networking

Top 10 Ways to Break Your Network

Check out the first Network Collective video podcast, Top 10 Ways to Break Your Network, in which experienced network engineers share their most memorable blunders and the lessons learned from them.

Here’s the website: http://thenetworkcollective.com/

The header image was used with permission from Michael Nelson who was one of the Twitter participants during the first show. Check out his site here.

TELoIP at Networking Field Day 15

No Networking Field Day would be complete without a presentation from an SD-WAN vendor. The technology is now established and maturing into a ubiquitous WAN solution across small and large enterprises alike, so at the upcoming Networking Field Day 15, I’ll be focused on how TELoIP, one of the presenters at the event, differentiates itself from its competitors.

(more…)

BGP Default Route Failover Using Reachability

Sometimes political, financial, or logistical hurdles determine how we solve networking problems. In these tricky situations we may not be able to solve the problem the way we’d prefer, but we still need to solve the problem.

In this post I’m going to look at how we can solve a WAN failover scenario when we have a default route learned from both of our service providers and a reachability problem via our primary ISP.

(more…)

Amazon S3 Outage: We’ve All Been There

I’ve been thinking a little bit about the Amazon S3 incident. Not really the incident, actually, but the responses to it. More than once I read something along the lines of “I’m sure that guy got fired” with regard to the engineer who entered the fatal command.

Sure, that’s kind of funny for a quick tweet or in the greater context of a blog post on change control, but for me, I’m not sitting at my desk shaking my head right now. Instead, I’m reminded about the times I did the exact same thing (on a much smaller scale) and will probably do it again.

(more…)

My Network Cutover Soundtrack

Here’s a list of carefully thought-out pairings of songs for specific types of network activities like cutovers, refresh projects, and typical pain-in-the-butt network tasks.

Click on the network-y activity to listen, and make sure to have your sound at a decent volume. Most of these tasks take longer than the length of one typical song, so usually I’m listening to the entire album.

(more…)

Trust But Verify: Lossless End-To-End Visibility from Ixia

Tap everywhere. Tap everything. Trustworthy visibility is the key to network monitoring and security.

This is Ixia’s approach for how networking professionals can get an accurate picture of what’s really going in the network, and this was the theme of Ixia’s presentation at Networking Field Day 13.

(more…)