Blog

IP and Mobile Trends and Education

 

Author: Grandmetric

05.2019

Grandmetric to deliver first SD-WAN implementation in Poland

We are very proud to announce that Grandmetric successfuly delivered the first Software-Defined production network in quarter 1 2019 for Pfeifer & Langen Polska S.A. The implementation was part of network and IT operations optimization project for one of the largest sugar manufacturer in this part of Europe.

Author: Grandmetric
04.2018

IPSec tunnel between Cisco IOS router and AWS VPC. Static VTI and crypto map with HSRP redundancy.

Recently i was asked to advise in the following scenario: VPN tunnel between AWS VPC and Cisco IOS routers on DC prem. Nothing sophisticated but: Two ISR 4k, HSRP VPN redundancy, legacy crypto maps in production (several working vpns) and Static VTI (AWS). Two Crypto structures sourced from one HSRP. I have put the results on blog.

Author: Grandmetric
04.2018

Cisco IOS XE Static Credential Vulnerability (Catalyst Switches, ISR4k and ASR1k Routers)

Cisco has stated that there is a vulnerability in Cisco IOS XE 16.X version (bug does not affect releases prior IOS XE 16.X)  that allows remote attacker to log in to the system with privilege 15 with default username cisco. This bug affects the platforms supported by IOS XE software, inter alia following:   Catalyst […]

Author: Grandmetric
03.2018

How does a switch work?

To explain how does a switch work, let me make an introduction to the subject by explaining background of TCP/IP stack layers, frame and the purpose of switch. This will help you to understand the exact operation of switch which is the main agenda here. To allow communication between billions of computer devices, intermediate network […]

Author: Grandmetric
03.2017

VPN Remote Access with Multi Factor Authentication Experience – Case Study

I would like to share my experience with VPN Remote Access and Multi Factor Authentication with products from Cisco and Duo Security: Cisco Identity Services Engine 2.X, Cisco ASA 5500-X Anyconnect Secure Mobility Client (VPN client) MFA Cloud based services from Duo Security   Background of Multi Factor Authentication Multi Factor Authentication (MFA) is already quite well […]

Author: Grandmetric
11.2016

ARP – what is it for ?

One may think that this subject is insignificant as everyone from networking domain knows what ARP is. In era of SDN’s, virtualization, clouds that may seem be the old well known topic, but to tell you the truth, I still meet network engineers (they are called professionals) applying for a job who can’t define ARP or explain how can one find […]

Author: Grandmetric
09.2016

Today’s threats vs security approach – Updated 2017

Latest threats like the already known WannCry ransomware show today, like never before, that organizations must concentrate more intensively on complementary approach to IT Security and that having obsolete solutions that were good a decade ago can bring tragic effects on brand image or even cause the bankruptcy of the biggest enterprises. Standard, legacy approach The […]

Author: Grandmetric
07.2016

5G-mobile vs. IP-networks techniques: Slicing

Within this series of posts, I want to review the 5G concepts from the IP-networks perspective and explore the available techniques on the market which allow translating the presented concepts into real infrastructures. This post is related to a concept known as slicing. Recently, there are many documents describing 5G principles and architectures. One of […]

Author: Grandmetric
06.2016

Protect the Control Plane – part 2, CoPP.

After we prove the CPU utilization can be easily increased by anyone anytime (as shown in the previous blog post, “Protect the Control Plane – part 1, trivial attack.”), I feel obliged to show how to quickly prevent the cause of potential network and services damage.

Author: Grandmetric
05.2016

Protect the Control Plane – part 1, trivial attack.

How many of you use the control plane protection features given by vendor with the benefit of inventory? From what I see mostly, is very very rare practice to use CoPP. Most of network people haven’t even heard of it. “Because my network performs well, why should I protect control plane?” I need to start […]

Author: Grandmetric
Load more
Show all
 

Newsletter