Archive

Category Archives for "Networking"

Off The Cuff – Cisco Acquiring Viptela

In this Off The Cuff episode of Network Collective, we talk about all aspects of Cisco’s announcement of their intent to acquire Viptela’s SD-WAN product.  Who wins in this deal?  What happens to Cisco’s existing SD-WAN product line?  What happens to the rest of the SD-WAN market?  Keith Townsend and Tom Hollingsworth join the Network Collective hosts in breaking down what this means for all involved.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Keith Townsend
Guest
Tom Hollingsworth
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

Audio Only Podcast Feed:

The post Off The Cuff – Cisco Acquiring Viptela appeared first on Network Collective.

Off The Cuff – Cisco Acquiring Viptela

In this Off The Cuff episode of Network Collective, we talk about all aspects of Cisco’s announcement of their intent to acquire Viptela’s SD-WAN product.  Who wins in this deal?  What happens to Cisco’s existing SD-WAN product line?  What happens to the rest of the SD-WAN market?  Keith Townsend and Tom Hollingsworth join the Network Collective hosts in breaking down what this means for all involved.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Keith Townsend
Guest
Tom Hollingsworth
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

Audio Only Podcast Feed:

The post Off The Cuff – Cisco Acquiring Viptela appeared first on Network Collective.

Juniper Control Plane Protection

How Does Internet Work - We know what is networking

I already wrote about Control Plane Protection in one of my previous posts focused on Cisco device configuration. Here we will make the same thing on Juniper device, I was using Juniper SRX300 and Juniper SRX1500 devices in my lab. CoPP ?? Control Plane Protection (CoPP) is a method of protecting processor unit, running services on your network device, against excessive flooding. Excessive flooding of traffic aimed towards your router/firewall processor, being that valid or malicious, is always undesirable and can also be dangerous. A network device, which starts the receive more control traffic that his processor can process, will

Juniper Control Plane Protection

Learning Python: Week2 (Printing, Numbers, and Lists) -Part 3

As discussed in last post,  ( https://crazyrouters.wordpress.com/2017/02/25/learning-python-kirk-byers-python-course/  ) , i will be sharing the my learning on weekly basis as course continues. This will not only motivate me but also help others who are in phase of learning python 3. Here we are going to discuss the Exercise 2 . Here is the Exercise 2 […]

Kubernetes Networking 101 – Ingress resources

I called my last post ‘basic’ external access into the cluster because I didn’t get a chance to talk about the ingress object.  Ingress resources are interesting in that they allow you to use one object to load balance to different back-end objects.  This could be handy for several reasons and allows you a more fine-grained means to load balance traffic.  Let’s take a look at an example of using the Nginx ingress controller in our Kubernetes cluster.

To demonstrate this we’re going to continue using the same lab that we used in previous posts but for the sake of level setting we’re going to start by clearing the slate.  Let’s delete all of the objects in the cluster and then we’ll start by build them from scratch so you can see every step of the way how we setup and use the ingress.

kubectl delete deployments --all
kubectl delete pods --all
kubectl delete services --all

Since this will kill our net-test pod, let’s start that again…

kubectl run net-test --image=jonlangemak/net_tools

Recall that we used this pod as a testing endpoint so we could simulate traffic originating from a pod so it’s worth keeping around.

Alright – now that we Continue reading

Facebook’s text understanding AI is coming to a phone near you

Developers have a new tool to help mobile apps understand text, thanks to a Facebook open source project update on Tuesday. The social networking company’s AI research group released a new version of FastText, a programming library that’s designed to make it easier for developers to deploy text-focused machine learning systems.Using a technique the researchers are calling FastText.zip, developers can compact a language recognition model so that it takes up two orders of magnitude less memory while maintaining much of the accuracy they would get out of a non-compacted model. It’s a move that allows those models to be deployed on less powerful devices like smartphones and Raspberry Pis, making them more useful for a broader variety of applications.To read this article in full or to leave a comment, please click here

Using the Ansible ios_config Module

I get asked often on how to perform specific network automation tasks with Ansible. There were a few questions recently pertaining to the ios_config module within Ansible core, so I decided to record a video to show different options you have when using it to deploy global configuration commands on IOS devices.

Here is a summary of the four (4) options covered:

  1. Embed commands in your playbook and reference them using the commands (or lines) parameter.
  2. Use the src parameter and reference a configuration file with one or more commands in it.
  3. Use the src parameter and reference a Jinja2 template such that it inserts variables into the template, creating a list of commands, and deploys them to a device.
  4. Use two tasks. In Task 1, use the template module and reference a Jinja2 template to auto-generate a configuration file. In Task 2, use the ios_config module and reference the config file built in Task 1 to deploy the commands from the file. This is often used instead of option #3 since it allows you to store/view the config file before deploying fully de-coupling the build and deploy processes.

Using the ios_config module

The video does assume some existing knowledge on using Ansible. The Continue reading

Using the Ansible ios_config Module

I get asked often on how to perform specific network automation tasks with Ansible. There were a few questions recently pertaining to the ios_config module within Ansible core, so I decided to record a video to show different options you have when using it to deploy global configuration commands on IOS devices.

