OpenStack Neutron – The Dirty Network Detail

OpenStack Neutron Networking

This post is just a quick response to a comment by Turing Machinæ on Show 227 - OpenStack Neutron Overview with Kyle Mestery, … [Read more...]

Cisco NAT Cheat Sheet


I've always had a difficult time when attempting to remember how to implement the different types of NAT available on ASA and … [Read more...]

Listen to Packet Pushers? Take Our 2015 Audience Survey!


Packet Pushers wants to know about you. Now, we don't want to know about you specifically, because that would be creepy. … [Read more...]

BGP RR Design – Part 2

BGP RR Fig.10

This is a continuation from Part 1 9. ACME VPN RR's Design: So the current total number of PE's dedicated for VPN … [Read more...]

BGP RR Design – Part 1

BGP RR Fig.12

1. Introduction In this post we will be looking at large scale RR design by using a fictional ISP ACME  as a reference. As … [Read more...]

HTIRW: Reality at the Mic (1)

We've talked a little about the structure of the IETF, and the process a draft follows when moving from submission to draft … [Read more...]

How we upgraded the entire Network Infrastructure in 2 weeks


I work as a Network Engineer at a Research Center in Silicon Valley. Being the only ‘network guy’ here, I’m responsible for … [Read more...]

Using Python Context Managers for SSH connections

In this post, I will cover basic usage of Python's context managers to connect to a network device using SSH. I will use them … [Read more...]

Python and Jinja2 Tutorial

"How should I get started with Network Automation?" I am often asked this question by network engineers looking to … [Read more...]

CCDE and CCAr Certificates – FAQ

CCDE is the de facto expert level, vendor neutral, and infrastructure network design certification in the industry.   I have … [Read more...]

IP FRR and Micro-loops Part 2

IP FRR Fig.20

This is a continuation from Part 1 Remote LFA At this point we already know that simple LFA doesn't always provide full … [Read more...]

IP FRR and Micro-loops Part 1

IP FRR Fig.24

Introduction In this post we will take a look at IP FRR and Micro-loops. If the reader already doesn't have some kind of … [Read more...]

NAT, Security, and Repeating Myself

In a former post I pointed out that we need to think of obscurity as a tool in network security — that we shouldn't try to … [Read more...]

HTIRW: The IETF Draft Process

In our deeper investigations of the IETF as a "sample standards body" in this (apparently forever running) series on how the … [Read more...]

Use Rate-Limiting to Alleviate Link Saturation

Rate-Limit (2)

At some point in time you may come across a scenario in which you notice a WAN link at a branch site is being saturated. You … [Read more...]