Archive

Category Archives for "Networking"

Visibility, Debugging and Network Virtualization (Part 1)

[This post was written by Martin Casado and Amar Padmanahban, with helpful input from Scott Lowe, Bruce Davie, and T. Sridhar]

This is the first in a multi-part discussion on visibility and debugging in networks that provide network virtualization, and specifically in the case where virtualization is implemented using edge overlays.

In this post, we’re primarily going to cover some background, including current challenges to visibility and debugging in virtual data centers, and how the abstractions provided by virtual networking provide a foundation for addressing them.

The macro point is that much of the difficulty in visibility and troubleshooting in today’s environments is due to the lack of consistent abstractions that both provide an aggregate view of distributed state and hide unnecessary complexity. And that network virtualization not only provides virtual abstractions that can be used to directly address many of the most pressing issues, but also provides a global view that can greatly aid in troubleshooting and debugging the physical network as well.

A Messy State of Affairs

While it’s common to blame server virtualization for complicating network visibility and troubleshooting, this isn’t entirely accurate. It is quite possible to build a static virtual datacenter and, assuming the vSwitch Continue reading

The Value of Certifications

I hope to clear the air on what a vendor certificate (or any certificate, such as a degree/diploma/etc) is, and is not. Too many times have I heard/seen people place too little or too much stock in the single piece of paper. What a certificate is A certificate, simply put, is proof that on a […]

Author information

Ken Matlock

Ken Matlock

Ken Matlock is a networking veteran of 19 years. He has worked in many fields in the networking industry including Service Provider, Retail, and Healthcare. When he's not fixing the problems of the networking world, he can be found studying for his CCIE, spending time with his family, and trying to chase the ever-elusive sleep.

He can be found on twitter @KenMatlock , email at [email protected] , irc.freenode.net #PacketPushers, or the occasional blog or forum post.

The post The Value of Certifications appeared first on Packet Pushers Podcast and was written by Ken Matlock.

Cisco onePK: Now I Get It

I had an opportunity recently to sit in a Cisco onePK lab and it opened my eyes to exactly what Cisco is doing with onePK, why it’s going to be so important as Software Defined Networking (SDN) continues to gain traction, and why onePK is different than what anyone else is doing in the industry.

onePK is a key element within Cisco’s announced Open Network Environment SDN strategy. onePK is an easy-to-use toolkit for development, automation, rapid service creation and more. It enables you to access the valuable data inside your network via easy-to-use APIs.

Source: www.cisco.com/go/onepk

Since having my own eyes opened, I’ve been pondering how to explain my new found understanding in a way that others will grasp. In particular to business decision makers (BDMs) and technical decision makers (TDMs). I’m really, really, struggling to come up with a good analogy for BDMs. I’m still working on that one. Surprisingly, I’m also struggling to come up with a sound analogy that will work with the majority of TDMs that I know. Maybe I shouldn’t be so surprised at that since all the TDMs I deal with are on the infrastructure side of things (networks, storage, Continue reading

Show 153 – Cisco Live 2013 Roundtable Discussion with Tech Field Day

At Cisco Live US 2013, we were able to get together a nice group of folks to share their opinions on the announcements we found most interesting. You’ll know some of them from Tech Field Day, an event Greg and I have been a part of several times. This show is good conversation with smart […]

Author information

Ethan Banks

Ethan Banks, CCIE #20655, has been managing networks for higher ed, government, financials and high tech since 1995. Ethan co-hosts the Packet Pushers Podcast, which has seen over 3M downloads and reaches over 10K listeners. With whatever time is left, Ethan writes for fun & profit, studies for certifications, and enjoys science fiction. @ecbanks

The post Show 153 – Cisco Live 2013 Roundtable Discussion with Tech Field Day appeared first on Packet Pushers Podcast and was written by Ethan Banks.

Cisco onePK: Now I Get It

I had an opportunity recently to sit in a Cisco onePK lab and it opened my eyes to exactly what Cisco is doing with onePK, why it's going to be so important as Software Defined Networking (SDN) continues to gain traction, and why onePK is different than what anyone else is doing in the industry.

onePK is a key element within Cisco's announced Open Network Environment SDN strategy. onePK is an easy-to-use toolkit for development, automation, rapid service creation and more. It enables you to access the valuable data inside your network via easy-to-use APIs.

