Last year when I was creating the first version of VMware NSX Deep Dive content, NSX-V was mainstream and NSX-T was the new kid on the block. A year later NSX-V is mostly sidelined, and all the development efforts are going into NSX-T. Time to adapt the webinar to new reality… taking the usual staged approach:
Summer has flown by and you may have missed some of the great content that was published. Don’t worry, you can catch up on some of our favorite podcasts, blog posts, and articles below. So settle in and then dive into all things open networking!
From Cumulus Networks:
Customizing your network: Take a quick look at the types of automation available in Linux, from basic to dynamic, and how these automation capabilities help to enable data center-wide orchestration here.
Kernel of Truth podcast: Network monitoring: When it comes to network monitoring, have you run into a “switch that cried wolf?”Kernel of Truth host Brian O’Sullivan is joined by two new guests to the podcast Justin Betz & Faye Ly to chat more about networking monitoring here.
Best practices: MLAG backup IP: We cover the best ways to build a redundant backup IP link for multi-chassis link aggregation (MLAG).
Exploring Batfish with Cumulus – part one: With Batfish supporting Cumulus Networks this year, we show how it can fit into pipelines & replace or complement existing testing strategies in part one of a two-part series.
Kernel of Truth podcast: Innovation in the data center: Spiderman aka Rama Continue reading
ClearOS is an operating system based on CentOS for use in small and medium enterprises as a network gateway and network server with a web-based administration interface.
ClearOS in Gateway mode acts as a firewall, gateway and server on a local network. The tutorial provides installation and configuration steps for deployement of ClearOS on QEMU VM. We will later connect ClearOS QEMU VM into GNS3 network topology in order to test features such as application traffic filtering and transparent proxy with user authentication.
Software Used:
Host OS: Kubuntu Linux 18.04.1 LTS with Qemu 3.0.0 installed and kvm-intel module loaded
Guest OS: ClearOS 7.5.0 x86_64
1. Preparing Host Network Infrastructure
As we are going to install ClearOS guest QEMU VM in a gateway mode, your host should have two network adapters available. (Picture 1). In our case, the first ClearOS guest network interface ens3 will be defined as LAN type during ClearOS installation. The second guest interface ens4 will be defined as External and used for connection to SOHO network. We will bridge the interface ens4 with the host interface enp4s0f2 using iproute utility. But first, we need to create tap interfaces tap0 and Continue reading
Building a business case for SD-WAN involves more than just anticipating savings by moving from private circuits to business broadband connections. On today's Heavy Networking, we look at how to tie SD-WAN capabilities to business benefits, what to consider when developing a business case, how measure ROI, and more with guest Jason Gintert.
The post Heavy Networking 468: Making The Business Case For SD-WAN appeared first on Packet Pushers.
Weekly Wrap for Aug. 30, 2019: AT&T CEO John Donovan gives his notice; VMware bets the farm on...
The CDN's Edge Computing Platform Service is built on Kubernetes and Docker using a container...
Broadcom claims its PEX88000 family of switches are "ideal for high-throughput and low-latency...
Cisco issued a patch for a critical bug in its IOS XE operating system that could allow a remote...
Who owns the network policy for your organization? How about the security policy?Identity policy? Sound like easy questions, don’t they? The first two are pretty standard. The last generally comes down to one or two different teams depending upon how much Active Directory you have deployed. But have you ever really thought about why?
During Future:NET this week, those poll questions were asked to an audience of advanced networking community members. The answers pretty much fell in line with what I was expecting to see. But then I started to wonder about the reasons behind those decisions. And I realized that in a world full of cloud and DevOps/SecOps/OpsOps people, we need to get away from teams owning policy and have policy owned by a separate team.
Where does the networking policy live? Most people will jump right in with a list of networking gear. Port profiles live on switches. Routing tables live on routers. Networking policy is executed in hardware. Even if the policy is programmed somewhere else.
What about security policy? Firewalls are probably the first thing that come to mind. More advanced organizations have a ton of software that scans for security Continue reading
To many North Americans, Hawai’i is a place of beaches, resorts, surfing, rainforests, and volcanoes — it’s a vacation destination.
But despite its tourism infrastructure and economy, Native Hawaiian communities in the far-flung chain of more than 130 islands face many of the same Internet connectivity challenges as Indigenous communities in Canada and the continental United States. And for a variety of economic, policy and geographic reasons, it is often excluded from efforts to improve access for Indigenous, rural and remote communities.
The Internet Society believes the Internet is for everyone and works with underserved communities to find and create local access solutions in some of the hardest-to-reach places on earth. What’s exciting is that despite the different geographic landscapes, the same community-led solution underway to improve Internet access in the high Arctic could also help Native Hawaiians carve their own path to better connectivity.
That’s why, in 2019, the Internet Society is holding its third annual Indigenous Connectivity Summit (ICS) in Hawai’i.
Including Indigenous voices in the planning and solutions that shape the Internet is a vital part of closing the digital divide. Previous summits in Santa Fe, New Mexico, in 2017, and Inuvik, Northwest Territories, Canada, Continue reading