ON THE NET
On the ‘net: The CCIE Shuffle Podcast
The Cisco Certified Design Expert (CCDE) exam was launched in 2007, but not many people know what the main objectives of the certification were at the time. Who better to enlighten us on some of the thought process and reasons behind the exam being created than one of the original development team? In this podcast, we are extremely humbled to be joined by networking industry legend, Russ White who spoke about his career, how he got into networking and some insights on the CCDE concept and how it came to fruition in the early 2000s!
On the ‘net: Privacy and IPv6 Renumbering
One of the biggest advantages of IPv6, from a network administration perspective, is the ease of renumbering. While IPv4 networks can be renumbered using DHCP, the process of changing the address of every device on a network is always fraught with unexpected challenges. People (like me) have a habit of manually assigning printers and network attached storage devices a fixed address so they will be easy to find and use.
Chatbot Attack Vectors
My monthly post is up over at Packet Pushers—
On the ‘net: Privacy and Networking
The final three posts in my series on privacy for infrastructure engineers is up over at Packet Pushers. While privacy might not seem like a big deal to infrastructure folks, it really is an issue we should all be considering and addressing—if for no other reason than privacy and security are closely related topics. The primary “thing” you’re trying to secure when you think about networking is data—or rather, various forms of privacy.
On the Web: Privacy and Logging
BGP Peering (part 1)
Why does BGP use TCP for peering? What happens if two BGP speakers begin the peering process at the same time? In this video, recorded for Packet Pushers, I start looking at the BGP peering process.
Privacy for Providers
While this talk is titled privacy for providers, it really applies to just about every network operator. This is meant to open a conversation on the topic, rather than providing definitive answers. I start by looking at some of the kinds of information network operators work with, and whether this information can or should be considered “private.” In the second part of the talk, I work through some of the various ways network operators might want to consider when handling private information.