OpenStack Neutron – The Dirty Network Detail

OpenStack Neutron Networking

This post is just a quick response to a comment by Turing Machinæ on Show 227 - OpenStack Neutron Overview with Kyle Mestery, … [Read more...]

Cisco NAT Cheat Sheet

Cisco_NAT_Cheat_Sheet

I've always had a difficult time when attempting to remember how to implement the different types of NAT available on ASA and … [Read more...]

Listen to Packet Pushers? Take Our 2015 Audience Survey!

crowd

Packet Pushers wants to know about you. Now, we don't want to know about you specifically, because that would be creepy. … [Read more...]

BGP RR Design – Part 2

BGP RR Fig.10

This is a continuation from Part 1 9. ACME VPN RR's Design: So the current total number of PE's dedicated for VPN … [Read more...]

BGP RR Design – Part 1

BGP RR Fig.12

1. Introduction In this post we will be looking at large scale RR design by using a fictional ISP ACME  as a reference. As … [Read more...]

HTIRW: Reality at the Mic (1)

We've talked a little about the structure of the IETF, and the process a draft follows when moving from submission to draft … [Read more...]

How we upgraded the entire Network Infrastructure in 2 weeks

Cisco-switches

I work as a Network Engineer at a Research Center in Silicon Valley. Being the only ‘network guy’ here, I’m responsible for … [Read more...]

Using Python Context Managers for SSH connections

In this post, I will cover basic usage of Python's context managers to connect to a network device using SSH. I will use them … [Read more...]

Python and Jinja2 Tutorial

"How should I get started with Network Automation?" I am often asked this question by network engineers looking to … [Read more...]

CCDE and CCAr Certificates – FAQ

CCDE is the de facto expert level, vendor neutral, and infrastructure network design certification in the industry.   I have … [Read more...]

IP FRR and Micro-loops Part 2

IP FRR Fig.20

This is a continuation from Part 1 Remote LFA At this point we already know that simple LFA doesn't always provide full … [Read more...]

IP FRR and Micro-loops Part 1

IP FRR Fig.24

Introduction In this post we will take a look at IP FRR and Micro-loops. If the reader already doesn't have some kind of … [Read more...]

NAT, Security, and Repeating Myself

In a former post I pointed out that we need to think of obscurity as a tool in network security — that we shouldn't try to … [Read more...]

HTIRW: The IETF Draft Process

In our deeper investigations of the IETF as a "sample standards body" in this (apparently forever running) series on how the … [Read more...]

Use Rate-Limiting to Alleviate Link Saturation

Rate-Limit (2)

At some point in time you may come across a scenario in which you notice a WAN link at a branch site is being saturated. You … [Read more...]