Archive

Category Archives for "Networking"

ACI Fabric Access Policies Part 3: AAEP, Interface Policy and Interface Policy Group

 

Attachable Access Entity Profile - AAEP


This section explains how to create an object Attachable Access Entity Profile (AAEP) that is used for attaching a Domain into Port Group. Phase 3 in Figure 1-20 illustrates the APIC Management Information Model (MIM) from the AAEP perspective. Class AttEntityP is a Child class for infra, and they both belong to packages Infra. I have already added the object attentp-AEP_PHY into the figure.The format of the RN for this object is Prefix1-{name}, where the Prefix1 is attentp. This gives us the RN attentp-PHY-AEP.



Figure 1-20: APIC MIM Reference: Attachment Access Entity Profile.

Continue reading

Worth Reading: The Shared Irresponsibility Model in the Cloud

A long while ago I wrote a blog post along the lines ofit’s ridiculous to allow developers to deploy directly to a public cloud while burdening them with all sorts of crazy barriers when deploying to an on-premises infrastructure,” effectively arguing for self-service approach to on-premises deployments.

Not surprisingly, the reality is grimmer than I expected (I’m appalled at how optimistic my predictions are even though I always come across as a die-hard grumpy pessimist), as explained in The Shared Irresponsibility Model in the Cloud by Dan Hubbard.

For more technical details, watch cloud-focused ipSpace.net webinars, in particular the Cloud Security one.

Worth Reading: The Shared Irresponsibility Model in the Cloud

A long while ago I wrote a blog post along the lines ofit’s ridiculous to allow developers to deploy directly to a public cloud while burdening them with all sorts of crazy barriers when deploying to an on-premises infrastructure,” effectively arguing for self-service approach to on-premises deployments.

Not surprisingly, the reality is grimmer than I expected (I’m appalled at how optimistic my predictions are even though I always come across as a die-hard grumpy pessimist), as explained in The Shared Irresponsibility Model in the Cloud by Dan Hubbard.

For more technical details, watch cloud-focused ipSpace.net webinars, in particular the Cloud Security one.

Optus Android MMS No Workie

I migrated away from an iphone to an Android phone recently and MMS was not working. I was unable to send or receive MMS and it was pretty annoying as I was not getting funny memes from all of my non-existant friends. It looks like this is a pretty common issue going back years and...

Progress on Image classification and Home-assistant and Dyson integration

Contunuing from the previous post, I was determined to learn some sort of image classification in my free time, I went with Tensorflow/keras as the language or ml language as they have a lot of tutorials around it.

Below youtube series from tensor-flow team will help you get started if you are interested in this

The other part that was a sort of problem for a long time is integration of Dyson Fan with any sort of automation platform like Alexa or python api, Dyson does have an app but apparently they have some issues in UK/Ireland integration, after some research I found that home-assistant supports integration and after a lot of documentation and trials, it looks like home-assistant has now support for it.

Here is the below file that you need to use in the configuration.yaml snippet.

dyson:
username: yourdysonemailaccount
password: yourpassword
language: GB
devices:
- device_id: xxx-xx-xxxxxx
device_ip: a.b.c.d

This has now control for any sort of automation

-Rakesh

Best Networking ideas For Small Groups

Whether for small or large groups, networking is a challenging task. It takes a lot of effort to give the best impression of yourself while trying to socialize no matter what the purpose of socializing or networking is. This can become more challenging when you are living in a place where there are not many resources available for networking. Networking can be done for different purposes. So, if you are looking for networking ideas for small groups, you need to find out the purpose of networking for the group.

Check out a few networking ideas for small groups below.

A Mobile Event App

If you have an event coming up, you can create a mobile event app to organize your event and connect with the attendees of the event. This is a great way to stay in touch and coordinate with your small group of attendees who are going to look after various tasks of the event. These mobile apps are one of the easiest ways for staying in touch with the team. You even get the option to rate your favorite session and provide the admin with feedback once the event ends.

Thorough Social Media

If the purpose of Continue reading

Do You Do What You’ve Always Done?

When I was an intern at IBM twenty something years ago, my job was deploying new laptops to people. The job was easy enough. Transfer their few hundred megabytes of data to the new machine and ensure their email was all setup correctly. There was a checklist that needed to be followed in order to ensure that it was done correctly.

When I arrived for my internship, one of my friends was there finishing his. He was supposed to train me in how to do the job before he went back to school. He helped me through the first day of deploying laptops following the procedure. The next day he handed me a different sheet with some of the same information but in a different order. He said, “I realized we had too many reboots in the process and this way cuts about twenty minutes off the deployment time.” I’m all about saving time so I jumped at the chance.

Everything went smashingly for the next month or so. My friend was back at school and I used his modified procedure to be as productive as possible. One day, my mentor wanted to shadow my deployment day to see Continue reading

Heavy Networking 545: Achieving Automated Network State Validation

Automated state validation is our topic today on Heavy Networking. The hard part isn't configuring the network: it's ensuring the configuration has resulted in the desired state. Guest John Capobianco regards automated state validation is an advanced automation technique. We dive into details in this episode.

The post Heavy Networking 545: Achieving Automated Network State Validation appeared first on Packet Pushers.

Going Postal

Over the past few months I've had the opportunity at various network operator meetings to talk about BGP routing security. As usual, these presentations include an opportunity for questions from the audience. Here are a small collection of such questions and my efforts at trying to provide an answer.

Machine learning in network management has promise, challenges

As part of the trend toward more automation and intelligence in enterprise networks, artificial intelligence and machine learning are increasingly in-demand because the ability to programmatically identify problems with the network and provide instant diagnosis of complex problems is a powerful one.Applying AI and ML to network management can enable the consolidation of input from multiple management platforms for central analysis. Rather than IT staff manually combing through reports from diverse devices and applications, machine learning can make quick, automated diagnoses of problems.To read this article in full, please click here

Kolkata IX: The Maiden Community Internet Exchange in India

In 2015, the Internet Society Kolkata Chapter decided to create an Internet Exchange Point (IXP). It had just completed the installation of L-Root Instance, a critical Internet infrastructure to improve security and resiliency of the Web.

It chose the IXP model specifically because it was working towards hosting an authoritative Domain Name System (DNS) root zone for a top-level domain (TLD), another essential infrastructure of the Internet. But they didn’t know where to begin.

So, the team evaluated cost models and the market and held an outreach event with the Internet Service Provider (ISP) community. The engagement raised interest, but no one joined the IXP. The expectation was that Content Distribution Networks (CDN) would kick off the IXP, before others could join. Tushar Kanti Bhakta, a senior member of the Chapter’s board, suggested community building could help.

With no equipment, no members and no CDN, the team started community building efforts. It held workshops where it invited potential members to discuss Domain Name System Security Extensions, DNS, and the Border Gateway Protocol, the routing protocol for the Internet. Each workshop gave the team the opportunity to pitch the idea of a community IXP in Kolkata.

After two years of engagement, Continue reading