Rant Wednesday! Networking |
- Rant Wednesday!
- What are you using for network automation?
- What to learn or where to move next? Need advice please (From Cisco to...)
- Ethernet and Fiber OTDR Certification
- Arista VXLAN low throughput
- Reserved WiFi bandwidth per user
- Network security ransomware attacks
- SD Networking or Traditional Deployment? Stability vs new features/easier management
- How often is OSPF FRR and Fast Hellos actually used in real world?
- Cisco ACI Multi-Site Vs Multi-Pod Design
- Do you use DNA Center?
- Wi-Fi for ~1000 devices during the event
- netmiko question (3-prompt system)
- Azure MFA plugin for NPS - slow? anyone else?
- [Extreme switches] how to auto fill port alias fields
- Need help/suggestions for different Wifi networks for 4 or 5 different apartments
- Switch redundancy
- Recommendations for 10 gigabit switch?
- How would you setup a semi-permanent packet capture for your WAN interface?
Posted: 01 Oct 2019 05:04 PM PDT It's Wednesday! Time to get that crap that's been bugging you off your chest! In the interests of spicing things up a bit around here, we're going to try out a Rant Wednesday thread for you all to vent your frustrations. Feel free to vent about vendors, co-workers, price of scotch or anything else network related. There is no guiding question to help stir up some rage-feels, feel free to fire at will, ranting about anything and everything that's been pissing you off or getting on your nerves! [link] [comments] |
What are you using for network automation? Posted: 01 Oct 2019 11:29 AM PDT What technologies, if any, are you using for network automation?
If you are using something, how big is your network (devices)? When did your organization switch from manual configuring stuff to automation? Why did you choose the system that you ended up going with? If you are not using anything, do you see yourself using something in the future? At what point is it worth the effort to roll out? Are you considering something in particular? [link] [comments] |
What to learn or where to move next? Need advice please (From Cisco to...) Posted: 01 Oct 2019 04:33 AM PDT Hello Guys, I am new to this forum, and I am seeking for advice. At the moment I am trying to decide in what direction I should develop myself. Brief description of myself: I have finished UK University with Networking course in 2011. For next 5 years I have been working as Network engineer in a few Companies(changed 2-3 Companies) and obtained CCNA, CCNA Security, CCDA, CCNP. Last three years I have job that combines Network Engineer and IT manager roles. During these 3 years and start loosing my networking skills as its only 30% of my daily routine. Now its time to start think what to do next, and I have spent so many hours looking for what could be better for me. First thought was to start preparing for CCIE. This would remind me all forgotten skills and I will learn a lot from it. Although, its difficult exam, I know this path, I been in Cisco world for so many years, I know how it works and what it requires. But.. there is that mind in my head. Network Engineers are not on demand anymore. I remember time 7 years ago, when it was the most valuable IT job on the market with high Salary and a lot of vacancies on the market. I am not seeing this anymore. I am living near London, so will use London as an example. Average Salary for Senior Network engineer is about 50k - 70k. But this mean you most likely will be responsible for entire Region, for example be responsible for entire EMEA. I am not against this, as even with my current position I am responsible for EMEA region and that's ok. Now, if we will take average Python developer, his salary will be about 60k, and he will not have that much responsibilities on his shoulders. Nowadays, if you compare junior job Salaries from different areas you will see something like this: · Junior Network Engineer 25k · Junior Java developer 47k · Junior AWS engineer 42k All this leads me to conclusion that network engineer job has no future. Yes, I can try to get CCIE in 2 years, and I will find the job with the salary of 60-80k, but I am pretty sure in 3-5 years time I will have the same question in my head, does the energy I spend worth the money I earn? I can only imagine how much I can learn about Azure, AWS, Java or Python during these 2 years instead of CCIE preparation. I cannot decide if I should start a new carrier or carry on with Cisco. I like Security. You would say go for CISSP. But then it will be the same scenario, in the future I can find 80k job in Security, but this will most probably be Security department lead with huge responsibilities. I like Ethical hacking and penetration tester jobs. But this is new carrier and I will probably not be able migrate from Networking to Penetration tester without loosing Salary. Junior penetration tester salary can be 35k, when my current salary is 50k. Also another thing is, at the moment I am responsible for EMEA region and this make me feel myself very important for the Company. it will be difficult to accept the fact that I will be junior again... I do not mind programming paths, but I have a fear, what if I will spend 2 years doing programming, and then will come to conclusion that CCIE would be better choice. I like Cisco and I like networking, but I just do not want to be that old school guy who is denying the fact that he need to evolve and learn something new. As a last option, I think I am knowledgeable enough to open my own Company that will be providing Networking Services. But there is a fear:
It would be great to hear your opinion regarding this. Thank you [link] [comments] |
