From the previous posts, we learned that in order to differentiate between routes in the MP-BGP table, we include a 64-bit RD value along with the MAC address. In this post, we will discuss what else other than MAC address can propagate through BGP EVPN. Different route types carry BGP EVPN information. RFC 7432 defines […]
Integrated Route and Bridge (IRB) simply means first-hop routing. We have two different semantics for IRB: Asymmetric IRB: We have one L2VNI for each subnet we want to route between. Symmetric IRB: We have one L3VNI associated with the VRF which is used for all routed traffic Asymmetric IRB For now, forget the VXLAN and […]
Printing files content in output cat command The “cat” command stands for concatenate. It is one of the most useful commands in Linux. This command displays file content in the output concatenates and creates files. Syntax cat [OPTION] [FILE]………… Example Cat without any options displays the file’s content in the output. If sending multiple files […]
What is the SSL Offloading solution, and how does it work? SSL protocol (of course, this protocol is obsolete, and its replacement version is TLS, but the name of the SSL Offloading solution has not changed, for that reason, we use the title SSL) is a protocol that is used to encrypt and decrypt data […]
In this section, we are going to discuss MP-BGP VXLAN with PIM to handle multi-destination traffic. So, your complete bipartite graph must support PIM. This is why in this post, we happened to choose loopback 254 on the spines for our PIM Anycast RP. VTEP V1 then sends out the packet toward the IP core. […]
SSH or Secure Shell is a secure protocol for remote communication between systems and servers. This protocol is an alternative to Telnet, which has security and encryption mechanisms. This article will discuss 7 tips to secure the SSH protocol. In the past, the Telnet protocol was used to establish remote communication, execute commands, and manage […]
we’ve come from the previous page here… ISO/OSI Model; Open Systems Interconnection ‘N’ Notation There are many terminologies that are used to describe the OSI Model and its layers, one such terminology is the N Notation. The letter N is often used to generically refer to ta number within the computer world. In the OSI […]
ISO/OSI Model; Open Systems Interconnection OSI stands for Open Systems Interconnection, it is a model which tells us how the application communicates over a network. Basically, seven marvelous layers that IT systems use to communicate and disseminate data over network, established in 1983 by the International Organization for Standardization (ISO) and became a working product […]
In this post, I am going to explain how the location-identity mapping database populates using MP-BGP. Consider the image below where VTEP01 takes the original ARP L2 frame from the HOST01. VTEP01 learns IP-MAC binding of the end host. BGP Update sends the information to the Route-Reflector (iBGP), which in turn forwards this update message to […]
Today, malware is one of the biggest threats to our organizations and assets. Identifying and hunting this malware is one of the most important issues in the field of security. In this article, we are going to talk about 10 commonly used tools for identifying and analyzing malware. What Is Malware Analysis? Malware analysis refers […]