Archive

Category Archives for "Networking"

F5 LTM Encrypted Cookie Insert Persistence

The purpose of a load balancer is to distribute client connections to multiple servers to increase load capacity and provide high availability. One common requirement of load balanced applications, since most application servers maintain session information on the local box, is that a client must stay locked to a single server for the duration of […]

Author information

Eric Flores

Eric Flores

Eric is a senior network engineer for a major real estate company. He has seven years in the field and has a passion for anything related to technology. Find him on Twitter @nerdoftech.

The post F5 LTM Encrypted Cookie Insert Persistence appeared first on Packet Pushers Podcast and was written by Eric Flores.

Five Functional Facts about OTV

Following on from my previous “triple-F” article (Five Functional Facts about FabricPath), I thought I would apply the same concept to the topic of Overlay Transport Virtualization (OTV). This post will not describe much of the foundational concepts of OTV, but will dive right into how it actually functions in practice. A reasonable introduction to OTV can be found in my series on Data Center Interconnects.

So without any more preamble, here are five functional facts about OTV.

Last Day to Buy a Poster is October 31

I've been selling physical copies of my 36x24" IOS Interior Routing Protocols poster for a while now. Unfortunately, Google Checkout is going the way of Google Reader next month and soon I will no longer be able to accept payments. Thus, October 31st will be the last day to order copies of the poster.

The PDF will of course remain freely available for download if you'd like to print the print poster yourself after the deadline.

Poster

7 comments

Cisco UCS SDK for Python, and Building in Windows

So I’m tackling a little side project - and that is to replicate my Cisco UCS configuration scripts, currently in PowerShell, but instead in Python. While the UCS API is actually an XML interface on the Fabric Interconnects, Cisco has created a module of cmdlets called PowerTool so that this service can be easily consumed, rather than deal with XML serialization directly. For instance, once authenticated, you can do cool stuff like get a list of all Service Profiles on a system:

Cisco UCS SDK for Python, and Building in Windows

So I’m tackling a little side project - and that is to replicate my Cisco UCS configuration scripts, currently in PowerShell, but instead in Python. While the UCS API is actually an XML interface on the Fabric Interconnects, Cisco has created a module of cmdlets called PowerTool so that this service can be easily consumed, rather than deal with XML serialization directly. For instance, once authenticated, you can do cool stuff like get a list of all Service Profiles on a system:

Review: Information Storage and Management

EMC Education Services Safari | Amazon   I’m a routing geek. Not a storage, compute, SONET, web design, and mobile phone geek — a routing geek. But even routing geeks need to know something about the stuff that attaches to the network right? In the spirit of learning something new, I recently picked up (and […]

Author information

Russ White

Russ White
Principle Engineer at Ericsson

Russ White is a Network Architect who's scribbled a basket of books, penned a plethora of patents, written a raft of RFCs, taught a trencher of classes, and done a lot of other stuff you either already know about, or don't really care about. You want numbers and letters? Okay: CCIE 2635, CCDE 2007:001, CCAr, BSIT, MSIT (Network Design & Architecture, Capella University), MACM (Biblical Literature, Shepherds Theological Seminary). Russ is a Principal Engineer in the IPOS Team at Ericsson, where he works on lots of different stuff, serves on the Routing Area Directorate at the IETF, and is a cochair of the Internet Society Advisory Council. Russ will be speaking in November at the Ericsson Technology Day. he recently published The Art of Network Architecture, is currently working on a new book in the area Continue reading

Java is to JavaScript as Car is to Carpet – a Beginner’s Guide

Some recent discussions at work have led me to the surprising realization that lots of people working in IT don't understand that Java and JavaScript are almost completely unrelated to each other. This is actually a fairly important misunderstanding to correct:  it leads to wasted troubleshooting efforts, such as downgrading or upgrading Windows Java installations in response to browser JavaScript errors.