Ethernet and Fiber OTDR Certification Posted: 01 Oct 2019 08:28 AM PDT Our company is trying to put together a training program for our employees in order to train helpers to become technicians and allow technicians to continually educate themselves. Let's say we were going the cliche route of Belden for ethernet cabling and Corning for fiber....It seems to me very unlikely our company would have the resources to send our helpers around the country to the different training sessions available...Do you all recommend an in-house program? Get the manufacturer or manufacturer's representative to travel to us? If an in-house program is the way to go, what programs are recommended? Fluke? CNet? Other? Thanks for the read. [link] [comments] |
Posted: 01 Oct 2019 08:10 AM PDT Any Arista VXLAN users here? We're having an issue where throughput gets severely impacted. Running iperf on 2 servers on 2 neighboring leaf pairs, I've seen throughput get as low as 1gbps on 10gbps link. I am pretty sure it is because packets get received out of order, causing duplicate ACKs, which in turn causes the sender to reduce its congestion window. Have an open support ticket but they are fixated on finding a bad link , which is totally not the case. Has anyone experienced anything similar? [link] [comments] |
Reserved WiFi bandwidth per user Posted: 01 Oct 2019 11:15 AM PDT Hi Guys, I am designing a new WIFI6/5 network for around 500 users and I was wondering what is a safe number for guaranteed bandwidth per user taking into consideration the future proofing? Would 10 Mbps per user be enough? [link] [comments] |
Network security ransomware attacks Posted: 01 Oct 2019 06:25 PM PDT I work at a factory manufacturing auto parts. Our customer was hit with a ransomware attack. Today in our manager meeting, as we talked about the incident, I asked the IS guy what protections we had. His reply was that he has contacted ATT (our ISP). Am I missing something or is this guy a complete idiot? [link] [comments] |
SD Networking or Traditional Deployment? Stability vs new features/easier management Posted: 01 Oct 2019 10:11 AM PDT I know this is a loaded question but to summarize as much as possible. What does the professionally tech community think is better for the Org? I work for a VAR I have seen many deployments. Some very basic and some very advanced using bleeding edge tech such as Cisco SDA. VARs typically love new tech so they can sell more stuff so to speak. Based on what I have witnessed, I feel that the bleeding edge is cool but typically much more expensive and full of bugs/downtime. Products such as Cisco SDA or ACI promise easier management but when troubleshooting, it almost seems not worth it. They also come with extensive compatibility matrices that are just another thing to keep in mind. From an IT standpoint which is more important? Stability through traditional/tested tech or newer technology with new features that may be easier to manage? [link] [comments] |
How often is OSPF FRR and Fast Hellos actually used in real world? Posted: 01 Oct 2019 01:30 PM PDT As title I'm curious to how often they are used im real world especially FRR with OSPF. I can imagine BFD is commonly used over fast hellos if it a requirement. [link] [comments] |
Cisco ACI Multi-Site Vs Multi-Pod Design Posted: 01 Oct 2019 05:48 AM PDT Trying to architect a design to plan for the future, Is there any drawbacks to deploying ACI Multi-Site vs Multi-Pod and for the context, this is in a healthcare environment so redundancy and availability is a very critical component to our design. We have two locations, 1700 Miles apart, and I can't go into anymore details for privacy reasons. I believe we are currently set to deploy this as a multi pod deployment, but It makes more sense to me at least to do a multi site deployment because of the ability to stretch the fabric and be able to disaster recovery with EMR systems that are VM Based, so Data vMotion is essentially the major basis of this plan (Not sure if Storage based vMotion could span that distance without consistency check errors occurring in the stored data). Any thought's/Pro's and Con's? [link] [comments] |
Posted: 01 Oct 2019 01:14 PM PDT -Topic- Do you use DNA Center and if so, whats your favorite feature? Do you like where the platform is moving? [link] [comments] |
Wi-Fi for ~1000 devices during the event Posted: 01 Oct 2019 05:21 AM PDT I am tasked to find out about the capacity of Wi-Fi network for about 1000 devices (500 laptops + 5000 phones). The event will take place in a hotel, where we will have different conference rooms. So this is something I should take into account. How to you approach this kind of task? What should be overall bandwidth? How many APs we need to put there? Now it is expected that users will not misuse the network to watch streaming videos and etc. [link] [comments] |
netmiko question (3-prompt system) Posted: 01 Oct 2019 02:08 PM PDT I've got some VM appliances that are CentOS-based and I want to do some automation on them. I can't use the Linux device type because the vendor is using klish to present an application-specific shell that has a prompt terminating with >. I can use something like terminal_server or alcatel_aos to get stuff working, but I'd rather get something more usable. The klish shell allows you to drop out to a bash shell with a $ terminator and then, of course, you can su to root and get a # terminator. I wrote my own device type and hacked the source to get it working with all three prompts and implemented the admin functions, but I don't really like that solution either. Is there a way to include a new device type without going through the submission process? I'm not experienced enough to handle all the requirements for submitting new device types (black, plint, etc). I'm a little below intermediate at best in python. I've noticed that packages like pygments allow runtime "plugins" through the use of entry points. Is that something that can be done with netmiko? [link] [comments] |
Azure MFA plugin for NPS - slow? anyone else? Posted: 01 Oct 2019 08:18 AM PDT I've never setup this particular thing before and I got it configured and working but when using it for cisco anyconnect there is a pretty substantial delay and you often have to put in bogus keys a few times until you finally got a text/app message with correct code. since I've never set this up I was wondering if anyone else has and saw this issue? [link] [comments] |
