<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Networking on The IT Hollow</title>
    <link>https://theithollow.com/categories/networking/</link>
    <description>Recent content in Networking on The IT Hollow</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Mon, 23 Jun 2014 16:19:10 +0000</lastBuildDate>
    <atom:link href="https://theithollow.com/categories/networking/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Test Connections from an ESXi Host Using vmkping</title>
      <link>https://theithollow.com/2014/06/23/test-connections-esxi-vmkping/</link>
      <pubDate>Mon, 23 Jun 2014 16:19:10 +0000</pubDate>
      <guid>https://theithollow.com/2014/06/23/test-connections-esxi-vmkping/</guid>
      <description>&lt;p&gt;If you&amp;rsquo;ve been in a situation where you need to test connectivity, you&amp;rsquo;ve probably used the ping command.  But what do you do when you&amp;rsquo;re trying to test connectivity from an ESXi host?  Luckily there is a command called vmkping that will allow you to test from the host.&lt;/p&gt;
&lt;p&gt;The first thing that you need to do is to SSH into your ESXi host.  Turn the SSH Service on from the Configuration &amp;ndash;&amp;gt; Security Profile Tab.  Then you can use your favorite ssh client and remote into your host.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HP v1910-24G CLI Goody</title>
      <link>https://theithollow.com/2014/05/27/hp-v1910-24g-cli-goody/</link>
      <pubDate>Tue, 27 May 2014 13:31:03 +0000</pubDate>
      <guid>https://theithollow.com/2014/05/27/hp-v1910-24g-cli-goody/</guid>
      <description>&lt;p&gt;theITHollow.com lab suffered an outage to the core switch a few weeks ago (an aging Cisco 3750) and I was looking for a replacement that wouldn&amp;rsquo;t break the bank.  Luckily I found the &lt;a href=&#34;http://www.amazon.com/gp/product/B003UL531W/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B003UL531W&amp;amp;linkCode=as2&amp;amp;tag=theithollowco-20&amp;amp;linkId=6ZSLLGZA3FFQONMB&#34;&gt;HP v1910-24G (JE006A)&lt;/a&gt; to be more than adequate. One of my main gripes with this switch was that the Command Line Interface was very limited.  See for yourself. &lt;a href=&#34;https://assets.theithollow.com/wp-content/uploads/2014/05/PUTTY-HPv1910-0.png&#34;&gt;&lt;img alt=&#34;PUTTY-HPv1910-0&#34; loading=&#34;lazy&#34; src=&#34;https://assets.theithollow.com/wp-content/uploads/2014/05/PUTTY-HPv1910-0.png&#34;&gt;&lt;/a&gt; While the cli out of the box is nice, and I would say necessary, there isn&amp;rsquo;t a lot that can be done with it.  For basic configuration tasks, you&amp;rsquo;ll be stuck with the Web GUI. But after digging through some HP discussion boards I found out that you can enable the Comware operating system commands.&lt;/p&gt;</description>
    </item>
    <item>
      <title>vCNS Edge SSL VPN</title>
      <link>https://theithollow.com/2014/05/13/vcns-edge-ssl-vpn/</link>
      <pubDate>Tue, 13 May 2014 14:00:14 +0000</pubDate>
      <guid>https://theithollow.com/2014/05/13/vcns-edge-ssl-vpn/</guid>
      <description>&lt;p&gt;A secured, remote connection to your data is a requirement for almost all network designs these days.  Mobility, telecommuting and late night help desk calls have created an environment that needs to have access to the local network in a secure fashion.  vCNS Edge can provide these services to your virtual infrastructure.&lt;/p&gt;
&lt;p&gt;In previous posts, I’ve walked through &lt;a href=&#34;https://theithollow.com/2014/03/getting-started-vcns/&#34;&gt;installing vCNS Manager&lt;/a&gt; and &lt;a href=&#34;http://wp.me/p32uaN-Tb&#34;&gt;installing vCNS Edge appliances&lt;/a&gt;.  These are prerequisites to setting up SSL VPN on the VMware vCloud Network and Security appliance..&lt;/p&gt;</description>
