• Breaking News

    [Android][timeline][#f39c12]

    Sunday, August 2, 2020

    Is packet analysis a niche skill? Networking

    Is packet analysis a niche skill? Networking


    Is packet analysis a niche skill?

    Posted: 02 Aug 2020 02:38 AM PDT

    Mostly a lurker as I only recently landed my first job with a NOC recently - I'm a "network analyst" not an admin or engineer if that matters.

    Something I thought I might be doing often would be looking at pcaps and the like. Most if not all the time I have not needed to do this - generally boils down to layer 1-3 issues a physical issue or config issue. I find myself being at the level 1 support analyst never doing it. Pretty much it gets fixed without a packet capture or goes to a higher level analyst/team which I never see again as more tickets and calls come in.

    I ask in part because where I work they use netscout and observer. Along with wireshark.

    I am just left scratching my head a bit wondering if capturing and analyzing packets is more a niche skill then? Is learning how to read deeply into a pcap worthwhile or should I put my time and effort into say the CCNP or scripting for example?

    Personally I think its freakin cool, one of my favorite things in packet tracer was turning on the option to see how packets were being sent over network - seeing DHCP, STP, ARP, and all these packets just working over (or not working lol) the network its crazy to think about.

    EDIT: Thanks everyone for your answers and replies very interesting perspectives and ways I had not thought of! I would updoot more if I could! Enjoy this complimentary updoot to further my thanks!

    submitted by /u/Victor2Delta
    [link] [comments]

    Good example of a network diagram with multiple sites?

    Posted: 02 Aug 2020 09:33 AM PDT

    I'm looking to build a network diagram to show to some members of my team but networking isn't my area honestly, programming is. I'm trying to just find a good example with some details showing multiple sites being connected to a main "HQ" site along with all sites being connected to the cloud - I'm trying to find how the router would interact with firewalls and these sort of things, any ideas of the best place to find examples?

    edit: https://www.silver-peak.com/sites/default/files/images/what-is-sdwan/SD-WAN-diagram-s.png I would use this as a basic example but I'm trying to find a much more detailed example to build from

    submitted by /u/BocciaChoc
    [link] [comments]

    Thinking through equipment for deployment in a remote area with poor connectivity

    Posted: 02 Aug 2020 12:46 AM PDT

    The Constraints

    I've been working through a network I'm looking to deploy in an environment with poor infrastructure and unreliable connectivity and need equip that can meet the following needs:

    • Dual WAN failover support including LTE connectivity (not expecting more than 30-40 Mbps on the WAN
    • NTP server for the LAN must be hosted locally and without reliance on external connectivity (needs to obtain time from GPS)
    • Capable of supporting multiple forms of VPN including Wireguard, Zerotier, among others
    • Would like to have IDS/IPS software running like Suricata
    • Multiple VLANs and internal routing between them
    • IP camera traffic will be present as well
    • The less power it needs, the better to increase runtime on batteries/UPS
    • The more affordable the better but not at the sake of resilience
    • Ideally needs to operate with little regular intervention (no full-time IT staff will be on-site)

    The options I've been looking at

    Option 1: Getting something like a Teltonika RUTX09 as the primary router and running a Ubiquiti managed switch for all LAN activity. The good news is that the Teltonika covers most of what I need (including the GPS-based NTP server) however the hardware looks a little underpowered and I'm not sure how to run Suricata elsewhere in the network to filter all traffic.

    Option 2: Getting a separate LTE modem/gateway with passthrough and running Opnsense on a dedicated machine (e.g. Qotom) to handle the WAN failover as well as Suricata (and Ubiquiti managed switches). The only issue is I'm not sure how to accomplish the local GPS-based NTP server. From what I've seen so far, it looks like this route may also be more expensive and the general feeling I get is that the more moving parts, the more potential issues might crop up requiring onsite intervention.


    Any thoughts on what route may be the better option? Or perhaps new options I haven't considered yet?

    submitted by /u/SingaporeOnTheMind
    [link] [comments]

    Unique cable labels & as-builts

    Posted: 01 Aug 2020 07:12 PM PDT

    I do cable installs for large construction projects (hospitals, hotels, arenas etc). As an installer I'm trying to find a happy medium between my job and the networking guys that come after me. I've heard labeling each cable with a unique hexadecimal number is encouraged because it makes for easy and accurate identification of cables. However, I could also imagine it would be a bit daunting to look at an as-built to find a cable as it would be seemingly random numbers with no particular order. Is it better to stick to traditional 1,2,3,4 etc since their order on an as-built would be more intuitive and easy to find or are as-builts not really referenced that much and most of the tracing/ID work is based on faceplate/switch/panel labels anyways

    submitted by /u/Pilgrim146
    [link] [comments]

    ISE Express vs ClearPass Onboard?

    Posted: 02 Aug 2020 12:51 PM PDT

    How do they compare if using them primarily as a portal for users to install certificates on the laptops they use for work that can't get EAP-TLS wireless certificates distributed via domain auto enrollment or MDM push?

    Do they both have a way for IT to pre-approve specific devices (MAC address?) that can download the certificates or that can access the portal at all?

    Which has the best/easiest to understand UI for users to get the certificates installed on Windows and Mac laptops?

    Is there much cost difference purchasing/installing/maintaining between ISE Express and ClearPass Onboard?

    submitted by /u/rancho100
    [link] [comments]

    Disaster relief / Civil protection

    Posted: 02 Aug 2020 12:49 PM PDT

    Hi

    Long time lurker. I'm a complete networking autodidact (MA in Social and Cultural Anthropology and a BA in Politcal Science...), currently working as an Incident Coordinator for a large ISP. I'm responsible for incident sniffing, for the initial troubleshooting on tickets for Enterprise products (IPVPN/MPLS, VoIP trunks, ...) and I'm responsible to coordinate between the cstmr, field techs, network engineers and 3rd parties. That basicly means I'm responsible for an incident from beginning to end, and also that I - from a network POV - need to be a jack of all trades (but my specialty seems to be SIP and related protocols). I also just started my journey to a CCNA cert.

    Just to broaden my horizon a bit I'm looking into ways I could apply these skills when it comes to disaster relief. Setting up voice and data networks after a flood or a hurricane for example. How is this done? What - if any - are the standards? Where do I need to look to get into this?

    Just FYI: I'm a EU citizen.

    Cheers

    KoffeePi

    submitted by /u/KoffeePi
    [link] [comments]

    Does Cisco catalyst 3850 support EVPN + VxLAN?

    Posted: 02 Aug 2020 11:52 AM PDT

    I have bunch of cisco 3850 in stock and trying to find out whether they are support EVPN + VxLAN or not, i didn't find any good information on cisco website as we know its EOL. does anyone know about this hardware?

    Does Cisco catalyst 3850 support EVPN + VxLAN?

    submitted by /u/satishdotpatel
    [link] [comments]

    ERSPAN decapsulation on Linux

    Posted: 02 Aug 2020 11:30 AM PDT

    Wondering if anyone has gotten this to work. I'm using Security Onion and have a CentOS7 VM as my sensor. I have ERSPAN configured in VMWare (Type II or Type III) on the VDS to traffic to the Linux sensor node's monitor NIC IP. This is working - I can see the ERSPAN traffic coming in:

    18:21:46.442220 IP esxihost.internal > hunter-sensor: GREv0, seq 205937, length 161: gre-proto-0x22eb

    Per this site, I enabled IP_GRE, set up the monitoring interface, etc, but it doesn't seem to work. I never get traffic on mon0. https://brezular.com/2015/05/03/decapsulation-erspan-traffic-with-open-source-tools/

    ip a show mon0 gives me

    219: mon0@NONE: <NOARP,UP,LOWER\_UP> mtu 1476 qdisc noqueue state UNKNOWN group default qlen 1000

    link/gre 10.85.167.40 brd 0.0.0.0

    inet 1.1.1.1/30 scope global mon0

    valid_lft forever preferred_lft forever

    I've tried this a million times, redoing it, always doesn't work.

    It doesn't seem like it should be difficult to decapsulate ERSPAN traffic.

