SOS! My Peering is Under Attack!
Now that the Internet has become critical to our day-day lives we really feel the impact when it goes down. While the origin of the Internet – the so-called “ARPANET” was built for resiliency and redundancy there are some hidden vulnerabilities that can undermine its stability.
Insights About the Global Internet Routing Table Reaching the 768k Milestone
Back in 2014, I wrote an article that highlighted that global Internet routing table passed the 512,000 or 512k route mark. Today we know that another significant milestone has been...
Learn How to Leverage BGP Automation to Execute Python Code Directly on an End Device
DevNet Create, April 24-25 in Mt. View California, is the hands-on conference focused on infrastructure automation and application development.
Persian Stalker pillages Iranian users of Instagram and Telegram
State-sponsored actors have a number of different techniques at their disposal to remotely gain access to social media and secure messaging applications. Starting in 2017 and continuing through 2018, Cisco...
Network like it’s 1999 with BGP EVPN
BGP EVPN brings both layer 2 and 3 capabilities to the hamstrung overlay but how would it work for your network? How well do you understand the additional benefits and limitations of this design?
Dynamic Multipoint VPN (DMVPN) Setup.
Since DMVPN has been added to the CCIE v5 BluePrint (http://www.cisco.com/web/learning/exams/docs/ccieRS_Lab5.pdf) I figured that now was just as good of a time as any to write this blog. DMVPN stands for Dynamic Multipoint VPN and it is an effective solution for dynamic secure overlay networks. DMVPN is combination of the following technologies: Multipoint GRE (mGRE) […]
Top Things to Know About DFA Before Cisco Live Milan
Two weeks ago, I presented a webinar on Dynamic Fabric Automation (DFA) and went over the allocated 1 hour to cover the content. Yesterday, as I was doing follow up with a hands-on demo, I went over time too. This illustrates how rich DFA is, and how much there is to say about it! Dynamic […]
Securing Critical Internet Infrastructure: a RPKI case study in Ecuador
Securing critical internet infrastructure is an ongoing challenge for operators that require collaboration across administrative boundaries. Last September, something exceptional happened in the small South American country of Ecuador: the entire local network operation community got together to be pioneers in securing the local Internet infrastructure by registering its networks in the RPKI system and […]
Securing Critical Internet Infrastructure: an RPKI case study in Ecuador
Securing the Critical Internet Infrastructure is an ongoing challenge for operators that require collaboration across administrative boundaries. Last September something exceptional happened in Ecuador, a small South American country. The entire local network operation community got together to be pioneers in securing its local Internet infrastructure by registering its networks in the Resource Public Key […]