    </item>
    <item>
      <title>vCNS Edge Network Address Translation</title>
      <link>https://theithollow.com/2014/04/15/vcns-edge-network-address-translation/</link>
      <pubDate>Tue, 15 Apr 2014 14:43:12 +0000</pubDate>
      <guid>https://theithollow.com/2014/04/15/vcns-edge-network-address-translation/</guid>
      <description>&lt;p&gt;VMware vCloud Networking and Security (vCNS) can provide Network Address Translation (NAT) services from the vCNS Edge appliance.&lt;/p&gt;
&lt;p&gt;There are two types of NAT that the edge appliance can provide.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Destination NAT (DNAT) is used to provide access to a private IP Address from a (usually) public IP Address for incoming traffic.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Source NAT (SNAT) is used to translate a private IP Address into a (usually) public IP Address for outgoing traffic. This type of NAT can also be called &amp;ldquo;masquerading&amp;rdquo;.  (It&amp;rsquo;s a subtle difference that we won&amp;rsquo;t go into in this post.)&lt;/p&gt;</description>
    </item>
    <item>
      <title>vCNS Edge DHCP</title>
      <link>https://theithollow.com/2014/04/10/vcns-edge-dhcp/</link>
      <pubDate>Thu, 10 Apr 2014 13:38:41 +0000</pubDate>
      <guid>https://theithollow.com/2014/04/10/vcns-edge-dhcp/</guid>
      <description>&lt;p&gt;One of the most basic tasks that happens on a network is assigning IP Addresses.  Once a VMware vCNS Edge appliance has been deployed, you can now hand out IP address through Dynamic Host Control Protocol (DHCP).&lt;/p&gt;
&lt;p&gt;In previous posts, I&amp;rsquo;ve walked through &lt;a href=&#34;https://theithollow.com/2014/03/getting-started-vcns/&#34;&gt;installing vCNS Manager&lt;/a&gt; and &lt;a href=&#34;http://wp.me/p32uaN-Tb&#34;&gt;installing vCNS Edge appliances&lt;/a&gt;.  These are prerequisites to setting up DHCP on the VMware vCloud Network and Security appliance.&lt;/p&gt;
&lt;h1 id=&#34;vcns-edge-dhcp-setup&#34;&gt;&lt;strong&gt;vCNS Edge DHCP Setup&lt;/strong&gt;&lt;/h1&gt;
&lt;p&gt;Log into your vShield Manager and click on the Datacenter.  Click the &amp;ldquo;Network Virtualization&amp;rdquo; Tab where you&amp;rsquo;ll find the Edge appliance you&amp;rsquo;ve already deployed.  Go to Actions and click &amp;ldquo;Manage&amp;rdquo;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Deploy vCNS Edge</title>
      <link>https://theithollow.com/2014/04/07/deploy-vcns-edge/</link>
      <pubDate>Mon, 07 Apr 2014 13:32:07 +0000</pubDate>
      <guid>https://theithollow.com/2014/04/07/deploy-vcns-edge/</guid>
      <description>&lt;p&gt;vCloud Networking and Security has the capabilities to provide edge services inside of your virtual environment.  Edge firewalls, network address translation, DHCP, routing are all things that vCNS Edge can do for you.  This post goes into the steps necessary to deploy vCNS Edge.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;I should mention that vCNS and the previous name vShield may be used interchangeably in this article.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h1 id=&#34;logical-diagram&#34;&gt;Logical Diagram&lt;/h1&gt;
&lt;p&gt;The picture below is a diagram of what our environment will look like when we&amp;rsquo;re done.  We have production VMs as you might expect, and our new vCNS Edge VM.  We&amp;rsquo;ve also got our new Edge network and a Shielded VM which will not be connected to the production vSwitch directly.&lt;/p&gt;</description>
    </item>
    <item>
      <title>vShield Endpoint - Trend Micro Deep Security (Part 1)</title>
      <link>https://theithollow.com/2014/03/24/vshield-endpoint-trend-micro-deep-security/</link>
