• Breaking News

    [Android][timeline][#f39c12]

    Saturday, September 1, 2018

    Inventory management system Networking

    Inventory management system Networking


    Inventory management system

    Posted: 01 Sep 2018 03:07 AM PDT

    Hi, I am looking for some kind of inventory management system for keeping record network equipent in stock. We periodicly do receive alot of devices, at several locations and do need to keep track on what we have in stock, instead of using internal mailinglists to ask for a specific device/component.

    The system should be: -web-based -Run on premise -keep track of inventory on separate locations

    submitted by /u/Energia2000
    [link] [comments]

    Nexus use cases for mid-sized companies

    Posted: 01 Sep 2018 09:33 AM PDT

    I'm new to Nexus. Web searches related to NX-OS reveal mountains of white papers and marketing pizzazz, but I'm struggling to understand (in practical terms) what benefits NX-OS would provide outside of a data center environment, given that it seems to be quite similar to IOS. Is it simply a matter of SDN compatibility and bandwidth capacity?

    I hope I didn't make your eyes roll. I'm an IOS guy interviewing for a job that includes a bit of NX-OS, and I would like to have a basic understanding of the above.

    Thanks!

    submitted by /u/FormationOfBabby
    [link] [comments]

    First Job Search in 25 Years - What Network Specific Advice Do You Have?

    Posted: 01 Sep 2018 10:06 AM PDT

    Someone close to me worked over 25 years at one company before being laid off due to a merger. They asked him to stay on until the very end, as he was needed for the transition. He had worked his way up from technician to mid/upper level management over 7 engineers; he designed, implemented, and troubleshot telephony networks. Now he's looking for a job, but it's been so long, where to start?

    I'm in a completely different field, so I just don't know how to help him. He is telephony/communication/networks. He has an updated resume and LinkedIn.

    Technology changed, and he kept up as the company changed, but he started out with little formal education. Now, these jobs require degrees. Will his experience make up for that? It doesn't make a ton of sense for him to spend 2 years taking classes on things he learned in the field. When looking at job postings, he has experience in all the programs they list...

    Are there specific recruiters you recommend for this field? Or specific job boards (not just Monster or Indeed) for the industry?

    submitted by /u/joy090
    [link] [comments]

    Access edge standardization and best practices - what does yours look like?

    Posted: 01 Sep 2018 08:02 AM PDT

    I think it would be an interesting conversation to discuss what a properly defined network edge would look like. Specifically the access switch edge, not internet edge.

    For the sake of the conversation, let's assume a few things about this fictitious network. All cisco devices, in a core/distribution/access 3 tier fashion.

    Core is layer3 to the distribution, over these layer3 links, ospf is used to send routing information to the cores. Distribution has layer 3 svi's configured that are trunked to the access switches. In most but not all cases distribution can be a single distribution switch with l3 uplinks to corea and coreb.

    Distribnution1 is set with stp rapid-pvst, and has a priority of 8192. It has an etherchannel to distB with all vlans allowed. Distribution2 is set with stp rapid-pvst, and has a priority of 16384. They use hsrp and each supports all client vlans in a deterministic fashion making distribution1 the primary for layer2 and layer3. Trunks from the distribution all have explicit vlan allow statements towards the access switches. Rootguard is configured on distribution ports facing the access ports.

    The edge has uplinks to dist1 and dist2. The edge has vlans defined that are used on the switch. ideally each access switch has it's own defined vlan however some things are trunked to multiple access switches. Access switches have portfast default and portfast bpduguard default enabled. Access switches have rapid port vlan stp priority set to 20480.

    Ok, so with that out of the way – how do you protect your edge?

    Port security? What do you care about. What threshholds do you use?

    Do you filter at the edge? acl's vacls? What and why?

    Does anyone care about voice vlans anymore?

    Anyone still use private-vlans? Why?

    802.1x ? dynamic vlan assignments? How do you get it to scale to thousands of switches?

    Anyone looked at clearpass

    Do you force non-trunking (dtp off)

    vtp transparent?

    Do not ever use vlan 1

    Do you still use a dummy vlan or shutdown unused ports?

    Dhcp snooping/ip sourceguard / dynamic arp inspection?

    Storm control? What parameters?

    How do you manage Qos across a huge variety of switches, and in some cases against a huge number of families of line cards per switch platform? Is it even worth it ?

    I am genuinely curious what other enterprise network folks are doing with their setups and how they find it working out in the real world where users come and go and requirements change quickly. On some level the expectation is the network should just work and should enable the business to do useful work without getting in the way. The other hand is that the network should be generally protected – where is the trade off? What do you wish you were doing that you are not – what do you hate the way you are doing now and wish you could change?

    submitted by /u/projectself
    [link] [comments]

    Virtual Network Tap recommendation

    Posted: 31 Aug 2018 09:18 PM PDT

    Anyone have hands-on with virtual taps from Ixia, Gigamon or Apcon? Looking for a Virtual Tap that will work on ESXi standalone w/standard switch as well as vcenter w/VDS. Seems Apcon Virtual Tap will only work with vcenter. Would also like the ability to send tap output directly to monitoring tool via ERSPAN. I know this is not optimal, but smaller environments cannot always afford a physical packet broker. Thx!

    submitted by /u/ElectronSandwich
    [link] [comments]

    Juniper EX v6 RA and loopback filter

    Posted: 31 Aug 2018 08:13 PM PDT

    Hi all

    I seem to be having a strange issue with some EX's and their loopback firewall that I can't seem to figure out.

    I have a EX4600 virtual chassis and multiple EX4300 virtual chassis which are connected to the EX4600's.

    I have some VLAN's that have their layer 3 handled by the EX4600's. The EX4300's are only layer 2 for those networks - they do not have any irb interface in them at all.

    For the VLAN's in question, the EX4600's have router advertisements configured. I confirmed they are working (from a capture on the device itself as well as from a server attached). On the EX4300's I have a v6 filter attached to the loopback interface. For testing purposes the firewall simply has one rule - allow all traffic. With the filter attached to the loopback interface no clients connected to the EX4300 see any router advertisements. Solicits also fail - I don't see the counter incrementing on the EX4600's.

    I then removed the loopback filter on the EX4300's and router advertisements work as expected. I don't understand why that is - the filter simply has an allow all rule.

    Has anyone ran into a similar issue?

    submitted by /u/shthead
    [link] [comments]

    10gb rj to SFP+

    Posted: 01 Sep 2018 03:17 AM PDT

    Hey

    Does any1 know if they exist? I have some SFP+ to RJ 1gb converters, but I want to get 10gb RJ to SFP+, can that be done? Most of the network runs on sfp+ but we have workstation with RJ 10gb so its a bit of issue.

    TIA

    submitted by /u/Dariusz1989
    [link] [comments]

    IPv6 BGP routing with three carriers and OSPFv3 for core routing issues.

    Posted: 31 Aug 2018 04:52 PM PDT

    If I ping an ipv6 address from a bgp router and it wants to go out a different carrier it will send it out but it keeps routimg back to the first bgp router. For ospf on my edge I am using the command of ospf originate default always. I do this with IPv4 and do not have any problems. What do I need to do differently with IPv6 so that the OSPF default route does not try to route right back to the original edge router.

    submitted by /u/maineac
    [link] [comments]

    Single tier firewall

    Posted: 01 Sep 2018 07:12 AM PDT

    Is there anything called single tier firewall? I'm aware of 2 - tier and 3- tier . Is it an obsolete term ?

    submitted by /u/babula2018
    [link] [comments]

    Please, sanity-check this branch network

    Posted: 01 Sep 2018 12:54 AM PDT

    Hello all,

    I've been tasked to redesign a cost-aware small branch (They call it branch but its more a SOHO) network while adding in a firewall and some dedicated wired connections. Goal is improved security & visibility & speed.

    I would like to run the setup I have in mind with you experts, as to double check if everything makes sense and that there are no bottlenecks or completely useless and convoluted contraptions..

    Below a diagram, the first block being the firewall (thinking of getting a pfsense box, specifically the SG-3100) and the second block is a managed switch.

    Few points I've been pondering over:

    • The big heavy loads will happen on the switch on VLAN_Y (multiple PCs talking to NAS).
    • I want to manage centrally the L2 firewalling and to strictly control what VLAN_XYZ do in relation to each other and towards WAN
    • I want to protect and gather visibility on the WAN so I was thinking to run Suricata and/or pfBlockerNG on the WAN port (so IDS/IPS). I don't think (questionable) I need to run any of those on the other interfaces?
    • The reason for the LAG between Switch and Router is to allow VLAN_X to fully talk to VLAN_Y without pestering VLAN_Y trying to talk to WAN
    • Bottlenecks... If I should fully utilize the 1Gbps from the WIFI and go to the VLAN_Y (like accessing the NAS), and the VLAN_Y should send at full speed to WAN..(it has nowhere else to go) it would still be 1Gbps+100Mbps .. so there should be no issues ?
    • For clarity, I'm assuming that the firewall will be the gateway for VLAN_X, _Y and _Z, no static routing will happen in the switch. And I assume that when I need to go from VLAN_X to VLAN_Y, i'm actually sending traffic to the SOC? This bit I'm not sure.. Still if that happens I have 2.5Gbps to the SOC and those could be 1Gbps VLAN_X in + 1Gbpe VLAN_X out + 100Mbps VLAN_Y to WAN .. 2.1Gbps.
    • The firewall is not super-beefed .. however I'm starting to think it's more than enough for the setup (and I would hate spending twice as much and not utilize the investment). Although I'd run Gb speeds to it for L2 routing, the heavy stuffs should run only for the WAN (?) which is low speed.. (100Mbps is even an exaggeration, they currently have a 10/1 connection, but I'm considering room for improvement).

    So what do you think? Any conceptual mistake here? Anything different you would make?

    On a different note do you think the SG-3100 is enough for this task and leaves some room for adding complexity for the future?

    ______________________ | ##### | SOC #-----------------|- 1Gbe PORT <-> WAN comulative up/down 100Mbps #####-----------------|- 1Gbe PORT <-> OPT for non-traffic-generating-stuff, isolated ##### | #####- 2.5Gbe PORTSW -# ##### #- 1Gbe PORTSW <-> 1Gbe PORT WIFI AP (2.4-5GHz) VLAN_X #- 1Gbe PORTSW <-¬ # --> 2Gbe LAG to Managed Switch VLAN_Y,VLAN_Z #- 1Gbe PORTSW <-' ______________________| __ | |- 1Gbe to Router (LAG) VLAN_Y,VLAN_Z |- 1Gbe to Router (LAG) VLAN_Y,VLAN_Z | |- 1Gbe to NAS VLAN_Y |- 1Gbe to NAS VLAN_Y | |- 1Gbe to PC1 VLAN_Y |- 1Gbe ...... VLAN_Y |- 1Gbe to PCn VLAN_Y | |- 10Mb to non-traffic-generating-stuff VLAN_Z __| 

    Thanks a lot for your invaluable feedback!

    submitted by /u/jk37e
    [link] [comments]

    No comments:

    Post a Comment

    Fashion

    Beauty

    Travel