EVPN – the basics

A great EVPN overview and detailed walkthrough from a colleague of mine… Nice and clear.

PACKETS AND STUFF

So I decided to take a deep dive into eVPN, I’ll mostly be looking into VLAN-aware bundling, as per RFC 7432 – and mostly because I think this will fit more closely, with the types of deployments most of the customers are used to – good old IRB interfaces and bridge-tables!

As everyone knows, VPLS has been available for many years now and it’s pretty widely deployed, most of the customers I see have some flavour of VPLS configured on their networks and use it to good effect – so why eVPN? what’s the point in introducing a new technology if the current one appears to work fine.

The reality is that multipoint layer-2 VPNs (VPLS) were never quite as polished as layer-3 VPNs, when layer-3 VPNs were first invented they became, and still are the in many cases the “go to” technology for layer-3 connectivity across MPLS networks, and…

View original post 4,444 more words


New products of the week 7.25.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Sophos SafeGuard Encryption 8Key features:  Sophos SafeGuard Encryption 8 is a new synchronized encryption solution that protects data against theft from malware, attackers or accidental leaks. All organizations can now choose to adopt the best practice of “always-on” file-level encryption to protect data by default. More info. To read this article in full or to leave a comment, please click here

New products of the week 7.25.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Sophos SafeGuard Encryption 8Key features:  Sophos SafeGuard Encryption 8 is a new synchronized encryption solution that protects data against theft from malware, attackers or accidental leaks. All organizations can now choose to adopt the best practice of “always-on” file-level encryption to protect data by default. More info. To read this article in full or to leave a comment, please click here

Evolved Packet Core – Welcome to Long Term Evolution!

As an end user, I am always welcoming the “4G” Signal indicator on my mobile because basically for me this maps to a better Download Speed, good quality VoIP calls (skype, Hangout, Whatsapp, etc) , better Streaming, and HD Videos. This article is all about the “4G” indicator. I am discussing the Evolved Packet Core together with […]

The post Evolved Packet Core – Welcome to Long Term Evolution! appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

IS-IS level 1, IS-IS Routing Protocol Levels

What is IS-IS Level 1 ? Why IS-IS level 1 is used ? What are the IS-IS levels ? What is the corresponding Area type in OSPF ? IS-IS Level 1 is also called as IS-IS Level 1 sub domain. IS-IS is a link state routing protocol, similar to OSPF. You can read detail comparison […]

The post IS-IS level 1, IS-IS Routing Protocol Levels appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

51% off Inflatable Lounge Bag Hammock Air Sofa and Pool Float – Deal Alert

This innovative "lounge" requires no external pump and is a suitable substitute for folding chairs, bean bags, hammocks, picnic blankets and pool floats. To inflate, simply unfold, scoop air into it, roll and buckle. Elastic loops allow you to anchor your lounger to solid ground in the windiest conditions. Currently averages 5 out of 5 stars on Amazon from 59 reviewers (read reviews). It's list price of $79.99 has been reduced by 51% to just $39. See this discounted summer item now on Amazon.To read this article in full or to leave a comment, please click here

Jinja2 and… Powershell? Automation(ish) Microsoft DHCP

Most of us have home labs, right?

I’m in the middle of doing some zero touch provisioning testing, and I had the need to create a bunch of DHCP scopes and reservations, some with scope specific options, and some with client specific options. As often as I’ve had to create a Microsoft DHCP server in the lab and set up some custom scopes, I decided I was going to figure out how to automate this as much as I could with a little effort as possible.

After taking a quick look around for a python library to help me out, python being my weapon of choice, I realized that I was going to have to get into some Powershell scripting. I’ve dabbled before, but I’ve never really take the time to learn much about Powershell control structures ( loops, conditionals, pipes, etc…).  I really didn’t want to spend the time getting up to speed on a new language, so I instead decided I was going to use the python skills I had to auto generate the scripts using a little jinja2 and some google-technician skills.

