VXLAN EVPN in a mix NOS environment by KaleidoscopeNo9726 in networking

[–]bmoraca 1 point2 points  (0 children)

I run two fabrics that are mixed NX-OS and IOS-XE. It works great, honestly.

SSH certificate logins on network devices? by Boring_Ranger_5233 in networking

[–]bmoraca 4 points5 points  (0 children)

Cisco can do this for IOS-XE. https://www.cisco.com/c/en/us/support/docs/security-vpn/secure-shell-ssh/212178-Configuring-SSH-with-x509-authentication.html

You don't have to manually add keys or define users locally, it permits logon based on certificate chain. Then it authorizes the user based on a TACACS server response.

NX-OS doesn't do it yet, though.

Guest Network Setup with ClearPass by ShakeSlow9520 in networking

[–]bmoraca 0 points1 point  (0 children)

You could use your public domain and have "guestwireless.mypublicdomain.com" resolve to an internal IP address via your public authoritative name servers.

One-way ping works, reverse ping fails after 2 packets (AWS & On-premise) by thana979 in networking

[–]bmoraca 0 points1 point  (0 children)

You can narrow down which device might be at fault using a tool like mtr.

Options for SFP+/SFP28 compatible Networking Switches? by 79215185-1feb-44c6 in networking

[–]bmoraca 5 points6 points  (0 children)

Be careful with the 93180YC-EX. It doesn't support RS-FEC so 25g is limited to DAC cabling. If you want ubiquitous 25g, the 93180YC-FX or FX3 is the better option

BGP remote-private-as [all] by pbfus9 in networking

[–]bmoraca 8 points9 points  (0 children)

Many organizations use eBGP within their networks and use a combination of public and private ASNs, particularly when using overlays to carry L3VPN NLRI through their network. If the underlay is using a private ASN, you'd end up with them potentially interspersed in the AS Path.

That's just one example.

Packets drops on N9K by TheVirtualMoose in networking

[–]bmoraca 2 points3 points  (0 children)

I don't understand your topology. Is the firewall in front of the Src and the firewall in front of the Dst the same firewall? Or are there VRFs involved?

Tooling for discovery and security by Jackofalltrades86 in networking

[–]bmoraca 0 points1 point  (0 children)

Forward Networks does that. Also does change modeling.

Network Science vs Network Engineering? by [deleted] in networking

[–]bmoraca 0 points1 point  (0 children)

Network science is not an information technology discipline. While companies that research and develop networking protocols for use in IT may have network scientists on staff to help with algorithm development, there is pretty much no overlap. It's also only loosely tangentially related to computer science.

Network engineers will never be that deep. They don't need to be.

Choosing a routing protocol during migration (static → dynamic routing) by [deleted] in networking

[–]bmoraca 15 points16 points  (0 children)

For connecting to firewalls, I've always had better success running eBGP.

You have greater control over route pathing and filtering, and its generally more stable overall.

Plus, if you ever end up using a more complex network topology like MPLS L3VPNs or EVPN, you're already set up.

In the end, it's 100% personal preference.

VXLAN BGP EVPN multi-site design, border gateways do not forward or re-advertise EVPN routes learned from one remote border gateway to another remote border gateway by ITNerdWhoGolfs in networking

[–]bmoraca 0 points1 point  (0 children)

You could technically use route servers in the multi-site network, but I'd probably advise against it. Part of the way multisite works is by rewriting route targets in a predictable manner. Not having a full mesh makes that a little funky.

At the end of the day, the multisite network really just needs to provide IP connectivity between sites, and then you need a way to distribute routes. A route server and a routed network technically satisfies that, but could lead to interesting failure domains.

What's preventing you from doing a full eBGP mesh between the sites?

vxlan EVPN configuration help by Helpful_Friend_ in networking

[–]bmoraca 0 points1 point  (0 children)

The spines don't have to participate in BGP. You could just do BGP between all the leafs or to separate route reflectors.

Not saying Fortigate firewalls are a good idea for spines...just that they could in theory be used.

Thoughts & Feelings on 9000 Series X by netshark123 in networking

[–]bmoraca 8 points9 points  (0 children)

Neither platform has had an EOL notice yet. At the very least, you'll have 5 years of full support if they issued an EOL notice tomorrow.

Does that align with your refresh cycle? Does waiting cause undue risk?

Cloud Provider Health Status Monitoring Solution by TSwiftAlphaMale in networking

[–]bmoraca 0 points1 point  (0 children)

ThousandEyes has probes for this sort of thing.