      <pubDate>Mon, 24 Mar 2014 13:03:24 +0000</pubDate>
      <guid>https://theithollow.com/2014/03/24/vshield-endpoint-trend-micro-deep-security/</guid>
      <description>&lt;p&gt;If you&amp;rsquo;re a vSphere Administrator and have compliance regulations to deal with, vShield Endpoint might save you a lot of hassle.  From my own experience with PCI-DSS, it was important to limit the cardholder data environment scope.  The fewer devices that touch credit card data, the fewer items that had to be protected.  In the same breath, it was important to have Anti-Virus, malware protection, firewall rules and file integrity monitoring.  vShield Endpoint allows for all of these things to be handled in a single package.  This post looks specifically at Trend Micro&amp;rsquo;s Deep Security Product.&lt;/p&gt;</description>
    </item>
    <item>
      <title>vShield Endpoint - Trend Micro Deep Security (Part 2)</title>
      <link>https://theithollow.com/2014/03/24/vshield-endpoint-trend-micro-deep-security-part-2/</link>
      <pubDate>Mon, 24 Mar 2014 13:02:02 +0000</pubDate>
      <guid>https://theithollow.com/2014/03/24/vshield-endpoint-trend-micro-deep-security-part-2/</guid>
      <description>&lt;p&gt;In the &lt;a href=&#34;http://wp.me/p32uaN-QT&#34;&gt;first post&lt;/a&gt; in this series, we deployed the vShield Endpoint host driver and installed the Trend Micro Deep Security Manager on a Windows VM.&lt;/p&gt;
&lt;h1 id=&#34;trend-micro-deep-security-appliance-deployment&#34;&gt;Trend Micro Deep Security Appliance Deployment&lt;/h1&gt;
&lt;p&gt;First, we need to login to the Deep Security Manager which is conveniently accessed as a web page.  Go the the DNS name of the Manager that you entered during the setup wizard in &lt;a href=&#34;http://wp.me/p32uaN-QT&#34;&gt;part 1&lt;/a&gt; of this series.  Log in with the username and password that you specified.&lt;/p&gt;</description>
    </item>
    <item>
      <title>vShield Endpoint - Trend Micro Deep Security (Part 3)</title>
      <link>https://theithollow.com/2014/03/24/vshield-endpoint-trend-micro-deep-security-part-3/</link>
      <pubDate>Mon, 24 Mar 2014 13:01:49 +0000</pubDate>
      <guid>https://theithollow.com/2014/03/24/vshield-endpoint-trend-micro-deep-security-part-3/</guid>
      <description>&lt;p&gt;The first parts of this series focused mainly on how to install the Trend Micro Deep Security product and how to prepare your environment.  This post shows you a bit more of what can be accomplished with the product.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://wp.me/p32uaN-QT&#34;&gt;vShield Endpoint Part 1&lt;/a&gt; &lt;a href=&#34;http://wp.me/p32uaN-RD&#34;&gt;vSheidl Endpoint Part 2&lt;/a&gt;&lt;/p&gt;
&lt;h1 id=&#34;policies&#34;&gt;Policies&lt;/h1&gt;
&lt;p&gt;This is the guts of the product.  All the configurations you&amp;rsquo;ve done up to this point have been leading up to a solution that can help secure your environment and possibly make it comply with a regulatory body.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Getting started with vCNS</title>
      <link>https://theithollow.com/2014/03/17/getting-started-vcns/</link>
      <pubDate>Mon, 17 Mar 2014 14:07:03 +0000</pubDate>
      <guid>https://theithollow.com/2014/03/17/getting-started-vcns/</guid>
      <description>&lt;p&gt;VMware has a very nice solution for managing network access between virtual machines.  In a physical environment, blocking access between servers would require routing network traffic through a firewall.  This might mean several vlans, subnets and routes.  Luckily now that many infrastructures are virtual we have an alternative.  vCloud Networking and Security (vCNS) is a solution that can be used to block traffic between virtual machines.&lt;/p&gt;
