A one-stop shop that targets IT, not just service providers.
I’ve been wrestling with an Ubuntu network configuration issue over the last couple of weeks (off and on between working on other projects), and today I finally found a fix for the problem. The issue was that Ubuntu wouldn’t pick up changes to network interfaces. The fix is so simple I’m almost embarrassed to talk about it (it seems like something that I should have known), but I’m posting it here in case others run into the same issue.
Here’s a bit more context: I was switching some of the network interfaces in my Ubuntu 14.04.2 servers from a “standard” network configuration to using VLAN interfaces (after all, it seemed like such a shame to not more fully utilize the 10GbE and 40GbE interfaces in these servers). Before the reconfiguration, the servers had a network interface configuration file (located in /etc/network/interfaces.d
and sourced in /etc/network/interfaces
) that looked something like this:
auto p55p1
iface p55p1 inet static
address 172.16.3.201
netmask 255.255.255.0
This interface was connected to a port on a Cumulus Linux-powered Dell S6000-ON that was configured as an access port on a particular VLAN. Everything seemed to work just Continue reading
Cisco's security obsession creates an exit for the DNS startup.
Over the last couple of weeks, the networking industry has made some significant steps in the right direction, the open networking direction. At the Open Networking Summit (ONS), we heard some great news about the disaggregated network and how open networking is now everywhere from hyperscale to the enterprise to startups to telcos. As exciting as that is, that’s not the news I’m referring to — I’m referring to the announcement of the Open Networking Testing Consortium.
To illustrate why this is big news, I’ll give some background on how open networking has been operating for most people. Up until a few years ago, the way you purchased a bare metal switch was through select APAC sources and a wire transfer. A few weeks later, you’d receive your equipment and it was then up to you, the end user, to perform interoperability testing with your cables and optics manufacturers while on the phone with support, along with bootstrapping your OS to these boxes. Eventually you had both a CapEx and OpEx saving solution that you controlled from end to end.
Luckily for most of you, that experience has now been refined significantly Continue reading
INE CCIE RSv5 Lab Cram Session is now available for viewing in our All Access Pass Library. This course includes over 35 hours of new content for CCIE Routing & Switching Version 5, including both technology review sessions as well as a step-by-step walkthrough of two new CCIE RSv5 Mock Lab Exams. These new Mock Labs are available here as part of INE’s CCIE RSv5 Workbook.
This class is designed as a last minute review of technologies and strategy before taking the actual CCIE RSv5 Lab Exam. Each of the two Mock Labs covered in class are subdivided into three sections – just like the actual exam – Troubleshooting, Diagnostics, and Configuration.
Rack rentals are available for these mock labs here. Technical discussion of the labs is through our Online Community, IEOC.
Happy Labbing!
Take a Network Break! Grab a coffee, a doughnut and then join us for an analysis of the latest IT news, vendor moves and new product announcements. We’ll separate the signal from the noise–or at least make some noise of our own. Sponsor: Sonus Networks This week’s show was sponsored by Sonus Networks. Sonus wants […]
The post Network Break 42 appeared first on Packet Pushers.
AnsibleFest in NYC was an amazing day filled with everything Ansible. If you missed the presentations, we've compiled them all here.
Take a Network Break! Grab a coffee, a doughnut and then join us for an analysis of the latest IT news, vendor moves and new product announcements. We’ll separate the signal from the noise–or at least make some noise of our own. Sponsor: Sonus Networks This week’s show was sponsored by Sonus Networks. Sonus wants […]
The post Network Break 42 appeared first on Packet Pushers Podcast and was written by Greg Ferro.
This morning, Cisco announced their intent to acquire OpenDNS, a security-as-a-service (SaaS) provider based around the idea of using Domain Naming Service (DNS) as a method for preventing the spread of malware and other exploits. I’ve used the OpenDNS free offering in the past as a way to offer basic web filtering to schools without funds as well as using OpenDNS at home for speedy name resolution when my local name servers have failed me miserably.
This acquistion is curious to me. It seems to be a line of business that is totally alien to Cisco at this time. There are a couple of interesting opportunities that have arisen from the discussions around it though.
The first and most obivious synergy with Cisco and OpenDNS is around Internet of Things (IoT) or Internent of Everything (IoE) as Cisco has branded their offering. IoT/IoE has gotten a huge amount of attention from Cisco in the past 18 months as more and more devices come online from thermostats to appliances to light sockets. The number of formerly dumb devices that now have wireless radios and computers to send information is staggering.
All of those devices depend Continue reading