Archive

Category Archives for "Networking"

Migration from VMware NSX for vSphere to NSX-T

Migration to VMware NSX-T Data Center (NSX-T) is top of mind for customers who are on NSX for vSphere (NSX-V). Broadly speaking, there are two main methods to migrate from NSX for vSphere to NSX-T Data Center: In Parallel Migration and In Place Migration. This blog post is a high-level overview of the above two approaches to migration.

2 Methods for VMware NSX Migration

Customers could take one of two approaches for migration.

In Parallel Migration:

In this method, NSX-T infrastructure is deployed in parallel along with the existing NSX-V based infrastructure.  While some components of NSX-V and NSX-T, such as management, could coexist, compute clusters running the workloads would be running on its own hardware.  This could be net new hardware or reclaimed unused hardware from NSX-V.

Migration of the workload in this approach could take couple of different approaches.

  • Cattle:  New workloads are deployed on NSX-T and the older workloads are allowed to die over time.
  • Pets:  Lift and shift workloads over to the new NSX-T infrastructure.

In Place Migration

There is simpler method though!  A method that doesn’t require dedicated hardware.  It’s an in place migration approach.  Curious?   This method uses Continue reading

ShortestPathFirst Now Has a New, Shorter Domain Name – spfirst.net

ShortestPathFirst now has a new, shorter domain name (spfirst.net) that we intend to use for future correspondence, marketing and business initiatives. We will continue to maintain the longer domain (shortestpathfirst.net) for backward compatibility and for business continuity but for all intents and purposes will use the new domain name where possible. Stay tuned for lots …

5G and Me: And Security

In today’s uber-connected world, everyone has dealt with that little voice in the back of the...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BrandPost: Huawei CloudCampus Triumphs over Cisco DNA, Tolly Reports

With new technologies such as automation and artificial intelligence (AI) emerging all around us, enterprise digitalization is inevitable. But however much enterprises want to transform, there is a significant cost in terms of time and technological manpower to ensure the system runs smoothly. In particular, enterprises are often faced with a variety of human factors that can hamper digitalization projects, including organizational resistance to change, lack of a clear vision, and inability to gather and leverage customer data, to name just a few.On the technical front, the challenge is in finding the right products and services to overcome the inflexibility of technology stack and development processes. Therefore, picking the most suitable and flexible solutions to meet the transformation challenges is usually the key to success. The right solution not only streamlines deployment but also makes it easier for people who are involved in the exercise – the easier the jobs, the less reluctant the organization towards the changes.To read this article in full, please click here

Vapor IO Raises $90M to Build ‘Nationwide’ Edge Computing Network

It also reached an agreement for Cloudflare to deploy its cloud services on Vapor IO’s Kinetic...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Juniper to MikroTik – MPLS and VPNv4 interop



Juniper to MikroTik – a new series

Previously, I’ve written a number of articles that compared syntax between Cisco and MikroTik and have received some great feedback on them.

As such, I decided to begin a series on Juniper to MikroTik starting with MPLS and L3VPN interop as it related to a project I was working on last year.

In the world of network engineering, learning a new syntax for a NOS can be overwhelming if you need a specific set of config in a short timeframe. The command structure for RouterOS can be a bit challenging if you are used to Juniper CLI commands.

If you’ve worked with Juniper gear and are comfortable with how to deploy that vendor, it is helpful to draw comparisons between the commands, especially if you are trying to build a network with a MikroTik and Juniper router.

Lab Overview

The lab consists of (3) Juniper P routers and (2) MikroTik PE routers. Although we did not get into L3VPN in this particular lab, the layout is the same.

A note on route-targets

It seems that the format of the route-target has some bearing on this being successful. Normally i’ll use a format like Continue reading

Getting More Bang for Your VXLAN Bucks

A little while ago I explained why you can’t use more than 4K VXLAN segments on a ToR switch (at least with most ASICs out there). Does that mean that you’re limited to a total of 4K virtual ethernet segments?

Of course not.

You could implement overlay virtual networks in software (on hypervisors or container hosts), although even there the enterprise products rarely give you more than a few thousand logical switches (to use NSX terminology)… but that’s a product, not technology limitation. Large public cloud providers use the same (or similar) technology to run gazillions of tenant segments.

