Archive

Category Archives for "Networking"

Juniper’s Cloud-Grade networking aims to deliver network agility

There should be no question in anyone’s mind that the cloud era has arrived. Businesses are adopting the cloud at an unprecedented rate and by 2020, the number of cloud workloads will be on par with the number of on-premises ones.Businesses of all sizes are turning to the cloud to help them become digital by increasing the level of agility. To be an agile business, though, the entire network stack—from the network through applications must be agile.+ Also on Network World: Juniper heads to the clouds with Unite + However, organizations are also more cost conscious than ever, so whatever solution is deployed must save money in addition to making the network more dynamic. To read this article in full or to leave a comment, please click here

Time to consider a move to IPv6

Organizations should consider migrating their network infrastructure and devices over to IPv6. It may be a challenge to persuade leadership to prioritize it over other projects such as cloud computing or big data migrations, but it is essential to start planning for a migration.Many service providers, such as Comcast, Verizon and AT&T, have already started using IPv6 addresses and are presently encouraging other organizations across the United States to do the same. The Internet Engineering Task Force (IETF) has encouraged organizations to move forward with these migrations for over a decade, and with more devices connecting to the internet, the need has increased. To read this article in full or to leave a comment, please click here

Time to consider a move to IPv6

Organizations should consider migrating their network infrastructure and devices over to IPv6. It may be a challenge to persuade leadership to prioritize it over other projects such as cloud computing or big data migrations, but it is essential to start planning for a migration.Many service providers, such as Comcast, Verizon and AT&T, have already started using IPv6 addresses and are presently encouraging other organizations across the United States to do the same. The Internet Engineering Task Force (IETF) has encouraged organizations to move forward with these migrations for over a decade, and with more devices connecting to the internet, the need has increased. To read this article in full or to leave a comment, please click here

Ohio government websites defaced by pro-ISIS hackers

Hackers proclaiming to be pro-ISIS defaced 10 Ohio government websites on Sunday as well as the government websites for Howard County, Maryland, and Brookhaven, Long Island.“Hacked by Team System DZ,” the defacements read. “Anti: Govt all word.”The pro-ISIS message continued: You will be held accountable Trump, you and all your people for every drop of blood flowing in Muslim countries. I Love Islamic state. Ohio Department of Rehabilitation and Corrections via Ohio Treasurer Josh Mandel A screenshot of the defaced Ohio Department of Rehabilitation and Corrections website was posted on Facebook and Twitter by Ohio Treasurer Josh Mandel. He added, “OH Dept of Corrections website right now, this is what you see. Wake up freedom-loving Americans. Radical Islam infiltrating the heartland.”To read this article in full or to leave a comment, please click here

Ohio government websites defaced by pro-ISIS hackers

Hackers proclaiming to be pro-ISIS defaced 10 Ohio government websites on Sunday as well as the government websites for Howard County, Maryland, and Brookhaven, Long Island.“Hacked by Team System DZ,” the defacements read. “Anti: Govt all word.”The pro-ISIS message continued: You will be held accountable Trump, you and all your people for every drop of blood flowing in Muslim countries. I Love Islamic state. Ohio Department of Rehabilitation and Corrections via Ohio Treasurer Josh Mandel A screenshot of the defaced Ohio Department of Rehabilitation and Corrections website was posted on Facebook and Twitter by Ohio Treasurer Josh Mandel. He added, “OH Dept of Corrections website right now, this is what you see. Wake up freedom-loving Americans. Radical Islam infiltrating the heartland.”To read this article in full or to leave a comment, please click here

Tools that increase IT efficiency pave the way for digital transformations

Inflexible IT architectures can be a barrier to organizational change. As companies embark on digital transformations aimed at improving their business, the pressure is on IT to reduce complexity and increase the efficiency of enterprise systems and applications. Fave Raves is an annual feature from Network World that invites IT pros to share hands-on assessments of products they love. Several tools that enable organizations to simplify their infrastructure and automate key tasks ranked among the favorites in 2017 and recent years. Here’s what IT pros had to say, in their own words. For more enterprise favorites, check out the full Fave Raves collection.To read this article in full or to leave a comment, please click here

Tools that increase IT efficiency pave the way for digital transformations

Inflexible IT architectures can be a barrier to organizational change. As companies embark on digital transformations aimed at improving their business, the pressure is on IT to reduce complexity and increase the efficiency of enterprise systems and applications. Fave Raves is an annual feature from Network World that invites IT pros to share hands-on assessments of products they love. Several tools that enable organizations to simplify their infrastructure and automate key tasks ranked among the favorites in 2017 and recent years. Here’s what IT pros had to say, in their own words. For more enterprise favorites, check out the full Fave Raves collection.To read this article in full or to leave a comment, please click here

Cisco and Juniper Routers : OSPF point to multipoint configurations

Today I am going to discuss on the OSPF configuration part, As you already know about the OSPF protocol and the network types in OSPF.

OSPF is a link state routing protocol and i wrote some of the articles on OSPF earlier as well. Please go through that articles to understand more about OSPF protocol

OSPF Basics
OSPF States
OSPF vs RIP protocols
Routing Basics : Distance Vector vs Link State Routing Protocol

Above are some of the articles on OSPF will help you more in the interview preparation.

