IWAN (Intelligent Wide Area Network) and Why EIGRP or BGP over the DMVPN Tunnel.
In this YouTube “playing in the lab” IWAN fun we are going to drill down between 2 sites – Branch 3 and the Hub site. Branch 3 will be in “hybrid” mode (1 MPLS link and 1 Internet Link) – in the past using the MPLS link as a primary and the internet link as backup only. Now, however, taking advantage of IWAN’s Intelligent Path Control.
We will design the implementation such that should we need to fall back from Intelligent Path Control to normal routing… we fallback to what is (for many customers’) today’s norm in this situation – MPLS as the Primary and Internet as the backup. For this to happen….there will only be 1 entry in the RIB (via the MPLS) How, then you ask, would you ever send any traffic at all out of the Internet link (tunnel 20) if that path is not in the routing table?
PfRv3 can read the EIGRP topo table and the BGP table…. we can still do intelligent decision making at the WAN edge and only send out the Internet path Continue reading
A while ago, I wrote an article about bootstrapping servers into Ansible—in other words, how to prepare servers to be managed via Ansible. In order for a server to be managed via Ansible, you usually must first create a user account for Ansible, populate the appropriate SSH keys, and grant the new Ansible user sudo permissions. The process I described in my earlier blog post works great for manually-built servers (physical or virtual), but I recently needed to revisit this process for cloud instances. Was it possible to use the process I’d found to bootstrap cloud instances into Ansible?
Cloud instances are a slightly different beast than manually-built servers primarily because password authentication isn’t an option—generally speaking, you’re required to use SSH keys when working with cloud instances. Ansible is SSH-based, as you probably already know, so this shouldn’t be an issue, but it was still something I hadn’t tested or verified. After a bit of testing, I found the bootstrap process I described in my earlier post can be easily adapted for cloud instances.
For reference, here’s the command I use when bootstrapping manually-built servers into Ansible:
ansible-playbook bootstrap.yml -k -K --extra-vars
"hosts=newhost.domain.com user=admin"
In this post we’ll have a look at the process of configuring a FlexVPN network (unofficially known as DMVPN phase 4). I’ll show what components are involved in configuration and how they all tie together. For most patient readers there’s a bonus at the end of this post. FlexVPN network topology The network we’ll be looking at is […]
The post FlexVPN configuration appeared first on Packet Pushers.
Orchestration is a difficult step, but some OPNFV members are lobbying for it.
I am very proud to announce that Daniel Lardeux, Johnny Britt and Mohammad Haddad passed the CCDE Practical exam yesterday and they joined the CCDE Club, which is one of [..]
The post November CCDE Achievers appeared first on Network Design and Architecture.
If you’re studying for the CCIE Data center v.10 exam, it’ll be available until July 2016, after which time the recently announced CCIE DC v2.0 exam will take its place. [..]
The post CCIE data center v2.0 appeared first on Network Design and Architecture.
Tidbits from SC15, GEN15, and DockerCon Europe.
Secure Shell, or SSH, is something of a “Swiss Army knife” when it comes to administering and managing Linux (and other UNIX-like) workloads. In this post, I’m going to explore a very specific use of SSH: the SSH bastion host. In this sort of arrangement, SSH traffic to servers that are not directly accessible via SSH is instead directed through a bastion host, which proxies the connection between the SSH client and the remote servers.
At first, it may sound like the use of an SSH bastion host is a pretty specialized use case. In reality, though, I believe this is a design pattern that can actually be useful in a variety of situations. I plan to explore the use cases for an SSH bastion host in a future blog post.
This diagram illustrates the concept of using an SSH bastion host to provide access to Linux instances running inside some sort of cloud network (like an OpenStack Neutron tenant network or an AWS VPC):
Let’s take a closer look at the nuts and bolts of actually setting up an SSH bastion host.
First, you’ll want to ensure you have public key authentication properly configured, both on the bastion host Continue reading
Please join us in congratulating the following iPexpert students who have passed their CCIE lab!
New OVS instrumentation features aimed at real-time monitoring of virtual networks (Peter Phaal, InMon)This talk is a follow up to an Open vSwitch 2014 Fall Conference talk on the Continue reading
The talk will describe the recently added packet-sampling mechanism that returns the full list of OVS actions from the kernel. A demonstration will show how the OVS sFlow agent uses this mechanism to provide real-time tunnel visibility. The motivation for this visibility will be discussed, using examples such as end-to-end troubleshooting across physical and virtual networks, and tuning network packet paths by influencing workload placement in a VM/Container environment.
IPv4 address space is officially exhausted in ARIN’s region. Broker services can facilitate the sale and transfer of IPv4 addresses between parties, but is it a good idea? John Curran, President and CEO of ARIN, helps us understand the issues.
The post PQ Show 65: IPv4 Broker Services appeared first on Packet Pushers.
IPv4 address space is officially exhausted in ARIN’s region. Broker services can facilitate the sale and transfer of IPv4 addresses between parties, but is it a good idea? John Curran, President and CEO of ARIN, helps us understand the issues.
The post PQ Show 65: IPv4 Broker Services appeared first on Packet Pushers.