A third of my readers are celebrating Thanksgiving today, and I’d like to use the opportunity to say what I always wanted to say but somehow never got to it. Let’s make it short: Thank you! Without you, there would be no ipSpace.net.
Read more ...Orhan Ergun and Jeff Doyle talks about IPv6 design and deployment considerations in the Enterprise networks. They strongly advice you to consider IPv6 deployment in your network. Why IPv6 in the Enterprise , what are the real business drivers for the IPv6 ? Growth of IPv6 in the Enterprise Networks Jeff Doyle’s advices to Service […]
The post IPv6 in the Enterprise by Jeff Doyle and Orhan Ergun appeared first on Packet Pushers Podcast and was written by Orhan Ergun.
[player] Orhan Ergun and Jeff Doyle talks about IPv6 design and deployment considerations in the Enterprise networks. They strongly advice you to consider IPv6 deployment in your network. Why IPv6 in the Enterprise , what are the real business drivers for the IPv6 ? Growth of IPv6 in the Enterprise Networks Jeff Doyle’s advices to […]
The post IPv6 in the Enterprise by Jeff Doyle and Orhan Ergun appeared first on Packet Pushers.
A different kind of war story this time: Unix security blunders. Old-school Unix-types will mutter about how much more secure Unix systems are than Windows, but that glosses over a lot. In a former life I worked as an HP-UX sysadmin, and I saw some shocking default configurations. I liked HP-UX – so much better laid out than Solaris – but it was very insecure by default. Here’s a few things I’ve come across:
We’d lost the root password for a test HP-UX server. We had user access, but not root. The server was located in a different DC, and we didn’t really feel like going and plugging in a console cable to reset the root password. So we started looking around at how we might get access. After a while I found these two things:
And now for the kicker:
hpux lhill$ ls -ld / drwxrwxrwx 30 root wheel 1020 1 Nov 13:57 /
Put those together, and you can see it’s easy to gain root. All we needed to do was create /.rhosts, and add whatever Continue reading
When running services on nodes in a CORE Network Emulator scenario, we may wish to customize the services configurations.
Some reasons why a user may customize CORE services are:
To show how to customize CORE Services, we will work through a detailed tutorial that shows how to customize the IPForward service. We will work through the same steps required to customize any other CORE Service.
The IPForward CORE Service provides a script that runs when the node starts in a simulation scenario. The script sets the IP Forwarding kernel parameters so that the node will forward packets from one port to another, according to the routing table on the node. The IPForward script is a default service on the Router node type.
The default IPForward CORE service has limited functionality: it can start IP forwarding on a Continue reading
These are two standards for single mode fibre optic cabling from a total of five types of fibre that are generically used today known of “OF types” (OM1, OM2, OM3 for multimode and OS1,OS2 for single mode.) OS1 is for indoor use i.e. Campus, Data Centre. Cabling is is tight buffered (i.e. manufactured into solid […]
The post Tech Notes: Difference Between OS1 and OS2 Fibre Optic Cable appeared first on EtherealMind.
Who would you trust more to fix your car, a licensed mechanic or a guy who once saw someone do an oil change? The choice should be simple. But surprisingly, the debate over trusting an expert versus someone who claims to be an expert happens every day across all industries, so it shouldn’t be shocking that the debate rages in the cloud, too.
Cloud computing enables people and companies to access applications from any computer. But the cloud has created a new group of cloud posers -- inexperienced software developers who make bold (and often untrue) claims about the performance of the cloud-based applications they manage. While on the surface they may seem like a good choice to support your business, once you start asking smart questions, a cloud poser’s true colors (and lack of expertise) will quickly be revealed.
To read this article in full or to leave a comment, please click here
Service Level Agreements (SLA) serve as a roadmap and a warranty for cloud services offerings. All cloud providers offer standard, one-size-fits-all SLAs that cover availably, performance, security, disaster recovery, response times, compliance and termination. This may be adequate for pure cloud applications, however standard SLAs fall short when it comes to hybrid cloud deployments.
There is nothing standard about hybrid deployments. Each one is different and inherently includes a higher level of involvement from IT. SLAs need to establish clear guidelines of engagement for both the enterprise and service provider. Unfortunately, not all cloud service providers are open or equipped to customize SLAs.
To read this article in full or to leave a comment, please click here
It was a dark stormy autumn night and three networking engineers had nothing better to do than ponder the heavy topics of transactional consistency in a distributed SDN environment in Episode 16 of Software Gone Wild podcast.
Here are a few of the topics that crossed our minds:
Read more ...Woke up to a very nice email today.
