Hedge 123: Geoff Huston and the State of BGP

Another year of massive growth in the number and speed of connections to the global Internet—what is the impact on the global routing table? Goeff Huston joins Tom Ammon and Russ White to discuss the current state of the BGP table, the changes in the last several years, where things might go, and what all of this means. This is part 1 of a two part episode.

download

Cloudflare Radar’s new ASN pages

Cloudflare Radar’s new ASN pages
Cloudflare Radar’s new ASN pages

An AS, or Autonomous System, is a group of routable IP prefixes belonging to a single entity, and is one of the key building blocks of the Internet. Internet providers, public clouds, governments, and other organizations have one or more ASes that they use to connect their users or systems to the rest of the Internet by advertising how to reach them.

Per AS traffic statistics and trends help when we need insight into unusual events, like Internet outages, infrastructure anomalies, targeted attacks, or any other changes from service providers.

Today, we are opening more of our data and launching the Cloudflare Radar pages for Autonomous Systems. When navigating to a country or region page on Cloudflare Radar you will see a list of five selected ASes for that country or region. But you shouldn’t feel limited to those, as you can deep dive into any AS by plugging its ASN (Autonomous System Number) into the Radar URL (https://radar.cloudflare.com/asn/<number>). We have excluded some statistical trends from ASes with small amounts of traffic as that data would be difficult to interpret.

Cloudflare Radar’s new ASN pages

The AS page is similar to the country page on Cloudflare Radar. You can find traffic levels, protocol Continue reading

Understanding Data Center Fabrics 04: Clos Scaling – Video

In the fourth installment of this 9-video series, Russ White describes methods for scaling data center fabrics. He reviews how to calculate port density in a leaf-spine design, discusses physical restraints on the scale of a fabric based on the spines, fabric types in chassis switches, and the pros and cons of chassis vs. single […]

The post Understanding Data Center Fabrics 04: Clos Scaling – Video appeared first on Packet Pushers.

HOW TO FORGET A WIFI NETWORK ON MAC.

Once your Mac computer gets connected to a source of wifi and the password has been saved, its unique features enable it to automatically reconnects once in range with the wifi network.. At first, this might be okay not until for some reason, you don’t want it to be connected anymore.

Sometimes, when there are various networks in range that had been previously connected and saved to your Mac, it becomes difficult for your system to choose which one to connect to as they are all saved and could easily be connected. In situations like this, you may want to connect to one particular network but it probably connects to the wrong one. In this scenario, you would want to disconnect with the unwanted wifi network, and to do that means you would need to forget the wifi.

There are other various reasons why you may need to forget your wifi network. Probably you’ve got lots of already connected networks and you would like to reduce them or you no longer really use the network anymore and don’t want it always connected or you probably have more than one wifi and would no longer want to use one but the Continue reading

Beware: Ansible Reorders List Values in Loops

TL&DR: Ansible might decide to reorder list values in a loop parameter, resulting in unexpected order of execution and (in my case) totally borked device configuration.

A bit of a background first: I’m using an Ansible playbook within netlab to deploy initial device configurations. Among other things, that playbook deploys configuration snippets for numerous configuration modules, and the order of deployment is absolutely crucial. For example, you cannot activate BGP neighbors in Labeled Unicast (BGP-LU) address family (mpls module) before configuring BGP neighbors (bgp module).

Beware: Ansible Reorders List Values in Loops

TL&DR: Ansible might decide to reorder list values in a loop parameter, resulting in unexpected order of execution and (in my case) totally borked device configuration.

A bit of a background first: I’m using an Ansible playbook within netsim-tools to deploy initial device configurations. Among other things, that playbook deploys configuration snippets for numerous configuration modules, and the order of deployment is absolutely crucial. For example, you cannot activate BGP neighbors in Labeled Unicast (BGP-LU) address family (mpls module) before configuring BGP neighbors (bgp module).

Nvidia Will Be A Prime Contractor For Big AI Supercomputers

Normally, when we look at a system, we think from the compute engines at a very fine detail and then work our way out across the intricacies of the nodes and then the interconnect and software stack that scales it across the nodes into a distributed computing platform.

Nvidia Will Be A Prime Contractor For Big AI Supercomputers was written by Timothy Prickett Morgan at The Next Platform.

Tech Bytes: The Advantages Of Singtel SD-WAN For Cloud Access (Sponsored)

On today's Tech Bytes with sponsor Singtel, we look at SD-WAN as a critical network feature for cloud access, including the use of overlays to simplify operations. We also discuss why organizations might consider a service provider for SD-WAN and dig into Singtel's SD-WAN offering.

