Archive

Category Archives for "Networking"

Auto Network Diagram with Graphviz

One of the most useful and least updated pieces of network documentation is the network diagram. We all know this, and yet we still don’t have/make time to update this until something catastrophic happens and then we says to ourselves

Wow. I wish I had updated this sooner…

Graphviz

According to the website 

Graphviz is open source graph visualization software. Graph visualization is a way of representing structural information as diagrams of abstract graphs and networks. It has important applications in networking, bioinformatics,  software engineering, database and web design, machine learning, and in visual interfaces for other technical domains.

note: Lots of great examples and docs there BTW.  Definitely check it out.

Getting started

So you’re going to have to first install graphviz from their website. Go ahead… I’l wait here.

Install the graphviz python binding

This should be easy assuming you’ve already got python and pip installed. I’m assuming that you do.

>>> pip install graphviz

Getting LLDP Neighbors from Arista Devices

You can use the Arista pyeapi library, also installable through pip as well.  There’s a blog which introduces you to the basics here which you can check out. Essentially I followed that blog and then substituted the Continue reading

Up to 25% off Amazon Kindle and Fire Tablets – Deal Alert

Amazon has discounted various models of Kindle and Fire Tablets, some up to 25% off their regular list price. Use the links below to learn more and explore buying options. 25% off Kindle -- small, light, and perfect for reading. 17% off Kindle Paperwhite -- Amazon's best-selling Kindle. 20% off Fire Tablet, 7" Display, Wi-Fi, 8 GB 20% off Fire Kids Edition Tablet, 7" Display, Wi-Fi, 16 GB To read this article in full or to leave a comment, please click here

Nanoleaf Aurora: Smart lighting for the nerd set

“You’re going to put that in your office, aren’t you?” So quoth my beloved when I assembled and fired up the Nanoleaf Aurora lighting system in our living room. I understood her point. As lighting solutions go, the Nanoleaf Aurora isn’t exactly subtle in design and in operation as colors flow and change across the various panels it can be a little, well, dominating. That said, speaking as a card-carrying nerd, I love it! Check it out: As you can see, the Nanoleaf Aurora could be part of the set of “Lost in Space”, so unless your house looks like something from the Jetsons, you may find you have a stylistic conflict (and possibly significant other conflict) to deal with. To read this article in full or to leave a comment, please click here

Cisco Clock Issue – This Is Really Bad

Check out this advisory from Cisco that came out a couple days ago.  You need to read it and act on it immediately!  I’ll summarize for you : Thanks to a faulty clock signal component, certain Cisco devices will stop functioning after about 18 months and become really expensive bricks!  Reading through it, you’ll see phrases like “we expect product failures” and “is not recoverable.”  Seriously, what the hell? This really warms the heart.

The fault affects a couple Meraki devices, the Nexus 9504, and some models of the ISR 4000s – the ISR4331, ISR4321, and ISR4351.  The 4000s are part of Cisco’s flagship branch routers, and I know several people (including myself!) who have some of the affected units deployed in production.  Some unnamed people on Twitter tell me that they have 50 and even 120 of these guys deployed in the field.  That’s a lot of faulty clocks.

The fix is to open a TAC case and get a new device.  Cisco is using the word “platform” when talking about replacement, meaning that they’ll send you a naked device.  If you have cards or memory upgrades or a Continue reading

25% off iHome iPL23 Clock Radio with Lightning Dock, Support for iPhone 7/7+ – Deal Alert

iHome's iPL23 is compatible with iPhones 5, 6 and 7 (including Plus models), features premium speakers, a Lightning charging dock, FM radio, and alarm clock in one compact device. This handy radio clock charges Lightning-capable iPhone and iPod devices, while letting you wake or sleep to your favorite songs, podcasts, audio books or FM radio station. Gradual wake/sleep function slowly increases or decreases volume as you drift off, or come to. A USB port allows for simultaneous charging of your iPad or Apple Watch as well. The iPL23 in white has been discounted 25% from $79.95 to $59.95.To read this article in full or to leave a comment, please click here

SSH is a BAD API

Okay, so its not meant to be an API. I get that. I’ve been watching a rather good video about executing interactive commands with Parimiko and two thoughts came to my mind.

  • Very powerful/flexible way to do tasks across many devices
  • This could be a LOT easier if we simply had the RESTful API’s we want everywhere

In any case, I think the video below is a worthwhile watch if you’re struggle to leverage Python and SSH to make a modification across a large number of devices.

