Archive

Category Archives for "Networking"

Azure Networking Fundamentals: Virtual WAN Part 2 – VNet Segmentation

VNets and VPN/ExpressRoute connections are associated with vHub’s Default Route Table, which allows both VNet-to-VNet and VNet-to-Remote Site IP connectivity. This chapter explains how we can isolate vnet-swe3 from vnet-swe1 and vnet-swe2 using VNet-specific vHub Route Tables (RT), still allowing VNet-to-VPN Site connection. As a first step, we create a Route Table rt-swe12 to which we associate VNets vnet-swe1 and vnet-swe2. Next, we deploy a Route Table rt-swe3 for vnet-swe3. Then we propagate routes from these RTs to Default RT but not from rt-swe12 to rt-swe3 and vice versa. Our VPN Gateway is associated with the Default RT, and the route to remote site subnet 10.11.11.0/24 is installed into the Default RT. To achieve bi-directional IP connectivity, we also propagate routes from the Default RT to rt-swe-12 and rt-swe3. As the last step, we verify both Control Plane operation and Data Plane connections. 


Figure 12-1: Virtual Network Segmentation.

IPv6 Buzz 120: Revisiting IPv6 Address Allocation – What’s The Right Size For Your Organization?

Today's podcast episode revisits the subject of IPv6 address allocation along with how changes in network planning and Regional Internet Registry (RIR) policy are influencing allocation size requests. We also look at how network trends around IoT, cloud, and SD-WAN might affect allocation size and how to overcome "IPv4 thinking."

The post IPv6 Buzz 120: Revisiting IPv6 Address Allocation – What’s The Right Size For Your Organization? appeared first on Packet Pushers.

How Many Spines Should a Leaf-and-Spine Fabric Have?

One of my readers sent me a question along these lines:

How do we determine the number of spines needed in a leaf-and-spine fabric? It’s easy to calculate the number of leaf nodes from the required number of server ports, and two spines give you the redundancy. Does it make sense to have more spines if two are good enough from the capacity perspective?

There are at least two factors to consider:

How Many Spines Should a Leaf-and-Spine Fabric Have?

One of my readers sent me a question along these lines:

How do we determine the number of spines needed in a leaf-and-spine fabric? It’s easy to calculate the number of leaf nodes from the required number of server ports, and two spines give you the redundancy. Does it make sense to have more spines if two are good enough from the capacity perspective?

There are at least two factors to consider:

Dell launches new PowerEdge servers, private 5G partnerships at MWC

Dell today announced the forthcoming availability of a new line of PowerEdge servers powered by 4th Generation Xeon Scalable processors, as well as new partnerships with cloud networking providers and hardware makers for private 5G networks.The new PowerEdge server models, which will be availabe in May, are the XR8000, XR7620, and XR5610. They’re designed with modularity and scalability in mind, with the idea of making it easy to deploy and maintain them, even in difficult conditions. (The systems are meant to support temperatures ranging from -5 to 55 degrees Celsius in the field.)To read this article in full, please click here

Dell launches new PowerEdge servers, private 5G partnerships at MWC

Dell today announced the forthcoming availability of a new line of PowerEdge servers powered by 4th Generation Xeon Scalable processors, as well as new partnerships with cloud networking providers and hardware makers for private 5G networks.The new PowerEdge server models, which will be availabe in May, are the XR8000, XR7620, and XR5610. They’re designed with modularity and scalability in mind, with the idea of making it easy to deploy and maintain them, even in difficult conditions. (The systems are meant to support temperatures ranging from -5 to 55 degrees Celsius in the field.)To read this article in full, please click here

Chatbot Attack Vectors And Failure Modes In Networking And IT

With the release of ChatGPT as a product, Microsoft brought Machine Learning (ML) and Artificial Intelligence (AI) back into focus for millions of users—including network operators, coders, and other folks in information technology. People are once against asking if this technology will make them redundant or how it might change their day-to-day jobs. As always, […]

The post Chatbot Attack Vectors And Failure Modes In Networking And IT appeared first on Packet Pushers.

Cisco: Maybe stop yanking on that Ethernet cable

Cisco issued field notices this week outlining what has apparently become a persistent issue: failed Ethernet connections due to a connected Webex device being moved around too much by pulling on its Ethernet cable.The product involved is the Cisco Webex Room Navigator, a small touchscreen device that combines on-screen, controls, sensors and a power-over-Ethernet port used as a controller for Webex conferencing devices and scheduling conference spaces.The problem, as the field notice describes, is that  “the Ethernet port might fail when the Cisco Room Navigator is pulled across the table by the Ethernet cable frequently over a period of several months.”To read this article in full, please click here

Understanding DPUs For Network Engineers – Packet Pushers Livestream With Dell Technologies – Video

This video looks at the fundamentals of Data Processing Units (DPUs) and what they can do with an eye toward helping network engineers and infrastructure professionals. Greg Ferro from the Packet Pushers and Joseph White, a Fellow at Dell Technologies, discuss how DPUs are different from GPUs and CPUs; using DPUs to offload workloads from […]

The post Understanding DPUs For Network Engineers – Packet Pushers Livestream With Dell Technologies – Video appeared first on Packet Pushers.

Day Two Cloud 183: How Did We Get To WebAssembly And What Is It For?

WebAssembly (Wasm) is an up-and-coming technology that's probably going to fall into the lap of operations folks. WebAssembly is basically a specification on how to compile things to a bytecode format and how to execute that bytecode. On today's Day Two Cloud we start to peel the onion on what WebAssembly, what it's used for, and why you might want to get your hands on it.

The post Day Two Cloud 183: How Did We Get To WebAssembly And What Is It For? appeared first on Packet Pushers.

Day Two Cloud 183: How Did We Get To WebAssembly And What Is It For?

WebAssembly (Wasm) is an up-and-coming technology that's probably going to fall into the lap of operations folks. WebAssembly is basically a specification on how to compile things to a bytecode format and how to execute that bytecode. On today's Day Two Cloud we start to peel the onion on what WebAssembly, what it's used for, and why you might want to get your hands on it.