Introduction
Software Defined networking (SDN) is no more a new topic but still many Network/ System engineers feel it painful how to start learning SDN. Many SDN solution exists in market and each has its pros and cons. Objective of this blog is to give an idea about SDN basics to the engineers who want to start their SDN learning curve.
Reference topology
Topology Description
Open vSwitch (e.g br0) in each host will have following interfaces:-
Step by Step setting up Lab
It is assumed Ubuntu 14. Continue reading
DANZ addresses customer's concerns for more security.
It’s always a good idea to calculate an MD5 or SHA1 file checksum to validate file integrity after download or transfer, especially when dealing with firmware binaries. While most modern systems are smart enough to validate images before attempting an installation, not all are so wise, and I’m sure I’m not the only one to have seen a device bricked (or stuck in ROMMON or a similar bootloader or equivalent) after a bad image was uploaded.
Here’s a quick reference guide to creating file checksums on Macos (OSX), Windows and Linux.
There are various ways to check md5/sha1 checksums depending on your preferred platform. Vendors tend to publish the MD5 or SHA1 checksums (or both) for downloadable files, so it’s silly not to do checksum validation and confirm that the file has downloaded completely and uncorrupted. I try to validate after each time I transfer a file so that I don’t waste time sending a corrupted file on to the next hop. For example:
Delta's recent IT failures put spotlight on the faulty nature of enterprise disaster recovery planning.
The post Worth Reading: Quantum safe glossary appeared first on 'net work.
As many as 1 million tech workers hold H-1B visas.
Microsoft Azure appears to be gaining steam.
A weak Q3 is now a distant memory.
Some ISR routers and Nexus 9000 switches impacted by faulty component from Cisco supplier.