Archive

Category Archives for "Networking"

Off the Cuff – NFD17 Wrap Up

Networking Field Day 17 (NFD17) was in Silicon Valley last week, with two of our co-founders participating as delegates – but the conversation doesn’t have to stop there. In this Off The Cuff episode of Network Collective, we’ve gathered a few of the delegates from the event to talk about their impressions on the information that was presented and some of the broader themes they experienced across the presentations. Vendors at the invent included Cisco, Cumulus, Extreme, Ixia, Juniper, Mellanox, Thousand Eyes, and VMware.

You can check out the event and see the presentations for yourself over at the Event Page at techfieldday.com.

Nick Buraglio
Guest
Drew Conry-Murray
Guest
John Herbert
Guest

Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Off the Cuff – NFD17 Wrap Up appeared first on Network Collective.

Cisco unveils container management on HyperFlex

Cisco continued its HCI momentum this week, announcing at Cisco Live its new Cisco Container Platform (CCP), which runs on its HyperFlex hyperconverged infrastructure (HCI) solution. This news follows last week’s HyperFlex 3.0 release and acquisition of Skyport. One of the key themes of Cisco Live was the need for businesses to be more agile and move faster. Businesses want to modernize the infrastructure to meet the changing demands on IT, and they are adopting the DevOps model. Along with that, containers have grown in popularity, as the lightweight nature of them makes them ideal for organizations that have embraced the concepts of DevOps.To read this article in full, please click here

Rehashing Certifications

While at Cisco Live in Barcelona this week, I had a chat with someone—I don’t remember who—about certifications. The main point that came out of the conversation was this:

One of the big dangers with chasing a certification is you will end up chasing knowledge about using a particular vendor feature set, rather than chasing knowledge about a technology.

At some point I’m going to edit a post a video short on engineering versus meta-engineering (no, it won’t be next week), but the danger is real. For instance, in an article I’ve had in my bookmarks pile for a long while, the author says—

My boss advised me that getting my WPCE (WordPerfect Certified Resource) cert would accomplish two things: 1. It would establish my credibility as a trainer; and 2. If I didn’t know a feature before the test, I sure as heck would afterward.

I’m not going to name the author, because this is his description of thinking through a certification many years ago, rather than his current thinking on certifications—but the example is telling. I know a lot of folks studying for certifications. They mostly spend their time labbing up various protocols and… features. The temptation to Continue reading

Cloudflare Workers is now on Open Beta

Cloudflare Workers is now on Open Beta

Cloudflare Workers Beta is now open!

Cloudflare Workers lets you run JavaScript on Cloudflare’s edge, deploying globally to over 120+ data centers around the world in less than 30 seconds. Your code can intercept and modify any request made to your website, make outbound requests to any URL on the Internet, and replace much of what you might need to configure your CDN to do today. Even better, it will do this from all our edge locations around the world, closer to many of your users than your origin servers can ever be. You will have a fully functional Turing-complete language in your fingertips which will allow you to build powerful applications on the edge. The only limit is your imagination.

Cloudflare Workers is now on Open Beta

To get started:

  • Sign in to your account on cloudflare.com.
  • Visit the Workers tab.
  • Launch the editor.
  • Write some code and save it.
  • Go to the routes tab and prescribe on what requests you want to run Workers for

That’s it!

You can start by writing a simple ‘hello world’ script, but chances are that you are going write Workers that are more complicated. You can check out our page with recipes to:

BrandPost: Should We Virtualize Functions or Virtualize Networks?

I gave a keynote presentation at MEF and answered two questions that I’m commonly asked: What’s next after SD-WAN? What’s the relationship between SD-WAN and NFV? If you’ve read my previous blogs, you can probably guess my answer to the first question. I believe the software-defined WAN must evolve into the self-driving WAN. By augmenting automation with machine learning and AI, we can build WANs that dynamically translate business intent into action, with central orchestration working in tandem with the WAN edge. For this blog, I will focus on answering the second question.To read this article in full, please click here

Enterprise Network on GNS3 – Part 6 – Edge Router and ISPs

This is the sixth article from the series of the articles discussing the configuration of an entire enterprise network. The article explains the configuration of the edge router vIOS-EDGE-I and configuration of ISP routers.  Now let's say few words about the router vIOS-EDGE-I. The router is Cisco IOSv Qemu appliance, version 15.6(2)T. It has assigned 512MB RAM by GNS3. The router connects all three parts of the company network to the Internet. These parts are the the campus network, data center and DMZ.

Picture 1 - Company Connection to the Internet via vIOS-EDGE-I

The company has assigned the prefix 195.1.1.0/24. Devices located in DMZ have assigned the prefix 195.1.1.128/25. The prefix 195.1.1.0/25 is assigned for devices hidden behind NAT. NAT is configured on vIOS-EDGE-I router, translating campus and data center subnets to the subnet 195.1.1.128/25. The router is connected to the upstream providers via their Ethernet ports Gi0/1 and Gi0/3. This is a single multi homed topology when a company is connected to two upstream providers with a single edge router. The entire prefix 195.1.1.0/24 is advertised to the both ISPs via BGP routing protocol. Continue reading

Enterprise Network on GNS3 – Part 6 – Edge Router and ISPs

This is the sixth article from the series of the articles discussing the configuration of an entire enterprise network. The article explains the configuration of the edge router vIOS-EDGE-I and configuration of ISP routers.  Now let's say few words about the router vIOS-EDGE-I. The router is Cisco IOSv Qemu appliance, version 15.6(2)T. It has assigned 512MB RAM by GNS3. The router connects all three parts of the company network to the Internet. These parts are the the campus network, data center and DMZ.

Picture 1 - Company Connection to the Internet via vIOS-EDGE-I

The company has assigned the prefix 195.1.1.0/24. Devices located in DMZ have assigned the prefix 195.1.1.128/25. The prefix 195.1.1.0/25 is assigned for devices hidden behind NAT. NAT is configured on vIOS-EDGE-I router, translating campus and data center subnets to the subnet 195.1.1.128/25. The router is connected to the upstream providers via their Ethernet ports Gi0/1 and Gi0/3. This is a single multi homed topology when a company is connected to two upstream providers with a single edge router. The entire prefix 195.1.1.0/24 is advertised to the both ISPs via BGP routing protocol. Continue reading

How to eliminate the default route for greater security

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default?Part of the reason is that many enterprises use an internet perimeter firewall performing port address translation (PAT) with a default policy that allows access the internet, a solution that leaves open a possible path by which attackers can breach security.+Also on Network World: IPv6 deployment guide; What is edge computing and how it’s changing the network?+To read this article in full, please click here(Insider Story)