We have all been there; sitting down to dinner on a Sunday night, when you get an alert that one of your branches has gone offline. You politely excuse yourself from the table, open your laptop and start troubleshooting. The problem, you can’t access any of the gear to troubleshoot the issue, and the gear you can access isn’t providing any answers to why the site went down. Now you are faced with...Continue reading
Welcome back! In our previous entry on Cisco TrustSec (CTS) we answered the question of why CTS is needed in the first place. Now that we understand why we need it; we need to understand how to do it! So how do you do it? In short, first you classify, then you propagate, and finally enforce. In this entry to our ISE blog series we are going to cover some baseline context on all three of...Continue reading
This past week I have been working on a new campus build-out for one of our customers and came across some interesting behavior regarding 100Gbps and 25Gbps uplinks between switches.
A simplified view of the setup in question is shown below:Continue reading
In the modern networking world routing protocols fall into two distinct camps, Link-state and Distance Vector. Being a network consultant I often have customers asking me which routing protocol is better so I figure I would create a post comparing the different routing protocols.Continue reading
If you have Meraki MX security appliances chances are that you have seen the SD-WAN & traffic shaping option in the Meraki dashboard menu. Software-defined WAN (SD-WAN) can dynamically optimize your WAN without having to make manual adjustments when network conditions change. In a network with redundant uplinks if one uplink becomes degraded, SD-WAN allows the network to dynamically select the...Continue reading