This lesson describes how to install the Python SDK for Twilio so you can build SMS alerts. You can find the packages for this lesson in the GitHub repository that accompanies this course: https://github.com/ericchou1/pp_practical_lessons_1_route_alerts/tree/master/4_Packages Eric Chou is a network engineer with 20 years of experience, including managing networks at Amazon AWS and Microsoft Azure. He’s […]
The post Practical Python For Networking: 4.2 – SMS Alerting – Python SDK And Environmental Variables – Video appeared first on Packet Pushers.
Some people think that everything is better with Bluetooth. They’re clearly wrong; according to the ancient wisdom of product managers working for networking vendors, everything is better with a GUI.
Now imagine adding network topology visualizer and GUI-based device access with in-browser SSH to an intent-based infrastructure-as-code virtual network function labbing tool. How’s that for a Bullshit Bingo winner1?
Some people think that everything is better with Bluetooth (or maybe it’s AI these days). They’re clearly wrong; according to the ancient wisdom of product managers working for networking vendors, everything is better with a GUI.
Now imagine adding network topology visualizer and GUI-based device access with in-browser SSH to an intent-based infrastructure-as-code virtual network function labbing tool. How’s that for a Bullshit Bingo winner1?
DMVPN – Dynamic Multipoint VPN and MPLS VPN are two of the most popular VPN mechanisms. In this post, we will look at DMVPN vs MPLS VPN comparison, from many different aspects. At the end of this post, you will be more comfortable positioning these private VPN mechanisms.
When we compare the two protocols, we look at many different aspects. For this comparison, I think very first we should say that DMVPN is a Cisco preparatory tunnel-based VPN mechanism but MPLS VPN is standard-based, RFC 2547, non-tunnel based VPN mechanism. Although, whether MPLS LSP is a tunnel or not is an open discussion in the networking community, we won’t start that discussion here again.
Another important consideration for MPLS VPN vs DMVPN is, that DMVPN can be set up over the Internet but MPLS VPN works over private networks, Layer 2 or Layer 3 based private networks. DMVPN tunnels can come up over the Internet and inside the tunnels routing protocols can run to advertise the Local Area Networks subnets.
But MPLS requires Private network underlay.

Figure – DMVPN Networks can run over Internet or Private Networks
Today on Tech Bytes podcast we talk with Aruba, a Hewlett Packard Enterprise company, about the evolution of Wi-Fi standards, why Aruba is seeing the fast take-up of Wi-Fi 6E, practical enhancements in 6E, and what to expect with Wi-Fi 7.
The post Tech Bytes: Why Wi-Fi 6E Is Off To A Fast Start (Sponsored) appeared first on Packet Pushers.
This year I have been learning Rust, and I recently came across an excellent by Tyler Christiansen Dependencies Add the following libraries to the dependencies section of the cargo.toml file. tokio = futures = "0.3.21" serde = "1.0.136" serde_derive = "1.0.136" serde_json =...continue reading
This year I have been learning Rust, and I recently came across an excellent by Tyler Christiansen Dependencies Add the following libraries to the dependencies section of the cargo.toml file. tokio = futures = "0.3.21" serde = "1.0.136" serde_derive = "1.0.136" serde_json =...continue reading
IS-IS is a link-state routing protocol, similar to OSPF. If you are looking for Service Provider grade, MPLS Traffic Engineering support, and extendible routing protocol for easier future migration then the only choice is IS-IS.
Commonly used in Service Providers, Datacenter (as an underlay), and some large Enterprise networks.
IS-IS works based on TLV format. TLVs provide extensibility to the IS-IS protocol.
IS-IS TLV Codes – Specified in RFC 1195

You don’t need totally different protocol to support new extensions. In IS-IS IPv6, MTR and many other protocols just can be used with additional TLVs.

IP support to IS-IS is added by the IETF after ISO invented it for the CLNS. If IS-IS is used together with IP, it is called Integrated IS-IS.
IS-IS doesn’t require an IP address for the neighborship.
This article originally appeared on Packet Pushers Ignition on January 12, 2021. In broad terms, the SolarWinds attack is a standard (though well-executed) supply-chain compromise that breaches a trusted source of software, hardware, or services to gain entry into an organization’s internal infrastructure. Once inside, it spreads to other systems, installs additional tools, compromises user […]
The post Mitigate Supply-Chain Attacks With Microsegmentation And ZTNA appeared first on Packet Pushers.