IS-IS Overload Bit – Why IS-IS Overload bit is used ? What are the use cases ? In this post, I will explain the Overload bit which is an important feature of IS-IS routing protocol. When a router which runs an IS-IS routing protocol have resource issue (CPU, Memory), device shouldn’t receive network traffic. […]
The post IS-IS Overload Bit – Why IS-IS Overload bit is used ? What are the use cases ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
When it comes to packet capture, a hardware analyzer will produce different results vs. a software-based tool.
A network engineer interested in attending the Building Network Automation Solutions online course sent me this question:
Does the course cover only Ansible, or does it also cover other automation tools like Python?
The course focuses on how you’d build a network automation solution. Selecting the best tool for the job is obviously one of the major challenges, and so one of the self-study modules describes various automation tools and where you could use them to build a full-blown solution.
Read more ...I really don’t like the trend of filesystem authors to only care about filesystem integrity by default. How about having seat belt for your data integrity by default and let people turn it off if they want to compromise correctness for performance?
What I didn’t know is that ReFS integrity is not on by default. Only metadata integrity.
It’s also not visible or changeable in the UI (which is why I assumed they’d done the right thing), which is strange to me, this being Windows. No, you have to drop down into Microsoft’s crappy CLI.
PS E:\> Get-Item '*' | Get-FileIntegrity
FileName Enabled Enforced
-------- ------- --------
E:\SomeDirectory False True
E:\SomeOtherDirectory False True
E:\SomeFile.txt False True
[...]
Fuck you, Microsoft.
Of course Get-Item
doesn’t do recursion. Why would it? That would
make sense.
PS E:\> Get-Children -Recurse 'E:\SomeDirectory' | Get-FileIntegrity
FileName Enabled Enforced
-------- ------- --------
E:\SomeDirectory\foo.txt False True
[...]
Both commands are needed. The first command sets the new default for the root directory, and the second adds checksums to all existing files and directories.
PS E:\> Continue reading
It’s using its vRouter and Contrail analytics module.
The post Worth Reading: ROI is not a cybersecurity concept appeared first on rule 11 reader.
More than 80 percent of the patents originated with Alcatel Lucent.
Enterprises can deploy Kubernetes on VMware vSphere-based data centers and Google Cloud Platform.
Linux support moves the company beyond just being a Windows shop.
After Daniel Walton visited the History of Networking at the Network Collective, I went back and poked at BGP permanent route oscillations just to refresh my memory. Since I spent the time, I thought it was worth a post, with some observations. When working with networking problems, it is always wise to begin with a network, so…
For those who are interested, I’m pretty much following RFC3345 in this explanation.
There are two BGP route reflectors here, in two different clusters, labeled A and D. The metric for each link is listed on the links between the RR clients, B, C, and E, and the RRs; the cost of the link between the RRs is 1. A single route, 2001:db8:3e8:100::/64 is being advertised in with an AS path of the same length from three different eBGP peering points, each with a different MED. E is receiving the route with a MED of 0, C with a MED of 1, and B with a MED of 10.
Starting with A, walk through one cycle of the persistent oscillation. At A there are two routes—
edge MED IGP Cost
C 1 4
B 10 5 (BEST)
When A runs the bestpath calculation, Continue reading
The enhanced Synergy product offers increased management of cloud deployments.