“The fundamental problem of communication is that of reproducing at one point either exactly or approximately a message selected at another point.” – Claude Shannon
There are many options for wireless authentication. Most of us have a home router and use some form of passphrase based authentication for our home networks. Most likely you’re using WPA/WPA2 personal. It is perfectly suitable for a small home network but is not at all best security best practice when moving to an enterpriseContinue reading “EAP-TLS: setting up the private PKI”
This is the first in a series of posts about wireless networking that I’ve been learning for the last few weeks. As with anything in networking there are a lot of terms and concepts associated with any configuration. I’ll probably have a post discussing the basics of radio frequencies and how frames are actually transmittedContinue reading “Wireless: Initial Setup”
OSPF was the first routing protocol that I learned mostly because of its prominence in the CCNA and though I found it interesting, most of my time recently has been spent learning BGP and IS-IS. I recently built a topology to revisit OSPF areas and neighbor relationships. After tinkering around with some of the configurationContinue reading “Misconfiguring OSPF”
I’ve spent a lot of time studying link state routing protocols and also BGP because they are more prominent in data center and service provider networks but EIGRP also has use cases, particularly for sharing routes in a DMVPN environment. I decided to create a DMVPN topology to study a few advanced EIGRP features. Here’sContinue reading “The hybrid distance vector protocol: EIGRP”
The more I learn about BGP, the more I can appreciate why it’s considered an application instead of a routing protocol. BGP might have been invented to distribute routes in a large, constantly changing topology but it has since been extended to do so much more. I won’t pretend to know all the different implementationsContinue reading “BGP the mimic”
*** Note: This is part of a series of posts outlining networking topics I had to research to more thoroughly understand VXLAN. I discussed IS-IS in the previous post. *** One of the first things I learned about network traffic was how switches make forwarding decisions. The broadcast address, FFFF.FFFF.FFFF, is flooded through all theContinue reading “Detours: BUM”
I mentioned in former posts that learning VXLAN required me to research a variety of concepts to understand what was happening in the control plane. I’ll outline a few of them here. IS-IS was the first detour. I could have used OSPF for the underlay but I had studied OSPF enough to know most ofContinue reading “Detours: IS-IS”
I thought VXLAN was just another type of encapsulation when I first saw it. There was a payload that existed behind a series of headers, not unlike GRE. Except the header was bigger than GRE and VXLAN itself is coupled with other protocols like LISP or BGP EVPN L2VPN. There was emphasis on decoupling IPContinue reading “VXLAN from above”
To be clear, the title isn’t completely accurate. MPLS uses the information from the IGP for labels and whether or not the forwarding efficiency is improved is debatable. In fact, if you’re using a protocol like RSVP for traffic engineering, the path that a packet takes might not be the shortest path. I’d love toContinue reading “Label Switching or how I learned to ignore IP and become a better forwarder”
Virtual private network evokes certain ideas from different folks. Some will think ISAKMP/IPSec GRE tunnels while others will think VRFs and MPLS. I had used VPNs as a consumer for several years before I started to study them for networking. If you’re using a program like NordVPN then that is more the first type thanContinue reading “How does it VPN though?”
Something went wrong. Please refresh the page and/or try again.
Follow My Blog
Get new content delivered directly to your inbox.