Archive

Category Archives for "Networking"

Revisiting – Why IGP sync with LDP is required ?

Hi All,

I was preparing some content on MPLS for a training session  and as a part of it, was going through LDP. The interesting aspect is very obvious

-> LDP is dependent on IGP

-> What ever Draw-backs IGP has will be inherited by LDP

-> LDP has to be enabled on the Interface to exchange Labels, else it wont consider the exit-interface from IGP and hence there will be no LSP’s

So far so good and makes sense as well

 

I will not be boring with command line outputs in this case

-> I have disabled the interface between R3/R4 so if R3 Has to reach R1, it will use R3-R2-R1 path

All good, Am going to just tweak the metric of the interface on R3 -> R2 before I enable back the R3 – R4

Now let me enabled the interface between R3-R4

-> It has a Better cost

-> It has not been enabled for LDP

 

 

If we go back to R3, to examine the result

This is dangerously familiar for me ? , There is a LDP neighbor, but No routes are present in Inet.3 (neither for R1 or R2) as Routes Continue reading

NetApp partners with Google for cloud-native file-storage service

NetApp is expanding its cloud data services range through a new partnership with Google that integrates NetApp’s flash-powered data services with Google’s cloud platform.Announced today, NetApp Cloud Volumes for Google Cloud Platform is a fully-managed storage service that's designed to make it easier for the companies' joint customers to run new and existing workloads in the cloud. The cloud-native file storage service links NetApp’s data services with Google Cloud’s application development, analytics and machine learning functions with a goal of speeding access to resources and simplifying management.[ Check out What is hybrid cloud computing and learn what you need to know about multi-cloud. | Get regularly scheduled insights by signing up for Network World newsletters. ] At the same time, NetApp rolled out a new high-end enterprise all-flash storage array and updated its ONTAP enterprise data management software. Software advances target increased data retention compliance, and new machine learning-driven analytics are aimed at reducing capacity costs. To read this article in full, please click here

16 Blockchain Disruptions

I am more than happy to publish the new infographic "16 Blockchain Disruptions" with the help of my friends from bitfortune.net.  As we know, blockchain enables decentralized transactions across a P2P network. The infographic lists 16 different industries that benefits from using the blockchain technology. Enjoy reading.

 

16 Blockchain Disruptions

I am more than happy to publish the new infographic "16 Blockchain Disruptions" with the help of my friends from bitfortune.net.  As we know, blockchain enables decentralized transactions across a P2P network. The infographic lists 16 different industries that benefits from using the blockchain technology. Enjoy reading.

 

Getting grounded in IoT networking and security

download Getting grounded in IoT networking and security The internet of things already consists of nearly triple the number of devices as there are people in the world, and as more and more of these devices creep into enterprise networks it’s important to understand their requirements and how they differ from other IT gear.To read this article in full, please click here

Getting grounded in IoT networking and security

download Getting grounded in IoT networking and security The internet of things already consists of nearly triple the number of devices as there are people in the world, and as more and more of these devices creep into enterprise networks it’s important to understand their requirements and how they differ from other IT gear.To read this article in full, please click here

Getting grounded in IoT networking and security

download Getting grounded in IoT networking and security The internet of things already consists of nearly triple the number of devices as there are people in the world, and as more and more of these devices creep into enterprise networks it’s important to understand their requirements and how they differ from other IT gear.To read this article in full, please click here

Please don’t register to South Africa/Johannesburg CCDE Class, it is full !

Hi Everyone,   I would like to inform you that Instructor Led CCDE Class in South Africa/Johannesburg Training is full. So please don’t register for it.   Having more people will reduce the time required for discussions. Those who attended any of my earlier class know that we have already very packed agenda, approximately 2000 […]

The post Please don’t register to South Africa/Johannesburg CCDE Class, it is full ! appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Please don’t register to South Africa/Johannesburg CCDE Class, it is full !

Hi Everyone,   I would like to inform you that Instructor Led CCDE Class in South Africa/Johannesburg Training is full. So please don’t register for it.   Having more people will reduce the time required for discussions. Those who attended any of my earlier class know that we have already very packed agenda, approximately 2000 …

The post Please don’t register to South Africa/Johannesburg CCDE Class, it is full ! appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Please don’t register to South Africa/Johannesburg CCDE Class, it is full !

Hi Everyone,   I would like to inform you that Instructor Led CCDE Class in South Africa/Johannesburg Training is full. So please don’t register for it.   Having more people will reduce the time required for discussions. Those who attended any of my earlier class know that we have already very packed agenda, approximately 2000 …

The post Please don’t register to South Africa/Johannesburg CCDE Class, it is full ! appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Different IGP and BGP Methodologies of Multi National Service Providers

Different IGP and BGP Methodologies of Multi National Service Providers. I mentioned two different IGP and BGP design approaches for two different Multi National Service Providers in my last CCDE course   Both are these operators in Africa and one of them has an operation in 4 and another has an operation in 5 countries.   […]

The post Different IGP and BGP Methodologies of Multi National Service Providers appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Different IGP and BGP Methodologies of Multi National Service Providers

Different IGP and BGP Methodologies of Multi National Service Providers. I mentioned two different IGP and BGP design approaches for two different Multi National Service Providers in my last CCDE course   Both are these operators in Africa and one of them has an operation in 4 and another has an operation in 5 countries.   …

The post Different IGP and BGP Methodologies of Multi National Service Providers appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Different IGP and BGP Methodologies of Multi National Service Providers

Different IGP and BGP Methodologies of Multi National Service Providers. I mentioned two different IGP and BGP design approaches for two different Multi National Service Providers in my last CCDE course   Both are these operators in Africa and one of them has an operation in 4 and another has an operation in 5 countries.   …

The post Different IGP and BGP Methodologies of Multi National Service Providers appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Validating SGT Inline with Netflow and Embedded Packet Capture

In the last article, Learning TrustSec, An Introduction to Inline Tagging, we took a quick look at manual configuration of SGT Inline Tagging in a manual configuration. We also performed some validation with show commands and proved the operation by enabling enforcement.

In today’s article, we will perform slightly deeper validation of the inline imposition itself. For this process, we will use Netflow and Embedded Packet Capture. I happen to know that there is already EIGRP traversing the link that will help produce some output. Let’s just jump right in with a very basic Netflow configuration.

Netflow Configuration

//you could additionally configure and exporter
//if there is a proper netflow collector

flow record my_record_output
 match flow cts source group-tag
 match flow cts destination group-tag
 match ipv4 source address
 match ipv4 destination address
 match ipv4 protocol
 match transport source-port
 match transport destination-port
flow monitor my_monitor_output
 record my_record_output
!
interface GigabitEthernet1/0/1
 description trunk to c9kSW2
 switchport mode trunk
 ip flow monitor my_monitor_output output
 cts manual
  policy static sgt 100 trusted

Verification Using Netflow

c9kSW1#show flow monitor my_monitor_output cache
  Cache type:                               Normal (Platform cache)
  Cache size:                                10000
  Current entries:                               1

  Flows added:                                   9
  Flows aged:                                    8
    - Active timeout      (  1800 secs)          2
    -  Continue reading