Archive

Category Archives for "Networking"

4 steps to planning a migration from IPv4 to IPv6

With the depletion of IPv4 addresses, more organizations are encouraged to transition over to using IPv6 addresses. Many organizations are noticing the benefits of the built-in security features of IPv6. Also, enterprise IT managers are observing that their service providers are successfully using IPv6, and this encourages them to move forward with it.To continue to ignore IPv6 could cause any number of potential problems, including an inability to immediately migrate to IPv6 when there is no longer a choice, loss of internet connectivity, and not being able to compete with organizations whose systems are configured for IPv6.To read this article in full or to leave a comment, please click here

How to plan your migration to IPv6

With the depletion of IPv4 addresses, more organizations are encouraged to transition over to using IPv6 addresses. Many organizations are noticing the benefits of the built-in security features of IPv6. Also, enterprise IT managers are observing that their service providers are successfully using IPv6, and this encourages them to move forward with it.To continue to ignore IPv6 could cause any number of potential problems, including an inability to immediately migrate to IPv6 when there is no longer a choice, loss of internet connectivity, and not being able to compete with organizations whose systems are configured for IPv6.To read this article in full or to leave a comment, please click here

How to plan your migration to IPv6

With the depletion of IPv4 addresses, more organizations are encouraged to transition over to using IPv6 addresses. Many organizations are noticing the benefits of the built-in security features of IPv6. Also, enterprise IT managers are observing that their service providers are successfully using IPv6, and this encourages them to move forward with it.To continue to ignore IPv6 could cause any number of potential problems, including an inability to immediately migrate to IPv6 when there is no longer a choice, loss of internet connectivity, and not being able to compete with organizations whose systems are configured for IPv6.To read this article in full or to leave a comment, please click here

4 steps to planning a migration from IPv4 to IPv6

With the depletion of IPv4 addresses, more organizations are encouraged to transition over to using IPv6 addresses. Many organizations are noticing the benefits of the built-in security features of IPv6. Also, enterprise IT managers are observing that their service providers are successfully using IPv6, and this encourages them to move forward with it.To continue to ignore IPv6 could cause any number of potential problems, including an inability to immediately migrate to IPv6 when there is no longer a choice, loss of internet connectivity, and not being able to compete with organizations whose systems are configured for IPv6.To read this article in full or to leave a comment, please click here

4 steps to planning a migration from IPv4 to IPv6

With the depletion of IPv4 addresses, more organizations are encouraged to transition over to using IPv6 addresses. Many organizations are noticing the benefits of the built-in security features of IPv6. Also, enterprise IT managers are observing that their service providers are successfully using IPv6, and this encourages them to move forward with it.To continue to ignore IPv6 could cause any number of potential problems, including an inability to immediately migrate to IPv6 when there is no longer a choice, loss of internet connectivity, and not being able to compete with organizations whose systems are configured for IPv6.To read this article in full or to leave a comment, please click here

Are you an Intelligent fool ?

Most fundamental network design attribute should be simplicity.   When you have a simple network, you can have secure, flexible , scalable, understandable , in fact all important design requirements can be achieved.   But having simplicity is easy to say, hard to achieve.   On the other hand, some amount of complexity is required, as […]

The post Are you an Intelligent fool ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

IDG Contributor Network: The new branch office SD-WAN model

Wrapping up an SD-WAN workshop session with a client last week, I reflected on how rapidly the branch office WAN connectivity and management model is changing. Some great opportunities are emerging for enterprise IT teams that can materially impact how the network is designed, paid for and managed. Here are some thoughts:1. Public cloud is driving a lightweight edge security model Most people agree that SD-WAN can facilitate service chaining, and a selective backhaul model is interesting to many enterprises that want to concentrate next-generation firewall services in larger locations. But with the rapid growth of distributed content in public cloud applications (even from Microsoft and Salesforce, who long resisted this trend that Google pioneered) it’s increasingly counterproductive to backhaul browsing traffic long distances from the end users. It reduces performance, and adds significant load at hubs on the network — not ideal when this can represent 80 percent or more of the traffic.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The new branch office SD-WAN model

Wrapping up an SD-WAN workshop session with a client last week, I reflected on how rapidly the branch office WAN connectivity and management model is changing. Some great opportunities are emerging for enterprise IT teams that can materially impact how the network is designed, paid for and managed. Here are some thoughts:1. Public cloud is driving a lightweight edge security model Most people agree that SD-WAN can facilitate service chaining, and a selective backhaul model is interesting to many enterprises that want to concentrate next-generation firewall services in larger locations. But with the rapid growth of distributed content in public cloud applications (even from Microsoft and Salesforce, who long resisted this trend that Google pioneered) it’s increasingly counterproductive to backhaul browsing traffic long distances from the end users. It reduces performance, and adds significant load at hubs on the network — not ideal when this can represent 80 percent or more of the traffic.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The new branch office SD-WAN model

