In this post I’ll show how to automatically build configuration files for Hubs and Spokes in FlexVPN network topology. I will also introduce two concepts that are frequently used in software development world - DRY and “Convention over Configuration”. This post is a precursor to the upcoming FlexVPN configuration post on Packetpushers.
Continue readingThe US, UK and Australian governments have all introduced legislation that effectively co-opts Internet Providers/Carriers to become legal surveillance arms for secret services. Why are governments pushing forward to use private companies to perform activities that were previously restricted to secret services such as the NSA, GCHQ and DSD ?
The post Governments Want Cheap Interception and Cheap Politics appeared first on EtherealMind.
Who said IT Engineers are not funny ! Whenever I see below pictures I laugh Which one is your favorite ? Share yours in the comment section below. 1-) [CONTINUE READING]
The post Who said IT Engineers are not fun :) appeared first on Network Design and Architecture.
Telcos don't want NFV to screw up their networks.
You might remember all the fuss about various encapsulations used in overlay virtual networking… just because one wouldn’t be good enough (according to Andrew Lerner “we provide users with choice” actually means “we can’t decide which product to offer you”).
Read more ...On this week's show we're chatting with computer crime lawyer extraordinaire Tor Ekeland! He's worked on a number of high profile CFAA cases. Most recently he's been defending former Reuters and LA Times journalist Matthew Keys on some pretty hefty CFAA charges. He's also the guy who got Andrew Aurenheimer out of jail so he could go and live a free life as a Nazi troll. (Is that really a win?) He also defended Lauri Love... basically if you're a hacker who's fallen foul of the CFAA, this is the guy you want on your team.
iperf -suThen run the following sequence of tests on Server1:
#!/bin/bash
RT="10.0.0. Continue reading
Prediction: Eventually, they will.
Rob Lloyd went to Hyperloop, and Cisco's other ex-president has kept busy as well.
In this post we walk through the steps required to install a 2 node cluster running kubernetes that uses opencontrail as the network provider. In addition to the 2 compute nodes, we use a master and a gateway node. The master runs both the kubernetes api server and scheduler as well as the opencontrail configuration management and control plane.
OpenContrail implements an overlay network using standards based network protocols:
This means that, in production environments, it is possible to use existing network appliances from multiple vendors that can serve as the gateway between the un-encapsulated network (a.k.a. underlay) and the network overlay. However for the purposes of a test cluster we will use an extra node (the gateway) whose job is to provide access between the underlay and overlay networks.
For this exercise, I decided to use my MacBookPro which has 16G of RAM. However all the tools used are supported on Linux also; it should be relativly simple to reproduce the same steps on a Linux machine or on a cloud such as AWS or GCE.
The first step Continue reading