Archive

Category Archives for "Networking"

New book on LISP – Locator and Identity Separation Protocol

New book is released on LISP – Locator and Identity Separation Protocol. “LISP Network Deployment and Troubleshooting: The Complete Guide to LISP Implementation on IOS-XE, IOS-XR, and NX-OS” I still couldn’t start to read it as the authors didn’t send my own copy yet :), but I want to congratulate the authors, Tarique, Vinit and …

The post New book on LISP – Locator and Identity Separation Protocol appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

What is last hop router and first hop router in Multicast?

What is last hop router and first hop router in Multicast? These are important  terms which are used in Multicast. In this post, I will explain the terms, differences and some detail about this term.   In fact, last hop router and the first hop router can be considered as the same thing. But I …

The post What is last hop router and first hop router in Multicast? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

When Is Something SD-WAN?

A couple of days ago, I wrote on LinkedIn asking you what a SD-WAN solution should consist of.

https://www.linkedin.com/posts/danieldib_sdn-sdwan-wan-activity-6583614108971655168-BH8x

The post was meant to create a discussion and there were a lot of great answers. Some of the features are “must have” and some of them are “nice to have”. I’m not claiming to have all of the answers but here are some of my thoughts on the topic.

Automated VPN – There should be a mechanism to help you build the IPSec tunnels. You should not have to configure them manually. Traditionally, we often used something like DMVPN to build the tunnels for us. Consider the following:

  • How are devices onboarded? Who can join the overlay?
  • Are tunnels built using certificates or pre-shared key?
  • How often are keys rotated? If at all
  • How do you prevent a stolen router from joining the overlay?

Separation of control- and data plane – This one is debatable but there should a mechanism to influence topology of the overlay, and routing of the edge devices, using a central mechanism. With DMVPN, we had the ability to do Hub & Spoke or fully meshed, but there was no granular control. We could Continue reading

Changing Cisco IOS BGP Policies Based on IP SLA Measurements

This is a guest blog post by Philippe Jounin, Senior Network Architect at Orange Business Services.


You could use track objects in Cisco IOS to track route reachability or metric, the status of an interface, or IP SLA compliance for a long time. Initially you could use them to implement reliable static routing (or even shut down a BGP session) or trigger EEM scripts. With a bit more work (and a few more EEM scripts) you could use object tracking to create time-dependent static routes.

Cisco IOS 15 has introduced Enhanced Object Tracking that allows first-hop router protocols like VRRP or HSRP to use tracking state to modify their behavior.

Read more ...

Not so static… Introducing the HTMLRewriter API Beta to Cloudflare Workers

Not so static... Introducing the HTMLRewriter API Beta to Cloudflare Workers
Not so static... Introducing the HTMLRewriter API Beta to Cloudflare Workers

Today, we’re excited to announce HTMLRewriter beta — a streaming HTML parser with an easy to use selector based JavaScript API for DOM manipulation, available in the Cloudflare Workers runtime.

For those of you who are unfamiliar, Cloudflare Workers is a lightweight serverless platform that allows developers to leverage Cloudflare’s network to augment existing applications or create entirely new ones without configuring or maintaining infrastructure.

Static Sites to Dynamic Applications

On Friday we announced Workers Sites: a static site deployment workflow built into the Wrangler CLI tool. Now, paired with the HTML Rewriter API, you can perform DOM transformations on top of your static HTML, right on the Cloudflare edge.

You could previously do this by ingesting the entire body of the response into the Worker, however, that method was prone to introducing a few issues. First, parsing a large file was bound to run into memory or CPU limits. Additionally, it would impact your TTFB as the body could no longer be streamed, and the browser would be prevented from doing any speculative parsing to load subsequent assets.

HTMLRewriter was the missing piece to having your application fully live on the edge – soup to nuts. You can Continue reading

Tech Bytes: The Value Of Software Quality With Arista Networks (Sponsored)

Software is essential to networking and on today's Tech Bytes podcast, sponsored by Arista, we examine how software quality affects operations, upgrades, security and more. Our guest is Doug Gourlay, VP and General Manager of Cloud Networking at Arista.

The post Tech Bytes: The Value Of Software Quality With Arista Networks (Sponsored) appeared first on Packet Pushers.

