Using a few guides on the web and a little bit of ingenuity I was able to get my FTDI-based, USB to 2x Serial adapter working in Mac OSX 10.9 Mavericks with iTerm 2. This post documents the process and resources used in the hope of becoming the definitive guide to setting up a USB serial adapter in OSX and using iTerm2 as the terminal emulator. Even if it isn’t quite definitive, it should at least be useful to others - I hope!
[This post was written by Dinesh Dutt with help from Martin Casado. Dinesh is Chief Scientist at Cumulus Networks. Before that, he was a Cisco Fellow, working on various data center technologies from ASICs to protocols to RFCs. He’s a primary co-author on the TRILL RFC and the VxLAN draft at the IETF. Sudeep Goswami, Shrijeet Mukherjee, Teemu Koponen, Dmitri Kalintsev, and T. Sridhar provided useful feedback along the way.]
In light of the seismic shifts introduced by server and network virtualization, many questions pertaining to the role of end hosts and the networking subsystem have come to the fore. Of the many questions raised by network virtualization, a prominent one is this: what function does the physical network provide in network virtualization? This post considers this question through the lens of the end-to-end argument.
Networking and Modern Data Center Applications
There are a few primary lessons learnt from the large scale data centers run by companies such as Amazon, Google, Facebook and Microsoft. The first such lesson is that a physical network built on L3 with equal-cost multipathing (ECMP) is a good fit for the modern data center. These networks provide predictable latency, scale well, converge quickly when nodes or links change, and provide Continue reading
Juniper Network’s Doug Hanks & Satish Surapaneni join Juniper customer (and Kool-Aid drinking fanboy) Kurt Bales in a discussion about the newly announced QFX5100 line of switches with Ethan Banks & Greg Ferro. Along the way, we talk about useful new technologies enabled by the QFX5100, such Virtual Chassis Fabric & TISSU. This is one of […]
The post Show 168 – Juniper QFX5100 & Virtual Chassis Fabric – Sponsored appeared first on Packet Pushers Podcast and was written by Ethan Banks.
It is hard to ignore all of the hype around Hadoop and Big Data these days. Like most infrastructure engineers, we tend to focus on how to build highly-available, highly-scalable networks – and I’m no exception. However, it is still important to me to keep up with and implement projects on popular trends, directly infrastructure […]
The post ‘Hello world’ for network engineers exploring Hadoop appeared first on Packet Pushers Podcast and was written by JR Mayberry.
Every week I see somebody ask “will all Network Engineers be programmers” on Twitter, LinkedIn, at a trade show or just to be antagonistic and for no other reason than to start an argument.
The anger inside has been brewing for over 12 months until the pressure valve finally released in the form of this blog post. Expect snark.
Lets clear something up. IF YOU CAN WRITE ONE LINE OF RUBY YOU ARE NOT A PROGRAMMER. The Programmers of myth and legend are these days referred to as “Software Engineers”, “Software Architects” and sometimes even “Hackers”, “Coders” or “Code Monkeys”. What they “do” - is build software for a living.
The networking industry can be broken in to four main segments:
Network Operations - These folk keep networks running. They eat support tickets and are seldom let out of their cages.
Network Architects - These folk run around data centers with whiteboards and sharpies and draw clouds. Consultants fall under this designation too. Occasionally these guys get their hands dirty and pick up a console cable but most times they are cooking up the most complicated solution to a simple Continue reading
Every week I see somebody ask “will all Network Engineers be programmers” on Twitter, LinkedIn, at a trade show or just to be antagonistic and for no other reason than to start an argument.
The anger inside has been brewing for over 12 months until the pressure valve finally released in the form of this blog post. Expect snark.
As things are sometime hard to find on HP.com, I thought I’d consolidate them here.
HP VAN SDN Controller Download
As things are sometime hard to find on HP.com, I thought I’d consolidate them here.
As things are sometime hard to find on HP.com, I thought I’d consolidate them here.
Every week I see somebody ask “will all Network Engineers be programmers” on Twitter, LinkedIn, at a trade show or just to be antagonistic and for no other reason than to start an argument.
The anger inside has been brewing for over 12 months until the pressure valve finally released in the form of this blog post. Expect snark.
