Networking Jobs Beta

City: - Country:

* We couldn't fetch your location, please try again later!

Error retrieving jobs at this moment


How managed network services are evolving to simplify the global WAN

Published on: 2019-02-20

Fundamentally, the way that carriers (i.e. telcos) deliver managed network services hasn't changed in decades. The core architecture of this network, known as hub and spoke, consists of branches talking to the data center over a managed network with a separate firewall in the middle.

How to secure your Azure network

Published on: 2018-10-16

Cloud services like Azure offer a lot of security features straight out of the box, especially if you're using their platform services. But virtual infrastructures are much like physical infrastructures, connecting virtual machines with software-defined virtual networks. Thus, they need the same ...

Review: 6 slick open source routers

Published on: 2018-02-01

Hackers of the world, unite! You have nothing to lose but the lousy stock firmware your routers shipped with. Apart from smartphones, routers and wireless base stations are undoubtedly the most widely hacked and user-modded consumer devices.

KRSeries: The man who introduced the Internet to Asia

Published on: 2019-02-19

This article is the second in our KRSeries ahead of APRICOT 2019 in Daejeon, South Korea. Read the first article here. Since the beginning of time, humans have developed origin stories to explain how elements of the natural and social world came to be.

5G-Ready Network Today Requires a Secure, Automated Cloud Architecture

Published on: 2019-02-12

Imagine playing an immersive VR video game on your cell phone with friends around the world, in real time, with zero delays, while traveling in a self-driving car. It's not that far-fetched: this is just one of the many possible scenarios that the future holds with the emergence of 5G.

Dealing with Performance Brownouts

Published on: 2019-02-07

I've done a couple of application slowness (brownout) troubleshooting sessions recently. This blog is my attempt to condense some observations from both engagements, to share lessons learned. "Condense" might not be the right word, seeing how long this blog got! Troubleshooting with some process ...

Large BGP Communities playground

Published on: 2016-09-15

Lately, in the IETF Inter-Domain Routing (idr) area, various efforts are going on to push a (IMHO) winning idea to solve a 32-bits-wide problem: standard BGP communities are no longer enough to describe routing policies which involve 4-byte ASNs.

Just Say No to Jumbo Frames

Published on: 2019-01-24

How do you feel about jumbo MTU? I seem to periodically get into debates about jumbos. I'm highly allergic to jumbos. Let's examine the facts (as I see them), and then we'll get to the cause of my allergic reaction. TL;DR: jumbo can cause major operational pain for network administrators.

NAE: Some Help Dealing with Brain Block

Published on: 2019-01-17

For years, thanks to the gift of misaligned perception, I've been mentally blocked. I've avoided things like Machine Learning because my perceived skill with mathematics is weak, avoided programming languages like C# because the perceived uphill hike to get familiar is high and avoided front end ...

Ways to Automate VXLAN

Published on: 2019-01-10

More and more sites are deploying Cisco Nexus 9K-based fabrics. Basically, if the time has come for datacenter switch refresh, you have two choices: Nexus 7700 etc. with a "classic Nexus" design (core, distribution, Top of Rack, FEX), or Nexus 9K-based fabrics. Fabrics are cool and look like a ...

The Changing Cisco QoS Environment

Published on: 2019-01-03

A few months ago, I wrote about the tradeoffs between using a L3 switch and a router. That blog noted that there are a lot more QoS capabilities on the Cisco routers. L3 switches provide a much more constrained set of QoS features, presumably those suitable for high speed processing in chips.

Vendor Lock-in – Is It Really That Bad?!

Published on: 2018-12-30

In today's IT infrastructure, open source software is a common component. Many organizations and network engineers stay away from certain architectures and products citing vendor lock-in as their only argument but often lack the understanding to why they think vendor

SD-WAN – Glorified DMVPN?

Published on: 2018-12-28

I had an interesting discussion with Jon Cooper in the Network Collective Slack. The discussion was around SD-WAN. We were discussing if SD-WAN is just a "glorified DMVPN" or if it's something more than that. Note that this was a

Troubleshoot a DMVPN phase 3 architecture

Published on: 2018-10-09

In the last article, I explained how to configure DMVPN phase3, but what are the most useful commands to troubleshoot this type of network architecture? Five are the main group of commands used to troubleshoot a DMVPN topology: The "show dmvpn" and "show ip nhrp" commands permit to obtain the ...

DMVPN Phase 3: a complete guide

Published on: 2018-07-16

In a previous article, I explained what is and how it works DMVPN technology. In this article you see how to configure DMVPN phase3. This phase allows spokes to build a spoke-to-spoke tunnel and to overcomes the phase2 restriction using NHRP traffic indication messages from the hub to signal to ...

Understanding Cisco DMVPN

Published on: 2018-06-26

In an old post, dated 2011, I explained various types of VPN technologies. In seven years several things have changed: SHA1 is deprecated, des and 3des are no more used for security issues, but some VPN technologies are still used with protocols more secure (SHA256, AES, ...).

An Update for my Adoring Fans

Published on: 2018-06-05

I feel like a teenage girl with a fashion blog who hasn't posted in 6 months and comes back with "I know I haven't posted in a while..." Sigh. It's been right at a year since I actually published a post, so I figured I would give everyone an update.

The Overlay Problem: Getting In and Out

Published on: 2016-09-30

I've been researching overlay network strategies recently. There are plenty of competing implementations available, employing various encapsulations and control plane designs. But every design I've encountered seems ultimately hampered by the same issue: scalability at the edge. Why Build an ...

Storm control on a QFX VCF

Published on: 2017-12-15

There don't seem to be many operational commands in Junos to tell you what's going on with regard to Storm Control. Here's all I could find - let me know if you know of more: In the lab, I configured this storm control profile: {master:1} user@VCF> show configuration forwarding-options ...

Wireless 2017: What We Wanted Then, and What We Want Today

Published on: 2017-12-15

As a wireless engineer, we study the 802.11 protocol. We read how the standard is written, study how it is supposed to work and yet seem to spend our time fighting why it doesn't work. Tweaking power, channels, datarates, toggling features and code versions in hope that things functions the way ...

L3 fabric DC -The underlay Network (BGP) -part2

Published on: 2017-01-17

In the previous post, we laid the foundation of L3 fabric DC In this post we will discuss the underlay network which mainly provide IP reachability plus ECMP capability, here BGP would play a role in your DC next to the 3 other that we discussed one of the previous posts.

L3 fabric DC -The underlay Network -Part1

Published on: 2016-12-07

In the previous posts we have discussed the classic DC designs and the M-LAG solution. In this post we will cover the basic L3 fabric DC, you might never heard of it or you think that's a solution for massive scale DC, yes the massive DC in the world would be running L3 fabric but nowadays more ...

poor man’s dos protection

Published on: 2014-02-10

You might have been DoS-ed recently. And you can't spend more money on special and expensive DoS detection and mitigation systems. Well, you have routers, don't you? Some routing platforms support features which can be efficiently used to limit the impact of DoS attacks. Let us take a brief look ...

bgp – advertising multiple paths

Published on: 2014-02-07

Yes, it can be done by BGP. What was the question anyway? Path hiding on a route server running BGP can happen if the route server has been configured to filter the chosen best path from reaching a particular route server client. Assuming a traditional best path selection, when the same prefix ...

© 2016 rights reserved.