Archive

Category Archives for "Networking"

Apstra intent-based networking bridges the physical, virtual

Intent-based systems have been all the rage since Cisco announced its “Network Intuitive” solution earlier this year. For Cisco customers, its solution is certainly interesting. But what about businesses that want an alternative to Cisco? Or companies that want to run a multi-vendor environment?Over a year before Cisco’s launch, a start-up called Apstra shipped the closed-loop, intent-based solution. It was designed to be multi-vendor in nature with support for Cisco but also Arista, Juniper, HP and others, including white box. Apstra operates as an overlay to networks built on any of the leading vendors to deliver intent-based networking in heterogeneous environments.To read this article in full or to leave a comment, please click here

Apstra bridges the physical — virtual network divide

Intent-based systems have been all the rage since Cisco announced its “Network Intuitive” solution earlier this year. For Cisco customers, its solution is certainly interesting. But what about businesses that want an alternative to Cisco? Or companies that want to run a multi-vendor environment?Over a year before Cisco’s launch, a start-up called Apstra shipped the closed-loop, intent-based solution. It was designed to be multi-vendor in nature with support for Cisco but also Arista, Juniper, HP and others, including white box. Apstra operates as an overlay to networks built on any of the leading vendors to deliver intent-based networking in heterogeneous environments.To read this article in full or to leave a comment, please click here

Set up a dedicated virtualization server on Packet.net

Packet is a hardware-as-a-service vendor that provides dedicated servers on demand at very low cost. For me and my readers, Packet offers a solution to the problem of using cloud services to run complex network emulation scenarios that require hardware-level support for virtualization. Packet users may access powerful servers that empower them to perform activities they could not run on a normal personal computer.

In this post, I will describe the procedure to set up an on-demand bare metal server and to create and maintain persistent data storage for applications. I will describe a generic procedure that can be applied to any application and that works for users who access Packet services from a laptop computer running any of the common operating systems: Windows, Mac, and Linux. In a future post, I will describe how I run network emulation scenarios on a Packet server.

Table of Contents

  1. Packet.net
    1. Controlling costs when using bare metal servers
    2. Create a Packet account and Login
    3. Create a project
  2. Generate SSH Keys
    1. Windows
    2. Mac
    3. Linux
    4. Copy public key to Packet.net
  3. Deploy a Server
  4. SSH Server on local machine
    1. Windows
    2. Mac
    3. Linux
  5. Set up the remote server
    1. Test X11 forwarding
  6. Create block storage
    1. Create Continue reading

Time to rethink how much customer data you store

Does the company you work for (or own) retain data on customers? Odds are pretty high that it does, at least in some form (often fairly extensively). It's often attractive to do so for both marketing and functionality purposes.But here's the thing, storing that data is probably a bad business decision. One that could cost your business a huge amount of money and, even worse, potential loss of trust by your most valuable customers.Storage costs  Just from the IT infrastructure point of view: As your business grows and the amount of data you store on each customer slowly expands (it always does), your cost for storing that data also grows. Rather quickly. Even if your data center is already well equipped, this is a not-insignificant recurring expense (failing drives, energy costs, other equipment needs, etc.).To read this article in full or to leave a comment, please click here

Time to rethink how much customer data you store

Does the company you work for (or own) retain data on customers? Odds are pretty high that it does, at least in some form (often fairly extensively). It's often attractive to do so for both marketing and functionality purposes.But here's the thing, storing that data is probably a bad business decision. One that could cost your business a huge amount of money and, even worse, potential loss of trust by your most valuable customers.Storage costs  Just from the IT infrastructure point of view: As your business grows and the amount of data you store on each customer slowly expands (it always does), your cost for storing that data also grows. Rather quickly. Even if your data center is already well equipped, this is a not-insignificant recurring expense (failing drives, energy costs, other equipment needs, etc.).To read this article in full or to leave a comment, please click here

IP Fast Reroute, LFA and Remote LFA Discussion for real network deployment

IP Fast Reroute , LFA (Loop Free Alternate) , Remote LFA and in general recovery and protection discussion. In this post, I will share the discussion with one of my slack group member, Driss Jabbar. He is a CCDE and highly skilled network engineer and also author of some posts in this website. You can […]