I found the title of this blog entry in a StackOverflow post: "Java is to JavaScript as Car is to Carpet". That's pretty much it, in a nutshell. For the record, the only things that Java and JavaScript have in common are:
  1. They are both programming languages.
  2. The word "Java".
  3. Both came out of the web technology explosion of the early 1990s.
  4. Both are frequently encountered in the context of web browsers.
Java is a compiled programming language that was originally developed with a major goal of allowing similar or identical codebases to run on different platforms without needing to be recompiled. It does this by compiling to "bytecode" rather than platform-specific machine code, which then typically runs inside a so-called "Java Virtual Machine". Java was originally developed and controlled by Sun Microsystems (now Oracle), but it has Continue reading

Back to the Basics…

Now that I’ve finished learning about SDN, and then studied for and passed my latest Cisco certification (CCNA Security, keeping that vendor certification path open!), I’ve gotten into the groove of studying at night (and I as I love IT, and specifically networking, it’s kinda become my hobby… I know, lame, right?) In any case, […]

Author information

Will Dennis

Will Dennis

Will Dennis has been a systems and network administrator since 1989, and is currently the Network Administrator for NEC Laboratories America, located in Princeton NJ. He enjoys the constant learning it takes to keep up with the field of network and systems administration, and is currently pursuing the Cisco CCNP-R/S certification. He can be found on the Twitters as @willarddennis, and on Google Plus.

The post Back to the Basics… appeared first on Packet Pushers Podcast and was written by Will Dennis.

Bash and Net-SNMP: a low budget, high frequency SNMP poller

Introduction Note: This assumes you’re on a linux machine, but it should work on any box where you can install and run Bash, for example windows with Cygwin. (You’ll also need the date program from GNU Core Utilities too, but that’s installed by default on any normal Linux or Cygwin system.) Note: For simplicity the […]

Author information

Nik Weidenbacher

Nik Weidenbacher

Nik has been into linux, networking and software development for the past couple of decades. He's been working for a service provider for a long time, and in recent years has been doing a lot with data center automation (the buzzword-enhanced version of that being "cloud orchestration").

The post Bash and Net-SNMP: a low budget, high frequency SNMP poller appeared first on Packet Pushers Podcast and was written by Nik Weidenbacher.

Cisco STP forward-time command trick

This is more a topic for exams, like Cisco CCIE, but also it can appear in real-world environments. Consider the following simple topology: SW1 is the spanning-tree root bridge for all VLANs. Imagine that you have a request which ask you that when a port becomes active, no matter of VLAN, it should wait 10 […]

EtherChannel over 802.1q Tunneling

Consider the following topology: We have one Customer with two distributed locations (SW1, R1 and SW2, R2) connected over Provider backbone. What we want to create is something like this: If Provider support 802.1q and L2 tunneling we can achieve a nice Etherchannel between our 2 remote locations with direct CDP visibility. Also STP and […]

The Big Bad Internet

I often think there are only two types of stories about the Internet. One is a continuing story of prodigious technology that continues to shrink in physical size and at the same time continue to dazzle and amaze us. We've managed to get the cost and form factor of computers down to that of an ordinary wrist watch, or even into a pair of glasses, and embed rich functionality into almost everything. The other is a darker evolving story of the associated vulnerabilities of this technology, where we've seen "hacking" turn into organised crime and from there into a scale of sophistication that is sometimes termed "cyber warfare". And in this same darker theme one could add the current set of stories about various forms of state sponsored surveillance and espionage on the net. In this article I'd like to wander into this darker side of the Internet and briefly look at some of the current issues in this area of cybercrime, based on some conferences and workshops I've attended recently.

The bumpy road to E-VPN

In 2004 we were in the planning phase of building a new data center to replace one we had outgrown.   The challenge was to build a network that continued to cater to a diverse range of data center applications and yet deliver significantly improved value.

Each operational domain tends to have one or more optimization problem whose solution is less than optimal for another domain.  In an environment where compute and storage equipment come in varying shapes and capabilities and with varying power and cooling demands, the data center space optimization problem does not line up with the power distribution and cooling problem, the switch and storage utilization problem, or the need to minimize shared risk for an application, to name a few.

The reality of the time was that the application, backed by it's business counterparts, generally had the last word -- good or bad.  If an application group felt they needed a server that was as large as a commercial refrigerator and emitted enough heat to keep a small town warm, that's what they got, if they could produce the dollars for it.  Application software and hardware infrastructure as a whole was the bastard of a hundred independent self-proclaimed Continue reading

Stateless Routing Through an in-line F5 LTM

When using an F5 load balancer there are 2 predominant ways to setup the network topology. While there are many different names for these methods, in this article I will call them “load balancer on a stick” and in-line. Although the article is about the in-line method, we will quickly review both methods for comparison. […]

Author information

Eric Flores

Eric Flores

Eric is a senior network engineer for a major real estate company. He has seven years in the field and has a passion for anything related to technology. Find him on Twitter @nerdoftech.

The post Stateless Routing Through an in-line F5 LTM appeared first on Packet Pushers Podcast and was written by Eric Flores.

Protect, Grow, Transform

It's been a while since I wrote something in this blog. Long holiday season, moving house, multiple projects in neighbor country, were really occupying my time the past several months.

Yesterday I flew 16 hours from Dubai to San Francisco, had to queue 2 hours, and drove about 1 hour to San Jose for some company meeting in Cisco Head Quarter office. Now it's early morning here and I can't really sleep due to 11 hours time zone difference with Dubai, so I guess it's the right time to post new blog.

Last month I was moved to Architecture group for the new Intelligent Infrastructure Center of Excellence team for EMEAR region, focusing on IP NGN and Network Programmability. My current role as Solution Architect is not only to lead complex NGN projects, something that I've been doing for many years, but as well as to grow Cisco Advanced Services business in those focused technologies within the region.

One strategy that we just came up recently is to define the objectives of this new team. We classify the objectives using Protect, Grow, Transform terminology. For example, Protect by focusing on renewal business and ensuring the quality of project delivery, Grow Continue reading

T-Mobile IPv6 in the US

Swapped from AT&T to T-Mobile in order to take advantage of their 4G/LTE IPv6 network. Since I dogfood IPv6 every chance I get, and the cost to swap saved me a whopping $0.50, I moved forward with it. I find that if I set their EPC.TMOBILE.COM APN to IPv4/IPv6, I don’t really see much in the way of dual-stack actually working on the phone. So I set it from the default IPv4 to just IPv6, and that got it working with native IPv6 and using CLAT+NAT64/DNS64 for IPv4 sites. Screenshot from my Galaxy Nexus running 4.3:

Screenshot_2013-10-11-15-51-06

Packet Design Launches Multicast Explorer for Network Engineers to Conquer the Multicast Routing Frontier

New product expands visibility into complex multicast routing configurations, speeds troubleshooting, and makes planning more accurate 

From market trading data distribution to Internet Protocol television (IPTV) to online education, use of multicast routing is growing but the ability to manage it across networks has been limited. Building on its pioneering work in route analytics, Packet Design has launched Multicast Explorer, an optional module of the company’s flagship Route Explorer system, to provide unprecedented visibility into complex multicast routing configurations. With improved troubleshooting and proactive management – including interactive modeling – network professionals can enhance multicast service quality as well as prevent interruptions and outages. This is particularly important where failures carry severe penalties, such as in the financial services industry. 

Going beyond traditional SNMP and CLI pollers, Multicast Explorer collects and analyzes all IGP routing announcements in real time using a passive technique as well as data collection methods optimized for all major vendor routers. This means the information is always current and accurate for monitoring and troubleshooting multicast issues quickly, preventing the tedious process of querying individual routers and manually correlating the resulting data. If any planned or unplanned configuration changes occur, network managers know immediately Continue reading

Cisco UCS: Crossing the Streams

Apparently you can cable the A-side Fabric Interconnect to the right IOM in a chassis, and it works just fine. You can even look at the DCE interfaces on a VIC in this chassis and see that the paths have been flipped: This is not true for the “correctly” cabled chassis, where the A-side traces occupy the first two slots: The first two interfaces will always go to the left IOM because the backplane traces are cabled that way.

Cisco UCS: Crossing the Streams

Apparently you can cable the A-side Fabric Interconnect to the right IOM in a chassis, and it works just fine. You can even look at the DCE interfaces on a VIC in this chassis and see that the paths have been flipped: This is not true for the “correctly” cabled chassis, where the A-side traces occupy the first two slots: The first two interfaces will always go to the left IOM because the backplane traces are cabled that way.