Archive

Category Archives for "Networking"

How City Furniture built a better Wi-Fi network

Founded in 1971, City Furniture got its start when Kevin Koenig and his brothers constructed wood bed frames in a garage. They started with a single showroom, Waterbed City, in Fort Lauderdale, Florida, but have now grown to 27 locations across the state and operate under the brands of City Furniture and Ashley Furniture HomeStore brands. The company currently has an older Cisco 802.11g Wi-Fi network that it uses for bar code scanning and inventory management and was reaching the end of its life. City Furniture had big plans to digitize the company by moving its point-of-sale (POS) operations and capabilities to Wi-Fi-enabled tablets so the employees could transact business from anywhere in the store. Also, it wanted to use VoIP to take calls from iPads anywhere in the showroom, as well as access radio apps. To read this article in full or to leave a comment, please click here

How City Furniture built a better Wi-Fi network

Founded in 1971, City Furniture got its start when Kevin Koenig and his brothers constructed wood bed frames in a garage. They started with a single showroom, Waterbed City, in Fort Lauderdale, Florida, but have now grown to 27 locations across the state and operate under the brands of City Furniture and Ashley Furniture HomeStore brands. The company currently has an older Cisco 802.11g Wi-Fi network that it uses for bar code scanning and inventory management and was reaching the end of its life. City Furniture had big plans to digitize the company by moving its point-of-sale (POS) operations and capabilities to Wi-Fi-enabled tablets so the employees could transact business from anywhere in the store. Also, it wanted to use VoIP to take calls from iPads anywhere in the showroom, as well as access radio apps. To read this article in full or to leave a comment, please click here

Administravia 20170703

Just a short note: I’ve updated the sixty book section of the site with a new plugin designed to keep track of book libraries. Along the way, I’ve added an Amazon affiliate code, so maybe I can buy a cup of hot chocolate and a piece of banana nut bread at some point in the future. ? The look should really be a bit nicer, though, and it is easier to add books to this system than manually adding them as I was doing before.

Remember that the idea of sixty books is not that there are actually 60 books on the list, but rather this is what I read in an average year—and hence what I am challenging you to work up to.

The post Administravia 20170703 appeared first on rule 11 reader.

43% off Pecham Vertical Stand for PS4 with Cooling Fan and Dual Controller Charging – Deal Alert

Keep your PS4 or PS4 Slim compact, organized and functioning properly with this vertical stand from Pecham. It features an integrated cooling fan, dual controller changing and a USB hub for powering & charging your phone or other devices as needed. Pecham's stand currently averages 4.6 out of 5 stars from over 185 people on Amazon (82% rate the full 5 stars: read reviews here), where its list price of $29.99 has been reduced 43% to just $16.99. See this deal now on Amazon. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Embrace the heat: Data center tips for summer operations

With the summer solstice in the rear view mirror, those of us north of the equator are preparing for the true summer heat to arrive in force this next month. While BBQs, boating, and your preferred beverage may be the first things on your mind for this next month, many folks in the data center world greet summer with a different attitude entirely. For starters, the period from June to August is Outage Season. Data from previous years shows more centers head offline during this time period than any other 3-month span of your calendar. This includes both poor performing infrastructure to full-scale outages. In addition, data center managers often fight higher energy bills due to hotter external temperatures that drive up the heat inside your facility.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Embrace the heat: data center tips for summer operations

With the summer solstice in the rear view mirror, those of us north of the equator are preparing for the true summer heat to arrive in force this next month. While BBQs, boating, and your preferred beverage may be the first things on your mind for this next month, many folks in the data center world greet summer with a different attitude entirely. For starters, the period from June to August is Outage Season. Data from previous years shows more centers head offline during this time period than any other 3-month span of your calendar. This includes both poor performing infrastructure to full-scale outages. In addition, data center managers often fight higher energy bills due to hotter external temperatures that drive up the heat inside your facility.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Embrace the heat: Data center tips for summer operations

With the summer solstice in the rear view mirror, those of us north of the equator are preparing for the true summer heat to arrive in force this next month. While BBQs, boating, and your preferred beverage may be the first things on your mind for this next month, many folks in the data center world greet summer with a different attitude entirely. For starters, the period from June to August is Outage Season. Data from previous years shows more centers head offline during this time period than any other 3-month span of your calendar. This includes both poor performing infrastructure to full-scale outages. In addition, data center managers often fight higher energy bills due to hotter external temperatures that drive up the heat inside your facility.To read this article in full or to leave a comment, please click here

DMVPN Configurations on Juniper Router

Today I am going to talk about the configurations of DMVPN on Juniper routers and then associate Dynamic VPN with remote clients step by step. I talked about DMVPN earlier in my articles as well where i explained the basics of the DMVPN. I promised at that time that I will come up with the configurations of DMVPN on each and every vendor. Now I am coming up with the DMVPN configurations on Juniper routers first and I will come up with the configurations on Cisco, Huawei and HP routers later on.

