Home > VIP Perspectives
1 2 3 Previous Next

VIP Perspectives

120 posts

We Don't Need No Stinkin' Flags! ACI External EPG Subnet Flags...Just for Fun! by Micheline Murphy   In ACI, the L3Out is a veritable Howl’s Moving Castle[i] of configuration whose ultimate goal is to deliver external connectivity to the endpoints in the ACI fabric. All told, I think there are something in excess of twenty steps to go from zero to full connectivity between an outside ... Read more

Conning the System: Virtual Port Channels...Just for Fun! by Micheline Murphy   Virtual port channels are the tricksters of the networking world. They were originally developed as a con game, way to link two switches together and fool the rest of the network into thinking they were only a single switch. The biggest driver for developing vPC technology was to avoid having spanning-tree come ... Read more

  In the age of digital transformation, it can be challenging to understand educational paths, certification paths, and career paths. For this reason, it is more important than ever for people coming into this industry to have role models and mentors. What is mentoring though? Mentoring to me is not about me holding your hand every step of the way. Mentoring is not me doing your work. ... Read more

David P.

Demystifying CEF

Posted by David P. Mar 28, 2019

It's a common fact that we tend to ignore things that are taken for granted as we assume their presence to be constant over time. This applies undeniably to many aspects of our lives, including work. In this post I intend to describe the history and drivers behind Cisco Express Forwarding (CEF), its inner moving parts, how it carries out its tasks and why we should not take this feature for ... Read more

How's About a Little VXLAN... Just for Fun. by Micheline Murphy   Have you ever trouble-shot a system that wasn’t broke? What? Troubleshooting something that isn’t broken might seem like total madness, but it is a really good way to really become intimately familiar something while it’s actually working.  So, in the spirit of fun and unbridled exploration, ... Read more

Intermediate System to Intermediate System, commonly abbreviated IS-IS, and unfortunately often attributed without the hyphen, began as a research project at Digital Equipment Corporation in 1986 as part of a suite of protocols named DECNET. [1]  It was a full 6 years later that IS-IS was offically recognized as “Intermediate System to Intermediate System intra-domain routeing ... Read more

Application containerization, or lightweight process virtualization, is a method used for deploying multiple isolated applications over a single host accessing the same operating system (OS). By using application containers, you can run many containerized processes or apps on a machine, each process giving the user the illusion that it runs over a dedicated OS. In this blog post, we'll cover ... Read more

The networking industry is currently going through major changes. We are moving–or at least trying to move–from managing devices one by one via CLI to networks where we automate, be it via scripts, automation products, or software-defined solutions. What does this mean for the “modern” network engineer? What are the most important skills to have? How am I supposed to keep ... Read more

Introduction  I remember when I first started working with IT and heard the term “virtual” for the first time. When I tried to understand what it was and how it worked, it was like magic. I couldn’t see it, yet something was working in the background like magic to do good or bad deeds without my knowledge! This was in the era where you physically had to put ... Read more

Change is a process of evolution. It’s an integral part of life, whether it’s personal or professional. As we progress through life, we have to adopt the changes to move forward. Few of these changes are favorable, and many are necessary and time-consuming. But the truth is, change will always be there, and it’s constant.   “Change is the only constant in this ... Read more

Juan

Heading to the 5th Generation

Posted by Juan Aug 24, 2018

This does not happen every day. We are living the design and implementation of a new technology that is called to revolutionize mobile communications as we know them until now.   The principle of industrial design that dictates that "design follows function" could be applied to the design of this new technology and the subsequent analysis of requirements, although contrary to what usually ... Read more

As we know, there is no preemption in IPsec site-to-site VPN on Cisco ASA to the primary peer. If you configure a crypto map with two peers, one as the primary, and another as the secondary, the ASA will try always to initiate the tunnel with the primary peer. If the primary peer fails and become unreachable, then the ASA will initiate the tunnel with the secondary peer. When the primary comes ... Read more

Personal Experience on CCNA Cyber Ops  My journey hasn’t been long in the info sec. community, but I guess this is a high time for me to open up and clear confusions that the newbies might have.   Every time I sit down and think of information security, this wonderful movie ‘The Matrix’ pops up in my mind. Information Security – it’s like you either take ... Read more

Chandan Singh Takuli

A Sip of SIP

Posted by Chandan Singh Takuli May 18, 2018

All existing collaboration engineers out there must have known/worked on the SIP protocol either directly or in-directly, and they understand the importance of SIP in current and next generation VoIP networks. Collaboration engineers need to understand it more than ever as SIP is becoming an integral part of the VoIP network as we are unfolding towards the future. As I discussed with my ... Read more

Introduction Traditionally, wired Ethernet networks have been open to everyone that had a cable attached to the segment. Once the cable is plugged in and the correct IP information is configured, either statically or dynamically via DHCP, the device is granted access to the network. Back when Ethernet was originally created, nobody gave it much thought as to how to ensure that the connected ... Read more

Filter Blog

By date:
By tag: