fir3net
August 16, 2017

Interface to Network Security Functions (I2NSF)

in Standards and Frameworks
Interface to Network Security Functions (I2NSF) is a working group within the IETF formed to define a set of interfaces and data models for monitoring and managing network security functions hosted across multiple sites. I2NSF states, Network security functions (NSFs) are provided and consumed in increasingly diverse environments. Users of NSFs could consume network security services hosted by…

What is MacVTap?

in Linux
Definition MacVTap is a Linux device driver, based upon the combination of - Macvlan and TAP (descriptions below), that allows for the creation of…

The Journey of a Frame through a Linux Based System

in Linux
Abstract The scope of this article is to describe, at a high level, the journey a frame takes through a Linux based system. NOTE This article does…

What Is the Difference between QEMU and KVM?

in Linux
The differences between QEMU and KVM are not always clear. I mean, are they the same, or are they different? Aren't they both hypervisors? Lets begin…

How to Build an OpenStack Network using the OpenStack CLI

in OpenStack
Introduction Within this article we will detail the steps required to build a simple Neutron networking topology using the OpenStack CLI. Topology…

TUN, TAP and Veth - Virtual Networking Devices Explained

in Concepts and Terminology
Computer systems typically consist of a (or set of) networking devices, i.e eth0, eth1 etc. These network devices are associated to a physical…

How to Install OpenDaylight

in How-Tos
OpenDaylight is an SDN controller provided by the Linux Foundation. In this article we will show you the steps required to perform a simple…

What is OpenFlow?

in Protocols
What is OpenFlow? OpenFlow is a protocol, released by the ONF that allows the remote modification of a network switch's forwarding table. In other…

What is SNI (Server Name Indication)?

in Concepts and Terminology
What is SNI? SNI (Server Name Indication) is an extension to the TLS protocol, that provides the ability to host multiple HTTPS-enabled sites on a…

Route Leaking within an MPLS Network

in Cisco
Introduction First of all, what is a route leak? A route leak is the propagation of routing announcement(s) beyond their intended scope - RFC7908…

How to Configure an L3 MPLS VPN on Cisco IOS

in Cisco
Introduction Within this article we will walk through the various steps required in configuring MPLS. NOTE This article does not look to explain the…
cisco_cef

What is CEF (Cisco Express Forwarding)?

in Cisco
Introduction Cisco Express Forwarding (CEF) is a packet-switching technique used within Cisco routers. The main purpose of CEF is to optimize the…

How to Write Clean Code

in Programming
Introduction Even bad code can function. But if code isn't clean, it can bring a development organization to its knees. Every year, countless hours…

Python - What are Context Managers?

in Python
What are Context Managers? Context managers are constructs that allow you to set something up and tear something down automatically, by using using…

Python - What are Static and Class Methods?

in Python
Have you ever seen some Python code and wondered what @staticmethod and @classmethod do ?In short, they are both methods that modify the default…