Archive

Category Archives for "Networking"

JUNIPER NORTHSTAR UPGRADE 2.1 TO 3.0

In this post, I’m quickly going to describe how to upgrade NorthStar 2.1 to 3.0. For a detailed installation and user guide refer to the 3.0 release notes here.

Firstly, let’s start off by verifying the current host OS and NorthStar versions. Note. NorthStar 3.0 requires a minimum of Centos 6.7 or above.

[root@northstar ~]# cat /etc/redhat-release
CentOS release 6.9 (Final)

To check the current version of NorthStar, navigate to the about section via the drop down menu located at the top right of the GUI

northstar-about

Download NorthStar, Extract & Copy:

Download the NorthStar 3.0 application from Juniper.net NorthStar download page. Once downloaded, extract the RPM and copy to your host machine. Below I have copied the NorthStar-Bundle-3.0.0-20170630_141113_70366_586.x86_64.rpm to the /root/rpms/ directory.

[root@northstar ~]# ls /root/rpms/ -l
total 3843976
-rw-r–r–. 1 root root 881371892 Mar 11 2016 NorthStar-Bundle-2.0.0-20160311_005355.x86_64.rpm
-rw-r–r– 1 root root 856402720 Jul 11 2016 NorthStar-Bundle-2.1.0-20160710_201437_67989_360.x86_64.rpm
-rw-r–r– 1 root root 2148942508 Jun 30 19:24 NorthStar-Bundle-3.0.0-20170630_141113_70366_586.x86_64.rpm
-rw-r–r– 1 root root 21878016 Dec 28 2016 NorthStar-Patch-2.1.0-sp1.x86_64.rpm
-rw-r–r–. 1 root root 27610536 Mar 11 Continue reading

Beware of companies claiming products have AI capabilities

Software companies are exploiting the current artificial intelligence (AI) craze by exaggerating the scope and capabilities of AI in their products, according to a report from Gartner. Gartner tracks product marketing hype with a tool it calls the Hype Cycle, measuring the growth and decline of products as they mature. It calls the process of overhyping AI "AI washing," similar to the way the term “greenwashing” was used to describe exaggerated claims of environmental-friendliness in various products or practices. Gartner said more than 1,000 vendors say their products employ AI, but many are "applying the AI label a little too indiscriminately." And it has happened fast.To read this article in full or to leave a comment, please click here

Context From The People

Are you ready for the flood of context-based networking solutions? If not, it’s time to invest in sandbags. After the launch of Cisco’s Intuitive Network solution set at Cisco Live, the rest of the context solutions are coming out to play. Granted, some of them are like Apstra and have been doing this for a while. Others are going to be jumping on the bandwagon of providing a solution that helps with context. But why are we here and why now?

Creating Context

The truth is that we’ve had context in the network for decades now. It’s not a part number that we can order from a vendor. It’s not a command that we type into the CLI to activate. In fact, it’s nothing that you can see at all right now, unless there’s a mirror handy.

The context in networks has been provided by people for as far back as anyone can remember. You do it every day without consciously realizing it. You interpret error messages and disregard those that aren’t important. People know how to program VLANs correctly to segment traffic in certain ways. Security context, application context, and more are delivered by breathing, thinking humans.

We have Continue reading

OSPF Show Commands : Cisco, Juniper, Huawei, HP and Arista Networks

I am going to talk about the OSPF show commands in this article on different vendors which includes Cisco, Juniper, Huawei, HP and Arista Networks. These commands are working as per the device you have. Please let me know if you knew any other commands in general for OSPF in different platforms which includes Cisco, Juniper, Huawei, HP and Arista Networks.

Fig 1.1- Sample OSPF topology

Above is the sample topology and below are the sample OSPF show commands which will help you to troubleshoot OSPF in your network for the various platforms

Cisco OSPF show Commands
ttlbits@cisco#sh ip ospf
ttlbits@cisco#sh ip ospf data
ttlbits@cisco#sh ip ospf database database-summary
ttlbits@cisco#sh ip ospf neighbor
ttlbits@cisco#sh ip ospf nei det
ttlbits@cisco#sh ip ospf int
ttlbits@cisco#sh ip ospf virtual-links
ttlbits@cisco#sh ip ospf database self-originate
ttlbits@cisco#sh ip ospf adv-router X.X.X.X

ttlbits@cisco#sh ip ospf stat

Juniper OSPF show Commands
ttlbits@juniper> show ospf route
ttlbits@juniper> show ospf route detail
ttlbits@juniper> show ospf route extensive
ttlbits@juniper> show ospf3 route detail
ttlbits@juniper> show ospf route topology voice
ttlbits@juniper> show ospf database
ttlbits@juniper> show ospf database detail
ttlbits@juniper> show ospf database extensive
ttlbits@juniper> show ospf Continue reading

How to use Cloudflare for Service Discovery

Cloudflare runs 3,588 containers, making up 1,264 apps and services that all need to be able to find and discover each other in order to communicate -- a problem solved with service discovery.

You can use Cloudflare for service discovery. By deploying microservices behind Cloudflare, microservices’ origins are masked, secured from DDoS and L7 exploits and authenticated, and service discovery is natively built in. Cloudflare is also cloud platform agnostic, which means that if you have distributed infrastructure deployed across cloud platforms, you still get a holistic view of your services and the ability to manage your security and authentication policies in one place, independent of where services are actually deployed.

How it works

Service locations and metadata are stored in a distributed KV store deployed in all 100+ Cloudflare edge locations (the service registry).

Services register themselves to the service registry when they start up and deregister themselves when they spin down via a POST to Cloudflare’s API. Services provide data in the form of a DNS record, either by giving Cloudflare the address of the service in an A (IPv4) or AAAA (IPv6) record, or by providing more metadata like transport protocol and port in an SRV record.

Continue reading

Configuring Private VLANs on Juniper Switches

Thanks for the huge support on all my previous articles. Today I am going to talk about the Private VLANs configuration on the Juniper Switches. Earlier I wrote a article where i talk about the basics of the Private VLANs and the vendors supported to Private VLANs. If you want to have a look on that article, please go through the below mentioned link for the Private VLANs

Basics of Private VLANs

I am sure after reading the above article you will come to know about the basics of the Private VLANs. In this article I am going to cover the Configurational part of the Private VLANs on Juniper Switches, as it is demanded by some of the candidates on the blogs.

I will soon come up the configuration and the topology for the Private VLANs on Cisco and Huawei as well in another article.

A lot of people asking me about the VLANs, before starting with the configuration of the Private VLANs, let me quickly go through the VLANs and Private VLANs.

VLANs : Virtual Local Area Networks
VLANs is the way to partition the various Layer 2 network with in one Local Area Network which simply means that Continue reading

VMware vSphere vSwitches

Local and Distributed vSwitches server the same purpose as physical switches allowing for VM vNICs to be assigned to specific VLANs. In a production environment it is usual to define a local vSwitch on each ESX host for management and backdoor and have distributed vSwitches shared between hosts for VMs.

Cisco N1000v Switches

A cisco vswitch that can be used instead of the default VMware DvS to have a similar environment to that of Cisco physical NXOS switches. The control and packet communication can either be carried over VLANs in Layer2 mode or IP addresses in Layer3 mode. The default and Cisco recommended solution is L3 mode.