In this episode of the IPv6 Buzz podcast, Ed, Scott, and Tom talk about microsegmentation with IPv6 and what the IT use cases look like.
The post IPv6 Buzz 109: Microsegmentation With IPv6 appeared first on Packet Pushers.
I’ve rebuilt my data center fabrics live training class, adding a lot of new material across the board, and adding a few new topics. To cover all this new material, the class has been expanded from three to six hours. I’m teaching it for the first time on the 29th and 30th of this month.
From the Safari Books description—
Data centers are the foundation of the cloud, whether private, public, on the edge, or in the center of the network. This training will focus on topologies and control planes, including scale, performance, and centralization. This training is important for network designers and operators who want to understand the elements of data center design that apply across all hardware and software types.
This class consists of two three-hour sessions. The first session will focus on the physical topology, including a short history of spine-and-leaf fabrics, the characteristics of fabrics (versus the broader characteristics of a network), and laying out a spine-and-leaf network to support fabric lifecycle and scaling the network out. The first session will also consider the positive and negative aspects of using single- and multi-forwarding engine (FE) devices to build a fabric, and various aspects of Continue reading

Lots of interesting stuff coming up this month on the Hedge, and here at Rule11 … listen here to find out all about upcoming episodes and training.
You can register for the DC fabric training I mention in this update here.

How much of the traffic on the Internet is wasted—traffic no-one really wanted, and yet is being carried and paid for by providers and end users? In a world increasingly concerned about the waste of precious resources, this is an important topic to consider. Leslie Daigle joins Russ White and Tom Ammon on this episode of the Hedge to discuss the kinds of traffic she’s seeing hit their large-scale honey-trap, and the implications for the Internet.
Long long time ago, Daniel Dib started an interesting Twitter discussion with this seemingly simple question:
How does a switch/router know from the bits it has received which layer each bit belongs to? Assume a switch received 01010101, how would it know which bits belong to the data link layer, which to the network layer and so on.
As is often the case, Peter Paluch provided an excellent answer in a Twitter thread, and allowed me to save it for posterity.
Long long time ago, Daniel Dib started an interesting Twitter discussion with this seemingly simple question:
How does a switch/router know from the bits it has received which layer each bit belongs to? Assume a switch received 01010101, how would it know which bits belong to the data link layer, which to the network layer and so on.
As is often the case, Peter Paluch provided an excellent answer in a Twitter thread, and allowed me to save it for posterity.
Broadcom has announced a new ASIC in the Trident family that can monitor flows in real time to identify anomalies that may indicate DDoS attacks, port scans, data exfiltration, and other threats, but has yet to announce security partners to take advantage of this capability.
The post New Trident 4C ASIC Includes Real-Time Threat Analysis Option appeared first on Packet Pushers.
This video provides a deeper dive into service mesh fundamentals, why a service mesh is important, how it works, and the pros and cons of service mesh in Kubernetes.
The post Service Mesh And Ingress In Kubernetes: Lesson 3 – Service Mesh Fundamentals – Video appeared first on Packet Pushers.
In this Day Two Cloud episode, Ned and Ethan discuss the tradeoffs of mental health and professional achievement. Maybe you spend a lot of extra hours at work for your employer. Perhaps you focus on certifications after work and on the weekends. Maybe you say “yes” to more than you should, because you’re scared you’ll lose it all if you don’t. The tradeoffs are in your personal relationships. Your mental health. You suffer from burnout, anxiety, and stress. Is it all worth it? Ned and Ethan don't have all the answers, but they share their experiences and perspectives.
The post Day Two Cloud 162: The Mental Health Of The 10x Samurai Ninja Engineer appeared first on Packet Pushers.
Network terminology was easy in the 1980s: bridges forwarded frames between Ethernet segments based on MAC addresses, and routers forwarded network layer packets between network segments. That nirvana couldn’t last long; eventually, a big-enough customer told Cisco: “I don’t want to buy another box if I already have your too-expensive router. I want your router to be a bridge.”
Turning a router into a bridge is easier than going the other way round1: add MAC table and dynamic MAC learning, and spend an evening implementing STP.
Network terminology was easy in the 1980s: bridges forwarded frames between Ethernet segments based on MAC addresses, and routers forwarded network layer packets between network segments. That nirvana couldn’t last long; eventually, a big-enough customer told Cisco: “I don’t want to buy another box if I already have your too-expensive router. I want your router to be a bridge.”
Turning a router into a bridge is easier than going the other way round1: add MAC table and dynamic MAC learning, and spend an evening implementing STP.