Mentoring & Coaching2021-10-30T12:19:32+00:00
711, 2021

AWS Networking 101 — Securing your VPCs

In a previous post, we outlined the basic networking solutions offered by AWS to build isolated and secure private Networks on AWS. We also outlined how to provision Virtual Private Cloud (VPC) in AWS. In this post, we will outline how to utilize the different AWS security services in order [...]

2909, 2020

Segment Routing Blog Series #4 – SR and LDP Interoperability

Overview In the first three articles of this series, we covered the Segment Routing Problem definition, Drivers, use cases,  and the benefits it brings to the table. (First blog link Click Here). Then we explained Segment Routing Building Block starting with SR SID (Second blog link Click Here), and SR [...]

2007, 2020

SD-WAN Security

Overview One of SD-WAN’s strongest capabilities is the remarkable ability to ability to secure unreliable Internet links and identify anomalous traffic flows and to bolster this strength, most vendors and SD-WAN technology providers are continuing to increase their native security features and to create robust ecosystems of network-security partners. However, [...]

1505, 2019

AWS Networking 101 — Automating AWS VPC Build with Ansible

In the previous post, we explained the main building blocks for AWS network infrastructure and how we can utilize AWS VPCs to build isolated and managed virtual Data Centers in the AWS cloud. In this post, we will outline how to design and build the AWS VPCs using Infrastructure as [...]

404, 2019

Tracking and Validating Configuration Deployment with NAPALM, Ansible and Git

In this post, we will outline a simple process for tracking configuration changes to network devices using Ansible. The goal is to provide a simple workflow for tracking, validating and approving network changes using Git as well as setting the stage for validation and testing. This can be considered part [...]

802, 2019

CCDE / Network Design training. A student’s experience (part 2)

The second part of our feedback sharing from our students, today we present you with another email from our student’s thoughts as he shared his own training experience with us. "Hello and good morning/evening to you all. For me, the network architecture Bootcamp was more of a necessity than curiosity [...]

405, 2018

9 Considerations to Size your routing domain (Number 9 will surprise you!!!)

It’s finally here, your dream job as a Network Designer in a newly established local service provider. You received the acceptance e-mail yesterday, and today is your first day on the job. After you take your time to explore your new workplace, you receive a call from your CTO asking [...]

1101, 2018

HOW TO AUTOMATE YOUR NETWORK USING ANSIBLE AND NAPALM – PART 3

In this article, we continue what we have started in the previous two articles focusing on Network Automation with Ansible and NAPALM. In the first article, we introduced Ansible and how it is used in combination with  NAPALM to orchestrate a Multi-Vendor network. In the Second article, we illustrated the [...]

2912, 2017

Using NFV to guard your “Environment”? — 4th / Last Episode

Test Results and Conclusion This is the last article in the series where we have discussed how to use NFV (Network Functions Virtualization) to secure your network and react promptly to security threats such as DDoS attacks.   Before revealing the results of our PoC (proof of concept) lab, let’s [...]

910, 2017

How to use NFV to Guard your “Environment”? — 3rd Episode

Test Methodology and Tools This Series of articles explain How to use emerging technologies such as NFV (Network Functions Virtualization) to secure your network and adapt promptly to security threats such as DDoS attacks. After we covered the problem statement, and requirements in the first article; we continued with the [...]

2609, 2017

How to use NFV to Guard your “Environment”? — 2nd Episode

How to use NFV to Guard your “Environment”? -- 2nd Episode In this article, we will continue what we have started in the first article; How to use emerging technologies such as NFV (Network Functions Virtualization) to secure your network and adapt promptly to security threats such as DDoS attacks. [...]

2907, 2017

CCDE Online Interative Training – Week2 IS-IS

CCDE Online Interactive Training launched on Saturday 22nd July with Solid Overview, Use Cases, and Design Considerations for the widely deployed OSPF. An Assignment and Discussion throughout the week around: - The maximum number of Routers in a single OSPF area, with justification. - The need for Segmentation, Layering, and [...]

Go to Top