Source: www.cisco.com/go/onepk

Since having my own eyes opened, I've been pondering how to explain my new found understanding in a way that others will grasp. In particular to business decision makers (BDMs) and technical decision makers (TDMs). I'm really, really, struggling to come up with a good analogy for BDMs. I'm still working on that one. Surprisingly, I'm also struggling to come up with a sound analogy that will work with the majority of TDMs that I know. Maybe I shouldn't be so surprised at that since all the TDMs I deal with are on the infrastructure side of things (networks, storage, Continue reading

Your Career – Enemies Within and Without

In the mood for some self analysis and reflection around your career and your employer? Good. I’ve strong feelings about employment in general and even stronger ones around balancing it with your personal life (I wouldn’t dare say private any more) and making work work for you. I’m definitely in the work to live camp. […]

Author information

Steven Iveson

Steven Iveson

Steven Iveson, the last of four children of the seventies, was born in London and has never been too far from a shooting, bombing or riot. He's now grateful to live in a small town in East Yorkshire in the north east of England with his wife Sam and their four children.

He's worked in the IT industry for over 15 years in a variety of roles, predominantly in data centre environments. Working with switches and routers pretty much from the start he now also has a thirst for application delivery, SDN, virtualisation and related products and technologies. He's published a number of F5 Networks related books and is a regular contributor at DevCentral.

The post Your Career – Enemies Within and Without appeared first on Packet Pushers Podcast and was written by Steven Iveson.

Heatsink Upgrade

A little detour from the networking topics today to show off a little weekend tech project. I recently ran into some overheating problems with my home BYO PC. Core Temp was showing upwards of 70 degrees Celsius during normal operation, and under load, it would sometimes just shut down completely. Here’s the setup I had as of 2 days ago: The rear fan, which takes air in, was not working due to a short.

Heatsink Upgrade

A little detour from the networking topics today to show off a little weekend tech project. I recently ran into some overheating problems with my home BYO PC. Core Temp was showing upwards of 70 degrees Celsius during normal operation, and under load, it would sometimes just shut down completely. Here’s the setup I had as of 2 days ago: The rear fan, which takes air in, was not working due to a short.

Network Security and the N00b Meter

This morning I read an article in which the writer thought that wireless security was too inconvenient and difficult, so he simply disabled it, leaving his network wide open. He was tired of his complex password being too hard for guests to use and made the comparison that they didn’t have to use these kinds […]

Author information

Mrs. Y

Snarkitecht at Island of Misfit Toys

Mrs. Y is a recovering Unix engineer working in network security. Also the host of Healthy Paranoia and official nerd hunter. She likes long walks in hubsites, traveling to security conferences and spending time in the Bat Cave. Sincerely believes that every problem can be solved with a "for" loop. When not blogging or podcasting, can be found using up her 15 minutes in the Twittersphere or Google+ as @MrsYisWhy.

The post Network Security and the N00b Meter appeared first on Packet Pushers Podcast and was written by Mrs. Y.

Optimizing and Protecting Spanning Tree – Lab Testing

Unfortunately the equipment I was using didn’t support PVST+ (Sup2Ts in 6503 Catalyst Switches), so I skipped testing UplinkFast and BackboneFast as these are incorporated in 802.1w (RSTP) and 802.1s (MSTP, which is basically an extension of RSTP).

BPDU Guard

image

For this test, SwitchD will be treated as a Rogue Switch being attached to the network.  Initially, SwitchC’s port 2/1 is configured as an access port with only PortFast enabled.

  1. 1. Disconnect link between SwitchC and SwitchD
  2. 2. Configure SwitchC port 2/1 as an access port in VLAN 10 with PortFast enabled.
  3. 3. Configure SwitchD port 2/1 as an access port in VLAN 10. Configure the priority on VLAN 10 to be 0.
  4. 4. Reconnect link between SwitchC and SwitchD and check topology for VLAN 10. SwitchD should be the root for VLAN 10.
  5. 5. Disconnect link between SwitchC and SwitchD
  6. 6. Enable BPDU Guard on Switch C port 2/1
  7. 7. Reconnect link between SwitchC and SwitchD. SwitchC port 2/1 should move to an err-disable state. Verify with sh interfaces status err-disabled. Verify SwitchD is no longer the root for VLAN 10.

