A strategy overhaul turns Pluribus into an all-software startup.
Presenter: Arkadiy Shapiro, Manager Technical Marketing (Nexus 2000 – 7000) @ArkadiyShapiro
You could say I’m obsessed with BFD –Arkadiy
The focus on this session is around failure detection (not reconergence, protocol tuning, etc). This session will not go over user-driven failure detection methods (ping, traceroutes, etc).
Fast failure detection is the key to fast convergence.
Routing convergence steps:
Failure detection tools: a layered approach: Layer 1, 2, MPLS, 3, application.
Interconnect options:
Think about this: moving to higher speeds (1G -> 10G -> 40G -> beyond) means that more data is lost as you move to higher speeds without changing the failure detection/reconvergence characteristics of the network. 1 second reconvergence time at 1G is way different than 1 second at 40G.
Be aware: ISSU may not support aggressive timers on various protocols. Another reason to be wary of timer cranking.
A Cisco white box is a possibility, John Chambers says.
Implications of IoT for service providers.
Embrace automation, the Arista CEO says.
Presenter: Eric Kostlan, Technical Marketing Engineer, Cisco Security Technologies Group
Above all, Snort is a community –Eric
Snort stats
Snort was created in 1998 (!!). Sourcefire founded in 2001.
The Snort engine
DAQ – packet acquisition library(ies?). Snort leverages this to pull packets off the wire (Snort doesn’t have its own built-in packet capture abilities). DAQ provides a form of abstraction between the Snort engine and the hardware where the bits are flowing. DAQ – Data AcQusition. DAQ modes: inline, passive or read from file.
Packet decoder – look for header anomalies, look for weird TCP flags, much more. Generator id (GID) is 116 for the packet decoder. Decodes Layer and Layer 3 protocols with a focus on TCP/IP suite.
Preprocessors – apply to Layer 3, 4, and 7 protocols. “Protocol decoders”. Normalizes traffic. Major preprocessors: frag3 (reassembly), stream5 (reconstruct TCP streams), http_inspect (normalizes http traffic), protocol decoders (telnet, ftp, smtp, so on).
Detection engine – various performance settings (eg, how long to spend on regex). Two components: rule builder and inspection component. Rule builder: assembles the rules into Continue reading
Jeff Baher discusses Dell's NFV Strategy and what we can expect from Dell's NFV approach.