Want to know more? Watch our NSX, AWS and Azure networking webinars.
Read more ...

VMware Acquires AIOps Vendor Nyansa to Bolster SD-WAN

The software giant says Nyansa's technology will enable improved network visibility, monitoring,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Setting up passwordless Linux logins using public/private keys

Setting up an account on a Linux system that allows you to log in or run commands remotely without a password isn’t all that hard, but there are some tedious details that you need to get right if you want it to work. In this post, we’re going to run through the process and then show a script that can help manage the details.Once set up, passwordless access is especially useful if you want to run ssh commands within a script, especially one that you might want to schedule to run automatically.It’s important to note that you do not have to be using the same user account on both systems. In fact, you can use your public key for a number of accounts on a system or for different accounts on multiple systems.To read this article in full, please click here

Daily Roundup: Cisco Advances Intent-Based Networking

Cisco advanced intent-based networking; SK boasted standalone 5G first; and Citrix swatted ADC,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco adds proactive problem solving to data-center software

Proactively fixing a network problem before it becomes a full-blown nightmare is the goal of new software Cisco has added to its Data Center Network Assurance and Insights suite.Cisco Assurance is a key component of the company’s intent-based networking initiative that maintains a continuous validation and verification that the network is doing what the customer expects.  [Get regularly scheduled insights by signing up for Network World newsletters.] Network Insights is software Cisco customers use to monitor and record hardware and software telemetry data over time to identify anomalies in the fabric and help automate troubleshooting, root-cause analysis, capacity planning and remediation, according to Cisco. For example, Network Insights can watch over network component usage patterns and audit logs, events, and faults as well as latency conditions from Cisco Application Centric Infrastructure or Data Center Network Manager (DCNM) network fabrics.To read this article in full, please click here

Cisco adds proactive problem solving to data-center software

Proactively fixing a network problem before it becomes a full-blown nightmare is the goal of new software Cisco has added to its Data Center Network Assurance and Insights suite.Cisco Assurance is a key component of the company’s intent-based networking initiative that maintains a continuous validation and verification that the network is doing what the customer expects.  [Get regularly scheduled insights by signing up for Network World newsletters.] Network Insights is software Cisco customers use to monitor and record hardware and software telemetry data over time to identify anomalies in the fabric and help automate troubleshooting, root-cause analysis, capacity planning and remediation, according to Cisco. For example, Network Insights can watch over network component usage patterns and audit logs, events, and faults as well as latency conditions from Cisco Application Centric Infrastructure or Data Center Network Manager (DCNM) network fabrics.To read this article in full, please click here

Kontron’s Antoine Sirois: 5G Edge Hinges on Hardware as the Foundation for Success

Antoine Sirois of Kontron sat down to share his thoughts on mobile edge, CDN, and the future of...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Full Stack Journey 038: Exploring Kubernetes And The Contour Project With Steve Sloka

Today's Full Stack Journey episode explores Contour, an an Envoy-based Kubernetes Ingress controller. My guest is Steve Sloka. In addition to Contour, we also talk about Steve's journey into Docker, containers, and Kubernetes as a developer, and their impact on his career.

The post Full Stack Journey 038: Exploring Kubernetes And The Contour Project With Steve Sloka appeared first on Packet Pushers.

BrandPost: SASE: What It Is, What It Isn’t, and Why Should You Even Care

For years, enterprise networking and security leaders have had to weather the complaints and consternation of IT and business executives. IT costs too high? Blame that MPLS network.  Web taking too long to load? It’s that darn VPN client again. Now a new product category, Secure Access Service Edge (SASE), is supposed to put networking and security teams firmly ahead of the game. So impactful is this new sector that Gartner’s termed it “transformational,” a lofty status that not even SD-WAN, with all of its market impact, ever achieved. Within four years, Gartner expects 40% of enterprises will have strategies to adopt SASE.To read this article in full, please click here

Snyk Secures $150M, Snags $1B Valuation

The open source security startup reported over 400% revenue growth in 2019 and says its customers...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Telefónica Scores SD-WAN, Security Deal With Arlanxeo

The five-year contract will span more than 20 production sites in 11 countries across four...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.