*Jul  5 22:02:06.023: %SPANTREE-2-BLOCK_BPDUGUARD: Received BPDU on port GigabitEthernet2/1 with BPDU Guard enabled. Disabling Continue reading

Masterclass – Tcpdump – Expressions

This Masterclass article series aims to provide in-depth technical information on the installation, usage and operation of the classic and supremely popular tcpdump network traffic analysis program including alternatives, running tcpdump as a process, building expressions, understanding output and more. I’ve covered the Basics and Parameters previously and here I move on to filter Expressions; […]

Author information

Steven Iveson

Steven Iveson

Steven Iveson, the last of four children of the seventies, was born in London and has never been too far from a shooting, bombing or riot. He's now grateful to live in a small town in East Yorkshire in the north east of England with his wife Sam and their four children.

He's worked in the IT industry for over 15 years in a variety of roles, predominantly in data centre environments. Working with switches and routers pretty much from the start he now also has a thirst for application delivery, SDN, virtualisation and related products and technologies. He's published a number of F5 Networks related books and is a regular contributor at DevCentral.

The post Masterclass – Tcpdump – Expressions appeared first on Packet Pushers Podcast and was written by Steven Iveson.

Ambassadors Cookbook for Enterprise now available

At the beginning of 2013 I was asked to join the Juniper Ambassador team; essentially an outreach program to those active in social channels including the J-Net community.  Whilst I was appreciative of the vendor swag; it wasn’t until the community manager had the bright idea for us to collaborate on a book did it […]

Author information

Glen Kemp

Professional Services Consultant at Fortinet, Inc

Professional Services Consultant. Designing & deploying “keep the bad guys out” technologies. Delivering elephants and not hunting unicorns.

Please free to add me on , follow me on Twitter or check out my other blogs on Fortinet Blog, sslboy.net and SearchNetworking.

The post Ambassadors Cookbook for Enterprise now available appeared first on Packet Pushers Podcast and was written by Glen Kemp.

KIClet: IOS “network” Command Cheating

I have always used the “network 0.0.0.0 0.0.0.0” statement to describe “all interfaces” when configuring a routing protocol like EIGRP. I know that it’s not correct, but I never stopped to wonder why my bad habit still worked. Then, I found this good article by @jdsilva explains this is IOS just assuming you had a “brain fart” and meant to type the proper “network 0.0.0.0 255.255.255.255” I’m studying for the CCIE and it can be really good to identify these bad habits that, while in real life may not be too bad, especially this kind, where the result is the same, but on exams can mean the difference between failure and success.

KIClet: IOS “network” Command Cheating

I have always used the “network 0.0.0.0 0.0.0.0” statement to describe “all interfaces” when configuring a routing protocol like EIGRP. I know that it’s not correct, but I never stopped to wonder why my bad habit still worked. Then, I found this good article by @jdsilva explains this is IOS just assuming you had a “brain fart” and meant to type the proper “network 0.0.0.0 255.255.255.255” I’m studying for the CCIE and it can be really good to identify these bad habits that, while in real life may not be too bad, especially this kind, where the result is the same, but on exams can mean the difference between failure and success.

You have a new manager – now what do you do?

We’ve all been there – a recent re-org or maybe your boss gets promoted or your boss leaves and you end up with a new manager. As I have mentored people over the years, I’d say that the most common reaction is “Crud! I have to start over.” But once you get past that moment […]

Author information

The post You have a new manager – now what do you do? appeared first on Packet Pushers Podcast and was written by Michael Bushong.

Traditional AQM is not enough!

Note: Updated October 24, 2013, to fix some editorial nits, and to clarify the intended point that it is the combination of a working mark/drop algorithm with flow scheduling that is the “killer” innovation, rather than the specifics of today’s fq_codel algorithm.