The post IP Fast Reroute, LFA and Remote LFA Discussion for real network deployment appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Update for the Free Network Engineers Group

A while ago, I created a slack group for the network engineers. Some of you might be a part of the group and have been enjoying, learning, discussing the networking topics, real life deployments, for a while.   I wanted to say that, I started to extend the group. It started initially for the Telco, […]

The post Update for the Free Network Engineers Group appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Cisco 6K Switch Supervisor Engines ( SUP 6T Vs SUP 2T)

I have been asked many times from many of the followers of the blogs about the SUP engines in Cisco catalyst 6k Series product mainly in Cisco 6500 Switches. Well first of all i would like to inform you that Cisco already announce Cisco 6500 chassis end of sale and also the previous SUP engines SUP-720 already end of life announcements.

As the question is related to Cisco 6500 Chassis only and the question is which chassis in Cisco 6500 Chassis supports SUP 2T and SUP 6T supervisor engines ?
Well the answer is SUP 2T and SUP 6T supported in the E-series 6500 chassis only. So if I am talking about the E-Series Chassis they are

  • Cisco Catalyst 6503-E 
  • Cisco Catalyst 6504-E
  • Cisco Catalyst 6506-E
  • Cisco Catalyst 6509-E
  • Cisco Catalyst 6509-V-E 
  • Cisco Catalyst 6513-E 

What are the capabilities of Cisco SUP 2T supervisor engines ?
Supervisor Engine 2T is designed to deliver higher performance, better scalability, and enhanced hardware enabled features. It integrates a high-performance 2-terabit (Tb) crossbar switch fabric that enables 80-Gbps switching capacity per slot on all Cisco Catalyst 6500 Series Switches.

Image of SUP 2T supervisor ?
Below is the image of the SUP 2T 

Fig 1.1- SUP Continue reading

IDG Contributor Network: How will the cloud be able to handle the emergence of IoT

Cloud computing and the Internet of Things (IoT) have spent the last several years in a sort of maximum-acceleration race where they’ve lapped the other players several times over and have only one another to measure against.IOT Expansion and Cloud Capacity Neither is slowing down, particularly the IoT. According to analysis firm Gartner, the number of IoT devices will hit 20.8 billion by 2020. The world population is expected to reach 8 billion in 2020, meaning there will be 2.5 IoT devices per person on the entire planet. In 2016, the IoT was growing at the rate of 5.5 million new things getting connected every day.To read this article in full or to leave a comment, please click here

WHOIS going to be at the Grace Hopper Celebration?

Ubuntu us are doing the round trip! It’s time to live - WAN you arrive at GHC, come meet us and say HELO (we love GNU faces, we’ll be very api to meet you). When you’re exhausted like IPv4, git over to the Cloudflare corner to reboot –– we’ll have chargers and Wi-Fi (it’s not a SYN to REST). R booth can be your ESC. Then Thursday morning we’re hosting a breakfast bash with Zendesk –– it will be quite the Assembly, you should definitely Go, compile a bowl of serial, drink a bit of CIDR or a cup of tee.

I’m also speaking at 1:30PM on Wednesday in OCCC W414 hashing out encryption and updates for IoT –– DES should be a fun session.

ACK! I did NAT tell you how to find us. Check for sum women in capes a few hops away from the booths with the lava LAMP stack. I'm the one with cURLs.

In D air! Excited to LANd. C you soon.

Why submarine cable , why not satellite ?

Why submarine/subsea cables rather than satellite. Story between my friend who is from finance background and myself.     Today, one of my friends who is totally foreigner to our industry,  visited me at home. It was a family dinner actually and as I said, He is not a network engineer but just a curios […]

The post Why submarine cable , why not satellite ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Cisco Virtual Router for Cloud Services : Cisco CSR1000v

Today I am going to talk about the Cisco CSR1000v router used for the cloud services. With the help of Cisco CSR 1000v router you will able to connect the public and the private clouds and use the applications smoothly.

What is the purpose of Cisco CSR 1000v routers ?
With the help of Cisco CSR 1000V we can use the cloud-based networking and security issues to access the public and private clouds applications. Cisco CSR1000v uses the same type of Cisco IOS Software platform that is inside the Cisco Integrated Services Router (ISR) and Aggregation Services Router (ASR) product families, If you talk about the Cisco CSR1000v, the virtual router contains the features like routing, VPN, firewall, Network Address Translation (NAT), QoS, application visibility, failover, and WAN optimization. These functions empower enterprises and cloud providers to build highly secure, optimised, scalable, and consistent hybrid networks.

If Cisco CSR 1000v is a virtual router then how and where it runs ?
Well Cisco CSR1000v is a virtual router and run on VM. for running the Cisco CSR1000v you should have a UCS server where VM will be installed and on top of the VM, Cisco CST 1000v router IOS image will be Continue reading

BrandPost: An SD-WAN Can Cure Your Security Blues

Cyber security remains a hot topic with nearly every IT and business leader that I speak with. In particular, there seems to be an intensified focus on network security. Security is typically deployed in layers (network, compute and application), and I expect that model to continue in the short-term, but given the fact that many of the building blocks of digitization, such as IoT and the cloud, are network-centric, there should be a stronger focus on leveraging the network and network-based security to protect the organization.Nowhere in the network has there been more change than in the wide area network (WAN), so it stands to reason that as legacy WANs evolve into software-defined WANs, it must play an increasingly critical role in securing the enterprise.  Below are my top five recommendations to better secure your organization with an SD-WAN.To read this article in full or to leave a comment, please click here

How to kill your network with Ansible

Aside from being a user, I write about Ansible and try to help others to understand how it works. A few days ago I was answering questions from other Ansible users. Someone was having trouble figuring out why the ios_config module didn’t apply his template correctly. I explained what was wrong with the template, afterwards I thought about the issue some more and realized that the error could potentially be really dangerous. As in a game-over-level-event for your employment dangerous. Continue reading

North Korea Gets New Internet Link via Russia

This past weekend, North Korea expert Martyn Williams and I spotted the activation of a new internet path out of North Korea.  At 09:07:51 UTC on 1 October 2017, the country’s single internet provider, Star JV (AS131269), gained a new connection to the global internet through Russian fixed-provider Transtelecom (AS20485), often referred to as TTK.  Martyn published his analysis on the US-Korea Institute‘s 38 North blog, named after the dividing line between North and South Korea.

The internet of North Korea is very small (four BGP routes) and reportedly only accessible by a few elites in the country.  Since the appearance of AS131279 in the global routing table almost 7 years ago, Star JV has almost exclusively relied on China Unicom for its connectivity to the global internet — the only exception was its partial usage of satellite service from Intelsat between 2012 and 2013.  In light of this history, a new internet connection out of North Korea is certainly a notable development.

Unsteady Connection

At 09:07:51 UTC, TTK (AS20485) appeared as a transit provider for three of the four BGP routes announced by AS131279, namely, 175.45.176.0/24, 175.45.178.0/24, and Continue reading

Nuage Networks Q&A: Automated Analytics and Remediation for Cloud-based Security Services

Thanks to all who joined us for the Nuage Networks 2017 SDx Infrastructure Security Report Webinar, Automated Analytics and Remediation for Cloud-based Security Services. During the webinar Nuage Networks discussed how their VSP delivers an SDN solution with built-in security capabilities that combines scale, performance and flexibility in a single, boundary-less platform without compromising security or... Read more →

Will machine learning save the enterprise server business?

Nvidia and server makers Dell EMC, HPE, IBM and Supermicro announced enterprise servers featuring Nvidia’s Tesla V100 GPU. The question is, can servers designed for machine learning stem the erosion of enterprise server purchases as companies shift to PaaS, IaaS, and cloud services? The recent introduction of hardened industrial servers for IoT may indicate that server makers are looking for growth in vertical markets.There are very compelling reasons for moving enterprise workloads to Amazon, Google, IBM and other hosted infrastructures. The scalability of on-demand resources, operating efficiency at cloud-scale and security are just three of many reasons. For instance, Google has 90 engineers working on just security where most enterprises are understaffed.To read this article in full or to leave a comment, please click here