Archive

Category Archives for "Networking"

Learning BGP Module 1 Lesson 1: Why BGP? – Video

Russ White kicks off a ten-video series on the Border Gateway Protocol (BGP). The series is divided into two modules, with short lessons within each module. This first video covers a brief history of BGP and then gets into the purpose of BPG, reachability vs. a route, Autonomous System (AS) rules, problems that BGP solves, […]

The post Learning BGP Module 1 Lesson 1: Why BGP? – Video appeared first on Packet Pushers.

Private 5G: The 4 things that determine if you need it

By this time, you’ve probably read so many stories about enterprises adopting private 5G networks that you feel like a student who finds out they’re not one of the cool kids. Can you ever hold your head up in a tech conference and admit you’re not running private 5G yet?Take heart!  Maybe you’re not supposed to be. The best wireless network technology for an enterprise depends on four things: devices, spread, privacy, and mission.5G is a cellular network technology used almost exclusively by telcos, but you can buy equipment to build your own 5G network, and even get hosted 5G from cloud providers like Amazon. You can use open spectrum so you don’t need to bid at an auction for a license. There’s a lot of excitement about private 5G, but in that excitement it’s easy to forget that you could have adopted private 4G/LTE long ago, and that Wi-Fi is still the most popular wireless technology of all.  You’ve got to look at the four factors just mentioned to decide whether you want to read about private 5G or adopt it.To read this article in full, please click here

Practical Python For Networking: 7.1 Distributing Python Packages – Introduction – Video

This lesson provides an introduction to distributing Python packages. Creating packages was covered in lessons 6.1, 6.2, and 6.3. Course files are in a GitHub repository: https://github.com/ericchou1/pp_practical_lessons_1_route_alerts Additional resources: https://packaging.python.org/tutorials/packaging-projects/ https://dzone.com/articles/executable-package-pip-install Eric Chou is a network engineer with 20 years of experience, including managing networks at Amazon AWS and Microsoft Azure. He’s the founder of […]

The post Practical Python For Networking: 7.1 Distributing Python Packages – Introduction – Video appeared first on Packet Pushers.

What Is Zero Trust Network Access (ZTNA)?

In the first article in this series, we discussed what zero trust security is and why it matters. In this article, we will take a deep dive into zero trust network access, how it works, and its benefits to the modern organization.   What Is Zero Trust Network Access? Zero Trust Network Access, or ZTNA, is a security solution that many IT departments and IT organizations use to ensure secure remote access to a range of data, applications, networks, and services within an organization. ZTNA is based on defined access control policies that clearly communicate who has access to what and for how long that access is granted. ZTNA is a gap-filler when it comes to secure remote access tools, methods, and technologies. VPNs or virtual private networks are different from zero trust network access because VPNs give access to an entire network rather than specific applications or data. As the remote workforce continues to take shape and many companies lean on it as a source of employee satisfaction and employer productivity. Zero trust network access is pertinent to keeping the right people in and the wrong people out of your organization’s systems. How Does Zero Trust Network Access Work Continue reading

Cloudflare Relay Worker

Cloudflare Relay Worker
Cloudflare Relay Worker

Our Notification Center offers first class support for a variety of popular services (a list of which are available here). However, even with such extensive support, you may use a tool that isn’t on that list. In that case, it is possible to leverage Cloudflare Workers in combination with a generic webhook to deliver notifications to any service that accepts webhooks.

Today, we are excited to announce that we are open sourcing a Cloudflare Worker that will make it as easy as possible for you to transform our generic webhook response into any format you require. Here’s how to do it.

For this example, we are going to write a Cloudflare Worker that takes a generic webhook response, transforms it into the correct format and delivers it to Rocket Chat, a popular customer service messaging platform.  When Cloudflare sends you a generic webhook, it will have the following schema, where “text” and “data” will vary depending on the alert that has fired:

{
   "name": "Your custom webhook",
   "text": "The alert text",
   "data": {
       "some": "further",
       "info": [
           "about",
           "your",
           "alert",
           "in"
       ],
       "json": "format"
   },
   "ts": 123456789
}

Whereas Rocket Chat is looking for this format:

{
   "text": "Example  Continue reading

WEBINAR: ISP Design – Separation of Network Functions


Recently, we recorded a webinar to explain a design concept frequently used by iparchitechs.com to build and migrate WISP, FISP and Telco networks – separation of network functions. It centers around simplification of roles within an ISP network. It also explores the use of lower-cost commodity network equipment to maximize the service area for a given ISP footprint while meeting key requirements like scale, redundancy and capacity.


Topics that were covered include:

  • What are network functions?
  • Design examples for WISP/FISP and Telco
  • Equipment and budget considerations



Here is an example of solving design/operational issues with network function separation:




Link to the webinar and slides:

Webinar: Webinar Recording
Slides: Slide Deck


https://iparchitechs.com/contact

Private 5G: Its use in enterprises faces challenges

Interest in deploying a private 5G network is growing among enterprises, but mainstream deployment faces a number of obstacles, including competition from less complicated and more widely available wireless options such as Wi-Fi 6/6E.Private 5G could be a game changer for some enterprises, particularly in the industrial, automotive, and energy sectors. A private 5G network can guarantee throughput and latency levels that next-generation use cases require, according to research firm Gartner. But it’s still very early in the private-5G game. It could take a decade for it to take hold, as 5G coverage needs to expand and costs for 5G subscription plans and capable devices need to come down.To read this article in full, please click here

Are we there yet?

This transition to IPv6 has been going on for 20 years now, and if there was any urgency that was instilled in the effort by the prospect of IPv4 address exhaustion then we’ve been living with exhaustion for a decade now. So perhaps it's time to ask the question: How much longer is this transition going to take?

BGP MPLS-VPN Option B

The Cisco documentation about this call it Inter-AS Option B with the use case being to extend LSPs between sites over the one link. As Option B is the only MPLS-VPN method supported by Cisco SD-WAN I wanted to get a better understanding of how it works aswell as see if it could be used to extend multi-VRF prefixes between edge routers and a core switch within the same AS (rather than using Option C with LDP).