10 Funny Networking Memes
Networking has its share of silly memes floating around on the internet. Here are a few to entertain you.
Networking has its share of silly memes floating around on the internet. Here are a few to entertain you.
In this Cisco Press chapter excerpt, learn ways to hide information in a network.
Marcel Reuter sent me a few questions about my upcoming Network Automation workshop. You might find them interesting, so here they are:
We have a lab with virtual IOS-XE, IOS-XR and Junos (vMX) router. I would like to learn how to provisioning the Lab router.
Covered in the workshop. I’m focusing on vIOS (which is pretty close to IOS Classic and IOS-XE) and Nexus OS because that’s what I can get up and running quickly in VIRL.
Read more ...Enterprise IT is willing to pay high prices and deliver large profit margins to suppliers.
The post Enterprise IT Doesn’t Care About The Price. Really. appeared first on EtherealMind.
In MPLS Fun in the Lab: Add the Multicast in the Cloud – Part 5 we added the support in the cloud for multicast and for MVPN. As I mentioned in that blog, I intentionally left something out so we... Read More ›
The post mVPN Fun in the Lab: Troubleshooting the MVPN Cloud – Part 6 of 6 appeared first on Networking with FISH.
There's a lot of information on the intertoobs about getting ssh-agent “working” in OS X and even more articles about when and how the stock behavior of ssh-agent changed (mostly with respect to how ssh-agent interacted with the Keychain).
This article doesn't cover or care about any of that.
This article is concerned with:
After last week’s, a reader left a comment noting “I2RS doesn’t manipulate forwarding data.” If I2RS isn’t “manipulating forwarding data,” then what, precisely, is it doing? I thought it’s worth a post to try and help folks understand the definitions in this space—except, as you’ll soon discover, there are no definitions here. In fact, it’s almost impossible to create a single set of definitions that will clarify the issues involved in understanding the various sorts of state in a network device. The following illustration might be helpful in trying to understand the vagaries of the various kinds of state, and the confusion that results from the various names used in different places.
It would be “nice” to say something like: information held in the forwarding table, that’s actually used to forward traffic through the router, is the only real “forwarding data.” This makes for a nice clean definition that clearly separates, say, what the RIB does and what the FIB does in most of the hardware based switching devices produced today. There are two problems with this clean definition, however.
First, there are, and always will be, devices produced that simply don’t have a forwarding table. Instead of Continue reading
The data center is driving toward a more software-centric security model and security performance in NFV will be key.