Archive

Category Archives for "Networking"

MPLS Scenario: Manually Configuring a BGP Router ID per VRF

Today I am going to talk about the configuration part of the BGP router id per VRF. In my example we took two different VRFs name NB and ttlbits and defined that VRF configurations.

The IP addresses are used here is for the demo purposes only and has no relevance with any of the enterprise network. These configurations are the demo configurations and will help you out for the configuration on your live network.

Below are the steps to configure the BGP router id per VRF. These steps are

  • Defining VRF_ttlbits on the router
  • Defining VRF_NB on the router
  • Configuring Loopback with the IP address
  • Configuring Ethernet interfaces with VRF
  • Configuring VPNv4 and IPv4 address family


Fig 1.1- Basic Sample MPLS network topology

Below is the basic configuration of defining the VRF

Defining VRF ttlbits on the router
!
ip vrf vrf_ttlbits
 rd 45000:1
 route-target export 50000:50
 route-target import 40000:1
!

Defining VRF NB on the router
!
ip vrf vrf_NB
 rd 65500:1
 route-target export 65500:1
 route-target import 65500:1
!
Configuring Loopback with the IP address
!
interface Loopback0
 ip address 10.10.10.1 255.255.255.255
!
Configuring Ethernet interfaces with the IP address
interface Ethernet0/0
 ip vrf forwarding vrf_ttlbits
 ip address Continue reading

Route where you can , switch where you must – Is it true ?

Route where you can , switch where you must. If you are from networking background most probably you heard this many times. But is it true or like anything else, does it depend on the situation and other parameters ?   Yes, you are right, it depends.   When you hear a quote , at […]

The post Route where you can , switch where you must – Is it true ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Bringing behavioral game theory to security defenses

Kelly Shortridge and CSO senior writer Fahmida Y Rashid talk about using behavioral game theory to take advantage of hackers’ mistakes and manipulate the data they think they're receiving. People generally make decisions by either thinking ahead to figure out how people may act in a given situation, or by learning over time by observing what people are doing. Since attackers learn over time by collecting feedback, obfuscating what they get can really mess up what the attackers are able to learn.

Bringing behavioral game theory to security defenses

Kelly Shortridge and CSO senior writer Fahmida Y Rashid talk about using behavioral game theory to take advantage of hackers’ mistakes and manipulate the data they think they're receiving. People generally make decisions by either thinking ahead to figure out how people may act in a given situation, or by learning over time by observing what people are doing. Since attackers learn over time by collecting feedback, obfuscating what they get can really mess up what the attackers are able to learn.

5 Wi-Fi analyzer and survey apps for Android

Wi-Fi networks have many variables and points of frustration. Different types of walls, materials and objects can impact the Wi-Fi signal in varying ways. Visualizing how the signals move about the area is difficult without the right tools. A simple Wi-Fi stumbler is great for quickly checking signal levels, but a map-based surveying tool helps you visualize the coverage, interference and performance much more easily. They allow you to load your floor plan map, walk the building to take measurements and then give you heatmaps of the signals and other data.Most Windows-based Wi-Fi surveying tools offer more features and functionality than Android-based tools provide, such as detecting noise levels and providing more heatmap visualizations. However, if you don’t require all the bells and whistles, using an app on an Android-based smartphone or tablet can lighten your load. (And in case you’re wondering why we're not discussing iOS apps, it’s because Apple won’t allow developers access to the Wi-Fi data, thus there can’t be any legit Wi-Fi surveying apps without jailbreaking the device.)To read this article in full or to leave a comment, please click here

Moving to a private cloud tips and considerations

There are a lot of reasons you may be thinking about moving to a private cloud environment. Perhaps you need more security, or maybe you feel the risks of public cloud have outweighed the benefits. But you’re still not certain that this version of web-scale networking is right for your company, and you’re wondering what’s involved in moving from a public cloud to a private one. Not surprisingly, there are several factors to consider when making the move from public to private clouds. Public clouds have their place, but there are many good reasons to switch. In this post we’ll covers some private cloud tips and considerations.