I have been selected as a Cisco Champion for 2015! – Now i get to see what all the fuzz is about and hopefully be able to contribute something.
I always enjoy reading the IPspace blog and as Ivan has stated about our blog, I don’t always agree with his opinion, but they are informative and cover just about everything networking. So this may come as a surprise, but in response to his “Do we have too many knobs” post from about a week ago I have one simple response: “Amen”.
Networking is unnecessarily complicated. We have written several blogs on this topic and related items. I used to run the sustaining organization for all data products at my previous company and when you do the analysis of the customer reported issues that come in to the support organization, you find that a very large percentage stem from configuration mistakes.
Many of those mistakes are not typos. We like to refer to fat fingered configurations often as a reason to move to a more automated configuration and provisioning environment, but most of the configuration mistakes that are made are simply because we have made it so difficult to configure these devices. Type something in the wrong order and it may not work right or behave slightly differently. Simple checks across configurations that could avoid many problems are Continue reading
Software Defined Networking has changed the way that organizations think about their network infrastructure. Companies are looking at increasing automation of mundane tasks, orchestration of policy, and even using white box switches with the help of new unbound operating systems. A new class of technologies that is coming to market hopes to reduce complexity and cost for the Achilles Heel of many enterprises: the Wide Area Network (WAN).
Do You WANt To Build A Snowman?
The WAN has always been a sore spot for enterprise networks. It’s necessary to connect your organization to the world. If you have remote sites or branch locations, it is critical for daily operations. If you have an e-commerce footprint your WAN connection needs to be able to handle the generated traffic. But good WAN connectivity costs money. Lots of money.
WAN protocols are constantly being refined to come up with the fastest possible transmission and the highest possible uptime. Frame Relay, Asynchronous Transfer Mode (ATM) and Multi-Protocol Label Switching (MPLS) are a succession of technologies that have shaped enterprise WAN connectivity for over a decade. They have their strengths and weaknesses. But it is difficult to build an enterprise WAN Continue reading
Network management and monitoring is at the heart of every network but not every product is based on client requests. Enigma NMS has been built by engineers for engineers to use. That's why the interface will be totally familiar to you and has the features you expect to be in the product.
The post PQ Show 36 – ENIGMA NMS – Network Management – The Engineers Monitoring System from NETSAS Australia appeared first on Packet Pushers Podcast and was written by Greg Ferro.
Why don't all companies take a customer-centric approach to service?
Being part of the Packet Design Customer Care department and specifically the Technical Support group, I constantly ask: What more can we do to better serve our customers? My own recent experiences as a customer of various consumer products revealed some things that I can correlate to my job and Packet Design’s customer centric approach.
A Tale of Two ISPs
I use two different Internet service providers and experienced issues with both recently. The first, which I will call “ISP1,” is a wired service provider. One day my service was disconnected, as my subscription had expired. I called them to ask for a renewal at 10:00 a.m., and the customer care executive confirmed a collection agent would arrive shortly. (They have a door-to-door bill collection staff, and they turn your service on immediately upon payment). The agent did show up to renew my service.
At 4:00 p.m. (six hours after I had already renewed the service), I received a call from the same ISP1 asking if I would like to renew, since my Continue reading
• Application Roll Out Reduced from Weeks to Minutes
• VMware NSX Enables Better Agility, Flexibility and Security
Recently I had the opportunity to speak with the team at Schuberg Philis about their successful, production deployment of VMware NSX. As background, Schuberg Philis is an innovative business technology company and an important player in the field of mission critical outsourcing services. The company serves customers across financial services, retail suppliers and utilities, and therefore must comply with the highest international risk management and corporate governance standards, while remaining flexible to evolving customer needs.
The adoption of VMware NSX based network virtualization has transformed the way Schuberg Philis runs its IT. In order to provide 100 percent functional up time of its customers’ critical applications, Schuberg Philis continuously optimizes its infrastructure and processes. However, the company increasingly saw its network as a barrier to increasing business agility.
To solve this challenge and to accelerate application roll out, the Schuberg Philis implemented a software-defined data center environment, and deployed VMware NSX. Schuberg Philis is taking advantage of the VMware NSX platform’s flexibility, security and agility to accelerate the deployment of applications to customers. Schuberg Philis customers now have easy access to Continue reading
After discussing the basics of MPLS and LDP in our Tech Talks chat, Seamus Gilchrist and myself focused on a concept that perplexes many networking engineers entering the MPLS world: the relationship between Forward Equivalence Classes (FEC), LDP and BGP.