacy between resolvers and authoritative servers. There’s also a new draft up for discussion on DNS-over-TLS for insecure delegations that describe an alternative authentication mechanism without need for DNSSEC support.


NOTE: If you are unable to attend IETF 103 in person, there are multiple ways to participate remotely.


TLS holds its second session of the week immediately after lunch at 12.20 UTC+7. This will carry-on where it left off on Monday, although will be discussing a DANE Record and DNSSEC Authentication Chain Extension for TLS. The intention is to allow TLS clients to perform DANE authentication of a TLS server without needing to perform additional DNS record lookups.

Then at 13.50 UTC+7, Homenet will be focusing on Homenet Naming Continue reading

Intel responds to the Epyc server threat from AMD

I do love seeing the chip market get competitive again. Intel has formally announced a new class of Xeon Scalable processors, code-named “Cascade Lake-AP” or Cascade Lake Advanced Performance, that in many ways leapfrogs the best AMD has to offer.The news comes ahead of the Supercomputing 18 show and was likely done to avoid being drowned out in the upcoming news. It also comes one day ahead of an AMD announcement, which should be hitting the wires as you read this. I don’t think that’s a coincidence.The Cascade Lake-AP processors come with up to 48 cores and support for 12 channels of DDR4 memory, a big leap over the old design and a leap over AMD’s Epyc server processors, as well. Intel’s current top-of-the-line processor, the Xeon Platinum 8180, has only 28 cores and six memory channels, while the AMD Epyc has 32 cores and eight memory channels.To read this article in full, please click here

Intel responds to the Epyc server threat from AMD

I do love seeing the chip market get competitive again. Intel has formally announced a new class of Xeon Scalable processors, code-named “Cascade Lake-AP” or Cascade Lake Advanced Performance, that in many ways leapfrogs the best AMD has to offer.The news comes ahead of the Supercomputing 18 show and was likely done to avoid being drowned out in the upcoming news. It also comes one day ahead of an AMD announcement, which should be hitting the wires as you read this. I don’t think that’s a coincidence.The Cascade Lake-AP processors come with up to 48 cores and support for 12 channels of DDR4 memory, a big leap over the old design and a leap over AMD’s Epyc server processors, as well. Intel’s current top-of-the-line processor, the Xeon Platinum 8180, has only 28 cores and six memory channels, while the AMD Epyc has 32 cores and eight memory channels.To read this article in full, please click here