Cisco recently introduced their Catalyst 9000 Series switches. One unique feature of these switches is their ability to support containers. This podcast episode explains the concept of containers and how they can be more efficient that virtual machines (VMs).
This podcast episode is from The Broadcast Storm podcast. Following are the links you can use to subscribe to the podcast, so you don't miss an episode:
Subscribe via iTunes: http://kwtrain.com/podcast
Subscribe to RSS Feed: http://kwtrain.com/rss
Malware poses an increasing threat to network devices. Recently, malware has been used to install ransomware on computers, which encrypts data on the computers' hard drives and demands money for the data to be decrypted (essentially holding a computer’s data hostage and demanding a ransom). A logical response to help mitigate such threats is to have a network-based device analyze traffic flows for those offending packets.
However, what if the malware concealed itself to avoid detection? For example, some malware uses TLS-based encryption (where TLS stands for Transport Layer Security), thus preventing traditional network-based threat scanners from inspecting it. Interestingly, malware’s use of TLS-based encryption is growing rapidly. Consider that in August 2015, only 2.21 percent of malware attacks used TLS, while the percentage of malware attacks using TLS in May 2017 had grown to 21.44 percent.
This increasing threat begs the question, “How do we protected...
Recently, I bought the book Deep Work, by Cal Newport. The book gives us a strategy for becoming much more productive. In hopes that you’ll read the book too and really apply it in your work, let me tell you about a time I implemented what it teaches.
As part of my Network Programmability Fundamentals video course (which comes out in October 2017), I was trying to figure out a chunk of Python code that came from the Cisco DevNet site. The struggle was real for me every time I spent a few minutes trying to figure out what some of the lines of code were doing, and how everything worked together. So, I decided to use what I’d been reading about in Deep Work. First, let me give you an overview of the book. Then, I share with you how I used it.
The author begins by pointing out how in today’s technological world, we have many interruptions. Think about your day. Your sitting at your desk, and you receive a text or an e-mail that interrupts your...
Back in my high school days, I took a class in mythology, and one of the stories that really stands out to me is the story of the Sirens. These Sirens were alluring creatures, with amazing voices, and they made beautiful music. They lived on islands, and they would sing out to sailors sailing pass their islands. Upon seeing the beauty of the Sirens and hearing their music, the sailors would steer their ships toward the islands, only to have their ships destroyed by the rocks surrounding the islands.
Today, we use the term Siren call to refer to something that looks appealing but is actually dangerous, and I think that is a great description of brain dumps. You’ve probably heard of these brain dumps, where people take an exam and post online the exact questions they saw on the exam. However, it’s not just individuals posting these questions from their short term memory, there are also companies with collections of actual exam questions that they sell on the Internet....
Studying for your CCNA R/S (200-125) exam? If so, a perusal of the exam topics list can be daunting. Clearly, you’re going to spend a significant amount of time getting at least a passing familiarity with the myriad of topics. However, your focus should not be spread evenly over all topics. Rather, there are some topics that need a disproportionately large amount of study.
That’s the focus of this blog post, identifying 3 of the topics likely to appear multiple times on your 200-125 exam. These topics won’t come as any surprise, but I hope this will be a reminder to expend that extra measure of effort when reviewing “the big 3.” Let’s check out the list:
To be prepared for IP addressing questions on the CCNA R/S exam, you need several skills, including:
For decades, we’ve heard about Cisco’s three-tier network design where we had the following layers: (1) Access, (2) Distribution, and (3) Core. The Access Layer connected to our end devices (e.g. clients and servers). The Distribution Layer redundantly interconnected Access Layer switches, and provided redundant connections to the campus backbone (i.e. the Core Layer). The Core Layer then provided very fast transport between Distribution Layer switches.
However, within today’s data centers, a new topological design has taken over. It’s called a Leaf-and-Spine topology, and in this short blog post, you’re going to learn the basics of how it’s structured.
Imagine a cabinet in a data center, filled with servers. Frequently, there will be a couple of switches at the top of each rack, and, for redundancy, each server in the rack has a connection to both of those switches. You might have heard the term top-of-rack (ToR) used to refer to...
Are you going to Cisco Live US (CLUS) 2017 in Las Vegas? If so, you might want to come check out my session. It's entitled Number Globalization and Localization for CCIE Collaboration Candidates. But, please don't be thrown by the title. Even though it has CCIE in the title, this session can be super valuable to you if you work with Cisco Unified Communications Manager (CUCM) servers, regardless of your certification level.
This video gives you the details of what you'll be learning:
You can check out the session in the CLUS Schedule by clicking HERE.
Hope to see you in Vegas!
It was 1989 when I first laid hands on a Cisco router. Specifically, it was a Cisco AGS+ router. Well, actually, it was called a “brouter,” because it did both bridging (software-based Layer 2 switching) and routing. The version of Cisco IOS it ran was some flavor of 7.x, but at that time, the operating system had not been given the Internetwork Operating System (IOS) name.
Since that time, Cisco has paraded out a variety of additional operating systems, many of which are now defunct. Some of those operating systems came through acquisitions. For example, in the mid-1990s, Cisco started building up their line of Cisco Catalyst switches by acquiring Grand Junction, Kalpana, and Crescendo. Switches coming from these various lineages ran different operating systems. Cisco also came out with different operating systems for their hubs, load balancers, security appliances, unified messaging modules, etc. However, Cisco IOS was long viewed as the defacto Cisco operating system,...
The day-to-day tasks of Cisco network engineers are in the midst of a major industry shift. Specifically, we’re moving away from traditional command line interface (CLI) commands, and moving towards having programs do the work for us. The industry term for this new environment is Software Defined Networking (SDN). Cisco’s SDN product suite is called ACI. As an example, we could write a program to talk with a Cisco APIC controller, which could then send out commands to multiple Cisco devices (e.g. routers and switches).
This change is going to require Cisco engineers to become proficient in programming, and the most common programming language for SDN is the Python programming language. Unfortunately, the challenge of learning a new programming language can be a bit daunting even to seasoned engineers.
Fortunately, this video will break the FUD (Fear, Uncertainty, and Doubt) surrounding Python. Specifically, in this video, you’ll learn: