Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Dalrain
Nov 13, 2008

Experience joy,
Experience waffle,
Today.
I'm taking a programmatic config course, and Cisco mentions both NETCONF and RESTCONF, is there more market acceptance or desirability between the two?

Edit: I guess the REST portions are just a subset of NC functions, so it's just a choice on how to access the device. I'm just not educated enough to understand why you would want to use the web interface vs SSH or vice versa.

Dalrain fucked around with this message at 23:10 on Jan 3, 2019

Adbot
ADBOT LOVES YOU

ate shit on live tv
Feb 15, 2004

by Azathoth

Dalrain posted:

I'm taking a programmatic config course, and Cisco mentions both NETCONF and RESTCONF, is there more market acceptance or desirability between the two?

Edit: I guess the REST portions are just a subset of NC functions, so it's just a choice on how to access the device. I'm just not educated enough to understand why you would want to use the web interface vs SSH or vice versa.

If the device has a (REST) API you can access it over https, i.e. Arista devices, if the device doesn't have an API, say most Junos/Cisco devices, you'll use NETCONF via ssh.

Pile Of Garbage
May 28, 2007



Fortinet devices have a REST API apparently however you need to pay for a subscription to their developer program to get the doco :lol:

Bigass Moth
Mar 6, 2004

I joined the #RXT REVOLUTION.
:boom:
he knows...
I’m a bit worried about the future of collaboration. Most companies have switched to VoIP systems long ago, so new installs are uncommon. There are only so many upgrades and refreshes in the world. What do I need to learn in terms of technology to someday work at a provider? Is it more routing and hardware and less voice coded work? What protocols do they typically use? I have heard from a friend at one of the big providers that IS-IS is common.

BurgerQuest
Mar 17, 2009

by Jeffrey of YOSPOS

Pile Of Garbage posted:

Fortinet devices have a REST API apparently however you need to pay for a subscription to their developer program to get the doco :lol:

I've seen quite a few decent integrations with Fortinet devices and various OSS/BSS systems over the years so while it does sound a bit annoying I'm guessing the support you get with it is probably quite good. We have a few integrations in production and it works great and allows lower level staff to apply basic firewalling, application filtering etc to a customer service. I wasn't involved in their development though.

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k

Bigass Moth posted:

I’m a bit worried about the future of collaboration. Most companies have switched to VoIP systems long ago, so new installs are uncommon. There are only so many upgrades and refreshes in the world. What do I need to learn in terms of technology to someday work at a provider? Is it more routing and hardware and less voice coded work? What protocols do they typically use? I have heard from a friend at one of the big providers that IS-IS is common.

Why do you want to work at a provider specifically? Yes providers will run IS-IS on the voice network, I've never seen an enterprise copy that design.

Bigass Moth
Mar 6, 2004

I joined the #RXT REVOLUTION.
:boom:
he knows...
I’m just keeping my options open. I’m in an area where one of the big providers has a large presence, so they could be a potential employer if I ever move on.

BaseballPCHiker
Jan 16, 2006

I am definitely not a licensing hardware guy so please forgive my ignorance. Is the only difference between DNA Essentials and Advantage is that I can make a device a layer 3 switch?

Besides some like obscure inventory benefits for whatever DNA is? I feel like I'm missing something major, and also feel like Cisco is jumping in full steam ahead to the byzantine world of Microsoft licensing.

Partycat
Oct 25, 2004

Collaboration is becoming a service and an app rapidly. Design and application of those pieces, integration into other services , API and reporting work, etc will be probably the way to go to stay on the top edge of it.

There will always be people to spec, design, implement etc.

Personally I’ve been diving into the various Cisco APIs , looking at integration and automation opportunities . Been spending time in the instructional design realm looking at tech application. SP services are a different world but things are changing for sure.

uhhhhahhhhohahhh
Oct 9, 2012

BaseballPCHiker posted:

I am definitely not a licensing hardware guy so please forgive my ignorance. Is the only difference between DNA Essentials and Advantage is that I can make a device a layer 3 switch?

Besides some like obscure inventory benefits for whatever DNA is? I feel like I'm missing something major, and also feel like Cisco is jumping in full steam ahead to the byzantine world of Microsoft licensing.

Both can do dynamic and static routing. There might be some features missing from Essentials for EIGRP for example but I couldn't tell you what they are. If you were doing full MPLS you'd need Advantage for certain though.

We didn't like this DNA garbage and bought the perpetual NX-OS Essentials 'old style' license for our 9300 switches. I've set up VRF Lite on them with EIGRP and OSPF so I know it works.

It took us way longer that it should have to get our heads around this DNA nonsense but the takeaway is, unless you have basically nothing and you're starting from scratch - I mean no Wireless and no ISE mainly - it's not worth being on the hook forever. If you've already got an ISE deployment with xxxx amount of base licenses and wireless controllers with licenses it's just not worth it. I suppose if you were doing a refresh you could consider it but even then you're going to be on the hook for a lot of revenue every 3 or 5 or 7 years because even if you stop paying the DNA Essentials for example, your switches keep Essentials features perpetually but you lose all the SDN access and you lose your wireless and ISE licenses.

Your licensing costs will go through the roof and you still have to pay up front for the hardware as well. The backend appliance for their new management software for the Catalyst switches is like £20k on it's own.

Filthy Lucre
Feb 27, 2006
Is there a way to change the throughput of a BDI interface on a ASR 920? I have a BDI on a 2x10Gbps portchannel, but every BDI interface only appears as a 1Gbps interface and traffic stats confirm that max throughput is 1Gbps.

code:
interface Port-channel1
 no ip address
 service instance 10 ethernet
  encapsulation dot1q 10
  rewrite ingress tag pop 1 symmetric
  bridge-domain 10

 <other service instances>

interface TenGigabitEthernet0/0/2
 no ip address
 channel-group 1 mode active
!
interface TenGigabitEthernet0/0/3
 no ip address
 channel-group 1 mode active

interface BD10
 ip address 10.0.0.1 255.255.255.252

<other interfaces>

Filthy Lucre fucked around with this message at 23:50 on Jan 10, 2019

Lord Rupert
Dec 28, 2007

Neither seen, nor heard
Any recommendations for getting through, studying for, and completing the CCENT? My manager and I agreed it's time to have me start in on this, have yet to get the confirmation from our HR/Business people, but rest assured it's a happening thing. Currently I am a Tier 2 Voice/Data Network Admin, so we do lots of troubleshooting, interface configurations, equipment installation help with our Field Engineers and things along those lines.

I've been in this position for 8 months now, but I am certain there will be a considerable amount of raw technical information that ultimately hasn't been part of my practical experience. Just looking for resources, suggestions, and things to consider about all this. Not super worried about being able to comprehend this all, but I do want to make the best of it.

Actuarial Fables
Jul 29, 2014

Taco Defender

Lord Rupert posted:

Any recommendations for getting through, studying for, and completing the CCENT? My manager and I agreed it's time to have me start in on this, have yet to get the confirmation from our HR/Business people, but rest assured it's a happening thing. Currently I am a Tier 2 Voice/Data Network Admin, so we do lots of troubleshooting, interface configurations, equipment installation help with our Field Engineers and things along those lines.

I've been in this position for 8 months now, but I am certain there will be a considerable amount of raw technical information that ultimately hasn't been part of my practical experience. Just looking for resources, suggestions, and things to consider about all this. Not super worried about being able to comprehend this all, but I do want to make the best of it.

Are you planning on going for the CCNA R&S afterwards?

I found Wendell Odom's books very helpful for learning the material, and the practice exams at Boson very closely mimic the actual exam. If it's a work-driven request, see if you can get some time and spare equipment to lab out the materials you learn about.

e. Wait, this isn't the cert thread. Go here

Actuarial Fables fucked around with this message at 18:21 on Jan 12, 2019

Lord Rupert
Dec 28, 2007

Neither seen, nor heard

Actuarial Fables posted:

Are you planning on going for the CCNA R&S afterwards?

I found Wendell Odom's books very helpful for learning the material, and the practice exams at Boson very closely mimic the actual exam. If it's a work-driven request, see if you can get some time and spare equipment to lab out the materials you learn about.

e. Wait, this isn't the cert thread. Go here

Rad, I'll go bug the fine folks over there! Ideally I would finish it up and get the other part of the CCNA afterwards, as this is driven by management but I am way more than on board with it. We'll likely have some Network Engineer openings once we get through our NGN Upgrade, as we have some real old-timers currently seeing that through.

Thanks Ants
May 21, 2004

#essereFerrari


Anybody had a chance to work with the ISR 900-series?

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
We have a bunch of isr920s we use as 10g cpe w/ l3 routing. They're fine, although the licensing is annoying and enforced. Bug reports on newer IOS versions are pretty hilarious too.

Apex Rogers
Jun 12, 2006

disturbingly functional

Isr 900 series doesn't have a 10g port. Do you mean asr920?

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Apex Rogers posted:

Isr 900 series doesn't have a 10g port. Do you mean asr920?

Ack yep those. I'll go back to Juniper land now, which is the normal home base.

FatCow
Apr 22, 2002
I MAP THE FUCK OUT OF PEOPLE
FYI, the NCS4200s are a dumpster fire. Bad enough to get us moved to CAP with 3 units installed.

I miss the 15454s more every day.

ate shit on live tv
Feb 15, 2004

by Azathoth

FatCow posted:

FYI, the NCS4200s are a dumpster fire. Bad enough to get us moved to CAP with 3 units installed.

I miss the 15454s more every day.

This doesn't surprise me in the slightest. Cisco has really gone down the toilet.

Schadenboner
Aug 15, 2011

by Shine
So this may be, I dunno, orthogonal to the thread or whatever: but why are community colleges cutting the number of Cisco classes they require (from 4 to 2 generally, meaning the graduates are only doing the first half of the CCNA R&S). I’ve noticed this over the course of the last five years. Is this just a result of more stuff getting put into the :butt:?

Schadenboner
Aug 15, 2011

by Shine

Schadenboner posted:

So this may be, I dunno, orthogonal to the thread or whatever: but why are community colleges cutting the number of Cisco classes they require (from 4 to 2 generally, meaning the graduates are only doing the first half of the CCNA R&S). I’ve noticed this over the course of the last five years. Is this just a result of more stuff getting put into the :butt:?

:yayclod:-EATING MILLENNIALS ARE KILLING CISCO

And it’s illegal

Woof Blitzer
Dec 29, 2012

[-]

Schadenboner posted:

So this may be, I dunno, orthogonal to the thread or whatever: but why are community colleges cutting the number of Cisco classes they require (from 4 to 2 generally, meaning the graduates are only doing the first half of the CCNA R&S). I’ve noticed this over the course of the last five years. Is this just a result of more stuff getting put into the :butt:?

Not the case here, up to CCNP is offered.

Schadenboner
Aug 15, 2011

by Shine

Woof Blitzer posted:

Not the case here, up to CCNP is offered.

Around here (Metro-Milwaukee/South-Eastern Wisconsin) the Networking AASes previously required 4 semesters of Cisco, they all seem to be down to two now.

A lot of them still offer all four (although now that they're not required I'd imagine that enrollment is down) but they don't require it.

I don't think I've seen the CCNP offered at the CC level, where are you?

Sheep
Jul 24, 2003
We do CCNP stuff at community colleges in NC, back when I did it it used to be part of an optional track of the Networking AAS; if you followed 'standard' path you'd just do the CCNA stuff and shore it up with I guess Windows/Linux sysadmin courses or whatever.

Woof Blitzer
Dec 29, 2012

[-]

Schadenboner posted:

Around here (Metro-Milwaukee/South-Eastern Wisconsin) the Networking AASes previously required 4 semesters of Cisco, they all seem to be down to two now.

A lot of them still offer all four (although now that they're not required I'd imagine that enrollment is down) but they don't require it.

I don't think I've seen the CCNP offered at the CC level, where are you?

St. Louis

Schadenboner
Aug 15, 2011

by Shine

Sheep posted:

We do CCNP stuff at community colleges in NC, back when I did it it used to be part of an optional track of the Networking AAS; if you followed 'standard' path you'd just do the CCNA stuff and shore it up with I guess Windows/Linux sysadmin courses or whatever.


Wisconsin officially complete poo poo at community colleging?!?

:monocle:

Methanar
Sep 26, 2013

by the sex ghost
So I'm a huge dipshit and made some mistake a while ago forgetting that iBGP and eBGP have different administrative distances.

If I don't want whether a route is originating from within the same ASN or not to be a deciding factor in whether or not to use it, can I just change the AD of iBGP to be 20, the same as eBGP without loving everything up?

this is irrelevant

Basically, what I've got is this where the best carrier to go over is dependent on which device you're talking to which I don't really like.

Here you can see in the first output we're preferring the route with the giant metric of 178100 , even though there is a 0 metric possibility, because the seemingly worse option is originated over eBGP

code:
core-switch-2(config)#show ip bgp 1.0.16.0/24
BGP routing table information for VRF default
Router identifier 10.12.0.2, local AS number 395332
BGP routing table entry for 1.0.16.0/24
 Paths: 3 available
  174 174 2519
    38.142.223.97 from 38.142.223.97 (66.28.1.185)
      Origin IGP, metric 178100, localpref 100, weight 0, valid, external, ECMP head, ECMP, best, ECMP contributor
      Community: 174:21201 174:22032
      Rx SAFI: Unicast
  174 174 2519
    38.142.5.1 from 38.142.5.1 (66.28.1.185)
      Origin IGP, metric 178100, localpref 100, weight 0, valid, external, ECMP, ECMP contributor
      Community: 174:21201 174:22032
      Rx SAFI: Unicast
  6939 6939 2519
    10.12.0.1 from 10.12.0.1 (10.12.0.1)
      Origin IGP, metric 0, localpref 100, weight 0, valid, internal
      Rx SAFI: Unicast

 B E    1.0.16.0/24 [200/178100] via 38.142.5.1, Ethernet1
                                 via 38.142.223.97, Ethernet2
code:
 B E    1.0.16.0/24 [200/0] via 216.66.43.181, Ethernet1
                            via 216.66.68.249, Ethernet3
                            via 216.66.23.1, Ethernet4
https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/13753-25.html

quote:

7) Prefer eBGP over iBGP paths.

If bestpath is selected, go to Step 9 (multipath).
Prefer ebgp over ibgp is a step entirely on its own in the path selection process, independent of AD (why even bother assigning different ADs then, cisco)


code:
Connected interface	0
Static route	1
Enhanced Interior Gateway Routing Protocol (EIGRP) summary route	5
External Border Gateway Protocol (BGP)	20
Internal EIGRP	90
IGRP	100
OSPF	110
Intermediate System-to-Intermediate System (IS-IS)	115
Routing Information Protocol (RIP)	120
Exterior Gateway Protocol (EGP)	140
On Demand Routing (ODR)	160
External EIGRP	170
Internal BGP	200
Unknown*	255
Is there even a way to override that? I'm flipping through the bgp tunables I can set and I'm not necessarily seeing anything.

Nope there isn't. uh now what. I'd really rather not throw more Source IP routing at this

Methanar fucked around with this message at 06:15 on Feb 2, 2019

Methanar
Sep 26, 2013

by the sex ghost
Separate questions

code:
core-switch-2(config-router-bgp)#show ip bgp 1.0.128.0/24
BGP routing table information for VRF default
Router identifier 10.12.0.2, local AS number 395332
BGP routing table entry for 1.0.128.0/24
 Paths: 3 available
  6939 6939 38040 23969
    10.12.0.1 from 10.12.0.1 (10.12.0.1)
      Origin IGP, metric 0, localpref 100, weight 0, valid, internal, best
      Rx SAFI: Unicast
  174 174 38040 23969
    38.142.223.97 from 38.142.223.97 (66.28.1.185)
      Origin INCOMPLETE, metric 64070, localpref 100, weight 0, valid, external, ECMP head, ECMP, ECMP contributor
      Community: 174:21001 174:22013
      Rx SAFI: Unicast
  174 174 38040 23969
    38.142.5.1 from 38.142.5.1 (66.28.1.185)
      Origin INCOMPLETE, metric 64070, localpref 100, weight 0, valid, external, ECMP, ECMP contributor
      Community: 174:21001 174:22013
      Rx SAFI: Unicast
Should I be concerned about some routes just not originated properly through some ISPs? If I only had a single carrier here, 10.0.128.0 would just go nowhere Not true either. Just means that when Cogent, or someone else in the middle; or the origin, earns the route its doing something funky like redistributing an internal protocol into BGP but not overriding the ORIGIN attribute. Its a bit weird that despite the same path being present after the first hop, HE and Cogent routes differ in the origin. That's probably because someone way upstream is/isn't doing something right regarding setting attributes with a route-map when peering. I guess.

Kind of unfortunate that ones part of the path selection process. I can probably overwrite that attribute as I receive the routes, but ehh.


Is there really not a safer way of playing with the internet than blindly setting AS-path prepending or similar and then watching your links and hoping you don't send 11g over a 10g connection?
What about when I start setting policy-based routing statements, do I really just yolo it and hope I do it right on the first try? I'm not really sure how you build a test environment for The Internet.

Like okay I just read about all this so I understand. I could overwrite the origin attribute on all advertisements received through cogent by doing this.
code:
route-map RMAP-SET-ORIGIN-IGP permit 10
   set origin igp

router bgp ....
   neighbor 38.142.5.1 route-map RMAP-SET-ORIGIN-IGP in
Or I could be more specific and say

code:
route-map RMAP-SET-ORIGIN-IGP permit 10
   match ip address access-list ACL-PERMIT-10.0.128.0
   set origin igp

router bgp ....
   neighbor 38.142.5.1 route-map RMAP-SET-ORIGIN-IGP in
Which, cool, in theory that'll work. I'm not going to see if it actually works by putting it on my network at friday night when I don't need to though.




Is it just a normal and fine thing for most people for different BGP speaking routers to have different world views if they make it past the first 7 steps of bgp path selection?

Methanar fucked around with this message at 05:40 on Feb 2, 2019

abigserve
Sep 13, 2009

this is a better avatar than what I had before

Methanar posted:

words of problem 1

Obviously I don't know what your topology looks like but this should not be a major issue as you can still control the outgoing traffic using the regular bgp mechanisms within your AS, as obviously once you get off the border routers it's all iBGP internally and admin distance no longer plays a part in path selection. The only case where this would be a problem is if your networks are all routed off your border routers, in which case the solution is the one you already mentioned in which you have to use the same administrative distance for iBGP and eBGP - this eliminates the ability to use MED for path selection however, so you need to either configure localpref in your network or work with your providers to setup some shared community strings.

Methanar posted:

Separate questions


The most accepted and well supported method of managing active/active connection incoming traffic via BGP is as-path prepending, yes.

It sounds like you have a fairly standard problem of trying to balance your traffic from your networks out via a variety of peers - by using as-path prepending, you can influence the inbound traffic and localpref you should be able to influence the outgoing traffic and everything will remain deterministic and pretty much set in stone (unless one of your ISP's clears as-path or something). Not sure why you would need PBR...

ate shit on live tv
Feb 15, 2004

by Azathoth
When you accept the routes, you can use communities or as-path "* 174" and then set a local-preference to ensure that say, routes originated by Cogent take the Cogent route, and everything else takes the HE.

Assuming I understand your problem correctly.

BallerBallerDillz
Jun 11, 2009

Cock, Rules, Everything, Around, Me
Scratchmo
At Seattle Central they used to require three CCNA classes for an AS and an additional three CCNP classes as part of the BAS track but they recently dropped the CCNP in favor of more cloud type stuff. We worked on things like open daylight and NSX in the last one that I took.

tortilla_chip
Jun 13, 2007

k-partite

Methanar posted:

BGP rambling

Do you have any flow visibility? I like pmacct, but there's a lot out there. It would give you some actual to data to make forwarding decisions rather than spray and pray :gizz:

madsushi
Apr 19, 2009

Baller.
#essereFerrari

Methanar posted:

Here you can see in the first output we're preferring the route with the giant metric of 178100 , even though there is a 0 metric possibility, because the seemingly worse option is originated over eBGP

Is there even a way to override that? I'm flipping through the bgp tunables I can set and I'm not necessarily seeing anything.