&lt;p&gt;vCNS can be a bit intimidating so this is a quick, getting started, guide on how you can test it out in your environment.&lt;/p&gt;</description>
    </item>
    <item>
      <title>OPEN VPN for Home Labs</title>
      <link>https://theithollow.com/2014/02/10/open-vpn-home-labs/</link>
      <pubDate>Mon, 10 Feb 2014 14:10:13 +0000</pubDate>
      <guid>https://theithollow.com/2014/02/10/open-vpn-home-labs/</guid>
      <description>&lt;p&gt;If you&amp;rsquo;ve got a home lab to play around in, it&amp;rsquo;s great to have remote access so that you can try things out from the road.  This might mean purchasing an expensive firewall or VPN appliance but &lt;a href=&#34;http://openvpn.net/&#34;&gt;openvpn&lt;/a&gt; has a nice 2 user appliance that can be downloaded as an OVF file, right into your vSphere environment.&lt;/p&gt;
&lt;h1 id=&#34;installation&#34;&gt;Installation&lt;/h1&gt;
&lt;p&gt;I mentioned that this is an OVF file, so you know the installation is going to be a snap.  Download the &lt;a href=&#34;http://swupdate.openvpn.org/as/OpenVPN-AS-Appliance-2.0.1.ova&#34;&gt;bits from OpenVPN.net&lt;/a&gt; and deploy into your vSphere cluster.  I&amp;rsquo;m not going to go through the entire OVF deployment, I think you&amp;rsquo;ll find it very simple even if you haven&amp;rsquo;t done it before.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Internetworking 101 series - Subnets</title>
      <link>https://theithollow.com/2013/08/12/internetworking-101-series-subnets/</link>
      <pubDate>Mon, 12 Aug 2013 13:34:24 +0000</pubDate>
      <guid>https://theithollow.com/2013/08/12/internetworking-101-series-subnets/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://assets.theithollow.com/wp-content/uploads/2013/07/Chalkboard.png&#34;&gt;&lt;img alt=&#34;Chalkboard&#34; loading=&#34;lazy&#34; src=&#34;https://assets.theithollow.com/wp-content/uploads/2013/07/Chalkboard-300x161.png&#34;&gt;&lt;/a&gt; This is a series of posts designed to help readers understand how the Internet works.  This specific post looks directly at how devices know what machines are on their network segment.&lt;/p&gt;
&lt;p&gt;In previous posts, we looked at how &lt;a href=&#34;https://theithollow.com/2013/07/internetworking-101-series-frames-data-link-layer/&#34;&gt;machines communicate on the same network by utilizing frames&lt;/a&gt;, and &lt;a href=&#34;https://theithollow.com/2013/07/internetworking-101-series-packets-network-layer/&#34;&gt;how machines on different network segments use packets.&lt;/a&gt;  The next logical question is, &amp;ldquo;How do machines know if these machines are on the same network or not?&amp;rdquo;  The answer to this question is subnetting.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Internetworking 101 series – Collision Domains</title>
      <link>https://theithollow.com/2013/08/05/internetworking-101-series-collision-domains/</link>
      <pubDate>Mon, 05 Aug 2013 13:19:54 +0000</pubDate>
      <guid>https://theithollow.com/2013/08/05/internetworking-101-series-collision-domains/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://assets.theithollow.com/wp-content/uploads/2013/07/Chalkboard.png&#34;&gt;&lt;img alt=&#34;Chalkboard&#34; loading=&#34;lazy&#34; src=&#34;https://assets.theithollow.com/wp-content/uploads/2013/07/Chalkboard-300x161.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This is a series of posts designed to help readers understand how the Internet works.  This specific post looks directly at collision domains.&lt;/p&gt;
