BGP

SOS! My Peering is Under Attack!

Now that the Internet has become critical to our day-day lives we really feel the impact when it goes down. While the origin of the Internet – the so-called “ARPANET” was built for resiliency and redundancy there are some hidden vulnerabilities that can undermine its stability.

April 22, 2019

SECURITY

Insights About the Global Internet Routing Table Reaching the 768k Milestone

Back in 2014, I wrote an article that highlighted that global Internet routing table passed the 512,000 or 512k route mark. Today we know that another significant milestone has been...

March 12, 2019

DEVELOPER

Learn How to Leverage BGP Automation to Execute Python Code Directly on an End Device

DevNet Create, April 24-25 in Mt. View California, is the hands-on conference focused on infrastructure automation and application development.

November 5, 2018

THREAT RESEARCH

Persian Stalker pillages Iranian users of Instagram and Telegram

State-sponsored actors have a number of different techniques at their disposal to remotely gain access to social media and secure messaging applications. Starting in 2017 and continuing through 2018, Cisco...

January 5, 2016

TECHWISETV

Network like it’s 1999 with BGP EVPN

BGP EVPN brings both layer 2 and 3 capabilities to the hamstrung overlay but how would it work for your network? How well do you understand the additional benefits and limitations of this design?

August 12, 2014

PERSPECTIVES

Dynamic Multipoint VPN (DMVPN) Setup.

Since DMVPN has been added to the CCIE v5 BluePrint (http://www.cisco.com/web/learning/exams/docs/ccieRS_Lab5.pdf) I figured that now was just as good of a time as any to write this blog. DMVPN stands for Dynamic Multipoint VPN and it is an effective solution for dynamic secure overlay networks. DMVPN is combination of the following technologies: Multipoint GRE (mGRE) […]

Top Things to Know About DFA Before Cisco Live Milan

Two weeks ago, I presented a webinar on Dynamic Fabric Automation (DFA) and went over the allocated 1 hour to cover the content.  Yesterday, as I was doing follow up with a hands-on demo, I went over time too. This illustrates how rich DFA is, and how much there is to say about it! Dynamic […]

November 22, 2013

SECURITY

Securing Critical Internet Infrastructure: a RPKI case study in Ecuador

Securing critical internet infrastructure is an ongoing challenge for operators that require collaboration across administrative boundaries. Last September, something exceptional happened in the small South American country of Ecuador: the entire local network operation community got together to be pioneers in securing the local Internet infrastructure by registering its networks in the RPKI system and […]

November 19, 2013

PERSPECTIVES

Securing Critical Internet Infrastructure: an RPKI case study in Ecuador

Securing the Critical Internet Infrastructure is an ongoing challenge for operators that require collaboration across administrative boundaries. Last September something exceptional happened in Ecuador, a small South American country. The entire local network operation community got together to be pioneers in securing its local Internet infrastructure by registering its networks in the Resource Public Key […]