Inspur Pushes Data Center AI With Latest OCP Contributions

This includes an OCP compliant AI computing product for deep neural network applications launched...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Nokia Wields Single Carrier Terabit Connection Power

Nokia says just one terabit-per-second data stream is enough bandwidth to download the entire Game...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Talking 5G and the Next Big Networking Revolution with Claus Pedersen, Hewlett Packard Enterprise

Hear from Claus Pedersen, Vice President of Telco Infrastructure Solutions at HPE as he talks 5G,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

KDDI Molds 5G Plans With Ericsson, Nokia, and Samsung

KDDI plans to begin deploying 5G services in March 2020 — months before the 2020 Summer Olympics...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

¡Bienvenidos a Latinflare!

¡Bienvenidos a Latinflare!
¡Bienvenidos a Latinflare!

Our Story

When I first began interviewing with Cloudflare in the Spring of 2019, I came across a Cloudflare blog post announcing Proudflare, the company’s LGBTQIA+ Employee Resource Group (ERG). The post gave me a clear sense of the company’s commitment to diversity and inclusion. I could tell this was a place that values and celebrates diversity, which really appealed to me as I progressed through the interview process with Cloudflare, and ultimately accepted the role.

Fast forward to my Cloudflare new hire orientation, two weeks of training and introductions at our San Francisco HQ. We learned about the various ERGs at Cloudflare including one for Latinx employees. While I had a strong desire to be part of a Latinx ERG, it was clear that the group was actually in need of someone to lead the effort and rally the troops. At Cloudflare, we have offices across the country and around the world. I wasn’t really sure how to launch an ERG that would be global in scope. After meeting with leads from other Cloudflare ERGs, understanding the landscape, and attending an external workshop, everything started to come together.

In early August, we officially gave ourselves Continue reading

How the Linux screen tool can save your tasks – and your sanity – if SSH is interrupted

If you’ve ever had to restart a time-consuming process because your SSH session was disconnected, you might be very happy to learn about an interesting tool that you can use to avoid this problem – the screen tool.Screen, which is a terminal multiplexor, allows you to run many terminal sessions within a single ssh session, detaching from them and reattaching them as needed. The process for doing this is surprising simple and involves only a handful of commands. [ Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ] To start a screen session, you simply type screen within your ssh session. You then start your long-running process, type Ctrl+A Ctrl+D to detach from the session and screen -r to reattach when the time is right.To read this article in full, please click here

How the Linux screen tool can save your tasks — and your sanity — if SSH is interrupted

If you’ve ever had to restart a time-consuming process because your SSH session was disconnected, you might be very happy to learn about an interesting tool that you can use to avoid this problem — the screen tool.Screen, which is a terminal multiplexor, allows you to run many terminal sessions within a single ssh session, detaching from them and reattaching them as needed. The process for doing this is surprising simple and involves only a handful of commands. [ Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ] To start a screen session, you simply type screen within your ssh session. You then start your long-running process, type Ctrl+A Ctrl+D to detach from the session and screen -r to reattach when the time is right.To read this article in full, please click here

The Week in Internet News: The New Internet Space Race

Broadband in space: The Associated Press, via the New York Post, has a story on the new space race involving Amazon, SpaceX, and other companies. The competition is to be first to deploy new satellite networks to provide broadband service to all corners of the Earth. Still, there are some questions about these low-Earth orbit satellites, with the multi-billion-dollar cost of deployment being the biggest concern.

Secure by algorithm: Researchers at Princeton University have developed algorithms that they say can prevent hacker attacks on power grids, DownToEarth reports. The new algorithms target power spikes that could be driven by IoT-based attacks. One algorithm would prevent connections overloading by balancing power, and the other would help grids restore their functionality after an attack.

Please help: A column at ZDNet asks network operators to using existing tools to fix security problems with the Border Gateway Protocol, which routers use to tell each other the best way to route traffic. The BGP standard includes Route Origin Authorizations (ROAs) to confirm the accuracy of routing messages, but those tools aren’t as widely deployed as they could be, the column suggests.

Lost jobs: A nearly two-month Internet shutdown in the India-controlled Kashmir region Continue reading

Recommended Networking Resources for September 2019 Third Week

There are so many good resources for Network Engineers out there. I started to share the ones I liked on beginning of this month. Click here to see previous Networking Recommended Resources. As you know, I share 5 resource every week. There are so many in my list already, I can’t wait for the next …

The post Recommended Networking Resources for September 2019 Third Week appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.