Datacenter Switching : Nexus ( FEX: Fabric Extenders )

Today I am going to talk about the FEX that you generally heard when you are going to connect your datacenter servers in the Nexus Switching environment. It is called as Bridge Port Extension. It means there is a Parent Switch and the port of that parent switch get connected to FEX( that is another Switch) but act as the Interface card for the Parent switch.
  • Parent Switch :Nexus 5K or Nexus 7K
  • FEX:Nexus 2K ( Another Switch but interconnected with Parent Switch and controlled)

Nexus 7K or 5k is act as Parent Switch but Nexus 2K act as FEX for Parent Switch. So all the function of the Nexus 2K is controlled by the Parent Switch and that is Nexus 7K or 5K. Simply says that Nexus 2000 Series FEX behaves logically like Remote line cards for parent Nexus 5K  or 7K Nexus Switch.

Lets talk how we can connect the FEX with the parent switch in the datacenter environment.

Fig 1.1- FEX Connectivity


Let's talk about the basic Configurations to configure the FEX.

Step-1 :
Enable the FEX feature

N5K-1(config)# feature fex

Step-2 :Create a FEX instance (Note: Its up to you to choose Continue reading

NMAP Quick Reference

NMAP is a tool for network discovery and auditing. This is not a comprehensive tutorial, only a quick reference source. Consult the man pages and/or documentation for indepth explanation of commands. Port Scan Top Ports Scan the top N number of ports cmd nmap --top-ports 10 www.google.com UDP...

Microburst: Intent-Washing (See Apstra Fight Back!)

Apstra – the intent-based networking company – was thrilled, perhaps in a somewhat ironic sense, when Cisco announced just before Cisco Live 2017 US that the future was intent-based networking. I hear informally that their appointment book for meetings at Cisco Live was positively spilling over within just a couple of days. Intent-based networking had just been validated by the big guy in the room!

Apstra Logo

A few months later, and the evidence of intent-washing is all too clear, as some other vendors have begun labeling their SDN products intent-based so they can claim table stakes in the next big thing. In fact, I’m sure from Asptra’s perspective, Cisco was, and is, stepping on their toes too, and doing its own intent-washing to stay on message. If I were Apstra, I’d be none pleased to see my message devalued like this, but what can a company in this position do?

Apstra can fight back with a video featuring the bearded legend himself, Derick Winkworth (@cloudtoad), that’s what they can do. This is not to be missed:

This is pure gold. We shall never forget.

If you liked this post, please do click through to the source at Microburst: Intent-Washing Continue reading

How Oakforest-PACS Outpaced The K Supercomputer

In high performance computing in the public sector, dollars follow teraflops and now petaflops. Especially in the datacenters of academia, where cutting-edge computational research projects funded by large grants seek the most powerful supercomputers in the region.

Institutions with limited budgets these days are creatively solving their financial supercomputing needs by creating a collective that pools funds and shares computing resources. Some institutions, such as Iowa State University, are doing this internally, with various departments pitching in to buy a single, large HPC cluster, as with their Condo supercomputer.

In Japan, the University of Tokyo (U Tokyo) and University of

How Oakforest-PACS Outpaced The K Supercomputer was written by Timothy Prickett Morgan at The Next Platform.

Canonical’s eyes are on IoT

When Mark Shuttleworth founded Canonical in 2004, the idea behind the company was simple – promote the use of Ubuntu Linux as a desktop operating system. Fourteen years later, things have gotten a lot more complicated, as the prominent open source software vendor eyes the IoT market.Canonical’s still flying the flag for desktop Linux, but the company’s real business is in the cloud – it claims that Ubuntu accounts for about 60% of all Linux instances in the major public clouds – and it’s hoping to make its mark in the next-buzziest part of the technology sector, the Internet of Things.+ALSO ON NETWORK WORLD: Nvidia gets broad support for cutting-edge Volta GPUs in the data center + A lack of cloud skills could cost companies moneyTo read this article in full or to leave a comment, please click here

Using Wifi to Grow Grapes

Recently, California farmer Craig Thompson got a pretty nifty upgrade for his irrigation: a broadband-connected Hydrawise control system that would automatically manage and monitor the irrigation of his olive and grape fields and collect data to alert him if there was a problem. He woke up the next morning to fields he could have assumed were appropriately hydrated, but the Hydrawise system quickly proved its worth when he looked at the data coming out of it. He found that the water pressure had been much lower than expected. With that information, he was able to figure out that one of the drip irrigation wires was loose. This small detail revealed from his Wifi-enabled device could have meant the difference between success and failure for his entire season.

A Growing Market

Many farmers across the world are realizing the benefits of streamlining their businesses with broadband-enabled devices. According to a 2017 report by MarketsandMarkets, the precision farming market is expected to grow from USD 3.20 Billion in 2015 to USD 7.87 Billion by 2022. It goes way beyond irrigation: there are farms using broadband-enabled devices for security, employee management, fertilizer and spray control, real-time access to specialists and Continue reading

Cloudflare Apps Platform Update: September Edition

This is the September edition of our blog series showcasing the latest platform improvements in developer analytics, user feedback, release notes, and more!

Since launch, we’ve received hundreds of feature requests from developers and users alike. Feedback has been the source of some our most popular features. This month’s post is celebration of the innovation achieved when great ideas are shared.

Let’s dive in!

? Developer Analytics

Continuing with the theme of feedback, App developers can now track their apps’ popularity and growth:

App usage by month.

The usage charts help identify which changes have a positive impact on your app.

If you’ve created a paid app you can also track its financial performance:

App revenue & churn.

? User feedback

Charts and graphs are great for tracking trends, but what do your users actually think of your app? Wonder no longer; users can now leave comments when adding and removing apps from their site. Each comment includes sentiment tags and an optional message from the user.

Comments left by users before and after installing an app.

? Page Selectors

Cloudflare users have always been able to select which routes their apps are active, though apps this was too course Continue reading

ICANN Postpones DNSSEC Root KSK Rollover – October 11 will NOT be the big day

People involved with DNS security no longer have to be focused on October 11. News broke yesterday that ICANN has decided to postpone the Root KSK Rollover to an unspecified future date.
To be clear:

The Root KSK Rollover will NOT happen on October 11, 2017.

ICANN’s announcement states the the KSK rollover is being delayed…

…because some recently obtained data shows that a significant number of resolvers used by Internet Service Providers (ISPs) and Network Operators are not yet ready for the Key Rollover. The availability of this new data is due to a very recent DNS protocol feature that adds the ability for a resolver to report back to the root servers which keys it has configured.

Getting More Information

Discussion on the public DNSSEC-coord mailing list indicates more info may be available in a talk Duane Wessels is giving at the DNS-OARC meeting tomorrow (Friday, September 29). The abstract of his session is:


A Look at RFC 8145 Trust Anchor Signaling for the 2017 KSK Rollover

RFC 8145 (“Signaling Trust Anchor Knowledge”) was published in April 2017. This RFC describes how recursive name servers can signal, to authoritative servers, the trust anchors that they have configured for Continue reading

Anaconda Teams With Microsoft In Machine Learning Push

Microsoft is embedding Anaconda’s Python distribution into its Azure Machine Learning products, the latest move by the software vendor to expand its capabilities in the fast-growing artificial intelligence space and an example of Anaconda extending its reach beyond high performance computing and into AI.

The two companies announced the partnership this week at the Strata Data Conference in New York City, with the news dovetailing with other announcements around AI that Microsoft officials made this week at its own Ignite 2017 show. The vendors said they will offer Anaconda for Microsoft, which they described as a subset of the Anaconda

Anaconda Teams With Microsoft In Machine Learning Push was written by Jeffrey Burt at The Next Platform.

The History of Networking: Tony Li on BGP

The Network Collective has another History of Networking up; this time we’re chatting with Tony Li about the History of BGP. Tony was not involved in the original origins of BGP (the famous napkin, a picture of which you can see in this book), but he did start working on it in around 1996, the year I joined Cisco as a lowly TAC engineer.

The post The History of Networking: Tony Li on BGP appeared first on rule 11 reader.

Micro-segmentation of the Epic Electronic Health Records System with VMware NSX

authors – Geoff Wilmington, Mike Lonze

Healthcare organizations are focusing more and more on securing patient data.  With Healthcare breaches on the rise, penalties and fines for lost or stolen PHI and PII data is not only devastating to the patients, but to the Healthcare organization as well.  The Ponemon Institute Annual Benchmark Study on Privacy & Security of Healthcare Data has shown that nearly 50 percent of Healthcare organizations, up 5 percent from a previous study, that criminal attacks are the leading cause of Healthcare breaches.  [1]  With breaches on the rise and Healthcare organizations feeling the pain, how can we help Healthcare start layering security approaches on their most critical business applications that contain this highly critical data?

The principle of least privilege is to provide only the necessary minimal privileges for a process, user, or program to perform a task.  With NSX, we can provide a network least privilege for the applications that run on the vSphere hypervisor using a concept called Micro-segmentation. NSX places a stateful firewall at the virtual network card of every virtual machine allowing organizations to control very granularly how virtual machines communicate or don’t communicate with each Continue reading