With the amount of configuration involved in a typical L3VPN configuration, troubleshooting process can get pretty chaotic, especially in a time-constrained environments like CCIE lab. That’s why it is extremely important to have a well-structured approach to quickly narrow down the potential problem area. I used the below algorithm while preparing for my lab exam. Like most of the networking problems, troubleshooting of L3VPNs can and must be split into two different phases - control plane and data plane. All steps must be done sequentially with each next step relying on the successful verification of all previous steps.

Visibility is the first step toward data center security, vArmour reasons.
A live show recorded with a panel of customers who are well advanced into projects to deploy SD-WAN in their Enterprise networks. The Packet Pushers were pleased to be invited to host and record a live recording in New York in partnership with Viptela.
The post Show 240 – Software Defined WAN – Night of Nerdery – Live From New York – Sponsored appeared first on Packet Pushers Podcast and was written by Greg Ferro.
The proponents of microsegmentation are quick to explain how the per-VM-NIC traffic filtering functionality replaces the traditional role of subnets as security zones, often concluding that “you can deploy as many tenants as you wish in a flat network, and use VM NIC firewall to isolate them.”
Read more ...Presenters: Dave Zacks, Distinguished Engineer; Peter Zones, Principle Engineer
History has been: 10x performnce increase at 3x the cost. 40Gb broke that model -> 100Gb PHYs were very expensive; industry needed/wanted an intermediate step.
Presenter: Eric Howard, Techincal Marketing Engineer
“Why aren't we stopping all the malware???”
When I initially heard about the Internet of Things (IoT) sometime in the past few years, my initial reaction was okay here we go, we have another buzz word that means absolutely nothing. Add in Internet of Everything (IoE), it seemed even worse. After spending some time participating in an IoT Hackathon this past weekend in the DevNet Zone at Cisco Live, I can honestly say that my opinion has changed. Here’s why.
I was set to arrive at Cisco Live on Saturday to attend a DevOps forum on Sunday, but after booking travel and continuing to browse the Cisco Live website, I found out they were having an Internet of Things hackathon that would be starting on Saturday, go through the night, and finish on Sunday. It seemed intriguing because around the same time a highly valued peer of mine had just been telling me about a Cisco device that is still in beta, codename doublemint (more on this later), that is helping consume and deploy IoT-enabled devices. Now I needed to dig in and try to attend the hackathon. Being that I was set to arrive after the hackathon was to start, I emailed the DevNet team Continue reading
Presenter: Craig Williams (@security_craig) – Sr Technical Leader / Security Outreach Manager, Cisco TALOS
I’m from Talos. We love to stop bad guys.
Talos has a serious amount of data. For serious.
Data is key. It allows generation of real threat intel.
We basically have a bottomless pit of data
Talos vuln dev team:
With ransomware, you’re basically funding the malware underground.
Malvertizing:
Destructive/Wiper Malware: