Skip to main content

Posts

Showing posts from October, 2019

Ccie exam fee A brief look at vxlan technology (4)

Ccie exam fee A brief look at vxlan technology (4) VXLAN tunnel   "Tunnel" is a logical concept, it is not new, such as the familiar GRE. To put it bluntly, the original message is "transformed" and "packaged" so that it can be transmitted on a bearer network (such as an IP network). From the perspective of the host, it is as if there is a straight link between the start and end of the original message. Ccie exam fee.And this seemingly straight link is the "tunnel." As the name implies, the "VXLAN tunnel" is used to transmit packets that are encapsulated in VXLAN. It is a virtual channel established between two VTEPs. The payload message inside VXLAN specified in RFC7348 must be an Ethernet packet, which limits the scope of use of the VXLAN protocol. In order to allow VXLAN to support Overlay transmission of other protocol messages more widely, the RFC draft is exploring VXLAN Generic Protocol Encapsulation (GPE), which is a VXLAN ge...

Ccie exam fee A brief look at vxlan technology (3)

Ccie exam fee A brief look at vxlan technology (3) VXLAN communication process: For two virtual terminals in the same VXLAN, the communication process can be summarized as follows: 1. The sender sends a data frame to the receiver, which contains the virtual MAC address of the sender and receiver. 2. The VTEP node connected to the sender receives the data frame. By looking up the VXLAN where the sender is located and the VTEP node to which the receiver is connected, After adding the VXLAN header, the external UDP header, and the external IP header, the packet is sent to the destination VTEP node.ccie exam fee 3. The packet is transmitted over the physical network to the destination VTEP node. 4. After receiving the packet, the destination VTEP node removes the external IP header and the external UDP header of the packet, checks the VNI of the packet, and the destination MAC address of the internal data frame.ccie exam. After confirming that the receiver is connected to the VTEP node, ...

ccie certification cost A brief look at vxlan technology (2)

ccie certification cost A brief look at vxlan technology (2) VXLAN is transmitted by encapsulating data frames communicated in a logical network in a physical network. Ccie certification cost .The process of encapsulation and decapsulation is performed by a VTEP node. After VXLAN adds the data frame in the logical network to the VXLAN header, it is encapsulated in the UDP packet in the physical network. • Outer MAC Header: Encapsulates the outer Ethernet header, 14 bytes, or 18 bytes if there is a VLAN TAG. The source MAC address is the MAC address of the VTEP to which the source VM belongs, and the destination MAC address is the MAC address of the next hop device on the path to the destination VTEP. The type field is 0x0800, indicating that the inner layer encapsulates an IP packet.Ccie certification cost . • Outer IP Header: Encapsulates the outer IP header, 20 bytes. The source IP address is the IP address of the VTEP to which the source VM belongs, and the destination IP...

Ccie certification cost A brief look at vxlan technology (1)

VLAN means Virtual Local Area Network, which is the concept involved in the implementation of the switch, defined by the 802.1Q standard. Because the switch is a network device working at the link layer, the terminals connected to the same switch are in the same Layer 3 network and are also in the same broadcast domain. Ccie certification cost.When a switch accesses a large number of terminals, any one of the terminals sends a broadcast packet (for example, an ARP request), and the packet is transmitted throughout the network. For large-scale networking scenarios, the flood of broadcast packets will have a greater impact on network communications. VLAN technology provides a solution to this problem. A VLAN divides the same network into multiple logical virtual subnets. It also stipulates that when a broadcast packet is received, it broadcasts only in its VLAN to prevent broadcast packets from flooding. VLAN technology implements broadcast domain isolation at the link layer level VXLAN ...

Ccie lab dumps Introduction to SPAN and RSPAN for port mirroring(1)

Ccie lab dumps Introduction to SPAN and RSPAN for port mirroring(1) SPAN technology is mainly used to monitor the data flow on the switch, which is roughly divided into two types, Local Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN), the implementation method is slightly different. With SPAN technology, we can COPY or MIRROR the data stream of some ports on the switch that we want to be monitored.ccie lab dumps.Send to the traffic analyzer connected to the destination Port , such as CISCO IDS or PC with SNIFFER tool. The Source Port and destination Port can be on the same switch (local SPAN) or on different switches ( Remote SPAN). SPAN, known as Switched Port Analyzer, it is a port mirroring technology for switches. The main purpose is to provide network data flow to a certain network analyzer. Ccie lab dumps.SPAN does not affect the data exchange of the source port. It simply sends a copy of the packet sent or received by the source port to the destination Port . RSPAN (Remot...

