Turn operational challenges into opportunities, taking advantage of NFV’s strengths.
Occasionally you just need a cheat sheet to configure something up. This is meant to be exactly that, a quick configuration of lan to lan IPSec between an ASA and IOS based router.
! /// Host is simply here to emulate a ! /// client on one end of the network ! hostname Host ! interface GigabitEthernet0/1 description to iosv-1 ip address 192.168.1.2 255.255.255.0 ! ip route 0.0.0.0 0.0.0.0 192.168.1.1
! /// iosv-1 is terminating one end of an IPSec Tunnel ! hostname iosv-1 ! ! /// phase 1 policy ! crypto isakmp policy 10 encr aes authentication pre-share group 2 ! ! /// pre shared key ! crypto isakmp key P@rtn3rNetw0rk address 3.3.3.4 ! crypto ipsec transform-set myset esp-aes esp-sha-hmac mode tunnel ! crypto map mymap 10 ipsec-isakmp set peer 3.3.3.4 set transform-set myset set reverse-route distance 10 match address crypto ! interface GigabitEthernet0/1 description to Internet ip address 2.2.2.2 255.255.255.0 ! ! /// recommend to restrict inbound traffic ip access-group out-in in ! ! /// probably a good idea to disable ip ! /// unreachables on the outside interface no ip unreachables ! ! /// if nat is Continue reading
Community editions mean the first taste is free.
Watching a real butcher work is akin to watching a surgeon. They are experts with their tools, which are cleavers and knives instead of scalpels and stitches. They know how to carve the best cut of meat from a formless lump. And they do it with the expert eye of a professional trained in their trade.
Butcher is a term that is often loaded with all manner of negative connotations. It makes readers think of indiscriminate slaughter and haphazard destruction. But the real truth is that a butcher requires time and training to cut as they do. There is nothing that a butcher does that isn’t calculated and careful.
Why all the discussion about butchers? Because you’re going to see a lot more comparisons in the future when people talk about the pending Dell/EMC acquisition. The real indiscriminate cutting has already started. EMC hid an undisclosed number of layoffs in a Dec. 31 press release. VMware is going to take a 5% hit in jobs, including the entire Workstation and Fusion teams.
It’s no secret that the deal is in trouble right now. Investors are cringing at some of the provisions. The Virtustream spin out was rescinded after Continue reading
The post Worth Reading: Intel becomes irrelevant appeared first on 'net work.
SDN startup adds free entry-level versions of its software-defined networking products to entice new customers.
The world of digital copyright is somewhat tangential to “real” security, but it’s a culture issue that impacts every network engineer in myriad ways. For instance, suppose you buy a small home router, and then decide you really want to run your own software on it. For instance, let’s say you really want to build your own router because you know what you can build will outperform what’s commercially available (which, by the way, it will). But rather than using an off box wireless adapter, like the folks at ARS, you really want to have the wireless on board.
Believe it or not, this would be considered, by some folks, as a pretty large act of copyright infringement. For instance, the hardware manufacturer may object to you replacing their software. Or the FCC or some other regulatory agency might even object because they think you’re trying to hog wireless spectrum, or because you don’t like what the wireless providers are doing. The EFF has a good piece up arguing that just such tinkering as replacing the operating system on a commercially purchased device is at the heart of digital freedom.
One of the most crucial issues in the fight for Continue reading