Nope there isn't. uh now what. I'd really rather not throw more Source IP routing at this

Metric is relative. Metric doesn't mean poo poo between carriers. It's not even part of the decision-making flow for routes from 2 different carriers (1 caveat, below).

What you have is 2 paths with the same AS_PATH length, which makes them basically identical. It's going to be a toss-up either way. It could be ORIGIN, it could even be the IP address of the dang interface that picks which one is used.

Two paths with the same AS_PATH length are always going to be a coin toss, unless you make a decision via routing policy.

You can use something like the Metric System (described here):
https://www.nanog.org/meetings/nanog45/presentations/Monday/Roisman_bgp_metric_N45.pdf

Which is where you turn on always-compare-med (which DOES compare metric from different carriers) and then set the metrics yourself as you like. Or you can have some policies with localpref. Whatever you choose to do, the only time that matching AS_PATH does something you want is when you configure it to.

Methanar posted:

code:
route-map RMAP-SET-ORIGIN-IGP permit 10
   set origin igp

This is common. Again, especially with something like the Metric System, you just wipe + replace the ORIGIN and METRIC values from the carrier since they rarely mean anything outside of MED (which even then, is carrier specific).


Methanar posted:

Is there really not a safer way of playing with the internet than blindly setting AS-path prepending or similar and then watching your links and hoping you don't send 11g over a 10g connection?

As mentioned, you can look at traffic stats to get an idea of where your traffic goes and where it comes from, and then figure out which of your ISPs would handle what traffic. A good example is taking your top 1000 or top 10000 prefixes by traffic (recorded with a flow monitoring tool), then run them through your routing tables and see what the best path is. Here's a talk with some of that, where 15000 routes was 98% of Spotify's traffic:
https://www.youtube.com/watch?v=o1njanXhQqM

tadashi
Feb 20, 2006

Schadenboner posted:

So this may be, I dunno, orthogonal to the thread or whatever: but why are community colleges cutting the number of Cisco classes they require (from 4 to 2 generally, meaning the graduates are only doing the first half of the CCNA R&S). I’ve noticed this over the course of the last five years. Is this just a result of more stuff getting put into the :butt:?

That's loving weird. Seems like positions I see that used to use CCNA as the base requirement are now requiring CCNP. I definitely wouldn't recommend going light on Cisco training.

Partycat
Oct 25, 2004

Nor would I recommend CCNP if you’re not doing network architecture and support work, of a Cisco nature.

Though the bleed of these concepts into modern service hosting environments is a thing, it’s still not necessary to the average tech worker. Imo anyways.

Docjowles
Apr 9, 2009

In some ways I think it would be nice if Cisco would do a “CCNA Cloud” or something. Where they rip out 80% of the layer 1-2 and IGP content to spend a ton of time on BGP, since that is the only routing protocol that matters in a public cloud environment. And steal some IPSec VPN content from the CCNA Security. Like, we are moving all of our poo poo into AWS right now. I do not care about hiring someone who can tell me all the different spanning tree protocols or the differences between EIGRP and IS-IS. It will never matter.

It would also give us comedy when the cert holders’ companies decide to move back on-prem, and they build the whole data center as a flat /8 in the default VLAN with no STP configured :allears:

Docjowles fucked around with this message at 01:47 on Feb 6, 2019

ate shit on live tv
Feb 15, 2004

by Azathoth
Eh, even if STP isn’t a concern in a modern datacenter environment, it’s still important to understand why it exists, and when you use it. It’s pretty fundamental to the difference between an L2 and L3 environment. Plus even in AWS the concept of a VLAN still exists and if you ever do a direct connect it’s important to understand what a tagged frame is and what a MAC address looks like.

doomisland
Oct 5, 2004

All the fancy SDN poo poo too uses the same networking concepts as well. There are several blogs and posts I've reading where people are amazed by things such as IPTables and dynamic routing.

Adbot
ADBOT LOVES YOU

Docjowles
Apr 9, 2009

My ~* Cloud CCNA *~ curriculum would probably have STP in an appendix, and it would only cover Rapid-PVST because it is both modern and simple. Which is all you need to do an AWS direct connect to your colo. VLANs are important and get to be part of the surviving content, too.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply