Networking Pioneers, Settlers and Town Planners

Can we broadly separate Networking into Pioneers, Settlers, and Town Planners? I’ve been thinking about how to apply Simon Wardley’s PST model to networking. This leads to thinking about how we can encourage networking evolution. The model needs a lot of fleshing out, but I’m interested in what others think. Pioneers, Settlers and Town Planners […]

Continue Reading
Dollar Sign

Considering On-Call Pay

Let’s say you’ve been offered a new job. $70k base salary, with up to $20k per year extra for on-call duties. Great! $90k! That’s $10k more than my salary now! Sign me up! Wait a minute. Not so fast. Years ago I received some good advice: Treat your on-call payment as a separate item. Don’t consider it as […]

Continue Reading
vrouter-icon-square

Brocade Certified vRouter Engineer

If you’ve visited the Brocade website recently, you’ve probably seen the “Free NFV Certification” banner. I signed up for this several months ago, but had put off completing the course. I had a little downtime recently prior to starting work at Brocade, so I completed this course & exam. Here’s my impressions. What’s the Course/Exam About? […]

Continue Reading

Think Bigger

I get frustrated by those who take a narrow view of technology, and progress in general. They see things in terms of where they are now, and where they were. But they struggle to see a bit further out. The Internet of Things is a good example of this. I made the mistake of reading […]

Continue Reading
Brocade Logo

The Next Step: Brocade

I am happy to announce that I am now a Product Manager at Brocade. This is a big move for me, and one I am very excited about. I will get to work on the future of networking with a lot of smart people . Why Brocade? It’s simple really: He aha te mea nui o te ao? […]

Continue Reading
Firewall Pair

Using Check Point Identity Awareness with NAT

Check Point Identity Awareness is problematic in environments that have multiple customers, overlapping private address space, and NAT. It can be done, if you understand the traffic flows, the connections needed, and how to combine several features. Here’s how I did it. Background: Typical Check Point Management Flows A quick reminder of the traditional flows used […]

Continue Reading
IMC Icon

HP IMC Adapter Directory Naming

This week’s lesson: Be consistent with your vendor naming when working with HP IMC Custom Device Adapters. When you create the new adapter directory, use exactly the same vendor name as used within the UI. Otherwise IMC may not recognise your new adapter. Case matters too, even on Windows! HP IMC ships with a set […]

Continue Reading

F5 APM, SRX and DTLS NAT Timeout

I have been having issues using the F5 APM client behind a Juniper SRX-110 using hide NAT. I believe I’ve tracked it down to the default timeout settings used for UDP services. Here’s what I did to resolve it. Constant Connection Timeouts The laptop client was behind the SRX-110, using hide NAT. The initial client connection […]

Continue Reading
Firewall Pair

Check Point SmartLog – Recommended

Trigger warning for Check Point haters: I’m about to say nice things about Check Point. Continuing the recent theme of Check Point-related posts, I’d like to give Check Point credit for once. SmartLog is what I always wanted from Tracker/Log Viewer, and they’re not even charging me extra for it. Shocking, I know. Traditional Log Analysis 15-20 […]

Continue Reading
Firewall Pair

Check Point – Don’t Use the ‘Install On’ Column

I got caught out by Check Point’s “Install On” column recently. Most people don’t need this setting any more, but it’s still there for legacy reasons. Time to re-evaluate. When you create a firewall policy using Check Point, you define the set of possible installation targets. That is, the firewalls that this policy may be installed […]

Continue Reading