Your v6s are here--where do you want 'em? On today's IPv6 Buzz podcast, guest Tim Rooney dives into IPv6 address planning and management for IT teams that are just getting started.
The post IPv6 Buzz 029: You Just Got Your First IPv6 Addresses – Now What? appeared first on Packet Pushers.
Despite touting the advanced nature of its factory and the fact that it will be “operational in...
The bugs could allow attackers to take over affected devices, but Cisco says it’s “not aware of...
The new storage product combines Cloudian’s S3-based object storage software with Seagate’s...
The U.K. systems integrator will use elements of ADVA's Ensemble software, gaining access to 50...
I’ve been trawling through the Extreme Networks Announces Intent to Acquire Aerohive Networks – Investor Presentation – https://investor.extremenetworks.com/static-files/16c92f7a-212b-48ae-86bc-aa132251b1af I’ve picked out some highlights for those people wondering about Key Takeaways Aerohive can be positioned to compete with Meraki which is good fit for existing customers. Extreme gets a basis on which to build SDWAN products that […]
The post Analysis: Extreme Buys Aerohive. Not bad. appeared first on EtherealMind.
Data warehouses are complex beasts. If you want to migrate a warehouse to the cloud, there's a lot of layers to consider including encryption and security, automation, data sovereignty, right-sizing, which migration tools to use, and more. Today's Day Two Cloud podcast slices through the layers of complexity of data warehouse migration with guest Deepak Kaushik.
The post Day Two Cloud 012: Cloud Data Warehouse Migration – A Layer Cake Of Complexity appeared first on Packet Pushers.
I must admit that I was wrong. After almost six years, I was mistake about who would end up buying Aerohive. You may recall back in 2013 I made a prediction that Aerohive would end up being bought by Dell. I recall it frequently because quite a few people still point out that post and wonder what if it’s happened yet.
Alas, June 26, 2019 is the date when I was finally proven wrong when Extreme Networks announced plans to purchase Aerohive for $4.45/share, which equates to around $272 million paid, which will be adjust for some cash on hand. Aerohive is the latest addition to the Extreme portfolio, which now includes pieces of Brocade, Avaya, Enterasys, and Motorola/Zebra.
Why did Extreme buy Aerohive? I know that several people in the industry told me they called this months ago, but that doesn’t explain the reasoning behind spending almost $300 million right before the end of the fiscal year. What was the draw that have Extreme buzzing about this particular company?
The most apparent answer is HiveManager. Why? Because it’s really the only thing unique to Aerohive that Extreme really didn’t have already. Aerohive’s APs Continue reading
I stumbled over this IOS configuration in a folder today. I don’t remember what or who it was for but it looks like its a Mainframe Front End Processor to IPX configuration. The FEP was likely connected using SDLC protocol on the serial interaces and IPX was operating on 16 Megabit Token Ring interface usng […]
The post Before Ethernet and IP there was SDLC and IPX appeared first on EtherealMind.
The post Questions to ask a NetFlow Vendor Before you Buy appeared first on Noction.
In the previous two posts, we’ve seen how to build a custom network API with Kubernetes CRDs and push the resulting configuration to network devices. In this post, we’ll apply the final touches by enabling oAuth2 authentication and enforcing separation between different tenants. All of these things are done while the API server processes incoming requests, so it would make sense to have a closer look at how it does that first.
Every incoming request has to go through several stages before it can get accepted and persisted by the API server. Some of these stages are mandatory (e.g. authentication), while some can be added through webhooks. The following diagram comes from another blogpost that covers each one of these stages in detail:
Specifically for NaaS platform, this is how we’ll use the above stages:
On Monday we wrote about a painful Internet wide route leak. We wrote that this should never have happened because Verizon should never have forwarded those routes to the rest of the Internet. That blog entry came out around 19:58 UTC, just over seven hours after the route leak finished (which will we see below was around 12:39 UTC). Today we will dive into the archived routing data and analyze it. The format of the code below is meant to use simple shell commands so that any reader can follow along and, more importantly, do their own investigations on the routing tables.
This was a very public BGP route leak event. It was both reported online via many news outlets and the event’s BGP data was reported via social media as it was happening. Andree Toonk tweeted a quick list of 2,400 ASNs that were affected.
The RIPE NCC operates a very useful archive of BGP routing. Continue reading
On Monday we wrote about a painful Internet wide route leak. We wrote that this should never have happened because Verizon should never have forwarded those routes to the rest of the Internet. That blog entry came out around 19:58 UTC, just over seven hours after the route leak finished (which will we see below was around 12:39 UTC). Today we will dive into the archived routing data and analyze it. The format of the code below is meant to use simple shell commands so that any reader can follow along and, more importantly, do their own investigations on the routing tables.
This was a very public BGP route leak event. It was both reported online via many news outlets and the event’s BGP data was reported via social media as it was happening. Andree Toonk tweeted a quick list of 2,400 ASNs that were affected.
This blog contains a large number of acronyms and those are explained at the end of Continue reading
In this episode, you’ll hear from Russ White, Infrastructure Architect, Juniper Networks; Jorge...