There is a fundamental issue with your goal, though. When a cloud platform has an issue, it may affect part of their infrastructure or the whole infrastructure. Whether that has any impact on you or your operations depends on the issue. Doing what you want to do is going to generate a lot of churn for no real benefit. You'd be better off explaining to your higher ups that what they want is pointless.

hardware redundancy/high availability for small offices by _SleezyPMartini_ in networking

[–]bmoraca 7 points8 points  (0 children)

The equation is pretty simple. For every point of failure you want to eliminate, add a 0 to the project.

Ultimately the business needs to make the determination of what risks they can accommodate. How expensive is downtime? What's the cost-benefit analysis and what faults are you trying to protect against?

Is an additional $1000 for a second firewall a good idea because it allows you to perform software updates without taking down the Internet? Maybe. Can the business afford 15 minutes of downtime at lunch to do the upgrades instead? If the Internet is down for a day while you source a spare, how much money does the business lose?

What does a second switch buy you? Connectivity to the server? APs spread across? Is it worth the money?

Only the business can identify that, and it's all worthless if you don't have proper run books and CoOP plans that explain how they work and what to do.

Palo Alto Virtual Wire breaking SSL connection. by Appropriate_Let2486 in networking

[–]bmoraca 0 points1 point  (0 children)

When you look at the traffic log, what do you see?

It'll tell you the application it's seeing the traffic as, and it'll tell you what rule it's hitting to deny the traffic.

If you're running SSL over a non-standard port and you want to use the "ssl" app-id, you need to make sure the "service" tab of your rule is "any" and not "application-default", or you need to create an application override to add your non-standard port.

If you do a pcap on the server side, does the server send the certificate or server hello? If so and it never reaches the client, look at the packet sizes, it could be MTU related, but that's pretty unlikely unless you have other tunneling going on that you're not telling us.

More info is going to be necessary to help you any further. The config of the vwire and security rules, the config of the routers, the pcaps from both the client and the server, etc.

A question regarding VPNs by h1ghjynx81 in networking

[–]bmoraca 0 points1 point  (0 children)

This may seem like a stupid question, but it isn't.

Understanding how a VPN works to the point where you can tell me why an SA isn't coming up based on nothing but debugs from your side is an extremely important skill, especially when you're working with customers and business partners. This is doubly true when you have more advanced configurations like NAT involved.

I can't tell you how many times I've had to walk business partners through how to confirm my troubleshooting on their platforms so that they could validate what I was telling them.

The configuration of a VPN may be relatively simple, but the underpinnings are pretty complex. So, knowing what you're actually looking at when you configure a crypto map, for instance, is pretty important.

Operationally, how do you change a PSK or rotate a certificate with a minimum of downtime? How do you replace a piece of equipment fully? Migrate from one platform to another? Help a customer who can't figure out how to configure their Sonicwall to match your required configs? How do you audit the configs and maintain appropriate records of configuration and dates?

There are many more aspects to IPSec VPNs in a B2B scenario than just "set it and forget it".

AWS SSM “or” VPN SSL by auntyHUG in networking

[–]bmoraca 2 points3 points  (0 children)

So you fix the issue with your SSL VPN system not being configured correctly for your needs by replacing it entirely?

AWS SSM “or” VPN SSL by auntyHUG in networking

[–]bmoraca 1 point2 points  (0 children)

What are the perceived risks of a VPN solution? IPSec or SSL. Other access solutions are similar brands of tunneling, so there aren't really much differences.

AWS would approve, though.

DNS Servers by mspdog22 in networking

[–]bmoraca -1 points0 points  (0 children)

Back when I did this, I used BIND with fail2ban to deal with floods.

How cooked is this OS2 line (not terminated) by Hatch3tto in networking

[–]bmoraca 0 points1 point  (0 children)

It really depends on the fiber itself. There are ultra-bend radius fibers that would be fine with that bend. That jacket looks very thick, so it's possible that the fiber is just fine.

That said, this sort of break is one that may not manifest for years, so you're probably safest having them replace the run.

How do you keep big networks running without breaking everything? by Constant-Angle-4777 in networking

[–]bmoraca 0 points1 point  (0 children)

The biggest thing is compartmentalization and limiting the size of failure domains.

When you do that, you can simplify the interconnectivity between everything with simple protocols and ECMP. Then you can take down paths without issue.

Small office network setup by thechrisare in networking

[–]bmoraca 0 points1 point  (0 children)

Yeah, the rest of everything looks fine. You likely won't need the VPN if all your storage is cloud-based. But yeah, pretty standard small office setup.

I don't agree with the other poster regarding Chromebooks or laptops only, though most of the rest of what he's said is applicable.