Roughly a year ago, we built forum.packetpushers.net. This was a forum site built on vBulletin. The idea was to give the community another place to exchange ideas, share information, and help each other with challenges. After considering the matter for a couple of months, Greg and I are going to shut the site down. For […]
The post Forum Going Away – But New Things Are Coming appeared first on Packet Pushers Podcast and was written by Ethan Banks.
This Masterclass article series aims to provide in-depth technical information on the installation, usage and operation of the classic and supremely popular tcpdump network traffic analysis program including alternatives, running tcpdump as a process, building expressions, understanding output and more. I’ve covered the Basics, Parameters and filter Expressions previously; last up in the series is […]
The post Masterclass – Tcpdump – Interpreting Output appeared first on Packet Pushers Podcast and was written by Steven Iveson.
Lovely user interface this isn’t. Here’s the command to make an E1 circuit on a Nortel TN4XE where the E1 card is in slot 13. (The first character should be a tilde rather than a hyphen):
~C N C S6-1-J1-K111&S8-1-J1-K111 S13-1
S6 and S8 are the slots where the aggregate cards are. J1 says to use the first VC4. K111 tells it to use the first VC3, the first TUG2 and the first VC12.
Within an STM-4 there are four STM-1s which equate roughly to VC4s. Within each VC4 are three VC3s. Within each VC3 are 7 x TUG2s. Within each TUG2 are 3 x VC12.
Confusing…
There’s a lot of great blogs and resources that get really deep into specific areas of tech. While it may sound really strange, this site is decidedly not one of them. The focus of The Tech Interview is quite different. Instead of focusing on the bits and bytes of technology, we look at the un-tech […]
The post IT’s Not Just About Technology appeared first on Packet Pushers Podcast and was written by Paul Stewart.
It's been nearly a year since I had to take the community lab offline to relocate my home, and I still get frequent emails asking when it will be returned. Sadly, my plan to host it with my current employer didn't pan out, and I'm still searching for a suitable host in the Raleigh-Durham, North Carolina area. (If you might be able to give the lab a good physical home, please let me know!)
I also get a lot of emails asking if I can share the scheduling application I used to make the lab available. In short, no, I can't. Not because I don't want to or because it's secret, but simply because that code was written specifically for the packetlife.net site and is not in the least bit portable. But these requests got me thinking: A lot of people obviously would like to be able to share their labs, they just need a platform. Maybe I could rewrite and improve upon the scheduling application to spin it off as its own service.
If you follow me on Twitter, you may have caught one or two references to a new project recently. Indeed, this is exactly Continue reading
Palo Alto Networks are big fans of the show and they are excited to geek out about next-generation firewalls in this podcast. What you’ll hear about on this show is the unique technologies that help you deliver visibility, control and safe application enablement of applications in your network. This show was specifically planned to have zero […]
The post Show 160 – Palo Alto Networks and Everything You Always Wanted to Know About Next-Gen Firewalls – Sponsored appeared first on Packet Pushers Podcast and was written by Greg Ferro.
Software Defined Networks Thomas D. Nadeau and Ken Gray If you’ve been trying to find a good, solid, introduction to network programmability, you need look no farther than Software Defined Networks. While the authors do include a good bit of information that’s outside the field of network programmability, overall this is about the best overview […]
Regardless of where you stand on the future of data networks and SDN and the prevailing idea that dust made from ground up rainbows will be powering our pipes – there is something that I believe is being overlooked and should definitely be addressed. There is a rate of unprecedented change going on in the […]
The post Automation : Not Just Marketing Fluff appeared first on Packet Pushers Podcast and was written by Edward Henry.
What a week it has been.
I just spent four long, albeit highly productive days at VMworld 2013 in San Francisco speaking openly with customers, press, analysts and partners. The user conference, now in its tenth year, set a record for attendees with more than 23,000 and we were never without a steady stream of customers and prospects coming to our booth for a demo. Through the hundreds of conversations we had during the week, we found a few recurring themes and questions that bubbled up.
At this year’s VMworld, VMware unveiled a number of new and repackaged products for compute, storage, management and networking, eliminating any possible question about their desire to take over the data center world. What seemed to garner the majority of attention from the wave of press releases was the VMware NSX Network Virtualization Platform. It prompted a ton of questions from visitors to our booth about what it is, what we think of it and how we compete with it (I won’t even get into how many times we were asked: Why do you think Cisco isn’t a partner for NSX?).
There are so many things that need to be discussed Continue reading
I previously wrote a post in response to an article that equated Snowden’s CEH certification to James Bond’s “license to kill.” Well, it looks like some technically-challenged media types are at it again. They’ve called Snowden “brilliant” for his ability to “impersonate” users on various systems in order to obtain certain documents and I felt […]
The post More Snowden Media Douchebaggery appeared first on Packet Pushers Podcast and was written by Mrs. Y.
For organizations that have many remote offices a DMVPN solution is a great option. You can purchase a cheap DSL or cable modem based solution then establish a dynamically built encrypted tunnel back to the corporate office or Data Center(s). The hubs should be located in a DMZ behind a firewall at the Data Center […]
The post Securing a DMVPN spoke – Part 1 appeared first on Packet Pushers Podcast and was written by Charles Galler.
When planning your career you need to make several path choices. A career direction, the right attitude, respect for co-workers are all easy. Some people forget that everyday work is part of taking a single step down that path, tomorrow you will take another couple of steps and again the day after. But some people […]
The post You Don’t Have To Hit The Ball Out Of The Park To Hit A Home Run appeared first on Packet Pushers Podcast and was written by Greg Ferro.
DNS needs no introduction in today’s inter-networked, connected world. Though it could be a service the end-users are least aware of, it is one that the network administrator needs to keep an eye on and requires constant monitoring and management to ensure uptime and connectivity. It is DNS servers that help with resolving those easy-to-remember […]
The post Turning BIND DNS Management Into A Walk In The Park appeared first on Packet Pushers Podcast and was written by Sponsored Blog Posts.
The fight for control between sysadmin and network admin has been going on for decades but the boundary line had been pretty static. Anything that ran a full OS and was a end node was is a server is under server ops while anything that connected the servers together was a network device and was under the control of network operations.
If you look at the progression of the two side through the last two decades, you will realize that the server and server OS have gone through change after change with new software packaging system, virtualization, density of servers per rack, and so on while the networking technology has remained pretty static other than speed and feeds and some tagging protocols. While the server admin kept reinventing himself through open source, virtualization, six nine uptime, the network got split into three distinct category (forgive me Gartner for gross simplification):
How does the internet work - We know what is networking
There are different documents and books which are claiming that Administrative distance for static routes configured using exit interface is 1 and for the static route configured using next-hop IP address Administrative distance is 0. R1(config)#ip route 20.0.0.0 255.255.255.0 10.10.2.1 R1(config)#ip route 20.0.0.0 255.255.255.0 fastEthernet 0/0 This is not true. Both of them are having AD […]