In the last episode in our world wide tour of fast reroute mechanisms, we discussed Not-Via. While an interesting concept, Not-Via does require a number of extra IP addresses, as well as a new set of special routing advertisements, to work properly. So while Not-Via is conceptually simple, it hasn’t ever really been accepted as […]
How does the internet work - We know what is networking
Please note that this article is more or less pure speculation. The fact is that CCIE R&S v5 blueprint will be presented 28th January 2014 on Milan’s Cisco live event everything else is yet to be announced. From Milan’s Cisco live 28.1.2014 there is an CCIE R&S v5 blueprint event scheduled. When Cisco wants to […]
SDN Joke from Brent Salisbury's awesome ONUG presentation. I don't know these cats nor the owner of the photo. |
For best article visual quality, open Revell F-104G Starfighter 1/48 directly at NetworkGeekStuff.
Ok, this time there is something special, this is my first model where I used an air brush. As a complete beginner I got the Revell AirBrush starter kit as visible below. I was very happy with it, despite the fact that you cannot do much details with the basic pistol that is creating a paint flow that is too wide.
Regarding the F-104, let me borrow from wiki :
[wikipedia.org]:
The Lockheed F-104 Starfighter is a single-engine, high-performance, supersonic interceptor aircraft originally developed for the United States Air Force (USAF) by Lockheed. One of the Century Series of aircraft, it was operated by the air forces of more than a dozen nations from 1958 to 2004.
The F-104 served with the USAF from 1958 until 1969, and continued with Air National Guard units until 1975. The National Aeronautics and Space Administration (NASA) flew a small mixed fleet of F-104 types in supersonic flight tests and spaceflight programs until 1994.[2] USAF F-104Cs saw service during the Vietnam War, and F-104A aircraft were deployed by Pakistan briefly during the Indo-Pakistani wars. Continue reading
[This post has been written by Martin Casado and Justin Pettit with hugely useful input from Bruce Davie, Teemu Koponen, Brad Hedlund, Scott Lowe, and T. Sridhar]
Overview
This post introduces the topic of network optimization via large flow (elephant) detection and handling. We decompose the problem into three parts, (i) why large (elephant) flows are an important consideration, (ii) smart things we can do with them in the network, and (iii) detecting elephant flows and signaling their presence. For (i), we explain the basis of elephant and mice and why this matters for traffic optimization. For (ii) we present a number of approaches for handling the elephant flows in the physical fabric, several of which we’re working on with hardware partners. These include using separate queues for elephants and mice (small flows), using a dedicated network for elephants such as an optical fast path, doing intelligent routing for elephants within the physical network, and turning elephants into mice at the edge. For (iii), we show that elephant detection can be done relatively easily in the vSwitch. In fact, Open vSwitch has supported per-flow tracking for years. We describe how it’s easy to identify elephant flows at the vSwitch and Continue reading
If you need regular console port access then nothing beats a fixed console router. However there are many times when that simply isn’t an option. For occasional console connections I use a Keyspan USB/Serial adaptor with my MacBook. It’s … Continue reading
The post AirConsole Review appeared first on The Network Sherpa.
Oh, to be a Cisco IPsec VPN user these days… Now I know that we should get with the program and move to AnyConnect, since Cisco is EOL-ing the venerable Cisco VPN Client in 2014, but we have a large installed base, and since Cisco stopped making IPsec clients for Mac and Linux back in the […]
The post Cisco IPsec VPN breakage on Windows 8[.1] and OS X 10.9 appeared first on Packet Pushers Podcast and was written by Will Dennis.
In Part 1 we went through protecting the spoke from the outside world on the Internet and using the stateful inspection firewall CBAC, Content-Based Access Control, to dynamically allow returning traffic back in. CBAC works great for a single inside zone and a single outside zone. What if your business requirements have more than two […]
The post Securing a DMVPN spoke – Part 2 appeared first on Packet Pushers Podcast and was written by Charles Galler.
How does the internet work - We know what is networking
Now that my topology in GNS3 is exactly as in INE Workbook 1 I can share it with you if you don’t want to do all the basic configurations and connections by yourself. After spending too much money on different rack rentals in the past few months I decided that I will definitely need to […]
Dear all, I am happy to announce new version of phpipam IP address management – version 0.9.
New features, like Support for ICMP network discovery, ICMP check IP status in demand, Compressed (grouped) DHCP IP ranges and other were introduced. Most important are:
Some instructions on how to setup ICMP scanning will follow.
If you find phpIPAM useful for your company donations would be highly appreciated
You can demo it here: http://demo.phpipam.net/
You can download it on sourceforge site: phpipam-0.9.
Special thanks to all the people submitting bug reports, translators and feature testers!
Screenshots:
Full changelog for this release is:
New features:
----------------------------
+ Support for ICMP network discovery;
+ Cron script to check status for selected subnets/hosts with threading suport (pcntl php extension required);
+ ICMP check IP status in demand;
+ Compressed (grouped) DHCP IP ranges;
+ API server version 0.1;
+ Option to show and group subnets by VLAN in subnets list;
+ Option to show and Continue reading
It’s a busy week to say the least. Not only are we a sponsor of the 2nd Open Networking User Group (ONUG) meeting, we held our inaugural Technical Advisory Board (TAB) meeting. Leveraging the fact that many of our customers will be attending ONUG, we brought together some of the most forward-thinking networking and business professionals from enterprises, service providers and partners to talk about our company, our product roadmap and our ideal use cases.
Before I get into the highlights, I’d like to give Embrane a high-five because we can actually have a TAB made up of paying customers. In an industry currently dominated by PowerPoint slides and acronyms, having a shipping product that people are using is unique in its own right. Also, where there was a full day of great feedback and dialogue. I’m just going to cover three aspects of the discussion otherwise I would have to write a novel to capture everything.
Platform vs. Product
One of the liveliest discussions was around the value of Embrane to customers. If you’ve been following the Embrane story, you’ll recall we’ve been focusing our marketing message around application-centric networking and more specifically, as of late, application-centric Continue reading
Recently some time ago (this blog post has also been lying in draft for a while)
someone came to me with a problem they had with a Cisco 7600.
It felt sluggish and "show proc cpu" showed that the weak CPU was very loaded.
This is how I fixed it.
"show proc cpu history" showed that the CPU use had been high for quite a while, and too far back to check against any config changes. The CPU use of the router was not being logged outside of what this command can show.
"show proc cpu sorted" showed that almost all the CPU time was spent in interrupt mode. This is shown after the slash in the first row of the output. 15% in this example:
Interrupt mode CPU time is (a bit simplified and restricted to the topic at hand) used when the router has to react to some user traffic. Now why would the 7600 use the Continue readingRouter# show proc cpu sorted CPU utilization for five seconds: 18%/15%; one minute: 31%; five minutes: 42% PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process 198 124625752 909637916 137 0.87% 0.94% 0.94% 0 IP Input [...]