For an even deeper look at reasons you may want to switch to a private cloud, check out our education page, Private Cloud vs. Public Cloud.

Level set: Defining public, private and hybrid clouds

Private clouds take several different forms: semi-private cloud, virtual private cloud (hybrid), and fully private cloud. Each one has their advantages and disadvantages.

Semi-private clouds are similar to public clouds where the cloud is being hosted by a provider, but the access to the cloud is through private channels and not over the Internet. This reduces the problem of lag Continue reading

LoRaWAN key to building full-stack production IoT networks

Outside of the consumer market, real examples of the Internet of Things (IoT) often disappoint because in the end, they are limited by one or more of the IoT’s constraints: tens of billions of devices, cheap to acquire, cheap to deploy, security and ubiquitous connections.I spoke with Dave Kjendal, Senet’s vice president of engineering and CTO, because he has built products and networks that meet these constraints. It was insightful because Senet has produced products using the entire IoT stack. Senet’s evolution began in 2009 with low-cost fuel oil tank sensors communicating over the unlicensed airwaves to optimize delivery routes. The company now operates a general purpose LoRaWAN IoT network that covers one-fortieth of the United States. LoRaWAN is an implementation of low-power, wide-area networks designed to transmit small messages at a frequency of about one an hour. It serves about 55 percent of IoT WAN connectivity. It is a different technical approach than what the mobile carriers promise with 3GPP, which is yet to be standardized.To read this article in full or to leave a comment, please click here

Contrarian Reading on Net Neutrality

‘net neturality has been much in the news recently; a while back I did a piece for Tech Target on some of the complexities here, and I ran across three other articles that provide a contrarian view—not what you are likely to hear from the major edge providers. Since I am always trying to understand both sides of an issue, I am always looking for solid, well written views on both sides. It is hard to dig behind the hype in our 140 character world, but it is also important.

Hence this post, with pointers to my older post and three other articles of interest. Warning: some of these are more trenchant and contrarian than others.

The primary foundation of net neutrality explained is this: Providers should not be able to give services they offer any advantage over a competing service running over their network. The perfect example might seem to be voice services. Suppose you purchase access to the internet from a company that not only sells internet access, but also voice services. Now, suppose the provider decides to sell its voice service as superior in quality to any other available voice service — and guarantee its service is Continue reading

IoT in the office: Plantronics service blocks annoying noises

The Internet of Things (IoT) is creating interesting, new business opportunities. This week, Plantronics announced a new noise-as-a-service portfolio called Habitat Soundscaping. The solution set is designed to counteract the productivity-killing side effects of open offices.Habitat Soundscaping sounds a bit crazy, so let’s hear them out.Plantronics has been around since the early 1960s when it launched lightweight aviation headsets. Its business opportunities expanded from pilots to include astronauts, call center agents, knowledge workers and mobile professionals. Headsets evolved from big clunky proprietary interfaces through 2.5 and 3.5 mm jacks to USB to Bluetooth.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Can SD-WANs meet standards requirements?

Any innovative technology faces a battle of doubt. When Amazon first rolled out AWS, few could imagine servers running in the cloud. Before Salesforce, many thought CRM to be too critical to run as SaaS. I find SD-WANs to be facing a similar battle. It’s inconceivable to many that an SD-WAN could replace MPLS. This is particularly true for security teams.At one recent client, a chemical company, the team was looking to transition from MPLS to SD-WAN. The security group, though, could not accept the fact that SD-WANs met the requirements stipulated by CFATS (Chemical Facility Anti-Terrorism Standards) guiding the chemical industry.It was a classic example of professionals getting hooked into the implementation and failing to consider alternative approaches to addressing the same need. CFATS professionals assume MPLS and firewalls to be mandated by the standard. MPLS being the de facto transport. As for firewalls, “Organizations understand and feel safe with firewalls,” says Nirvik Nandy, my partner and the president and CEO, of Red Lantern, a security and compliance consultancy.To read this article in full or to leave a comment, please click here