Posted on 9 December 2013 | Leave a Comment
Podcast: Play in new window | Download (Duration: 50:56 — 23.5MB) Tweet Cisco FabricPath is a TRILL-based layer 2 forwarding technology that can take the place of spanning-tree. Allowing a fully-meshed layer 2 network to forward traffic across all links, FabricPath helps customers to make the most of their expensive 10GbE and 40GbE interconnects. In […]
Posted on 3 December 2013 | 4 Comments
Podcast: Play in new window | Download (Duration: 1:00:08 — 55.1MB) Tweet This week it’s Greg was configuring spanning tree in the data centre and had a problem with a switch cluster that didn’t work proper. How much networking do you need in a data centre ? Lets say you purchases 2 x 32 port […]
Posted on 27 November 2013 | Leave a Comment
Podcast: Play in new window | Download (Duration: 40:30 — 18.7MB) Tweet Cisco FabricPath is a TRILL-based layer 2 forwarding technology that can take the place of spanning-tree. Allowing a fully-meshed layer 2 network to forward traffic across all links, FabricPath helps customers to make the most of their expensive 10GbE and 40GbE interconnects. In […]
Posted on 18 November 2013 | 2 Comments
Podcast: Play in new window | Download (Duration: 40:52 — 18.9MB) Tweet Juniper Network’s Doug Hanks & Satish Surapaneni join Juniper customer (and Kool-Aid drinking fanboy) Kurt Bales in a discussion about the newly announced QFX5100 line of switches with Ethan Banks & Greg Ferro. Along the way, we talk about useful new technologies enabled […]
Posted on 13 November 2013 | Leave a Comment
Podcast: Play in new window | Download (Duration: 1:01:59 — 42.7MB) Tweet Hello boys and girls! What time is it? That’s right, it’s time for another fun-filled episode of Healthy Paranoia! Joining us in the top secret Healthy Paranoia treehouse and just in time for the release of PCI DSS 3.0 is special guest, Dr. […]
- Show 167 – Cisco ACI Software Defined Networking – A First Look
- Show 166 – SDN Controller Strategies
- Healthy Paranoia Show 18: Illusion, Lies and Neuroscience With Alex Stone
- Show 165 – Running Code Is What Defines the Rules
- Show 164 – Cool or Hot? Lapukhov + Nkposong’s BGP SDN
- Healthy Paranoia Show 17: How Do I Pwn Thee?
- Show 163 – Open Source perfSONAR Finds the Flaws Impacting the Flows
- Show 162 – The Bourbonator Rises at #NFD6
- Show 161 – VMware NSX – Real World SDN – Sponsored
- Show 160 – Palo Alto Networks and Everything You Always Wanted to Know About Next-Gen Firewalls – Sponsored
Community Blog Posts
In the first article here, I walked through importing netflow data into a single Hadoop instance (pseudonode) and mentioned a progression of the project to add multiple nodes. The ability to do distributed storage and … read more.
There's something terribly wrong about this... RUSH hour in Nairobi can be a nightmare. "Most motorists don't follow traffic rules and small inconveniences like a minor traffic accident or even a sudden downpour can … read more.
I can make you happy, I can give you everything you dreamed of. You already know that right? I've tried to make you understand this again and again; I'll fall at your feet at a moments notice, but somehow I'm always here … read more.
When I read the latest posts about Fast ReRoute from Russ White and as I had an introduction from a coworker contributing to some drafts, I thought it was the right time to write my first article on PacketPushers. And … read more.
It is hard to ignore all of the hype around Hadoop and Big Data these days. Like most infrastructure engineers, we tend to focus on how to build highly-available, highly-scalable networks - and I'm no exception. However, … read more.
As promised, here's the event order for HTTPS. I’d be grateful to any F5′ers out there that can pick holes in this, if any. Apologies for the ‘slimming’ of the diagram caused by the WordPress theme. I've made some … read more.
I hit an issue recently where I thought I knew what was what but found myself doubting my knowledge. To that end, here's a diagram detailing the iRule event order where HTTP traffic is concerned - I'll follow up shortly … read more.
Here is a delayed reaction to the posts about IPSec complexity by Jason Edelman and Ivan Pepelnjak last month. AWS might give us decent IPSec 'standard' to rally around. There has been plenty of discussion of the past … read more.
This is a long video, but you need to watch it. I'll have a couple of longer reports on IETF 88 in the coming weeks, as I get the chance to write stuff up. http://www.youtube.com/watch?v=oV71hhEpQ20 Edit: For … read more.
In the last episode in our world wide tour of fast reroute mechanisms, we discussed Not-Via. While an interesting concept, Not-Via does require a number of extra IP addresses, as well as a new set of special routing … read more.
More Community Blog Posts
- Cisco IPsec VPN Breakage on Windows 8[.1] and OS X 10.9
- Securing a DMVPN Spoke – Part 2
- F5 LTM Encrypted Cookie Insert Persistence
- Review: Information Storage and Management
- Back to the Basics…
- Bash and Net-SNMP: A Low Budget, High Frequency SNMP Poller
- Stateless Routing Through an in-Line F5 LTM
- Hot,Cold, Mash Potato Routing and BGP Route Reflector Design Considerations.
- MPLS VPNs and Junos Config Groups: A Match Made in Router Heaven
- IPSec Bandwidth Overhead Using AES