Inventory management system Networking |
- Inventory management system
- Nexus use cases for mid-sized companies
- First Job Search in 25 Years - What Network Specific Advice Do You Have?
- Access edge standardization and best practices - what does yours look like?
- Virtual Network Tap recommendation
- Juniper EX v6 RA and loopback filter
- 10gb rj to SFP+
- IPv6 BGP routing with three carriers and OSPFv3 for core routing issues.
- Single tier firewall
- Please, sanity-check this branch network
Posted: 01 Sep 2018 03:07 AM PDT Hi, I am looking for some kind of inventory management system for keeping record network equipent in stock. We periodicly do receive alot of devices, at several locations and do need to keep track on what we have in stock, instead of using internal mailinglists to ask for a specific device/component. The system should be: -web-based -Run on premise -keep track of inventory on separate locations [link] [comments] |
Nexus use cases for mid-sized companies Posted: 01 Sep 2018 09:33 AM PDT I'm new to Nexus. Web searches related to NX-OS reveal mountains of white papers and marketing pizzazz, but I'm struggling to understand (in practical terms) what benefits NX-OS would provide outside of a data center environment, given that it seems to be quite similar to IOS. Is it simply a matter of SDN compatibility and bandwidth capacity? I hope I didn't make your eyes roll. I'm an IOS guy interviewing for a job that includes a bit of NX-OS, and I would like to have a basic understanding of the above. Thanks! [link] [comments] |
First Job Search in 25 Years - What Network Specific Advice Do You Have? Posted: 01 Sep 2018 10:06 AM PDT Someone close to me worked over 25 years at one company before being laid off due to a merger. They asked him to stay on until the very end, as he was needed for the transition. He had worked his way up from technician to mid/upper level management over 7 engineers; he designed, implemented, and troubleshot telephony networks. Now he's looking for a job, but it's been so long, where to start? I'm in a completely different field, so I just don't know how to help him. He is telephony/communication/networks. He has an updated resume and LinkedIn. Technology changed, and he kept up as the company changed, but he started out with little formal education. Now, these jobs require degrees. Will his experience make up for that? It doesn't make a ton of sense for him to spend 2 years taking classes on things he learned in the field. When looking at job postings, he has experience in all the programs they list... Are there specific recruiters you recommend for this field? Or specific job boards (not just Monster or Indeed) for the industry? [link] [comments] |
Access edge standardization and best practices - what does yours look like? Posted: 01 Sep 2018 08:02 AM PDT I think it would be an interesting conversation to discuss what a properly defined network edge would look like. Specifically the access switch edge, not internet edge. For the sake of the conversation, let's assume a few things about this fictitious network. All cisco devices, in a core/distribution/access 3 tier fashion. Core is layer3 to the distribution, over these layer3 links, ospf is used to send routing information to the cores. Distribution has layer 3 svi's configured that are trunked to the access switches. In most but not all cases distribution can be a single distribution switch with l3 uplinks to corea and coreb. Distribnution1 is set with stp rapid-pvst, and has a priority of 8192. It has an etherchannel to distB with all vlans allowed. Distribution2 is set with stp rapid-pvst, and has a priority of 16384. They use hsrp and each supports all client vlans in a deterministic fashion making distribution1 the primary for layer2 and layer3. Trunks from the distribution all have explicit vlan allow statements towards the access switches. Rootguard is configured on distribution ports facing the access ports. The edge has uplinks to dist1 and dist2. The edge has vlans defined that are used on the switch. ideally each access switch has it's own defined vlan however some things are trunked to multiple access switches. Access switches have portfast default and portfast bpduguard default enabled. Access switches have rapid port vlan stp priority set to 20480. Ok, so with that out of the way – how do you protect your edge? Port security? What do you care about. What threshholds do you use? Do you filter at the edge? acl's vacls? What and why? Does anyone care about voice vlans anymore? Anyone still use private-vlans? Why? 802.1x ? dynamic vlan assignments? How do you get it to scale to thousands of switches? Anyone looked at clearpass Do you force non-trunking (dtp off) vtp transparent? Do not ever use vlan 1 Do you still use a dummy vlan or shutdown unused ports? Dhcp snooping/ip sourceguard / dynamic arp inspection? Storm control? What parameters? How do you manage Qos across a huge variety of switches, and in some cases against a huge number of families of line cards per switch platform? Is it even worth it ? I am genuinely curious what other enterprise network folks are doing with their setups and how they find it working out in the real world where users come and go and requirements change quickly. On some level the expectation is the network should just work and should enable the business to do useful work without getting in the way. The other hand is that the network should be generally protected – where is the trade off? What do you wish you were doing that you are not – what do you hate the way you are doing now and wish you could change? [link] [comments] |
Virtual Network Tap recommendation Posted: 31 Aug 2018 09:18 PM PDT Anyone have hands-on with virtual taps from Ixia, Gigamon or Apcon? Looking for a Virtual Tap that will work on ESXi standalone w/standard switch as well as vcenter w/VDS. Seems Apcon Virtual Tap will only work with vcenter. Would also like the ability to send tap output directly to monitoring tool via ERSPAN. I know this is not optimal, but smaller environments cannot always afford a physical packet broker. Thx! [link] [comments] |
Juniper EX v6 RA and loopback filter Posted: 31 Aug 2018 08:13 PM PDT Hi all I seem to be having a strange issue with some EX's and their loopback firewall that I can't seem to figure out. I have a EX4600 virtual chassis and multiple EX4300 virtual chassis which are connected to the EX4600's. I have some VLAN's that have their layer 3 handled by the EX4600's. The EX4300's are only layer 2 for those networks - they do not have any irb interface in them at all. For the VLAN's in question, the EX4600's have router advertisements configured. I confirmed they are working (from a capture on the device itself as well as from a server attached). On the EX4300's I have a v6 filter attached to the loopback interface. For testing purposes the firewall simply has one rule - allow all traffic. With the filter attached to the loopback interface no clients connected to the EX4300 see any router advertisements. Solicits also fail - I don't see the counter incrementing on the EX4600's. I then removed the loopback filter on the EX4300's and router advertisements work as expected. I don't understand why that is - the filter simply has an allow all rule. Has anyone ran into a similar issue? [link] [comments] |
Posted: 01 Sep 2018 03:17 AM PDT Hey Does any1 know if they exist? I have some SFP+ to RJ 1gb converters, but I want to get 10gb RJ to SFP+, can that be done? Most of the network runs on sfp+ but we have workstation with RJ 10gb so its a bit of issue. TIA [link] [comments] |
IPv6 BGP routing with three carriers and OSPFv3 for core routing issues. Posted: 31 Aug 2018 04:52 PM PDT If I ping an ipv6 address from a bgp router and it wants to go out a different carrier it will send it out but it keeps routimg back to the first bgp router. For ospf on my edge I am using the command of ospf originate default always. I do this with IPv4 and do not have any problems. What do I need to do differently with IPv6 so that the OSPF default route does not try to route right back to the original edge router. [link] [comments] |
Posted: 01 Sep 2018 07:12 AM PDT Is there anything called single tier firewall? I'm aware of 2 - tier and 3- tier . Is it an obsolete term ? [link] [comments] |
Please, sanity-check this branch network Posted: 01 Sep 2018 12:54 AM PDT Hello all, I've been tasked to redesign a cost-aware small branch (They call it branch but its more a SOHO) network while adding in a firewall and some dedicated wired connections. Goal is improved security & visibility & speed. I would like to run the setup I have in mind with you experts, as to double check if everything makes sense and that there are no bottlenecks or completely useless and convoluted contraptions.. Below a diagram, the first block being the firewall (thinking of getting a pfsense box, specifically the SG-3100) and the second block is a managed switch. Few points I've been pondering over:
So what do you think? Any conceptual mistake here? Anything different you would make? On a different note do you think the SG-3100 is enough for this task and leaves some room for adding complexity for the future? Thanks a lot for your invaluable feedback! [link] [comments] |
You are subscribed to email updates from Enterprise Networking news, blogs and discussion.. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment