Welcome back! In our previous entry on Cisco TrustSec (CTS) we answered the question of why CTS is needed in the first place. Now that we understand why we need it; we need to understand how to do it! So how do you do it? In short, first you classify, then you propagate, and finally enforce. In this entry to our ISE blog series we are going to cover some baseline context on all three of...Continue reading
This past week I have been working on a new campus build-out for one of our customers and came across some interesting behavior regarding 100Gbps and 25Gbps uplinks between switches.
A simplified view of the setup in question is shown below:Continue reading
In the modern networking world routing protocols fall into two distinct camps, Link-state and Distance Vector. Being a network consultant I often have customers asking me which routing protocol is better so I figure I would create a post comparing the different routing protocols.Continue reading
If you have Meraki MX security appliances chances are that you have seen the SD-WAN & traffic shaping option in the Meraki dashboard menu. Software-defined WAN (SD-WAN) can dynamically optimize your WAN without having to make manual adjustments when network conditions change. In a network with redundant uplinks if one uplink becomes degraded, SD-WAN allows the network to dynamically select the...Continue reading
February 24th is coming up fast and those of us working on our certifications are scrambling to complete them before the change. But for those who may not get it done before the deadline, you may need to start studying for the new exams. But what is on the new exams, what topics are covered, and most importantly what training material is out there. Today I will be comparing the certification...Continue reading
All major server manufactures have a built-in baseboard management controller (BMC) for remote server management. These are great tools for onboarding a server and maintaining the server throughout its lifetime. Most of my day to day experience has been using the Cisco IMC, Dell iDRAC, HPE iLO, and IBM IPMI. Some of the server vendors require an additional license to unlock the full features of...Continue reading