Cisco ccie exam Linux overview and history

      Cisco ccie exam Linux overview and history Simply put, the Linux operating system is a clone of the UNIX operating system, which was born on October 5, 1991 (the first time it was officially announced). It's the same as Microsoft's Windows, apple's MAC OS and android on mobile phones. Cisco ccie exam.Compared to ordinary people, Linux system may be relatively unfamiliar, and most of them are probably familiar with Windows system. Since the graphical interface of Windows is simpler and easier to use, Windows occupies more markets, and Linux systems are mainly command-line operations, which are more demanding for professionalism.Cisco ccie exam Linux systems are stable, secure, and have strong concurrency, so they are widely used in the server field. The professional servers are almost all Linux systems. Linux is open source, free, everyone can see the source code of Linux, you can use Linux for free. And the Linux kernel is short and lean, and some can only be a ...

CISCO CCIE EXAM 5G and WIFI6, still can't tell? (1)

cisco ccie exam 5G and WIFI6, still can't tell? (1) Ⅰ. the opening: On October 3, 2018, the Wi-Fi Alliance officially incorporated WiFi based on the 802.11ax standard into the regular army and became the sixth generation WiFi technology. The WiFi specification was renamed, the standard 802.11n was renamed to WiFi 4, the standard 802.11ac was renamed to WiFi 5, and the new standard 802.11ax was renamed to WiFi 6. (Of course, the previous generation of 802.11b/a/g can be chased as WiFi 1/2/3) Not only changed the naming convention of WiFi, but also in the network connection of WiFi devices. Also all use the new UI icon. The icon will display the level of the WiFi network you are currently connected to through the most intuitive numbers. Wi-Fi is well known to us. Wi-fi has evolved from 802.11b in 1999 and has gone through five generations. The Wi-Fi Alliance announced the simplification of the name of the new Wi-fi to Wi-fi6 when it introduced the new generation of 802.11ax stan...

Cisco ccie exam Introduction to the 802.1X protocol

Cisco ccie exam Introduction to the 802.1X protocol The IEEE802 LAN/WAN committee proposed the 802.1X protocol to solve the problem of wireless LAN network security. Later, the 802.1X protocol, which is a common access control mechanism for LAN ports, is widely used in Ethernet, mainly to solve the problems of authentication and security in Ethernet.cisco ccie exam The 802.1x protocol is based on the Client/Server access control and authentication protocol. It can restrict unauthorized users/devices from accessing LAN/WLAN through an access port. 802.1x authenticates users/devices connected to the switch port before obtaining the various services provided by the switch or LAN. Before the authentication is passed, 802.1x only allows EAPOL (LAN-based Extended Authentication Protocol) data to pass through the switch port to which the device is connected; after authentication is passed, normal data can successfully pass through the Ethernet port.cisco ccie exam 802.1X architecture An 802...

Ccie exam fee Detailed MSTP protocol

Ccie exam fee Detailed MSTP protocol MSTP refers to the multi-service node that provides unified network management based on the SDH platform and implements access, processing, and transmission of multiple services such as TDM, ATM , and Ethernet. Multiple Spanning Tree ( MST ) uses the Modified Rapid Spanning Tree ( RSTP ) protocol called the Multiple Spanning Tree Protocol ( MSTP ) .Ccie exam fee With the development of the times, a variety of network transmission forms appear in network applications, such as files, audio and video, pictures and data transmission, resulting in a certain area of ​​network capacity can’t meet a large number of business transmission needs, which enables the development of MSTP core technology, It is a transmission platform based on multi-service in the synchronous digital system. It can provide nodes for various forms of network services and realize mutual transmission between platforms. Ccie exam fee.And provide unified management to promote the normal...

Ccie exam fee Route Optimization Overview and Distribution Control List Control Routing Configuration

Ccie exam fee Route Optimization Overview and Distribution Control List Control Routing Configuration In today's high-performance networks, the network must be optimized to ensure network scalability, stability, security, and fast convergence. Route filtering and policy routing are common methods of route optimization.ccie exam fee Route filtering means that certain routes are not sent and received during route update. Passive interfaces, distributed control lists, redistribution and routing policies can implement route filtering.Policy routing provides a mechanism for packet forwarding based on standards set by network managers.ccie exam fee.Policy-based routing is more powerful and flexible than traditional routing. It allows network managers to select forwarding paths based on the destination address and based on protocol type, packet size, application, or IP source address.The policy routing policy is defined by a route map. The most important of the "route map" comma...

Ccie exam fee IP multicast brief

Ccie exam fee IP multicast brief Multicast technology refers to a type of network communication in which a single sender corresponds to multiple recipients. In the multicast technology, by transmitting a single information flow manner to multiple receivers, network communication traffic with multiple receivers simultaneously listening to or viewing the same resource can be reduced.For n-party video conferencing, you can reduce the bandwidth length by a(n-1) times. Typical of "multicast" is IP multicast using multicast addresses. IPv6 supports three types: Unicast, Multicast, and Anycast. IPv6 does not have a specific classification of broadcasts, but is a typical type of multicast.In addition, the multicast definition includes some other protocols, such as the Asynchronous Transfer Protocol (ATM) using "point-to-multipoint" or "multipoint-to-multipoint" connections.Multicast technology is based on the concept of "group" and belongs to the receive...

Ccie exam fee Switch Security Introduction

Ccie exam fee Switch Security Introduction As the most common device in the LAN, the switch faces a major threat to security.Some of these threats are directed at vulnerabilities in switch management, where an attacker attempts to control the switch;Ccie exam fee.Some are aimed at the function of the switch, and the attacker tries to disrupt the normal operation of the switch, thereby achieving the purpose of destroying or even stealing data. There are several types of attacks against switches: 1. Switch configuration/management attack 2, MAC flood attack 3, DHCP spoofing attacks 4, MAC and IP spoofing attacks 5, ARP fraud 6, VLAN jump attack 7, STP attack 8, VTP attack First, the access security of the switch In order to prevent the switch from being detected or controlled by an attacker, basic security must be configured on the switch. 1, use a qualified password 2, use ACL to limit management access 3, configure the system warning language 4, disable unwanted services 5, close CDP 6...

CISCO CCIE EXAM You must know about SD -WAN…(2)

CISCO CCIE EXAM You must know about SD -WAN...(2) Third, we need to overcome some common misunderstandings and concerns about SD-WAN. Too complicated Network engineers who shun SD-WAN adoption because they seem to think that this technology will require them to learn some complex new programming languages.SD-WAN does not require you to learn some mysterious new programming languages. Cisco ccie .Because the SD-WAN sits on top of multiple WAN links and uses software-driven policies to automatically choose the best data transfer mechanism for each application, it masks complexity.exam With SD-WAN, you can see the entire network. You are feeling it and seeing how it moves the connection.D-WAN keeps you ahead of the curve and you can keep up with service level agreements throughout your office. It will alleviate the huge burden on you. too expensive SD-WAN can be used as a SaaS, which is relatively inexpensive compared to custom DIY settings. Before you adopt it, you need to s...

Cisco ccie exam Introduction to the OpenFlow protocol

Cisco ccie exam Introduction to the OpenFlow protocol OpenFlow, a network communication protocol, belongs to the data link layer and can control the forwarding plane of the network switch or router, thereby changing the network path of the network packet. OpenFlow protocol background: Forwarding and control separation is one of the essential features of SDN networks.In the SDN network architecture, the control plane is separated from the forwarding plane, the management and state of the network are logically grouped together, and the underlying network infrastructure is independent from the application, thereby enabling the network to achieve unprecedented programmable, controllable, and automated capabilities.Cisco ccie exam. This makes it easy for users to build highly scalable elastic networks based on business needs. To implement the transfer separation architecture of the SDN network, a communication interface standard needs to be established between the SDN controller and the dat...

Cisco ccie exam You must know about SD-WAN... (1)

Cisco ccie exam You must know about SD-WAN... (1) 1. What is SD-WAN? "SD-WAN is a service formed by applying SDN technology to a wide area network scenario. Cisco ccie exam.This service is used to connect a wide range of enterprise networks, including enterprise branches and data centers."Although in many consulting reports or vendor solutions, SD-WAN is often limited to the networking scenarios where enterprise branch offices are interconnected.However, based on the definition of SD-WAN, the application scenarios of SD-WAN can be summarized into three categories: enterprise interconnection, data center interconnection and cloud interconnection scenarios. The enterprise interconnection SD-EN (SDN based Enterprise Network) focuses on the WAN connection on the user side, providing an efficient SDN-based solution for the connection between the enterprise headquarters and branch offices across the WAN.SD-DCI (SDN based Data Center Interconnection) refers to an SDN-based solutio...

How to identify files of the same content on Linux

Ccie exam fee   How to identify files of the same content on Linux File copies can sometimes take up a lot of disk space and can be confusing if you want to update. Here are six commands to help you identify these files. click to join new ccie group First, use the diff command to compare files Perhaps the easiest way to compare two files is to use the diff command. The output will show the difference between the two files.The < and > symbols indicate whether the extra line is in the first (<) or second (>) file provid...