Archive

Category Archives for "Networking"

The State of the Net Today – Why we must Act now for its Future

At the Internet Society, we are worried about the state of the Internet today. This global “network of networks” is now a critical part of our daily lives. We use it to communicate and connect with our families, friends, co-workers and customers. It is the engine that powers the global economy. It is our source of entertainment, of education, and of information. The Internet brings so many opportunities to all.

But… those opportunities are now under attack from several threats:

  • Lack of trust – We now find ourselves asking key questions: how can we trust that the information we see online is accurate? How do we know we are communicating with the correct people?
  • Security of the core of the Internet – The core infrastructure that creates the network of networks is now under constant attacks. Botnets, DDoS attacks, routing attacks – the public core of the Internet needs protection.
  • The explosion of connected devices – We are connecting almost everything to the Internet, and this “Internet of Things (IoT)” is being largely connected with little concern for security.
  • The growing divide between the connected and unconnected – Over 40% of the world’s people are not connected to the Internet, Continue reading

We Just Added a New Google Cloud Platform Course to Our Video Library

Last week we added another Google Cloud Platform Course to our video Library. You can find this course, Google Cloud Platform: Networking Fundamentals, on our All Access Pass streaming site and also at ine.com.

 

Why You Should Take This Course:

Google Cloud Platform enables developers to build, test and deploy applications on Googles highly-scalable, secure, and reliable infrastructure.

 

About the Course:

This course covers specifically Google Cloud Platform Networking services. We will review the features and functions of Google Cloud Platform Networking Services so that you will understand the GCP options available.

We will also dive into GCP Networking fundamentals such as Software Defined Networking, Load Balancing, Autoscaling and Virtual Private Clouds. As an added bonus, we will also dive into identity and access management from a networking security perspective.

This course is taught by Joseph Holbrook and is 3 hours and 51 minutes long.

 

What You’ll Learn:

After taking this class students will understand what GCP Cloud services will enable their organization around networking services. Whether you’re a developer or architect, this course will help you understand the basic capabilities and some of the useful advanced features of GCP networking services and features.

 

About Continue reading

Learning to Ask Questions

A lot of folks ask me about learning theory—they don’t have the time for it, or they don’t understand why they should. This video is in answer to that question.

Use YANG Data Models to Configure Network Device with Ansible

It took years after NETCONF RFCs were published before IETF standardized YANG. It took another half-decade before they could agree on how to enable or disable an interface, set interface description, or read interface counters. A few more years passed by, and finally some vendors implemented some of the IETF or OpenConfig YANG data models (with one notable exception).

Now that we have the standardized structure, it’s easy to build automated multi-vendor networks, right? Not so fast…

Read more ...

New Role, Same Goal

I recently gave a presentation at Network Field Day 17 wherein I announced that not only was I about to give probably the most compressed talk of my life (time constraints are unforgiving) but that I also was now working for Juniper. Until today, this was pretty much the most explanation I had time to give:

I decided to accept a position with Juniper over the 2017 holiday, and I started last week. There were a few reasons for moving on from the StackStorm team, some of which are personal and have nothing to do with either day job. Despite the move, all of these things are still true:

  • StackStorm is and continues to be an awesome project. Regular updates are happening all the time, each full of tons of new features and fixes.
  • The StackStorm team and Extreme Networks as a whole are some of my favorite people ever. I will never forget everything I learned from them, and will try my best to stay in contact with all of them.
  • The concepts behind StackStorm, such as infrastructure-as-code, and autonomous response to events, are still top-of-mind for me. I still strongly believe that each of these concepts are Continue reading

New Role, Same Goal

I recently gave a presentation at Network Field Day 17 wherein I announced that not only was I about to give probably the most compressed talk of my life (time constraints are unforgiving) but that I also was now working for Juniper. Until today, this was pretty much the most explanation I had time to give:

I decided to accept a position with Juniper over the 2017 holiday, and I started last week. There were a few reasons for moving on from the StackStorm team, some of which are personal and have nothing to do with either day job. Despite the move, all of these things are still true:

  • StackStorm is and continues to be an awesome project. Regular updates are happening all the time, each full of tons of new features and fixes.
  • The StackStorm team and Extreme Networks as a whole are some of my favorite people ever. I will never forget everything I learned from them, and will try my best to stay in contact with all of them.
  • The concepts behind StackStorm, such as infrastructure-as-code, and autonomous response to events, are still top-of-mind for me. I still strongly believe that each of these concepts are Continue reading

New Role, Same Goal

I recently gave a presentation at Network Field Day 17 wherein I announced that not only was I about to give probably the most compressed talk of my life (time constraints are unforgiving) but that I also was now working for Juniper. Until today, this was pretty much the most explanation I had time to give: I decided to accept a position with Juniper over the 2017 holiday, and I started last week.

BGP design options for EVPN in Data Center Fabrics

Ivan Pepelnjak described his views regarding BGP design options for EVPN-based Data Center Fabrics in this article. In comments to following blog post we briefly discussed sanity of eBGP underlay + iBGP overlay design option and come to conclusion that we disagree on this subject. In this blog post I try to summarize my thoughts about this design options.

Let’s start with the basics – what’s the idea behind underlay/overlay design? It’s quite simple – this is logical separation of duties of “underlying infrastructure” (providing simple IP transport in case of DC fabrics) and some “service” overlayed on top of it (be it L3VPN or EVPN or any hypervisor-based SDN solution). The key word in previous sentence – “separation”. In good design overlay and underlay should be as separate and independent from each other as possible. This provides a lot of benefits – most important of which is the ability to implement “smart edge – simple core” network design, where your core devices (= spines in DC fabric case) doesn’t need to understand all complex VPN-related protocols and hold customer-related state.

We use this design option for a long time – OSPF for underlay and iBGP for overlay is de-facto Continue reading