The post Tech Bytes: The Advantages Of Singtel SD-WAN For Cloud Access (Sponsored) appeared first on Packet Pushers.

Cisco upgrades target Kubernetes, cloud, and AI/ML

Cisco has added new features to its core cloud and computing packages to better manage and support distributed applications.The enhancements affect Cisco’s Intersight cloud management system, UCS X-Series server and HyperFlex hyperconverged system.The idea is to provide tools that offer flexibility and manageability while increasing performance and reducing the costs of modern cloud-based apps and workloads, said DD Dasgupta, vice president of Cisco’s Cloud & Compute Product Management group. Cisco is extending its Intersight support for Kubernetes, which had managed only Cisco Kubernets and only on-premises. The upgrade, Intersight Kubernetes Service Attached Clusters, provides a single place for IT pros to look at and manage all their Kubernetes clusters, including those running on Microsoft Azure and AWS cloud platforms, with plans to add Google Cloud support in the future.To read this article in full, please click here

Multi-Tenancy Datacenter with NSX EVPN

The data center landscape has radically evolved over the last decade thanks to virtualization.

Before Network Virtualization Overlay (NVO), data centers were limited to 4096 broadcast domains which could be problematic for large data centers to support a multi-tenancy architecture.

Virtual Extensible LAN (VXLAN) has emerged as one of the most popular network virtualization overlay technologies and has been created to address the scalability issue outlined above.

When VXLAN is used without MP-BGP, it uses a flood and learns behavior to map end-host location and identity. The VXLAN tunneling protocol encapsulates a frame into an IP packet (with a UDP header) and therefore can leverage Equal Cost Multi-Path (ECMP) on the underlay fabric to distribute the traffic between VXLAN Tunneling Endpoints (VTEP).

Multi-Protocol BGP (MP-BGP) Ethernet VPN (EVPN) allows prefixes and mac addresses to be advertised in a data center fabric as it eliminates the flood and learns the behavior of the VXLAN protocol while VXLAN is still being used as an encapsulation mechanism to differentiate the traffic between the tenants or broadcast domains.

A Multi-Tenancy infrastructure allows multiple tenants to share the same computing and networking resources within a data center. As the physical infrastructure is shared, the physical Continue reading

Day Two Cloud 139: Azure Bicep Is (Not) ARM

Today's Day Two Cloud podcast gets into Azure Bicep, a language that IT teams can use to deploy Azure resources in a consistent manner. While Bicep is Azure-specific, it can be useful as part of an Infrastructure-as-Code initiative. Guests Ben Weissman and Rob Sewell explore how Bicep works, discuss use cases, compare it to Terraform, and more.

IBM service aims to secure multicloud operations

IBM is launching a new service to help customers manage their data encryption keys in a hybrid cloud environment. Unified Key Orchestrator lets customers integrate all security key-management systems into one managed service that's backed by Big Blue’s Hardware Security Module. HSM is IBM’s system that protects against physical or logical attacks and has special hardware to perform cryptographic operations and protect keys.Gartner: IT skills shortage hobbles cloud, edge, automation growth Available from IBM Cloud, Unified Key Orchestrator lets customers maintain visibility and control over who has access to their critical data, while running workloads across hybrid or multicloud cloud environments. In addition, with a single, secure, cloud-based  view of an organization’s crypto keys, enterprises can create and revoke keys for their data across multiple clouds. At the same time, companies no longer need to rely on security experts with specialized knowledge of each individual cloud to handle security operations, according to IBM.To read this article in full, please click here

IBM service aims to secure multicloud operations

IBM is launching a new service to help customers manage their data encryption keys in a hybrid cloud environment. Unified Key Orchestrator lets customers integrate all security key-management systems into one managed service that's backed by Big Blue’s Hardware Security Module. HSM is IBM’s system that protects against physical or logical attacks and has special hardware to perform cryptographic operations and protect keys.Gartner: IT skills shortage hobbles cloud, edge, automation growth Available from IBM Cloud, Unified Key Orchestrator lets customers maintain visibility and control over who has access to their critical data, while running workloads across hybrid or multicloud cloud environments. In addition, with a single, secure, cloud-based  view of an organization’s crypto keys, enterprises can create and revoke keys for their data across multiple clouds. At the same time, companies no longer need to rely on security experts with specialized knowledge of each individual cloud to handle security operations, according to IBM.To read this article in full, please click here