Archive

Category Archives for "Networking"

Everything Is Better with a GUI (even netsim-tools)

Some people think that everything is better with Bluetooth. They’re clearly wrong; according to the ancient wisdom of product managers working for networking vendors, everything is better with a GUI.

Now imagine adding network topology visualizer and GUI-based device access with in-browser SSH to an intent-based infrastructure-as-code virtual network function labbing tool. How’s that for a Bullshit Bingo winner1?

Deloitte and VMware announce cloud-services practice

Consulting giant Deloitte has expanded its long-standing partnership with VMware to create the Deloitte VMware Distributed Cloud (DVDC) practice, designed to help clients moderninze their applications and migrate to the cloud.Monty Bhatia, vice president of Global Systems Integrators at VMware said via email there are no new services or products coming from the alliance, just the creation of the practice within Deloitte, which brings in existing capabilities from Deloitte with a broader portfolio of VMware Cross-Cloud services. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Creating a quick calculation function on Linux

Anytime you're planning to do a lot of calculations on a Linux system, you can use the power of bash to create a quick function and then use it repeatedly to do the calculations for you. In this post, we'll look at how this trick works and what you need to be aware of to ensure that your calculations are correct.Let's start with this mathematical function as an example:$ ? () { echo "$*" | bc ; } Troubleshooting your bash scripts in Linux   This command sets up a function that will pass the values and mathematical operators that you provide as arguments to the bc calculator command. Note that to call the function, you simply type a "?" followed by the arguments. In the first example below, the arguments are 1, followed by the multiplication character "*", followed by a 2, a "+" sign and a 3. The result is 5.To read this article in full, please click here

Creating a quick calculation function on Linux

Anytime you're planning to do a lot of calculations on a Linux system, you can use the power of bash to create a quick function and then use it repeatedly to do the calculations for you. In this post, we'll look at how this trick works and what you need to be aware of to ensure that your calculations are correct.Let's start with this mathematical function as an example:$ ? () { echo "$*" | bc ; } Troubleshooting your bash scripts in Linux   This command sets up a function that will pass the values and mathematical operators that you provide as arguments to the bc calculator command. Note that to call the function, you simply type a "?" followed by the arguments. In the first example below, the arguments are 1, followed by the multiplication character "*", followed by a 2, a "+" sign and a 3. The result is 5.To read this article in full, please click here

Microsoft shifts SONiC development to the Linux Foundation

The enhancement and adoption of SONiC, the open-source network operating system, could accelerate now that its development has been given over to the the Linux Foundation, experts say.Software for Open Networking in the Cloud had been overseen by Microsoft, which has now ceded that role to the Linux Foundation. [ Get regularly scheduled insights by signing up for Network World newsletters. ] The shift could result in the scale and use of the NOS grow as the foundation provides a trusted hub for over 450,000 developers to code, manage and advance open technology projects.To read this article in full, please click here

Microsoft shifts SONiC network operating system development to the Linux Foundation

The enhancement and adoption of SONiC, the open-source network operating system, could accelerate now that its development has been given over to the the Linux Foundation, experts say.Software for Open Networking in the Cloud had been overseen by Microsoft, which has now ceded that role to the Linux Foundation. [ Get regularly scheduled insights by signing up for Network World newsletters. ] The shift could result in the scale and use of the NOS grow as the foundation provides a trusted hub for over 450,000 developers to code, manage and advance open technology projects.To read this article in full, please click here

DMVPN vs MPLS VPN

DMVPN – Dynamic Multipoint VPN and MPLS VPN are two of the most popular VPN mechanisms. In this post, we will look at DMVPN vs MPLS VPN comparison, from many different aspects. At the end of this post, you will be more comfortable positioning these private VPN mechanisms.

DMVPN vs MPLS VPN

When we compare the two protocols, we look at many different aspects. For this comparison, I think very first we should say that DMVPN is a Cisco preparatory tunnel-based VPN mechanism but MPLS VPN is standard-based, RFC 2547, non-tunnel based VPN mechanism. Although, whether MPLS LSP is a tunnel or not is an open discussion in the networking community, we won’t start that discussion here again.

DMVPN and MPLS VPN over the Internet

Another important consideration for MPLS VPN vs DMVPN is, that DMVPN can be set up over the Internet but MPLS VPN works over private networks, Layer 2 or Layer 3 based private networks. DMVPN tunnels can come up over the Internet and inside the tunnels routing protocols can run to advertise the Local Area Networks subnets.

