Internets of Interest:21 Apr 11

Collection of useful, relevant or inane places on the the Internets for 21 Apr 11:

  • Server Virtualization Skills Lacking In Networking Groups

    I asked a roomful of networking professionals to respond to the following question: ìWith regard to server virtualization, which of the following would you characterize as your organizationís biggest organizational/process challenges?î I then presented them with some responses to choose from. Here are the results: 

    I disagree with this. Vehemently. Virtualisation networking is less than 10% of gross networking skillset which includes firewalls, internet, proxy and much more. Of course we haven’t taken time to learn it. Virtualisation is not even close to being finished and, broadly, deep penetration hasn’t occurred yet.

  • Will The First Thunderbolt Peripheral Be The iMac? ñ Stephen Foskett, Pack Rat

    Who doesnít want an eight-core MacBook Pro with a 27-inch high-resolution display? Who wants the hassle of synchronizing documents and files between a desktop and portable computer? Why not just merge everything into a single computer over the high-speed Thunderbolt interface? 

    Me, me, me ,me !!! Hoping for this next month and I’ll buy some more shiny quality toys that really work.

  • Cisco Blog ª Blog Archive ª OpenFlow: ìPulling networking into the application stackî – Omar delivers a blog post that says nothing.

    OS: OK, so the question that everyone wants to know: when will we see Cisco products complaint with the OpenFlow switch specification? 

    PM: At this point, I prefer not to pre-announce what we have in the works. Once OpenFlow evolves into full-fledged blueprint weíll provide more details, so stay tuned.

    Given the rate of delivery of new features from Cisco in the last three years, I won’t be putting it on my hot list .

  • RFC 6165 – Extensions to IS-IS for Layer-2 Systems – The missing piece to TRILL is released into the Standards Track. Both Ivan and myself are waiting for standards compliant TRILL anouncments…………
  • Release Notes for Cisco ASR 9000 Series Aggregation Services Routers for Cisco IOS XR Software Release 4.0.1 – Cisco Systems – The IOS XR code train is finally starting to deliver on promised features. Find it difficult to accept that it’s taken this long given the hype around DCI.

    Ethernet ServicesóThe Cisco†IOS†XR software Release 4.0.1 running on the Cisco†ASR†9000†Series†Router supports the following Ethernet features: 

    ñEthernet Virtual Connections (EVCs)
    ñFlexible VLAN classification
    ñFlexible VLAN translation
    ñIEEE bridging
    ñIEEE 802.1s Multiple Spanning Tree (MST)
    ñMST Access Gateway
    ñVirtual Private LAN Services (VPLS), Hierarchical VPLS (H-VPLS), Virtual Private Wire Service (VPWS), Ethernet over MPLS (EoMPLS), pseudo wire redundancy, and multi segment pseudo wire stitching

    These features are long overdue, especially on a strategic Cisco product that the ASR9000 is supposed to be.

  • Cloud Computing Risk Assessment ó ENISA
  • 30 Levels of NAT Firewall Lab | I-R-Coops Blog

    So I am a very large geek, and prod of it. It hurt to walk past a cupboard at work knowing there was 30+ Cisco PIX 501 firewalls sitting in there collecting dust. One day it dawned on me, I wonder how crap internet would be sitting behind 30 of those slow ass god awful to use and configure firewalls. So here are the results: 

    Interesting exercise. With interesting results – streaming video didn’t work and significant network delay which affected throughput. Some more discipline around the testing and the use of perfmon would have been better and more convincing.

  • HBGary’s Open Letter to Customers and the Defense Marketplace – HBGary attempt to spin their way out of their security breach by releasing an open letter. Which, unsurprisingnly, distances themselves, blames sacked CEO and pretends that they didn’t do any of the nasty things.

    The letter does a good job of downplaying the significance of some of the more serious allegations that were made based on information in the leaked emails. What it does not do is address any of ethical questions raised that were based on revelations of the company’s involvement in some very questionable projects. 

    Blaming everything on former CEO Aaron Barr and claiming ignorance of HBGary Federal’s business activities simply falls short of an acceptable set of explanations.

    Yeah. Bollocks. You are a security bottom feeders that exaggerate, spread fear, make grandiose claims and waste money instead making proper change and security results.

  • Mike


    First, I enjoy your postings and your podcasts, great work. Recently I was listening to your podcast on datacenter design or perhaps it was TRILL, not sure which one (I have listened to them all more than once!!). But one of the topics the panel took off on was the need to move away from spanning-tree because of the inability of spanning-tree to load share on all links. I wanted to point out that sound data center design or even LAN design using a redundant configuration plus spanning-tree can and does utilize all uplinks to balance the traffic. There is design work and planning to achieve the desired results, it is not plug and play. Also, this does require something other than a single spanning-tree, e.g. PVST, MST, etc ….. Spanning-tree is not a horrible protocol some make it out to be.

    my two cents,


    • Flintstone


      Cabletron via Securefast Vlans were already implementing VLSP (OSPF) at layer 2 in 1995-2002. It is good to see that this concept is now being standardised as STP has had it’s day.

      RIP STP.


  • Hroi Sigurdsson


    ASR9K has supported the features you list since launch. They were not introduced in 4.0.1. Take a look at the release notes for 3.7.2 and you’ll see the exact same list.

  • Brannen

    Regarding the first virtualization comment, learning about server virtualization is not way up on my to do list either, but I strongly agree with #3 and his summary,

    “Networking teams are often brought into server virtualization projects when they become too big and complex for the server team. That said, the server guys have already configured a bunch of virtual switches and VLANs that wonít easily integrate into the existing network infrastructure. This puts the networking team in fire fighting rather than planning mode.
    Networking vendors should learn a lesson from this data. Now is the time to work with customers, assess their needs, provide them with training, and help guide them to the next level.”