Disclaimer: This article includes the independent thoughts, opinions, commentary or technical detail of Paul Stewart. This may or may does not reflect the position of past, present or future employers.

The post SSH is a BAD API appeared first on PacketU.

The LeEco Le Pro 3 Ecophone; an Android smartphone definitely worth considering

It takes a brave company to attempt to gain a serious foothold in the U.S. smartphone market given that the dominant players are so massive and entrenched but that apparently wasn't a concern of LeEco when the company launched its products at the end of 2016. And rather than just selling smartphones, LeEco’s market approach is to become a lifestyle brand and claims that: LeEco seamlessly blends devices, content, applications and distribution in a first-of-its kind ecosystem. This innovative approach puts extraordinary experiences in the hands of millions of people all over the world. Pretty ambitious stuff but perhaps not surprising as LeEco is notable for being aggressively innovative and their product lines include televisions (the company acquired U.S. television manufacturer Vizio last year), headphones, speakers, chargers, phone covers, and there’s the LeEco Super Bike (with built-in fingerprint sensor ID and a waterproof touchscreen Android display). But wait! There’s more! They’ve even showcased a high-tech, self-driving concept car. To read this article in full or to leave a comment, please click here

Automation: Build or Consume?

The question of “home grown vs. off the shelf” comes up a lot. It comes up both in a professional capacity and social.

Home grown, usually born out of frustration to solve an immediate problem, often is a path that leads to consuming something off the shelf either Open Source or commercial. Home grown can deliver rapid results for simple things but has an exponential learning growth curve to do something more complex.

Why learn the oddities and nuances of a full programming language to write a multi-threaded application that automates concurrently, when you can write simple instructions that makes something else takes care of all of that mucking about in parallelism, logging and worrying about covering every use case. If you like hacking and building things, is it not better to apply that yearning solving rapidly rewarded challenges or to work on building something that starts off fragile and like all babies, has to learn to crawl, walk and be weened off milk?

Good tools deal with things like input, decision making and invoking output. It’s always better to control the pipeline and write linkages than to build the whole thing. After all, the problem with software is, you Continue reading

Starting SDN Learning Journey- Through Open vSwitch

openvswitch.png

Introduction

Software Defined networking (SDN) is no more a new topic but still many Network/ System engineers feel it painful how to start learning SDN. Many SDN solution exists in market and each has its pros and cons. Objective of this blog is to give an idea about SDN basics to the engineers who want to start their SDN learning curve.

Reference topology

  • 2 x Ubuntu host (14.04 LTS) each with multiple NICs
  • Open vSwitch installed in each host and 1 instance created.
  • Virtual Box installed in each host, vBox will be used to host guest virtual machines (VM-A & VM-B)

Topology Description

Open vSwitch (e.g br0) in each host will have following interfaces:-

  • A tap interface which will be used to bind guest VM to Open vSwitch
  • Eth1 of each host will be added to Open vSwitch
  • IP address / sub netmask for Eth1 of each host will be configured on Open vSwitch itself (br0)
  • Guest VM eth1 will be configured with IP/sub net mask different that host IP/ sub net mask
  • VXLAN / GRE will be configured on each host (by using host IP addresses)

Step by Step setting up Lab

It is assumed Ubuntu 14. Continue reading

TIP: How To Do MD5 and SHA1 File Checksum Validation

It’s always a good idea to calculate an MD5 or SHA1 file checksum to validate file integrity after download or transfer, especially when dealing with firmware binaries. While most modern systems are smart enough to validate images before attempting an installation, not all are so wise, and I’m sure I’m not the only one to have seen a device bricked (or stuck in ROMMON or a similar bootloader or equivalent) after a bad image was uploaded.

File Checksum

Here’s a quick reference guide to creating file checksums on Macos (OSX), Windows and Linux.

File Checksum Validation

There are various ways to check md5/sha1 checksums depending on your preferred platform. Vendors tend to publish the MD5 or SHA1 checksums (or both) for downloadable files, so it’s silly not to do checksum validation and confirm that the file has downloaded completely and uncorrupted. I try to validate after each time I transfer a file so that I don’t waste time sending a corrupted file on to the next hop. For example:

  • Download image file from Cisco’s website
  • — View the checksum and compare
  • SCP the file to a target jump server
  • — View the checksum and compare
  • SCP the file to the end device