Below are some of the links where i started with the DMVPN explanations
DMVPN Basics
DMVPN Vs IPSEC Basics
Quick Comparison: IPSEC vs DMVPN vs EasyVPN vs GETVPN


The configurations used here are for the demo purposes and has no relevance with any of the live and the enterprise networks. What kind of Topology it looks like, So i am pasting here the sample DMVPN topology and has no relevance with the configuration defining below. The configuration is just for your reference to take it further.

Fig 1.1- Sample DMVPN Topology

To configure the VPN tunnel, 
First you need to configure the IKE policy.

ISIS Authentication types (packet captures)

In this post i would like to highlight a couple of “features” of ISIS.
More specifically the authentication mechanism used and how it looks in the data plane.

I will do this by configuring a couple of routers and configure the 2 authentication types available. I will then look at packet captures taken from the link between them and illustrate how its used by the ISIS process.

The 2 types of Authentication are link-level authentication of the Hello messages used to establish an adjacency and the second type is the authentication used to authenticate the LSP’s (Link State Packet) themselves.

First off, here is the extremely simple topology, but its all thats required for this purpose:

Simple, right? 2 routers with 1 link between them on Gig1. They are both running ISIS level-2-only mode, which means they will only try and establish a L2 adjacency with their neighbors. Each router has a loopback interface, which is also advertised into ISIS.

First off, lets look at the relevant configuration of CSR-02 for the Link-level authentication:

key chain MY-CHAIN
 key 1
  key-string WIPPIE
!
interface GigabitEthernet1
 ip address 10.1.2.2 255.255.255.0
 ip router isis 1
 negotiation auto
 no  Continue reading

EVPN-VXLAN INTER-TENANT ROUTING ON JUNIPER QFX / MX

evpn-vxlan-title

I’ve recently started working on a project focused on EVPN-VXLAN based on Juniper technology. I figured I’d take the opportunity to share some experiences specifically around inter-VXLAN routing. Inter-VXLAN routing can be useful when passing traffic between different tenants. For example, you may have a shared-services tenant that needs to be accessed by a number of different customer tenants whilst not allowing reachability between customer tenants. By enabling inter-VXLAN routing on the MX we can use various route-leaking techniques and policy to provide a technical point of control.

To read the article then please head over to the iNET ZERO blog

Notes from IETF 99 – The IEPG Meeting

Many years ago the IEPG had a role in allowing network operators to talk to other operators about what they were seeing and what they were thinking about. Those days are long since over, and today the IEPG meetings present an opportunity for an eclectic set of diehards to listen to an equally eclectic collection of presentations that wander over much of the topics of today's Internet, without any particular common theme or filter.

JUNIPER NORTHSTAR UPGRADE 2.1 TO 3.0

In this post, I’m quickly going to describe how to upgrade NorthStar 2.1 to 3.0. For a detailed installation and user guide refer to the 3.0 release notes here.

Firstly, let’s start off by verifying the current host OS and NorthStar versions. Note. NorthStar 3.0 requires a minimum of Centos 6.7 or above.

[root@northstar ~]# cat /etc/redhat-release
CentOS release 6.9 (Final)

To check the current version of NorthStar, navigate to the about section via the drop down menu located at the top right of the GUI

northstar-about

Download NorthStar, Extract & Copy:

Download the NorthStar 3.0 application from Juniper.net NorthStar download page. Once downloaded, extract the RPM and copy to your host machine. Below I have copied the NorthStar-Bundle-3.0.0-20170630_141113_70366_586.x86_64.rpm to the /root/rpms/ directory.

[root@northstar ~]# ls /root/rpms/ -l
total 3843976
-rw-r–r–. 1 root root 881371892 Mar 11 2016 NorthStar-Bundle-2.0.0-20160311_005355.x86_64.rpm
-rw-r–r– 1 root root 856402720 Jul 11 2016 NorthStar-Bundle-2.1.0-20160710_201437_67989_360.x86_64.rpm
-rw-r–r– 1 root root 2148942508 Jun 30 19:24 NorthStar-Bundle-3.0.0-20170630_141113_70366_586.x86_64.rpm
-rw-r–r– 1 root root 21878016 Dec 28 2016 NorthStar-Patch-2.1.0-sp1.x86_64.rpm
-rw-r–r–. 1 root root 27610536 Mar 11 Continue reading

Beware of companies claiming products have AI capabilities

Software companies are exploiting the current artificial intelligence (AI) craze by exaggerating the scope and capabilities of AI in their products, according to a report from Gartner. Gartner tracks product marketing hype with a tool it calls the Hype Cycle, measuring the growth and decline of products as they mature. It calls the process of overhyping AI "AI washing," similar to the way the term “greenwashing” was used to describe exaggerated claims of environmental-friendliness in various products or practices. Gartner said more than 1,000 vendors say their products employ AI, but many are "applying the AI label a little too indiscriminately." And it has happened fast.To read this article in full or to leave a comment, please click here