Archive

Category Archives for "Networking"

Apple Watch pre-orders to begin at 12:01 Pacific Time on April 10

Apple on Friday afternoon updated its Apple Watch page with more precise details regarding Apple Watch pre-orders. According to Apple's website, pre-orders for Apple's highly anticipated wearable will begin at 12:01 AM Pacific Time  on Friday, April 10. Of course, this doesn't bode well for prospective buyers on the East Coast who will have to wait up until 3:01 AM in order to get their orders in.The latest reports from the rumor mill suggests that the Apple Watch will not be available to walk-in shoppers. Which is to say, if you want to get your hands (or wrist, as it were) on an Apple Watch, you absolutely must pre-order the device or make a reservation to check one out in-store. Presumably, walk-in sales will eventually be possible once supply is properly calibrated to match demand.To read this article in full or to leave a comment, please click here

My CLUS 2015 Schedule for San Diego

With roughly two months to go before Cisco Live starts, here is my preliminary schedule for San Diego.

CLUS San Diego Schedule

I have two CCDE sessions booked to help me prepare for the CCDE exam. I have the written scheduled on wednesday and we’ll see how that goes.

I have a pretty strong focus on DC because I want to learn more in that area and that should also help me prepare for the CCDE.

I have the Routed Fast Convergence because it’s a good session and Denise Fishburne is an amazing instructor and person.

Are you going? Do you have any sessions in common? Please say hi if we meet in San Diego.


What’s In My Bag (Hint: not much)

Recently @BobMcCouch posted a photo of the contents of his bags. He’s got a lot of gear, including a hammer, and a dent-puller. He assures us that it’s for lifting tiles, but I’m not so sure. Sounds to me like he’s worried about a few dings in the supermarket carpark.

It all sounded a bit scary. I want to provide a different perspective, that of someone who tries to minimise what they carry. I don’t want young engineers to think that they have to build up a huge toolbox, and the physical strength to lug it around. You might choose to do that, but it’s not the only path.

Note: I am not saying that what Bob is doing is wrong. Bob’s a smart guy, and if he’s carrying all that stuff, you can be sure it’s for a reason. What I’m trying to say is that there are different paths in network engineering.

The Bag Itself

My general rules for a laptop bag are that it should be as small as I can get away with, and it should not look too much like a laptop bag. So pretty much anything from Targus is inappropriate.

Today I use the “ Continue reading

Power up, baby! Cyntur JumpStart Mini: A monster backup battery in a tiny package

The market for portable battery packs to keep your digital life going on the road has become a huge business over the last couple of years and I just got my hands on one of the more versatile and powerful products in this market: The Cyntur JumperPack mini. This is a small (6.0” by 3.3” by 1.3”), weatherproof device that weighs just 0.9 pounds but despite its diminutive size contains a whopping 12,000 mAh lithium-ion battery, enough to jumpstart an eight-cylinder engine. Not only that but it's powerful enough, the company claims, to jumpstart 25 engines in a row (a problem I hope to never have).To read this article in full or to leave a comment, please click here

Network Break 34 – Fixed

Excerpt: Coffee, virtual doughnuts and networking. A perfect combination.

Author information

Greg Ferro

Greg Ferro is a Network Engineer/Architect, mostly focussed on Data Centre, Security Infrastructure, and recently Virtualization. He has over 20 years in IT, in wide range of employers working as a freelance consultant including Finance, Service Providers and Online Companies. He is CCIE#6920 and has a few ideas about the world, but not enough to really count.

He is a host on the Packet Pushers Podcast, blogger at EtherealMind.com and on Twitter @etherealmind and Google Plus.

The post Network Break 34 – Fixed appeared first on Packet Pushers Podcast and was written by Greg Ferro.

Network Break 34

Excerpt: Coffee, virtual doughnuts and networking. A perfect combination.

Author information

Greg Ferro

Greg Ferro is a Network Engineer/Architect, mostly focussed on Data Centre, Security Infrastructure, and recently Virtualization. He has over 20 years in IT, in wide range of employers working as a freelance consultant including Finance, Service Providers and Online Companies. He is CCIE#6920 and has a few ideas about the world, but not enough to really count.

He is a host on the Packet Pushers Podcast, blogger at EtherealMind.com and on Twitter @etherealmind and Google Plus.

The post Network Break 34 appeared first on Packet Pushers Podcast and was written by Greg Ferro.

Connecting VIRL, CML networks to outside world

This is a continuation of my VIRL, CML blog series. VIRL/CML overview is covered here. It will be good to connect VIRL, CML networks to outside world. Following are some use cases. If management interface of VIRL routers are accessible from outside machines, we can run management application in the client machine and connect directly … Continue reading Connecting VIRL, CML networks to outside world

US gains in mobile patents as IBM passes Samsung

The U.S. widened its lead in mobile patents last year and IBM took the top spot in new patents granted in that space, according to a report this week that analyzed data from both the U.S. and Europe.While the number of mobile patents granted by the U.S. Patent and Trademark Office (USPTO) jumped by 17 percent between 2013 and 2014, the total fell by 4 percent at the European Patent Office (EPO), according to Chetan Sharma Consulting. The U.S. continued to gain on Europe as the place where mobile inventions are devised, a trend driven by software development in Silicon Valley and Americans’ heavy use of mobile data, the report said.To read this article in full or to leave a comment, please click here

Benchmark scores show performance gap between Surface 3 and Surface Pro 3, iPad Air 2

A handful of benchmark scores for Microsoft's not-yet-released Surface 3 tablet hint that it's between a third and half as fast as the company's older 2-in-1, the more powerful Surface Pro 3.The scores also show that Apple's iPad Air -- which starts at the same $499 price of the Surface 3 -- is between 36% and 93% faster than Microsoft's latest device.Five Surface 3 benchmark scores posted on Primate Labs' Geekbench in the last two days have ranged from 949 to 1009 for single-core, and from 3200 to 3430 for multi-core.The tests may have been run by people who have a review unit; like other hardware makers, Microsoft often seeds media outlets and influential blogs with machines prior to bringing them to retail, giving reviewers hands-on time so that they can publish their takes on or before the sale or ship date.To read this article in full or to leave a comment, please click here

Senator wants bomb-making information removed from the Internet

After two U.S. women were charged this week with conspiring to build bombs in support of terrorist groups, a U.S. senator wants two publications that include bomb-making instructions deleted from the Internet.Senator Dianne Feinstein, a California Democrat, called for the 44-year-old Anarchist Cookbook and al-Qaeda’s Inspire Magazine to be banished from the Web, notwithstanding the difficulty of removing material from the entire Internet or the U.S. Constitution’s First Amendment. It’s not the first time that Feinstein has tried to ban publications that instruct would-be bomb-makers.“I am particularly struck that the alleged bombers made use of online bomb-making guides like the Anarchist Cookbook and Inspire Magazine,” Feinstein, a veteran member of the Senate Intelligence Committee, said in a statement. “These documents are not, in my view, protected by the First Amendment and should be removed from the Internet.”To read this article in full or to leave a comment, please click here

Use software license optimization tools to get your money’s worth out of SaaS

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Software as a Service (SaaS) breaks the shackles of traditional software licensing approaches, but savvy users still optimize their SaaS environments to avoid undue costs.

SaaS subscription models typically require a one to three year commitment. Customers are invoiced, usually on a monthly basis, and the license typically uses some sort of billing metric based on resource usage, such as the number of end users that can access the product. The flexibility of SaaS licensing models enables organizations to expand the use of the product according to their needs during the term of the subscription.

To read this article in full or to leave a comment, please click here

Exporting RSA keys from Cisco ASA: Harder than it should be

Unlike Cisco IOS routers, which by default don't allow RSA private keys to be exported from NVRAM, Cisco ASAs don't protect private keys. But there's no command (of which I'm aware) to directly export the keys either.

Sometimes you need to squirrel away those keys. You can do it by getting a certificate that uses the keys, then exporting a certificate bundle (with private key included). Here's how.

First, create a key:
 crypto key generate rsa label mykey modulus 2048  

Next, create a trustpoint which references the key, and generate a self-signed certificate:
 crypto ca trustpoint throwaway  
keypair mykey
enrollment self
crypto ca enroll throwaway noconfirm

Now the throwaway trustpoint has a certificate. Export that certificate to the terminal.
 no terminal pager  
crypto ca export throwaway pkcs12 <passphrase>

Save the blob of text including the begin/end lines. The blob is a PKCS12 bundle encrypted using the passphrase above and then base64 encoded. Be sure to save the encryption passphrase.
 -----BEGIN PKCS12-----  
MIIJZwIBAzCCCSEGCSqGSIb3DQEHAaCCCRIEggkOMIIJCjCCCQYGCSqGSIb3DQEH
BqCCCPcwggjzAgEAMIII7AYJKoZIhvcNAQcBMBsGCiqGSIb3DQEMAQMwDQQI4KTD
...etc...
ru1WrVnO7wFa+83BK8D+aQ7UedzQuU6NOiDrjPR0w8uWSLwKmmSVgnZN4BEwPTAh
MAkGBSsOAwIaBQAEFGA2bfp4y+a/R29RZ9TA8sCUSZ+jBBRvppgVbM8rBbW62096
L/HnJErexgICBAA=
-----END PKCS12-----

We no longer need the certificate or the throwaway trustpoint in which it's stored. Kill it. The private key will survive.
 no crypto ca trustpoint throwaway noconfirm  

The easiest way to Continue reading