Hello boys and girls! What time is it? That’s right, it’s time for another fun-filled episode of Healthy Paranoia! Joining us in the top secret Healthy Paranoia treehouse and just in time for the release of PCI DSS 3.0 is special guest, Dr. Anton Chuvakin, Research Director at Gartner and recognized security expert in the […]
The post Healthy Paranoia Show 19: The ABCs of PCI DSS appeared first on Packet Pushers Podcast and was written by Mrs. Y.
Update 2: I have something I think will be better up my sleeve for using the TPM chip with SSH. Stay tuned. In the mean time, the below works.
Finally, I found out how to use a TPM chip to protect SSH keys. Thanks to Perry Lorier. I'm just going to note down those same steps, but with my notes.
I've written about hardware protecting crypto keys and increasing SSH security before:
but this is what I've always been after.
Update: you need to delete /var/lib/opencryptoki/tpm/your-username/*.pem
,
because otherwise your keys will be migratable. I'm looking into how to either never generating
these files, or making them unusable by having the TPM chip reject them. Update to come.
When I run this again on a completely blank system I'll add Continue reading
I recently came across this article from John Dix – who made the point that throughout the year, SDN events have helped monitor and inform the community on where the adoption is really occurring. Many articles like this suggest to me that the market understands the idea of SDN opening up a “stack” as in the entire solution – from the metal, to the OS, to the applications. Yet today, there is not enough understanding to necessarily pull the ideal stack together. Articles such as this ask a common question we are all trying to answer: How much SDN is enough to see the value of SDN?
Customers help us see the value in “de-laminating the stack” and moving toward a horizontal model instead of the traditional, fully integrated and closed system that legacy networking vendors now provide. This makes sense because a more open SDN was designed in part to enable innovation and help break some of the vendor lock-in that a closed system fosters. Conversely, for even visionary customers, it can be daunting to try to pull the stack back together and add value to their specific environments.
Do customers see SDN as part of their collective visions Continue reading
As promised, here’s the event order for HTTPS. I’d be grateful to any F5′ers out there that can pick holes in this, if any. Apologies for the ‘slimming’ of the diagram caused by the WordPress theme. Right click and view in a new tab or save as to see it in all it’s glory. Last […]
The post F5 Networks iRule Event Order – HTTPS/SSL – Client & Server Side appeared first on Packet Pushers Podcast and was written by Continue reading
After trying in vain to make my BT Home Hub 3 work as a Proper Router™ for my home lab I decided to take the plunge and get something better. Seeing as I work at HP, I thought I’d try the HP MSR 930
First step is to get your Fundamentals configured. The config below is a snippet from my configuration. This will enable SSH, SFTP, and HTTPS access from local IP addresses only.
sysname <Your Hostname>
#
# Change some web timeouts
#
web https-authorization mode auto
web idle-timeout 3
#
# ACL for Local Access
#
acl number 2000
description *** Local Only ***
rule 0 permit source 192.168.1.0 0.0.0.255
rule 5 permit source 10.0.0.0 0.255.255.255
#
# Secure Web Interface
#
undo ip http enable
ip https enable
ip https port 443
ip https acl 2000
#
# SSH Setup
#
ssh server enable
ssh server authentication-timeout 10
sftp server enable
#
# Restrict VTY to SSH from Local IP's
#
user-interface vty 0 4
acl 2000 in
authentication-mode scheme
protocol inbound ssh
Once we have our fundamentals done, we can get our firewall ready. Continue reading
After trying in vain to make my BT Home Hub 3 work as a Proper Router™ for my home lab I decided to take the plunge and get something better. Seeing as I work at HP, I thought I’d try the HP MSR 930
Lifehacker suggested“Learning to Code by Breaking Someone Else’s Code” and I wanted to share my personal experiences with this method….
When I was young, 7ish, my parents bought a Packard Bell 486 machine (a DX with goofy speakers that hook on the side of the monitor IIRC). It was supposed to be for school, but as far as I was concerned it was for playing games! While the PC ran Windows 3.11, all of my games ran on DOS. DOS, as many of you probably know, has no UI, so in order to install or run a game you were at the mercy of the manual. Typically, the manual would instruct you to “cd” to a removable disk drive and run an “.exe”. This taught me some basic DOS and that an “exe” was an application that I could run.
Upon running the “exe” in DOS you would be lucky if the game would run correctly first time. Sometimes you would have graphics issues, other times no sound and sometimes your joystick wouldn’t work. To get a game to work you had to select the correct drivers for graphics Continue reading
Lifehacker suggested“Learning to Code by Breaking Someone Else’s Code” and I wanted to share my personal experiences with this method….