But MPLS requires Private network underlay.

DMVPNN vs MPLS

Figure – DMVPN Networks can run over Internet or Private Networks 

 

Continue reading

How SASE uses AI

Secure access service edge, or SASE, combines networking and security into a cloud-based service, and it’s growing fast. According to Gartner projections, enterprise spending on SASE will hit almost $7 billion this year, up from under $5 billion in 2021. Gartner also predicts that more than 50% of organizations will have strategies to adopt SASE by 2025, up from less than 5% in 2020.To read this article in full, please click here

What is Ethernet?

Ethernet is one of the original networking technologies, having been invented nearly 50 years ago. And yet, because of the simplicity by which the communications protocol can be deployed and its ability to incorporate modern advancements without losing backwards compatibility, Ethernet continues to reign as the de facto standard for computer networking.At its core, Ethernet is a protocol that allows computers (from servers to laptops) to talk to each other over wired networks that use devices like routers, switches and hubs to direct traffic. Ethernet works seamlessly with wireless protocols, too.Its ability to work within almost any environment has led to its universal adoption around the world. This is especially true because it allows organizations to use the same Ethernet protocol in their local area network (LAN) and their wide-area network (WAN). That means that it works well in data centers, in private or internal company networks, for internet applications and almost anything in between. It can even support the most complex forms of networking, like virtual private networks (VPNs) and software-defined networking deployments.To read this article in full, please click here

IS-IS Routing Ptrotocol

IS-IS is a link-state routing protocol, similar to OSPF. If you are looking for Service Provider grade, MPLS Traffic Engineering support, and extendible routing protocol for easier future migration then the only choice is IS-IS.

Commonly used in Service Providers, Datacenter (as an underlay), and some large Enterprise networks.

IS-IS Routing Protocol in Networking

IS-IS works based on TLV format. TLVs provide extensibility to the IS-IS protocol.

IS-IS TLV Codes – Specified in RFC 1195

IS-IS TLV format

 

You don’t need totally different protocol to support new extensions. In IS-IS IPv6, MTR and many other protocols just can be used with additional TLVs.

1. IPv6 Address Family support (RFC 2308)
2. Multi-Topology support (RFC 5120)
3. MPLS Traffic Engineering (RFC 3316)
IS-IS is a Layer 2 protocol and is not encapsulated in IP, thus it is hard if not impossible to attack Layer2 networks remotely, IS-IS is considered more secure than OSPF.
is-is dataplane

IS-IS uses a NET (Network Entity Title) address similar to OSPF Router ID.

IP support to IS-IS is added by the IETF after ISO invented it for the CLNS. If IS-IS is used together with IP, it is called Integrated IS-IS.

IS-IS doesn’t require an IP address for the neighborship.

Continue reading

Mitigate Supply-Chain Attacks With Microsegmentation And ZTNA

This article originally appeared on Packet Pushers Ignition on January 12, 2021. In broad terms, the SolarWinds attack is a standard (though well-executed) supply-chain compromise that breaches a trusted source of software, hardware, or services to gain entry into an organization’s internal infrastructure. Once inside, it spreads to other systems, installs additional tools, compromises user […]

The post Mitigate Supply-Chain Attacks With Microsegmentation And ZTNA appeared first on Packet Pushers.

OSPF Configuration – A sample template on multi-vendor routers

There are commons and differences to the time when it comes to configuring an OSPF routing protocol on a router you manage, based on the router’s manufacturer.

We will take a look at the basic sample of configuring OSPF on Cisco IOS-XE and Juniper’s JunOS operation systems.

OSPF on Cisco IOS-XE

With ios-xe we start configuring OSPF by mentioning the numerical value of the:

OSPF Process ID

And what that does mean is just a number to isolate some hierarchical designs of the OSPF process on the router of cisco.

Does it have to be matched on both the peering ends?, the answer is NO

Does it affect some priorities in some OSPF election processes?, the answer is also NO

Is it that mandatory?, well based on that “OS” it is, but it is not a general OSPF concept?

As it is missing with the other vendors!!

That makes the first line of configuration look like this:

        OERouter1(config)#router OSPF [Process ID]

i.e. “OERouter1(config)#router ospf 10

OSPF Network Advertisement

the later step after getting into the hierarchical mode of OSPF, specifying the process ID as well, is to advertise the networks.

these networks Continue reading