    Any thoughts or help would be GREATLY!!! appreciated.

    submitted by /u/DiatomicJungle
    [link] [comments]

    Trying to come up with a way selectively degrade performance for certain domains.

    Posted: 02 Aug 2020 10:45 AM PDT

    I don't want to block legitimate but inappropriate domains, but am looking to make them excruciatingly slow or frustrating (eg intermittent, etc) to discourage their use by users on the network. Any best ideas on what level to be doing this? Router/ DNS, Firewall, etc? Been looking at QoS but it seems to be protocol/source based.

    submitted by /u/alexcantor
    [link] [comments]

    Providing layer 2 services over layer 3 IP only network

    Posted: 02 Aug 2020 08:32 AM PDT

    Hey y'all,

    We're a small WISP and have landed an opportunity that wants a backup private WAN built for their 80+ locations. Currently they have an AT&T VPLS.

    Their requirements are that we provide them a single layer 2 fabric that they connect their site routers to with a single head end at their data center, or main site.

    No VLAN tags will need to be passed from the sites No multicast No QoS 50-100Mbps per site

    Couple of questions/notes:

    Our network is IP only, no MPLS, although we do run a few VRF's at each tower.

    At first, we were thinking a site router would be required on our end for each of their sites. I was thinking something like a 2951 for each site and an ASR at the head end as it will be 1Gbps+. Now that I think about this more, since many sites will be at the same POP, it may make sense to have a VPLS/VXLAN router still each of our POP's to pass layer 2 between them (all POP's are layer 3 only, no L2 between them for our network so we'll have to encapsulate).

    Should we lean towards VPLS over GRE, or look at VXLAN here?

    Is there any reason each site should have their own router or, could we choose a VLAN per POP, then link those VLAN's together via VPLS/VXLAN? Or even EoMPLS over GRE?

    I lean towards VXLAN since it seems like it was built to natively encapsulate over layer 3. Then we'll just use an ASR at each POP.

    submitted by /u/parkgoons
    [link] [comments]

    Why does traffic of vlan not allowed in 'switchport trunk allowed vlan' command pass through?

    Posted: 02 Aug 2020 12:14 PM PDT

    I have a vlan 5 connected directly to core switch. I have another vlan 10 connected to firewall. Core switch is connected to firewall through inside interface. In trunk link between core and firewall, i have allowed only vlan 10 (i understand vlan 10 need to be allowed in trunk if all vlan's are now allowed in order to reach it's default gateway in firewall and then get routed to other subnets). EIGRP is running between core and firewall.

    When traffic has to go to internet from vlan 5, how is it's traffic allowed through trunk link to firewall when i have allowed only vlan 10 through the trunk? I just want to understand how this works.

    submitted by /u/geek166
    [link] [comments]

    Rough CPU requirements for gigabit throughput with IPS/IDS on?

    Posted: 01 Aug 2020 09:35 PM PDT

    So I've been using a UniFi USG-Pro4 in conjunction with a UniFi 24 port(with 250W for PoE) switch for some time now, and while I like it for the most part, I'm not happy with how I have to do some really off-cuff things with jsons to set up multiple IPs on the WAN interface(I have a static block of IPs from my ISP), and I'm at the point now where I need to have an IPS/IDS that doesn't hamstring my throughput, and I'm not a fan of UniFi's new approach (in the new UDM) of forcing you to associate your network with a UniFi account.
    So at the moment I'm looking at building a pfSense router(which solves most of my config problems), that will be able to run Snort, and be capable of at least 1Gbps throughput(using snort), for a network with only 4 users(and 2 VPN users), and 4-5 servers on the network.
    As I asked in the title, I'm looking for some guidance on how powerful of a processor(without going full overkill), and to a certain extent how much RAM(though I'm guessing I shouldn't need any more than 8GB of ECC, and that's probably overkill) I need to manage that 1Gbps w/ a full featured Snort or Suricatta ruleset.

    submitted by /u/BoogaJew
    [link] [comments]

    No comments:

    Post a Comment

    Fashion

    Beauty

    Travel