[Extreme switches] how to auto fill port alias fields Posted: 01 Oct 2019 06:31 AM PDT Have ~50 Extreme switches... with about 60% of the ports unlabeled/unaliased. Read a few things here and there about running LLDP advertising from Window PCz... anyone have thoughts on doing this? Trying to think of a better approach than manually tracing every port, which seems wrong in several ways [link] [comments] |
Need help/suggestions for different Wifi networks for 4 or 5 different apartments Posted: 01 Oct 2019 02:33 AM PDT Looking for some basic pointers on hardware, setup and anything else needing consideration for the following scenario. We're starting from scratch, except the ISP provided router which we don't have much control over. Setting: This is at a holiday complex where we own 5 apartments. We're not always there to do on-site admin, and we don't want to have someone from there 'on hand' to fix things. Need to have: Remote admin control, so am hoping to set up a Raspberry Pi [or similar, discreet device] so I can remote into the router settings from abroad if and when needed. Some steerage on this would be great, not used Pi before. This would used to change Wifi passwords for each of the Wifi access points (ie different for guests etc) - would be good to know if someone is hammering the net and making it awful for other guests, for example, and then to be able to throttle or disable access. If the net goes down entirely that's another matter, and not really what I'm worried about finding answers for here. Ideal Scenario: The aim is to have a single access point, ideally PoE to avoid having to find wall power always, in each of the apartments (model/brand suggestions please!). This will be based off ONE inbound internet connection in the most central apartment of them all. Yes, I know it's going to go south in terms of bandwidth, however this is for email checking and Facebook for our guests, not torrents/streaming/etc. It's a ~70mb fiberoptic line. This is to save (a LOT of) money and to centralise control of the connections, ideally remote admin as mentioned. The apartments are not one next to the other, nor would we want to share wifi networks between say two apartments, so we plan to run ethernet cables (from the router) to a sensible spot in each apartment, where we will have a Wifi beacon. Maximum distance from router (ISP) to apartment is about 150ft, 120m, nothing more. Any ideas welcome, I have about 1 month before I head out and would like to either buy the parts in the UK before flying out or at least know what I need to order (in Canaries). Many many thanks in advance. If this would be better in another sub, let me know! [link] [comments] |
Posted: 01 Oct 2019 05:22 AM PDT Hello, I have a couple of machines (running FreeBSD) connected to an HPE 2530-24G switch. I'd like to add redundancy in case of switch failure and plan to buy another HPE 2530-48G, and interconnect the two through the SFP+ ports. We have several (tagged) VLAN. What I'd like to do is to add link failover at first and aggregation in a second time, so basically on each server connect IF1 in switch 1 and IF2 in switch 2. Failover can be done fairly easily I think, with LAGG and failover as the aggregation protocol (which is the default), but I'm wondering if I could use LACP as the aggregation protocol when two switches are involved and if something special should be configured on the switch part, apart from the trunks groups? To take a concrete example let's say that machine1 has port 1 connected to switch1 and port 2 connected to switch2, with one virtual LAGG interface in LACP mode. If the two switches are operationnal the traffic will be balanced across the ports in the LAGG, is it correct? How could I configure one trunk group with a port for switch1 and a port from switch2? In case of switch failure will the traffic no longer be sent on the interface connected to the dying switch? Thanks! [link] [comments] |
Recommendations for 10 gigabit switch? Posted: 01 Oct 2019 05:10 AM PDT We're a small office doing media production, and move massive amounts of Terabytes every month. Several of our new desktop workstations are equipped with 10 gigabit network interfaces, and we have two new servers also capable of 10 gigabit (Synology NAS machines with 10 gigabit interfaces and RAID 10 volumes that can definitely outperform 1 gigabit in both read and write). What switch would you recommend? We need no more than 6 ports at the moment, and would prefer a plug-and-play unmanaged switch. [link] [comments] |
How would you setup a semi-permanent packet capture for your WAN interface? Posted: 30 Sep 2019 11:57 PM PDT We have an application that requires a port-forward to function (according to the developers - it's niche software, so we don't have much room to argue). They won't disclose the IP addresses initiating a connection, so it's wide-open at this stage. The router/firewall device is a Netgate appliance running pfSense 2.4.4. WAN circuit is 100 Mbps, although I would not expect to see much traffic, if any on the port-forwarded port? What is the best way of setting up a long-term packet capture (filtering for the port-forwarded port), on the WAN interface? The firewall appliance doesn't have a lot of storage (and it's a slow eMMC drive), so I assume I'd want to offload storage to another server on the network, right? I assume I'd also want some kind of rotation going. I've read there's tcpdump, dumpcap, wireshark etc. What would people suggest here? (Some people mention setting up a SPAN port - however, I assume that means I'd need another switch that sat in front of the WAN interface on the Netgate firewall, right?) [link] [comments] |
You are subscribed to email updates from Enterprise Networking news, blogs and discussion.. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment