Archive

Category Archives for "Networking"

Feedback: Ansible for Networking Engineers

Got this feedback on my Ansible for Networking Engineers webinar:

This webinar is very comprehensive compared to any other Ansible webinars available out there. Ivan does great job of mapping and using real life example which is directly related to daily tasks.

The Ansible online course is even better: it includes support, additional hands-on exercises, sample playbooks, case studies, and lab instructions.

However, Ansible is just a tool that shouldn’t be missing from your toolbox. If you need a bigger picture, consider the Building Network Automation Solutions online course (and register ASAP to save $700 with the Enthusiast ticket).

Route Filtering Techniques : Access-lists, Route-map and Distribution-lists


Today I am going to talk about the various route filtering method we are using in our network. These can be Access-Lists, Route-map, Distribution-list and Prefix-Lists. They are the excellent way to filter out the routes but the way we are implementing is different. Many of you are aware of the access list like standard, extended and so on. I already wrote an article on the access-lists. Please go through the below link for the access-lists

Back to Basics : Access-Lists and Types

Before we talk about these protocols,  I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos

Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

But now if we are talking about all these route filtering protocol, we will take one by one to explain how and what they filter out in the network

IP Access List Route Filtering
So let's talk about the ACL or so called access-lists. An access-list is basically a mechanism accepting certain input from Continue reading

Unifi US-8 PoE Passthrough With The Cisco 3560CX

As part of my “everything should be on a UPS” strategy, I recently replaced a regular 8-port gigabit switch with a Ubiquiti Unifi US-8 Ethernet switch because the US-8 can be powered using POE (Power Over Ethernet) provided by a UPS-protected switch in my basement, so it should stay up in the event of a power outage. This also allowed me to indirectly provide UPS protection for the Ubiquiti wireless AP in that location because the US-8 has a PoE passthrough port with which I could power the AP. Clever, right?

Ubiquiti Unifi Us-8 with POE Passthrough

 

POE Passthrough

To clarify (because a picture is worth many thousands of my words), here’s how things were:

Before the Unifi US-8

And here’s how things are after installing the Ubiquiti Unifi US-8:

After the Unifi US-8 with POE Passthrough

The new setup worked well, but I noticed after a few days that the uptime for the Unifi US-8 kept on resetting; that is, it appeared to be rebooting. The Cisco 3560CX switch which is providing the POE can supply 30W per port, which is plenty enough for the US-8 and the wireless AP to be daisy-chained like this, yet when I looked at the logs on the 3560CX, I found an error:

Oct 23 18:23:12.124 UTC: %ILPOWER-3-CONTROLLER_PORT_ERR:  Continue reading

HPE broadens its processor offerings with AMD, Cavium systems

It’s been said that the industry dislikes too many choices, but HPE is offering more choices for server products with new ARM- and AMD Epyc-based servers. And in both cases, HPE is touting price-performance efficiency.The company today announced new ProLiant DL385 Gen10 servers running AMD’s Epyc processor, the server version of its Zen-based core that has shot the company back into serious competitiveness with Intel.Also on Network World: REVIEW: How rack servers from HPE, Dell and IBM stack up HPE claims that with the Epyc chips, customers can have more virtual machines per server and the ability to process more data in parallel, thanks to the 32 cores with two threads per core in the Epyc processor. The result, it says, is up to 50 percent lower cost per virtual machine than “traditional” servers.To read this article in full, please click here

HPE broadens its processor offerings with AMD, Cavium systems

It’s been said that the industry dislikes too many choices, but HPE is offering more choices for server products with new ARM- and AMD Epyc-based servers. And in both cases, HPE is touting price-performance efficiency.The company today announced new ProLiant DL385 Gen10 servers running AMD’s Epyc processor, the server version of its Zen-based core that has shot the company back into serious competitiveness with Intel.Also on Network World: REVIEW: How rack servers from HPE, Dell and IBM stack up HPE claims that with the Epyc chips, customers can have more virtual machines per server and the ability to process more data in parallel, thanks to the 32 cores with two threads per core in the Epyc processor. The result, it says, is up to 50 percent lower cost per virtual machine than “traditional” servers.To read this article in full, please click here

Certifications: Why I Like Them, How I Use Them and My Plan for Security Learning

The other day Daniel Dib (http://lostintransit.se) asked me an interview question.  The question was about certifications.  What do I think about them…. and are they losing their “value”.

Poor certifications.  People question their value.  Of course “value” typically means for many what can the cert “do” for you once you have it.  People also get so judgemental of others for “collecting” them.  And yes… when I was younger I was, admittedly, one of those people who looked down on people I viewed as “cert collectors”.  Poor poor certifications.  In every area certifications exist they can get a bad rep.  IT industry, Scuba Diving, .. heck even in girl scouts when there was always that one girl who wanted to try to get every possible girl scout badge.  ?

Why I Like Them and How I Use Them

In 2012 my view on certs changed.  I realized I could use them to my advantage to help me organize my learning by making goals and signing up for certs.   You see, back in 2010 I had bought a few books about Wireshark by Laura Chappel and told myself I would make Continue reading

Certifications: Why I Like Them, How I Use Them and My Plan for Security Learning

The other day Daniel Dib (http://lostintransit.se) asked me an interview question.  The question was about certifications.  What do I think about them…. and are they losing their “value”.

Poor certifications.  People question their value.  Of course “value” typically means for many what can the cert “do” for you once you have it.  People also get so judgemental of others for “collecting” them.  And yes… when I was younger I was, admittedly, one of those people who looked down on people I viewed as “cert collectors”.  Poor poor certifications.  In every area certifications exist they can get a bad rep.  IT industry, Scuba Diving, .. heck even in girl scouts when there was always that one girl who wanted to try to get every possible girl scout badge.  ?

Why I Like Them and How I Use Them

In 2012 my view on certs changed.  I realized I could use them to my advantage to help me organize my learning by making goals and signing up for certs.   You see, back in 2010 I had bought a few books about Wireshark by Laura Chappel and told myself I would make Continue reading

IDG Contributor Network: Cloud, SaaS and SD-WAN drive new licensing technology

In 5 software licensing challenges in the next generation network , I noted the important role that licensing models would have in the transition to the software defined network.  But there’s a deeper linkage between the growing demand for SaaS applications, cloud technology evolution and new software-defined Wide Area Network solutions.  What does that linkage mean for the licensing technologies that will drive monetization for the new software defined network?Let’s start with the Q3 Forrester Wave report “Recurring Customer And Billing Management,” which speaks broadly to the accelerating trend of consumers and businesses using Software as a Service (SaaS) offerings via the cloud versus traditional on-premises software.  The author states that as this takes place, software vendors invariably migrate to subscription, or usage-based monetization models.  The report goes on to reference a Forrester 2017 SaaS adoption report that finds “in 2017, we expect software-as-a-service (SaaS) spend in particular to be more than 1.5 times that of license software.”To read this article in full, please click here

Unlocking the Internet for Education: Policymakers Hold the Key

Education is the basis for individual empowerment, employability, and gender equity. Unfortunately, it is not available to everyone.

In 2015, the international community agreed to the 2030 Agenda for Sustainable Development, which commits countries to addressing these challenges. Such commitments require innovative approaches that go beyond simply building more educational institutions. At the Internet Society we believe the Internet is a key piece of that puzzle, which is why we are pleased to release a new paper, “Internet Access and education: Key considerations for policy makers”, to help navigate some of the opportunities and challenges.

The Internet has great potential to not only expand access to, but also improve the quality of education. It opens doorways to a wealth of information, knowledge, and educational resources to students and teachers. It also promotes opportunities for learning beyond the classroom – a critical feature to promote the lifelong learning that the future demands. A skilled workforce that utilizes ICTs effectively is a key factor in the global digital economy and for harnessing its natural resources for sustainable growth. Education is where it starts.

This Internet Society briefing describes ways in which policymakers can unlock that potential through an enabling framework Continue reading

The Supreme Court Wanders into the Patent Troll Fight

The Supreme Court Wanders into the Patent Troll Fight

Next Monday, the US Supreme Court will hear oral arguments in Oil States Energy Services, LLC vs. Greene’s Energy Group, LLC, which is a case to determine whether the Inter Partes Review (IPR) administrative process at the US Patent and Trademark Office (USPTO) used to determine the validity of patents is constitutional.

The constitutionality of the IPR process is one of the biggest legal issues facing innovative technology companies, as the availability of this process has greatly reduced the anticipated costs, and thereby lessened the threat, of patent troll litigation. As we discuss in this blog post, it is ironic that the outcome of a case that is of such great importance to the technology community today may hinge on what courts in Britain were and were not doing more than 200 years ago.

The Supreme Court Wanders into the Patent Troll FightThomas Rowlandson [Public domain], via Wikimedia Commons

As we have discussed in prior blog posts, the stakes are high: if the Supreme Court finds IPR unconstitutional, then the entire system of administrative review by the USPTO — including IPR and ex parte processes — will be shuttered. This would be a mistake, as administrative recourse at the USPTO is one of the few ways Continue reading