IGP vs BGP is one of the topics every Network Engineer want to learn in their career. In this post, without going into each IGP protocol detail, where and why IGP or BGP is used and should be used will discuss. As usual, we will look at it from a design aspect and understand the reasons for the protocol selection.
Although I will not explain the above chart in this blog post in detail, I would like to share it for completeness. Also, please note that we compared BGP with each IGP protocol from a design point of view on the website in different blog posts already.
When igp vs BGP is compared, the first thing we should understand is that BGP is the most scalable routing protocol and it is used for the Global Internet.
Global Internet, as of 2022, carries almost a million IPv4 Unicast prefixes.
When we talk about IGP scaling, OSPF, IS-IS, or EIGRP, can carry couple of tens of thousand prefixes, and after that, we may start seeing meltdowns, even in well-designed Continue reading
OSPF LSA Types is the first topic you need to understand if you are trying to understand OSPF routing protocol. There are 11 different types of LSA in OSPF and we will look at each one of them, why do we have many different LSA in OSPF, we will discuss the topologies and the examples to make it more clear for everyone.
We should start asking the most fundamental question first about OSPF. What is LSA?. LSA stands for Link State Advertisement and it carries, prefix information, interface cost, if advanced technologies such as Traffic Engineering are enabled, can carry link color information, used bandwidth, available bandwidth, and so on.
When a router receives an LSA, it is stored in the Link State Database (LSDB) of OSPF. Once the LSDBs between the routers are synchronized, OSPF uses the SPF/Dijkstra algorithm to calculate the best path for each destination network.
OSPF LSAs are information about a route that is transported inside OSPF Link State Update (LSU) packets.
We can only have scalable, resilient, fast-converged OSPF design when we understand OSPF LSAs and Area types and their restrictions
Figure -11 Different LSA Types is OSPF v2
After discussing the basics of IPv6 security in the hands-on part of IPv6 security webinar webinar, Christopher Werny focused on the IPv6 trust model (aka “we’re all brothers and sisters on link-local”).
After discussing the basics of IPv6 security in the hands-on part of IPv6 security webinar webinar, Christopher Werny focused on the IPv6 trust model (aka “we’re all brothers and sisters on link-local").
Kali is a purpose build Linux distribution for penetration testing. They have many pre-built deployment options, but unfortunately a cloud-init compatible image is not one of them. In this post, I will show you how to convert a pre-build VMware image into a cloud-init compatible image...continue reading
Who Should Read: If you are interested in VPC Endpoints or if you want to know more about AWS VPC services please continue.
I have been trying to understand endpoint services and thought I will write up a few posts on it, here are some posts I have written on medium(if you have access), I will port them to the blog by the weekend.
https://towardsaws.com/part-2-setting-up-ipsec-vpn-to-explore-interface-end-points-3048080e5514
Again, these will be ported here as well along with an audio version.
-Rakesh
An important part of any Kubernetes cluster is the underlying containers. Containers are the workloads that your business relies on, what your customers engage with, and what shapes your networking infrastructure. Long story short, containers are arguably the soul of any containerized environment.
One of the most popular open-source container orchestration systems, Kubernetes, has a modular architecture. On its own, Kubernetes is a sophisticated orchestrator that helps you manage multiple projects in order to deliver highly available, scalable, and automated deployment solutions. But to do so, it relies on having a suite of underlying container orchestration tools.
This blog post focuses on containers and container networking. Throughout this post, you will find information on what a container is, how you can create one, what a namespace means, and what the mechanisms are that allow Kubernetes to limit resources for a container.
A container is an isolated environment used to run an application. By utilizing the power of cgroup
, namespace
, and filesystem
from the Linux kernel, containers can be allocated with a limited amount of resources and filesystems inside isolated environments.
In an ideal world, we would never need to know how to reset passwords on network devices. In my utopia, network documentation would be thorough, updated, and readily available. We do not live in the ideal world, however. It is almost inevitable you will encounter a device that you are unable to properly authenticate to. In this lesson, I cover the steps for accessing a device without a password.
The post Device Management From The Ground Up: Part 7 – Resetting Device Passwords appeared first on Packet Pushers.
New routing protocol to replace BGP is one of the most common questions every good Network Engineer in their career at least a few times encounter. In this post, we will look at some of those thoughts and we will discuss aims to replace BGP were real or not.
Locator and Identity Separation Protocol, RFC 6830, as an experimental RFC, was one of those technologies, many Network Engineers thought of as a replacement for BGP, especially over the Internet.
This was probably one of the biggest myths we have been discussing for years when we discuss Routing protocol to replace BGP, but first thing is, LSIP is not a Routing protocol!.
It is an IP in the IP Encapsulation mechanism, or in other words, a tunneling mechanism, which is mainly used to hide the Internal prefixes from the network core to avoid the control plane state. So, LISP helps for Routing protocol scalability but LISP was never aimed to replace BGP.
In fact, I discussed exactly this point in the below video with Dino Farinacci, who is the inventor of the LISP protocol. Dino runs, www.lispers.net, Continue reading
In this episode of IPv6 Buzz Ed, Scott, and Tom talk about some of the challenges and best-practices when troubleshooting IPv6, including tools that work for IPv4 and v6, online test sites, and more.
The post IPv6 Buzz 098: Troubleshooting IPv6 appeared first on Packet Pushers.