&lt;p&gt;Ethernet uses a process called &amp;ldquo;Carrier Sense Multiple Access with Collision Detection&amp;rdquo; or CSMA/CD for short.  This is a very long way of explaining the process of how network adapters can share the same media to communicate.  Think about it if you have 10 machines on a network that are all sharing the same wires or devices, how can any of the devices understand anything with all those frames?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Internetworking 101 series - Packets (Network Layer)</title>
      <link>https://theithollow.com/2013/07/29/internetworking-101-series-packets-network-layer/</link>
      <pubDate>Mon, 29 Jul 2013 15:21:22 +0000</pubDate>
      <guid>https://theithollow.com/2013/07/29/internetworking-101-series-packets-network-layer/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://assets.theithollow.com/wp-content/uploads/2013/07/Chalkboard.png&#34;&gt;&lt;img alt=&#34;Chalkboard&#34; loading=&#34;lazy&#34; src=&#34;https://assets.theithollow.com/wp-content/uploads/2013/07/Chalkboard-300x161.png&#34;&gt;&lt;/a&gt; This is a series of posts designed to help readers understand how the Internet works.  This specific post looks directly at how machines on different network segments communicate.&lt;/p&gt;
&lt;p&gt;In my previous post, we looked at how two machines on the same network segment exchange information by using frames.  So what happens when two machines on different segments need to communicate?&lt;/p&gt;
&lt;h1 id=&#34;encapsulation&#34;&gt;Encapsulation&lt;/h1&gt;
&lt;p&gt;Before we get too involved in the discussion, we should take a peak at what an IP packet looks like.  IP Packets relate to Ethernet frames much like one nesting doll relates to the rest in the set.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Internetworking 101 series - Frames (Data Link Layer)</title>
      <link>https://theithollow.com/2013/07/22/internetworking-101-series-frames-data-link-layer/</link>
      <pubDate>Mon, 22 Jul 2013 13:03:21 +0000</pubDate>
      <guid>https://theithollow.com/2013/07/22/internetworking-101-series-frames-data-link-layer/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://assets.theithollow.com/wp-content/uploads/2013/07/Chalkboard.png&#34;&gt;&lt;img alt=&#34;Chalkboard&#34; loading=&#34;lazy&#34; src=&#34;https://assets.theithollow.com/wp-content/uploads/2013/07/Chalkboard-300x161.png&#34;&gt;&lt;/a&gt; This is a series of posts designed to help readers understand how the Internet works.  This specific post looks directly at how machines on the same network segment communicate with each other.&lt;/p&gt;
&lt;p&gt;We&amp;rsquo;ll look at the concept of a network segment in a future post, but for now all you need to think about is how two computers communicate on a Local Area Network.&lt;/p&gt;
&lt;h1 id=&#34;mac-addresses&#34;&gt;MAC Addresses&lt;/h1&gt;
&lt;p&gt;Before we discuss how machines on the same LAN segment communicate, we need to understand what Media Access Control (MAC) addresses are.  A MAC address is the physical address of a network adapter.  These are 48 bit addresses that are expressed as 12 digit hexadecimal notation and are unique to each network adapter.  Each manufacturer has an assigned range that they are to use for their first 24 bits, this is known as the Organizationally Unique Identifier (OUI).  The second 24 bits are known as the Network Interface Controller (NIC) specific and must be unique within that vendor&amp;rsquo;s range.  Keeping these ID&amp;rsquo;s unique is imperative for successful LAN communication.&lt;/p&gt;</description>
    </item>
    <item>
      <title>An Overview of [VMware] Virtual Networks</title>
      <link>https://theithollow.com/2013/06/24/an-overview-of-vmware-virtual-networks/</link>
      <pubDate>Mon, 24 Jun 2013 13:18:45 +0000</pubDate>
      <guid>https://theithollow.com/2013/06/24/an-overview-of-vmware-virtual-networks/</guid>