Here is a summary of the four (4) options covered:

  1. Embed commands in your playbook and reference them using the commands (or lines) parameter.
  2. Use the src parameter and reference a configuration file with one or more commands in it.
  3. Use the src parameter and reference a Jinja2 template such that it inserts variables into the template, creating a list of commands, and deploys them to a device.
  4. Use two tasks. In Task 1, use the template module and reference a Jinja2 template to auto-generate a configuration file. In Task 2, use the ios_config module and reference the config file built in Task 1 to deploy the commands from the file. This is often used instead of option #3 since it allows you to store/view the config file before deploying fully de-coupling the build and deploy processes.

Using the ios_config module

The video does assume some existing knowledge on using Ansible. The Continue reading

Verizon.net email addresses are going away — here are 4 alternatives

Verizon has begun warning customers that it’s getting out of the email game and that you need to act soon if you want to keep your Verizon.net email address.One alternative is to actually keep that Verizon.net address, but have Verizon acquisition AOL manage it for you. So your address would be [email protected] on the surface, but AOL underneath due to Verizon ending its email service. (See also: "How to keep your Verizon email account from being killed off")But if this whole situation might be prompting you to make a clean break from your carrier’s email system, here are a few free messaging services that you might want to consider, some more obvious than others. I’ve taken a fresh spin through each of the email systems to collect the latest info on them, figuring at least a good chunk of the 4.5 million email accounts controlled by Verizon will be moving elsewhere sooner than later.To read this article in full or to leave a comment, please click here

Verizon.net email addresses are going away — here are 4 alternatives

Verizon has begun warning customers that it’s getting out of the email game and that you need to act soon if you want to keep your Verizon.net email address.One alternative is to actually keep that Verizon.net address, but have Verizon acquisition AOL manage it for you. So your address would be [email protected] on the surface, but AOL underneath due to Verizon ending its email service. (See also: "How to keep your Verizon email account from being killed off")But if this whole situation might be prompting you to make a clean break from your carrier’s email system, here are a few free messaging services that you might want to consider, some more obvious than others. I’ve taken a fresh spin through each of the email systems to collect the latest info on them, figuring at least a good chunk of the 4.5 million email accounts controlled by Verizon will be moving elsewhere sooner than later.To read this article in full or to leave a comment, please click here

Shodan search engine starts unmasking malware command-and-control servers

There's now a new tool that could allow companies to quickly block communications between malware programs and their frequently changing command-and-control servers.Threat intelligence company Recorded Future has partnered with Shodan, a search engine for internet-connected devices and services, to create a new online crawler called Malware Hunter.The new service continuously scans the internet to find control panels for over ten different remote access Trojan (RAT) programs, including Gh0st RAT, DarkComet, njRAT, ZeroAccess and XtremeRAT. These are commercial malware tools sold on underground forums and are used by cybercriminals to take complete control of compromised computers.To read this article in full or to leave a comment, please click here

Shodan search engine starts unmasking malware command-and-control servers

There's now a new tool that could allow companies to quickly block communications between malware programs and their frequently changing command-and-control servers.Threat intelligence company Recorded Future has partnered with Shodan, a search engine for internet-connected devices and services, to create a new online crawler called Malware Hunter.The new service continuously scans the internet to find control panels for over ten different remote access Trojan (RAT) programs, including Gh0st RAT, DarkComet, njRAT, ZeroAccess and XtremeRAT. These are commercial malware tools sold on underground forums and are used by cybercriminals to take complete control of compromised computers.To read this article in full or to leave a comment, please click here

Google’s surging Chromebooks will test Microsoft’s new Windows 10 S PCs

Microsoft for years has been trying to tackle the growing threat of Google's Chrome OS, which is siphoning PC market share away from Windows.The company's new Windows 10 S operating system, announced on Tuesday, will be Microsoft's latest attempt to tackle Google's surging Chrome OS. The OS is targeted at the education market, which in the U.S. is dominated by Chromebooks.Even with the new Windows OS, worldwide Chromebook shipments are expected to grow by double digits this year, analysts from IDC and Gartner said. The market share of Chromebooks has been growing up consistently since 2015.The new Windows OS is built like Chrome OS. PCs with Windows 10 S will be able to download apps only from the Windows App store. The OS is more like a "container" that will run apps secured and verified by Microsoft. A version of Microsoft's Office Suite will also come to Windows 10 S.To read this article in full or to leave a comment, please click here

46% off Razer Kraken Pro Gaming Headset for PC, Xbox One and Playstation 4 – Deal Alert

On top of being optimized for extended wear, the Razer Kraken Pro is outfitted with a fully retractable microphone, in-line volume controls and mute toggle, giving you easy access to all its features. Powered by large, high-quality drivers, this full-sized headset provides you with immersive gaming audio for hours on end.  The 3.5mm combined audio jack and splitter cable ensure that you have mic support on your mobile devices as well as full connectivity to any gaming setup.This gaming headset currently averages 4 out of 5 stars from over 1,400 people (read reviews) on Amazon, where its typical list price of $79.99 has been recently dropped 46% to just $42.99.  See this deal now on Amazon.To read this article in full or to leave a comment, please click here