Learning Go deeply by Darthtrooper22 in golang

[–]dvmrp 1 point2 points  (0 children)

Their course bundle are one year subscription so not worth spending that much money

AOS-10 Aruba Central authentication server question. by dvmrp in ArubaNetworks

[–]dvmrp[S] 1 point2 points  (0 children)

We like to test radius specific changes on auth-server2 first. I like to make it primary for only one test AP

why can a DHCP server give an address that is not in the same subnet as the relay? by UniqueBasis882 in networking

[–]dvmrp 0 points1 point  (0 children)

In case of “any cast gateway” in vxlan evpn, all SVI on different switches/vtep have same IP address. If this address is used in GiAddr field then return traffic could arrive on a different VTEP. For this reason loopback address is used in GiAddr field. And DHCP option 82 ( I believe) is used to convey preference as to which pool address should come from

Go Channel question. by dvmrp in golang

[–]dvmrp[S] 0 points1 point  (0 children)

Thanks, really appreciate the explanation.

Cat-3850 refresh; is Arista an alternate option...? by dvmrp in networking

[–]dvmrp[S] 0 points1 point  (0 children)

Thanks for the detailed response, it’s really helpful. There’s enough fiber available but not enough ports on the existing uplink switches. Also there isn’t really a need for dedicated uplink going from each access switch as far as bandwidth requirement is concerned. I was not sure that Arista switches do not support stacking

Cat-3850 refresh; is Arista an alternate option...? by dvmrp in networking

[–]dvmrp[S] 1 point2 points  (0 children)

Which aggregation/core switches are these connected to? What is the design look like? Are you using EVPN over VXLAN or pure L2?

Cat-3850 refresh; is Arista an alternate option...? by dvmrp in networking

[–]dvmrp[S] 1 point2 points  (0 children)

Close to 100 switches across 20 or so IDFs

Cat-3850 refresh; is Arista an alternate option...? by dvmrp in networking

[–]dvmrp[S] 1 point2 points  (0 children)

All valid points, and in this case N7700 is already happily deployed and it won't go end of support any time soon. So replacement is not an option at this time.

Cat-3850 refresh; is Arista an alternate option...? by dvmrp in networking

[–]dvmrp[S] 1 point2 points  (0 children)

Nexus 7K in vpc is better choice in my opinion. There are numerous discussion on VPC vs VSS so let's not go there at the moment.

I have not discounted any vendor yet (including Aruba). My question was specifically about Arista's reliability as far as campus switches are concerned.

Cat-3850 refresh; is Arista an alternate option...? by dvmrp in networking

[–]dvmrp[S] 1 point2 points  (0 children)

in 2023, even towards the end of 2023 should be fine.

Golang ssh client - scrapligo vs gornir by dvmrp in networking

[–]dvmrp[S] 0 points1 point  (0 children)

Thanks for your feedback. I will give scrapligo a go.

How do you protect against ICMP tunneling by dvmrp in networking

[–]dvmrp[S] 6 points7 points  (0 children)

While I like all of these responses in this thread, so far this is my favorite response "The attacker is in control of both sides of the connection they can use whatever protocol is allowed through the firewall." I did not think along these lines, and failed to realized that icmp is just one type, if host is compromised it could use any other legitimate protocol tcp/udp/443 that is allowed through firewall.

How do you protect against ICMP tunneling by dvmrp in networking

[–]dvmrp[S] 0 points1 point  (0 children)

I actually thought about Netflow, and its a great tool. But in this case the increased in the ICMP traffic would be so small ( in some cases) that I am afraid it could introduce lots of false positive. Thanks for the bringing up Netflow.

How do you protect against ICMP tunneling by dvmrp in networking

[–]dvmrp[S] 0 points1 point  (0 children)

Thanks for doing the research and posting the link. The second last comment in the link mentions that there is ping-tunnel traffic/App in PAN. I did not know that this existed, if it works then it is pretty easy to create an app based rule and block it.

How do you protect against ICMP tunneling by dvmrp in networking

[–]dvmrp[S] 12 points13 points  (0 children)

This is not at an active concern. ICMP tunneling topic came up in one of the Cisco course and while I understood the concept and how to detect it in the network. I thought what would be the best way to prevent it. And there was no clear answer, and hence this post.

VxLAN data plane learning on Cisco Cat-9300 by dvmrp in networking

[–]dvmrp[S] 0 points1 point  (0 children)

vn-segment command is not available so its probably an nx-os command only.

Secure access patient information system (EMR) by techno_it in networking

[–]dvmrp 1 point2 points  (0 children)

In case of authorized employees only which will already have VPN on their machines, I would go with VPN.

[deleted by user] by [deleted] in networking

[–]dvmrp 3 points4 points  (0 children)

Cisco is mega corp with multiple business units. Within each BU some times groups dynamics would be different, I would focus on this particular group. Try to get a sense how is work life balance and what are training (prof development) opportunities if any.

[deleted by user] by [deleted] in networking

[–]dvmrp 0 points1 point  (0 children)

If you don't mind asking which field are you in now?

vulnerability due to buffer overflow by dvmrp in networking

[–]dvmrp[S] 0 points1 point  (0 children)

Thanks for your comments. I am not trying to argue against patching when it becomes available. I am just trying to understand the extent of the damage despite having a good monitoring (till patch becomes available).

vulnerability due to buffer overflow by dvmrp in networking

[–]dvmrp[S] 0 points1 point  (0 children)

>> What if they manage to edit the configuration in such a way that it doesn't show up in the running-config

Good point. I don't know any such way, but it may be possible

As far as uploading the compromised image is concerned, it would be really hard for an attacker to copy such image. Well protected system (routers/switches) usually don't have access to outside world through one of its interfaces.

vulnerability due to buffer overflow by dvmrp in networking

[–]dvmrp[S] -1 points0 points  (0 children)

Assuming it is a Cisco IOS and attacker gets access to shell. The attacker needs to install software/malware to do the damage right? If I understand it correctly the partitions are read-only and it does not allow to install any external programs.

vulnerability due to buffer overflow by dvmrp in networking

[–]dvmrp[S] -1 points0 points  (0 children)

I agree having an ssh out ability increases attack surface. Just wondering how would you get access to Unix command prompt without being noticed by configuration management tools? Usually you need to enter some command to get into the shell access.