She brings 20 years of experience in telecom reporting.
The Cross-VC NSX feature introduced in VMware NSX 6.2, allows for NSX logical networking and security support across multiple vCenters. Logical switches (LS), distributed logical routers (DLR) and distributed firewall (DFW) can now be deployed across multiple vCenter domains. These Cross-VC NSX objects are called Universal objects. The universal objects are similar to distributed logical switches, routers, and firewall except they have global or universal scope, meaning they can span multiple vCenter instances. With Cross-VC NSX functionality, in addition to the prior local-scope single vCenter objects, users can implement Universal Logical Switches (ULS), Universal Distributed Logical Routers (UDLR), and Universal DFW (UDFW) across a multi-vCenter environment that can be within a single data center site or across multiple data center sites. In this post we’ll take a look at how we do this. Continue reading
The Tor Project makes a browser that allows anyone to surf the Internet anonymously. Tor stands for "the Onion router" and that describes how the service works. Traffic is routed through a number of relays run across the Internet where each relay only knows the next hop (because each hop is enclosed in a cryptographic envelope), not the ultimate destination, until the traffic gets to the final exit node which connects to the website — like peeling the layers of an onion.
Think of it like a black box: traffic goes into the box, is bounced around between a random set of relays, and ultimately comes out to connect to the requested site. Anonymity is assured because anyone monitoring the network would have a difficult time tying the individuals making the requests going into the black box with the requests coming out.
Anonymity online is important for a number of reasons we at CloudFlare believe in. For instance, Tor is instrumental in ensuring that individuals living in repressive regimes can access information that may otherwise be blocked or illegal. We this is so important that we offer Continue reading
Configuring access to corporate resources is multi-faceted in the age of the digital workspace.
Recent improvements in solid-state drives accelerate their ascendance over HDDs.
DMVPN vs. GETVPN – In this post I am going to cover the similarities and the differences between GETVPN and the DMVPN. For the DMVPN basics, please read this post. Both technologies provide overlay virtual private network in general and I will use the below comparison table and the design attributes listed in it. For the […]
The post DMVPN vs. GETVPN appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
We are proud to announce the winner of our Interop Caption Contest, who will attend Interop Las Vegas on the house!
I’ve been telling you to build small-to-midsized data center with two switches for years ;) A few weeks ago I’ve turned the presentation I had on that topic into a webinar and the first video from that webinar (now part of Designing Private Cloud Infrastructure) is already public.
Late last year, I was pleased to be part of a special Tech Field Day event focused on network analytics. We had a day full of presentations from folks like Netflix, Google, and some goofball with a wrinkly jacket - all focused on what the next-generation networks will look like with respect to analytics.
This was a while ago, but I’ve wanted to write about this ever since, and a recent conversation gave me the spark I needed.
First, I want to mention that - in no small part due to the Netflix presentation - this was one of the first times I’ve heard microservices brought up in a network tooling context. Sure, microservices are all the rage and we’ve definitely seen a lot of activity regarding how to bring our networks up to the level required by these new application architectures. However, starting with this event, I’ve also started to notice a tremendous value in approaching the network software itself with a microservices architecture, instead of the monolithic network monitoring/management software we use today.
More on that in a future post.
If you haven’t watched any of the videos from Continue reading
Hi Folks, I write for a few other publications, so I’ve made this handy page to link to external articles. I’ll update this page as new articles are released. Human Infrastructure Magazine Issue 23 – How To Unblock Your Project Issue … Continue reading
The post Writing elsewhere on the net appeared first on The Network Sherpa.
I’m heading to the Intel Cloud Day event courtesy of Tech Field Day. Intel will provide details on its efforts to build software-defined infrastructure for the cloud, including NFV.
The post Intel Cloud Day Preview appeared first on Packet Pushers.
I’m heading to the Intel Cloud Day event courtesy of Tech Field Day. Intel will provide details on its efforts to build software-defined infrastructure for the cloud, including NFV.
The post Intel Cloud Day Preview appeared first on Packet Pushers.
Agile is a set of principles for software development, but its values and goals can be generally applied in other contexts. This episode explores how to use Agile concepts for IT infrastructure projects and to foster better collaboration.
The post The Next Level: Agile Networking Part 1 appeared first on Packet Pushers.
Agile is a set of principles for software development, but its values and goals can be generally applied in other contexts. This episode explores how to use Agile concepts for IT infrastructure projects and to foster better collaboration.
The post The Next Level: Agile Networking Part 1 appeared first on Packet Pushers.