I just wanted to take a quick moment to share a site Dan DeBusschere has created. This site is a list of very useful config snippets, information and links. Most of the content is focused on Datacenter and UCS. If you support this type of environment, check it out.
Disclaimer: This article includes the independent thoughts, opinions, commentary or technical detail of Paul Stewart. This may or may not reflect the position of past, present or future employers.
The post Useful Links — Cisco Quicklinks appeared first on PacketU.
A while ago I explained why OpenFlow might be a wrong tool for some jobs, and why centralized control plane might not make sense, and quickly got misquoted as saying “controllers don’t scale”. Nothing could be further from the truth, properly architected controller-based architectures can reach enormous scale – Amazon VPC is the best possible example.
Read more ...![]() |
Topology Continue reading |
Sure, there are other parties out there, but they usually don’t make the ballot for one reason or another. Even when you are not a “hardcore” supporter of either party, you feel stuck in one of those camps since you cannot partially “vote,” much less mix-and-match, as both parties are incompatible with each other.
What if this doesn’t have to be the case?
In this new world democracy, what if you could apportion your vote in a piecemeal fashion? In essence, taking the bits from one party combined with those of another party to create a new candidate tailored for your needs.
For the last 18 months or so, the Open Compute Project (OCP) Networking Group has been further validating and accelerating the adoption of this new reality of a disaggregated network design where the network device is separated from the network operating system (NOS) that powers the device. At the heart of this is a little piece of OCP software called ONIE (Open Network Install Environment), a key innovation by Cumulus Networks and released Continue reading
The Network Break returns with Show 15.
The post Network Break 15 appeared first on Packet Pushers Podcast and was written by Greg Ferro.
In Part 1 we discussed how to turn off ISATAP on Windows host—which is a great idea. Turning off unnecessary components of your network simplifies everything. But ISATAP can be useful in certain scenarios. For instance, if you want to test an application on IPv6 you clearly don’t want to turn on IPv6 everywhere and […]
The post Windows ISATAP Client, Part 2 appeared first on Packet Pushers Podcast and was written by Dan Massameno.
I've been reading the Cisco Application Centric Infrastructure Design Guide. Sometimes I see a product of genius and wondrous use of technology, other times I'm like 'did they do it the hard way or what' ?
The post Musing: First thoughts on how Cisco ACI Works appeared first on EtherealMind.
Here’s an interesting story illustrating the potential pitfalls of multi-DC deployments and the impact of data gravity on application performance.
Long long time ago on a cloudy planet far far away, a multinational organization decided to centralize their IT operations and move all workloads into a central private cloud.
Read more ...
@revolutionwifi @vall_wifi @KeithRParsons The negative effects on effective range with wider channels http://t.co/wyg3qtQjJl
— George Ou (@GeorgeOu) August 20, 2014
In this post I will be showing you how its possible to use different paths between your PE routers on a per VRF basis.
This is very useful if you have customers you want to “steer” away from your normal traffic flow between PE routers.
For example, this could be due to certain SLA’s.
I will be using the following topology to demonstrate how this can be done:
A short walkthrough of the topology is in order.
In the service provider core we have 4 routers. R3, XRv-1, XRv-2 and R4. R3 and R4 are IOS-XE based routers and XRv-1 and XRv-2 are as the name implies, IOS-XR routers. There is no significance attached to the fact that im running two XR routers. Its simply how I could build the required topology.
The service provider is running OSPF as the IGP, with R3 and R4 being the PE routers for an MPLS L3 VPN service. On top of that, LDP is being used to build the required LSP’s. The IGP has been modified to prefer the northbound path (R3 -> XRv-1 -> R4) by increasing the cost of the R3, XRv-2 and R4 to 100.
So by default, traffic between Continue reading
SDN evangelists talking about centralized traffic engineering, flow steering or bandwidth calendaring sometimes tend to gloss over the first rule of successful traffic engineering: Know Thy Traffic.
In a world ruled by OpenFlow you’d expect the OpenFlow controller to know all the traffic; in more traditional networks we use technologies like NetFlow, sFlow or IPFIX to report the traffic statistics – but regardless of the underlying mechanism, you need a tool that will collect the statistics, aggregate them in a way that makes them usable to the network operators, report them, and potentially act on the deviations.
Read more ...Typical Wi-Fi SNR to MCS Data Rate Mappings (Download for full resolution Continue reading |
As part of my work in OpenDaylight, we are looking at creating a router using Open vSwitch... Why? Well OpenStack requires some limited L3 capabilities and we think that we can handle those in a distributed router.
My test topology looks like this:
We have a host in an external network 172.16.1.0/24
, one host in an internal network 10.10.10.0/24
and two hosts in another internal network 10.10.20.0/24
.
As such, The hosts in the 10.x.x.x
range should be able to speak to each other, but should not be able to speak to external hosts.
The host 10.10.10.2
has a floating IP of 172.16.1.10
and should be reachable on this address from the external 172.16.1.0/24
network. To do this, we'll use DNAT for traffic from 172.16.1.2 -> 172.16.1.10
and SNAT for traffic back from 10.10.10.2 -> 172.16.1.2
If you'd like to recreate this topology you can checkout the OpenDaylight OVSDB project source on GitHub and:
vagrant up mininet
vagrant ssh mininet
cd /vagrant/resources/mininet
sudo mn --custom Continue reading
As part of my work in OpenDaylight, we are looking at creating a router using Open vSwitch... Why? Well OpenStack requires some limited L3 capabilities and we think that we can handle those in a distributed router.