Wrapping up an SD-WAN workshop session with a client last week, I reflected on how rapidly the branch office WAN connectivity and management model is changing. Some great opportunities are emerging for enterprise IT teams that can materially impact how the network is designed, paid for and managed. Here are some thoughts:1. Public cloud is driving a lightweight edge security model Most people agree that SD-WAN can facilitate service chaining, and a selective backhaul model is interesting to many enterprises that want to concentrate next-generation firewall services in larger locations. But with the rapid growth of distributed content in public cloud applications (even from Microsoft and Salesforce, who long resisted this trend that Google pioneered) it’s increasingly counterproductive to backhaul browsing traffic long distances from the end users. It reduces performance, and adds significant load at hubs on the network — not ideal when this can represent 80 percent or more of the traffic.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The new branch office SD-WAN model

Wrapping up an SD-WAN workshop session with a client last week, I reflected on how rapidly the branch office WAN connectivity and management model is changing. Some great opportunities are emerging for enterprise IT teams that can materially impact how the network is designed, paid for and managed. Here are some thoughts:1. Public cloud is driving a lightweight edge security model Most people agree that SD-WAN can facilitate service chaining, and a selective backhaul model is interesting to many enterprises that want to concentrate next-generation firewall services in larger locations. But with the rapid growth of distributed content in public cloud applications (even from Microsoft and Salesforce, who long resisted this trend that Google pioneered) it’s increasingly counterproductive to backhaul browsing traffic long distances from the end users. It reduces performance, and adds significant load at hubs on the network — not ideal when this can represent 80 percent or more of the traffic.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The new branch office SD-WAN model

Wrapping up an SD-WAN workshop session with a client last week, I reflected on how rapidly the branch office WAN connectivity and management model is changing. Some great opportunities are emerging for enterprise IT teams that can materially impact how the network is designed, paid for and managed. Here are some thoughts:1. Public cloud is driving a lightweight edge security model Most people agree that SD-WAN can facilitate service chaining, and a selective backhaul model is interesting to many enterprises that want to concentrate next-generation firewall services in larger locations. But with the rapid growth of distributed content in public cloud applications (even from Microsoft and Salesforce, who long resisted this trend that Google pioneered) it’s increasingly counterproductive to backhaul browsing traffic long distances from the end users. It reduces performance, and adds significant load at hubs on the network — not ideal when this can represent 80 percent or more of the traffic.To read this article in full or to leave a comment, please click here

Is your network ready for the Internet of Things?

Buying into IoT comes with a wealth of benefits, but adopting heavy use of the internet of things means more than plugging in devices and waiting for the data to pour in; it means modifying network infrastructure to accommodate them.This is not a trivial consideration. If the network doesn’t adequately support all aspects of IoT, a company may be unable to take advantage of all that data and will fail to realize the return on investment it was hoping for.+Related: Feds consider tougher requirements for IoT security;  IoT Security for Health Care is in critical condition; What is IoT?+To read this article in full or to leave a comment, please click here

Beware n1wireless.com: Bait & Switch

Over the weekend, I ordered an Apple Airport Extreme wireless router from n1wireless.com. The price was great, and their site stated they had 90 in stock. This afternoon, I received from them via e-mail one of the oldest sales tricks there is–the bait and switch.

With the bait and switch technique, the victim is lured by a low price on a desirable product (the bait). The vendor of the low-priced product claims to be out of the bait, offering a different product at a higher price (the switch). N1Wireless suggested that instead of what I had ordered, I spend $50 more on an Apple Time Capsule product.

I applaud n1wireless.com for their bold ethical choices, but respectfully decline the opportunity to spend more money on a product I don’t want.

The lesson is not a new one. If something is too good to be true, then it probably is. Really, I should know better. I had a similar experience with a different vendor several months back selling a TV at a surprisingly low price. After two weeks of waiting for the order to ship, I had to call support to find out that the TV was on backorder, Continue reading

Beware n1wireless.com: Bait & Switch

Over the weekend, I ordered an Apple Airport Extreme wireless router from n1wireless.com. The price was great, and their site stated they had 90 in stock. This afternoon, I received from them via e-mail one of the oldest sales tricks there is–the bait and switch.

With the bait and switch technique, the victim is lured by a low price on a desirable product (the bait). The vendor of the low-priced product claims to be out of the bait, offering a different product at a higher price (the switch). N1Wireless suggested that instead of what I had ordered, I spend $50 more on an Apple Time Capsule product.

I applaud n1wireless.com for their bold ethical choices, but respectfully decline the opportunity to spend more money on a product I don’t want.

The lesson is not a new one. If something is too good to be true, then it probably is. Really, I should know better. I had a similar experience with a different vendor several months back selling a TV at a surprisingly low price. After two weeks of waiting for the order to ship, I had to call support to find out that the TV was on backorder, Continue reading