Latency (called “lag” by gamers), once incurred, cannot be undone, as best first explained by Stuart Cheshire in his rant: “It’s the latency, Stupid.” and more formally in “Latency and the Quest for Interactivity,” and noted recently by Stuart’s 12 year old daughter, who sent Stuart a link to one of the myriad “Lag Kills” tee shirts, coffee bugs, and other items popular among gamers.lag_kills_skeleton_dark_tshirt

Out of the mouth of babes…

Any unnecessary latency is too much latency.

Many networking engineers and researchers express the opinion that 100 milliseconds latency is “good enough”. If the Internet’s worst latency (under load) was 100ms, indeed, we’d be much better off than we are today (and would have space warp technology as well!). But the speed of light and human factors research easily demonstrate this opinion is badly flawed.

Many have understood bufferbloat to be a problem that primarily occurs when a saturating “ Continue reading

Vendor mandated certs only degrade integrity

I dont doubt that vendors have a tight line to walk when it comes maintaining their brand integrity. To build up a skill set in the market the certification teams put in many weeks developing a program that is relevant, useful and achieves the goals required. Followed by countless hours reviewing each of the certifications regularly to ensure integrity. There is the added benefit that these certifications build of community of loyal followers – The Cisco and VMWare certification programs are evidence to this.

I personally have been involved in the development, technical review, and exam rewrite process and I can attest to the effort that the certifications teams go to to ensure the validity and integrity of their offerings. Weeding out sources of brain dumps and NDA violations and other activities that threaten this integrity work becomes an on going commitment that requires many hours of dedication.

On the other side of the line is the requirement to have the partners representing the vendor to maintain a level of skills and customer satisfaction. This ensures that when the brand is represented in the market that it will be delivered by the most skilled people capable of delivering the Continue reading

The Illusion of Perfection

I spend a lot of time commuting. During that commute, I listen to technical podcasts and lots of different leadership and career oriented audio books. One of the topics that experts seem to have differing opinions on is defining what is good enough. I’ve heard many refer to Nike’s ad campaign, Just Do It, and […]

Author information

Paul Stewart

Paul is a Network and Security Engineer, Trainer and Blogger who enjoys understanding how things really work. With nearly 15 years of experience in the technology industry, Paul has helped many organizations build, maintain and secure their networks and systems. Paul also writes technical content at PacketU.

The post The Illusion of Perfection appeared first on Packet Pushers Podcast and was written by Paul Stewart.

Snowden Media Douchebaggery

Recently the New York Times posted an article stating that while Edward Snowden was at the NSA, he learned to be a hacker by taking a CEH course and getting the certification. But the certification, listed on a résumé that Mr. Snowden later prepared, would also have given him some of the skills he needed […]

Author information

Mrs. Y

Snarkitecht at Island of Misfit Toys

Mrs. Y is a recovering Unix engineer working in network security. Also the host of Healthy Paranoia and official nerd hunter. She likes long walks in hubsites, traveling to security conferences and spending time in the Bat Cave. Sincerely believes that every problem can be solved with a "for" loop. When not blogging or podcasting, can be found using up her 15 minutes in the Twittersphere or Google+ as @MrsYisWhy.

The post Snowden Media Douchebaggery appeared first on Packet Pushers Podcast and was written by Mrs. Y.

Cisco ASA Virtualization with Mixed-Mode Security Contexts

The Cisco ASA firewall has supported multiple security contexts since version 7 was released in 2005. This feature allows you to configure multiple independent logical firewalls in the same ASA hardware.  When version 8.5(1) released in July 2011, support was added for mixed mode firewalls in which both routed and transparent contexts can reside on […]

Author information

Eyvonne Sharp

Eyvonne Sharp

Eyvonne Sharp is a senior network engineer for a large healthcare enterprise where her focus is security and data center architecture. Before working in the enterprise, she spent 10 years working for small VARs and integrators in the SMB space. Eyvonne blogs at esharp.net and you can connect with her on twitter @SharpNetwork

The post Cisco ASA Virtualization with Mixed-Mode Security Contexts appeared first on Packet Pushers Podcast and was written by Eyvonne Sharp.