Figuring out the Powershell Syntax

This was the easy part actually, Microsoft has some pretty Continue reading

German shooter hacked Facebook account to lure victims, bought gun on dark net

The media is delving into the digital life of the teenage shooter who opened fire at McDonald’s in Munich Germany’s Olympia Mall. Nine people were killed and 27 others were injured in the tragic rampage. In the end, he killed himself. So far, it’s been reported that he hacked Facebook to lure victims, bought a gun on the ‘dark net’ and played the ‘violent’ video game Counter-Strike.Shooter hacked a girl’s Facebook account to target and social engineer victims18-year-old mass shooting gunman Ali David Sonboly purportedly used Facebook to social engineer, aka “lure,” victims to McDonald’s. The Telegraph reported that the shooter, who had dual German-Iranian citizenship, had hacked into a “pretty teenage” girl’s Facebook account.To read this article in full or to leave a comment, please click here

German shooter hacked Facebook account to lure victims, bought gun on dark net

The media is delving into the digital life of the teenage shooter who opened fire at McDonald’s in Munich Germany’s Olympia Mall. Nine people were killed and 27 others were injured in the tragic rampage. In the end, he killed himself. So far, it’s been reported that he hacked Facebook to lure victims, bought a gun on the ‘dark net’ and played the ‘violent’ video game Counter-Strike.Shooter hacked a girl’s Facebook account to target and social engineer victims18-year-old mass shooting gunman Ali David Sonboly purportedly used Facebook to social engineer, aka “lure,” victims to McDonald’s. The Telegraph reported that the shooter, who had dual German-Iranian citizenship, had hacked into a “pretty teenage” girl’s Facebook account.To read this article in full or to leave a comment, please click here

Forensics Challenge for CSIRT Team – Part 1 Assignment

I have created a virtual machine that you can use to test your forensics analysis skills. Please, download the VM, solve an assignment below and share solutions with us.

1. Assignment
Your are a member of elite CSIRT team which is responsible for dealing with computer security incidents in your jurisdiction. You are asked to investigate a server that was previously administered by disgruntled administrator Mr. Abdullah Khan who was fired up. Although login credentials for server were changed after Khan's sacking from the company, it is believed he might insert malicious software into server before change of credentials. Your task is to ensure that a sever does not contain any malicious software and user data stored on the server are not compromised. You also need to prove your professional forensic skills and analyze a suspicious file in case you find it on the server. Based on your investigation you should find out how malware work and create detailed report for your boss.

The server is running Ubuntu 16.04.1 and it is primary used as a file server with configured SSH access. Unfortunately the backup of user files is damaged and cannot be used in case of data are lost during your investigation. The login/password is Continue reading

What is MPLS tunnel label and why it is used ?

In networking we use many times different terms to define the same thing. MPLS tunnel label or transport label are just two of those. Not only transport and tunnel labels but also other terms are used to define the same thing which these labels provide. Let me explain first why and where MPLS tunnel label is […]

The post What is MPLS tunnel label and why it is used ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Big data paper shows stock market trades behave like light bulbs

In the stock market, electronic trading (AKA “etrading”) originally started so people could buy and sell stocks and other financial instruments more easily. No more hanging out on the floor of a stock exchange or calling your orders into your broker; you could do it all from your desktop. This was good because it made markets more accessible and reduced costs.Then, in the 1980’s, because the electronic trading platforms had application programming interfaces to allow new client-side interfaces to be developed, the inevitable happened, the next generation of electronic trading appeared. Algorithmic trading (AKA “algo trading” or “black box trading”) removed humans from the equation and exploded as the latest, greatest stock market money-making strategy. To read this article in full or to leave a comment, please click here

Big data paper shows stock market trades behave like light bulbs

In the stock market, electronic trading (AKA “etrading”) originally started so people could buy and sell stocks and other financial instruments more easily. No more hanging out on the floor of a stock exchange or calling your orders into your broker; you could do it all from your desktop. This was good because it made markets more accessible and reduced costs.Then, in the 1980’s, because the electronic trading platforms had application programming interfaces to allow new client-side interfaces to be developed, the inevitable happened, the next generation of electronic trading appeared. Algorithmic trading (AKA “algo trading” or “black box trading”) removed humans from the equation and exploded as the latest, greatest stock market money-making strategy. To read this article in full or to leave a comment, please click here

Apple confirms: Pokemon Go has already set an App Store record

Since its release earlier this month, Pokemon Go has become a full-fledged cultural phenomenon. Speaking to this point, the last few weeks have been chock-full of stories involving addicted Pokemon Go players getting themselves into all sorts of ridiculous situations. From a Pokemon Go player who accidentally drove his car into a parked police car to a reporter who was recently caught playing the game during a State Department meeting, it seems as if the entire world is obsessed with capturing virtual monsters on Nintendo's Augmented Reality themed mobile app.To read this article in full or to leave a comment, please click here