Continue reading

Mozilla zaps residue of Firefox OS as it shutters IoT group

Mozilla confirmed that it is shuttering a group tasked with creating an operating system for connected devices, the category pegged as the "Internet of things," or IoT.It was the second defeat in 14 months for Mozilla projects aimed at producing commercial hardware products."We have shifted our internal approach to the IoT opportunity to step back from a focus on launching and scaling commercial products to one focused on research and advanced development," a Mozilla spokesman said in an email reply to questions. The open-source developer will dissolve its connected devices project, and will instead "incorporate our IoT explorations into an increased focus on emerging technologies."To read this article in full or to leave a comment, please click here

Lawsuit claims Apple broke FaceTime to force iOS 6 users to upgrade

Did Apple purposefully break iOS 6, rendering old iPhones unusable before their time? That’s the question at the heart of a new class-action lawsuit against the Cupertino company, which claims that Apple killed FaceTime in iOS 6 to avoid paying hefty licensing fees.The basis of the lawsuit, first reported by AppleInsider, comes from details that emerged last year in VirnetX’s patent infringement suit against the company. VirnetX licenses patents to technology companies, and one of those patents covers peer-to-peer audio and video transfer; Apple used peer-to-peer transfer to power FaceTime. When VirnetX, which has been described as a “patent troll,” came after Apple, the company switched to another relay method for FaceTime, using the third-party server Akami. That’s where things get tricky. Apple had to pay Akamai for that server usage to the tune of millions and millions of dollars. Faced with VirnetX’s patent infringement court win and mounting Akamai bills, Apple created a new peer-to-peer protocol for FaceTime in iOS 7.To read this article in full or to leave a comment, please click here

AT&T will prove 5G using open-source SDN technology

The blazing fast speed and low latency of 5G could suffer from the same obstacle that Gig-internet access does: a scarcity of apps that demonstrate its capabilities. Case in point: The Chattanooga municipal power company EPB slashed the price of Gig-internet to $69.95 per month because many customers opted for slower 100MB service at $59.95 because typical mobile and PC apps do not showcase the benefits of the top speed offering.It is a chicken and egg problem, or more aptly the chicken and the app problem. Without high-speed infrastructure, apps cannot be built that demonstrate the capabilities of 5G. And without apps, infrastructure will not reach cost effectiveness and be deployed at scale. 5G will not scale without distributing the cloud platforms into the network infrastructure running on software-defined networking (SDN) commodity hardware.To read this article in full or to leave a comment, please click here

UK defense secretary urges NATO to fend off Russian cyberattacks

The U.K.’s defense secretary is accusing Russia of using cyber attacks to “disable” democratic processes across the West, and he's demanding that NATO fight back.“NATO must defend itself as effectively in the cyber sphere as it does in the air, on land, and at sea,” Defense Secretary Michael Fallon said. “So adversaries know there is a price to pay if they use cyber weapons.”Fallon made the comments in a Thursday speech about the threat of “Russia’s military resurgence.”He pointed to the Kremlin’s suspected role in influencing last year’s presidential election in the U.S., as part of growing number of alleged cyber attacks that have targeted Western governments.   To read this article in full or to leave a comment, please click here

UK defense secretary urges NATO to fend off Russian cyberattacks

The U.K.’s defense secretary is accusing Russia of using cyber attacks to “disable” democratic processes across the West, and he's demanding that NATO fight back.“NATO must defend itself as effectively in the cyber sphere as it does in the air, on land, and at sea,” Defense Secretary Michael Fallon said. “So adversaries know there is a price to pay if they use cyber weapons.”Fallon made the comments in a Thursday speech about the threat of “Russia’s military resurgence.”He pointed to the Kremlin’s suspected role in influencing last year’s presidential election in the U.S., as part of growing number of alleged cyber attacks that have targeted Western governments.   To read this article in full or to leave a comment, please click here

US Immigration and Customs Enforcement nabs $20M in fake sports gear ahead of Super Bowl 51

Like clockwork, the week leading up to the Super Bowl has seen the federal government tear into the counterfeit sports gear element – this time seizing some $20 million worth of fake jerseys, hats, cell-phone accessories and thousands of other bogus items prepared to be sold to unsuspecting consumers.+More on Network World: 10 of the latest craziest and scariest things the TSA found on your fellow travelers+ ICE/DHS U.S. Immigration and Customs Enforcement (ICE) and Homeland Security Investigations (HSI) teams nabbed 260,000 counterfeit sports-related items during its annual, year-long Operation Team Player sting. Last year ICE seized nearly 450,000 phony items worth an estimated $39 million. In 2014 it grabbed 326,147 phony items worth more than $19.5 million.To read this article in full or to leave a comment, please click here