OSPF Point to Multipoint Networks
In the point-to-multipoint configurations, we need to emulate broadcast capability, it seeks to organise the PVCs into a collection of point-to-point networks. In the case of OSPF point to multipoint networks, the hello packets must still be replicated and transmitted individually to each neighbor, but the multipoint approach offers two distinct advantages: no DR/BDR is needed, and the emulated point-to-point links can occupy a common subnet.

Apart from all these today I am going to have sample configurations on OSPF point to multipoint networks.

Here in this article I am going to take a topology of OSPF point to multipoint network and let you know the Continue reading

Even weak hackers can pull off a password reset MitM attack via account registration

At the IEEE Symposium on Security and Privacy 2017, researchers from the College of Management Academic Studies in Israel presented an interesting paper on bad password reset processes, “The Password Reset MitM Attack” (pdf). It explains how a weak attacker could take over accounts by exploiting vulnerabilities in password reset procedures.They dubbed the attack: password reset man-in-the-middle (PRMitM). The researchers said Google is “extremely vulnerable” to PRMitM, but Facebook, Yahoo, LinkedIn, Yandex and other sites and email services are also vulnerable as well as mobile apps like Whatsapp, Snapchat and Telegram.To read this article in full or to leave a comment, please click here

Even weak hackers can pull off a password reset MitM attack via account registration

At the IEEE Symposium on Security and Privacy 2017, researchers from the College of Management Academic Studies in Israel presented an interesting paper on bad password reset processes, “The Password Reset MitM Attack” (pdf). It explains how a weak attacker could take over accounts by exploiting vulnerabilities in password reset procedures.They dubbed the attack: password reset man-in-the-middle (PRMitM). The researchers said Google is “extremely vulnerable” to PRMitM, but Facebook, Yahoo, LinkedIn, Yandex and other sites and email services are also vulnerable as well as mobile apps like Whatsapp, Snapchat and Telegram.To read this article in full or to leave a comment, please click here

“Focusing on the Gift” (aka How Fish views Presenting)

CiscoLive starts today and so do my presentations.  If you have ever wondered what I’m thinking about right prior to a presentation…. I am imagining a small and beautifully wrapped gift that I want to give to each and every person in the audience. That is what I am doing.  I am “Focusing on the Gift”.

Have I always done that?  LOL.  Uh… no.  But fortunately I don’t think my 2006 Networkers presentation on EIGRP is available on video.   Otherwise I think I’d be truly embarrassed.  Why?  Because it was my first Networkers/CiscoLive presentation and I was beyond belief nervous.  Worried if I’d do okay… worried if you were enjoying the session… oh the list goes on and on as to everything I was thinking and worried about.

And then I realized something.  You know what? It really isn’t about me at all.  I am just a vehicle.  It is all about “The Gift”.  So in 2007 I went out and bought a tiny little Christmas tree sized ornament of a perfectly wrapped gift box.  Small enough that I could hide it up on the stage Continue reading

What is P4?

Recently I attended a workshop organised by the Open NFP organisation about Data Plane acceleration. The primary goal of the workshop was to get students and researchers (why was I there you may think) familiar with the P4 programming language.

P4 is a programming language created to simplify writing data planes for networking use cases.  Recently the P4-16 spec was released and could be considered a mature version of the language.

Now I’m not a hardcore developer. I know my way around in Python, GoLang and C#, but I never wrote anything more low level like C. P4 is created a little bit like GoLang, where I do not mean it as comparison, but as an architecture. P4 is designed so you only need to focus on the actual networking features that you want to make available on the hardware you are programming it for. Then when you compile it, it will generate runtime code for your hardware. Or as the creators explain it:

At one level, P4 is just a simple language for declaring how packets are to be processed. At another level, P4 turns network system design on its head.

There is no need to worry on low Continue reading

Cisco Catalyst 6500 Chassis VSS Configuration ( Switch1 and Switch2 )

Today I am going to talk about VSS and tell you guys how to configure the VSS in the live environment. I am going to explain VSS first and then we will come up with the VSS configuration for both the switches which will be participate in the VSS.

Although we have three switches who can be used as VSS, It can be 
  • Cisco catalyst 4500 Series Switches
  • Cisco Catalyst 6500 Series Switches
  • Cisco Catalyst 6800 Series Switches
In this article I am taking the example of Cisco 6500 Switches in the VSS. Lets talk about VSS first now followed by the configurations:


Cisco Catalyst 6500 Series Virtual Switching System (VSS) is a technique by which we are going to merge two physical Cisco Catalyst 6500 Series switches together into a single, logically managed entity. In the case of Cisco catalyst 6500 where you can manage two chassis as a single control plane  but you can have the dual data plane after enabling Cisco Virtual Switching System. 

Fig 1.1-Sample Topology Cisco VSS Physical and Logical View
It uses Cisco IOS Stateful Switchover (SSO) technology, as well as Non-Stop Forwarding (NSF) extensions to routing protocols, to provide a single, Continue reading