      <description>&lt;p&gt;This post was a direct result of a request from one of my readers.  I hope that this post will explain VMware networks a bit more and how they fit into a production network.&lt;/p&gt;
&lt;p&gt;To begin I&amp;rsquo;d like to review how a VMware ESXi server might have its virtual switches and port groups setup to connect to a physical switch.  Here is a list of networks that we&amp;rsquo;ll be working with.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HP Virtual Connect Throughput</title>
      <link>https://theithollow.com/2013/06/05/hp-virtual-connect-throughput/</link>
      <pubDate>Wed, 05 Jun 2013 13:54:15 +0000</pubDate>
      <guid>https://theithollow.com/2013/06/05/hp-virtual-connect-throughput/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://assets.theithollow.com/wp-content/uploads/2013/05/truckoverload.png&#34;&gt;&lt;img alt=&#34;truckoverload&#34; loading=&#34;lazy&#34; src=&#34;https://assets.theithollow.com/wp-content/uploads/2013/05/truckoverload-300x175.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;I want to address a concern that many HP Virtual Connect customers have had about monitoring their Blade Chassis.  A question I’ve received was “How do I know if I have sufficient uplinks for my traffic?”&lt;/p&gt;
&lt;p&gt;Depending on the size of the organization and their familiarity with their networking equipment, they could be monitoring the available metrics on their switches.  If they are not necessarily that network savvy or don’t have the proper monitoring tools in place, they can use the throughput statistics tools within Virtual Connect.  These tools only give a simplistic view to the amount of traffic that is going across your uplinks, and doesn’t show the traffic going out each blade but it does get you some great high level information.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Discovery Protocols</title>
      <link>https://theithollow.com/2013/05/28/discovery-protocols/</link>
      <pubDate>Tue, 28 May 2013 14:40:33 +0000</pubDate>
      <guid>https://theithollow.com/2013/05/28/discovery-protocols/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://assets.theithollow.com/wp-content/uploads/2013/05/discovery.jpg&#34;&gt;&lt;img alt=&#34;discovery&#34; loading=&#34;lazy&#34; src=&#34;https://assets.theithollow.com/wp-content/uploads/2013/05/discovery.jpg&#34;&gt;&lt;/a&gt; If you find yourself in an unfamiliar network and want to understand how the networks are connected, it would certainly be nice to be able to tell what is connected to each other.  Luckily there are a couple of protocols that are responsible for just that.&lt;/p&gt;
&lt;h1 id=&#34;cisco-discovery-protocol-cdp&#34;&gt;Cisco Discovery Protocol (CDP)&lt;/h1&gt;
&lt;p&gt;As you can probably guess from the name, the Cisco Discovery Protocol is a proprietary protocol from Cisco Systems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Flow Control Explained</title>
      <link>https://theithollow.com/2013/05/07/flow-control-explained/</link>
      <pubDate>Tue, 07 May 2013 13:58:26 +0000</pubDate>
      <guid>https://theithollow.com/2013/05/07/flow-control-explained/</guid>
      <description>&lt;p&gt;&lt;img alt=&#34;dam&#34; loading=&#34;lazy&#34; src=&#34;https://assets.theithollow.com/wp-content/uploads/2013/04/dam-300x225.jpg&#34;&gt;&lt;/p&gt;
&lt;p&gt;Until recently, I never paid too much attention to flow control.  I knew that it was used in networking, and that it was a setting that sometimes needed modified when I would puttyhyperterminal into a device, but that pretty much ended my knowledge of the matter.&lt;/p&gt;
&lt;p&gt;As the name suggests, &amp;ldquo;Flow Control&amp;rdquo; will limit the amount of data across a network interface.  It&amp;rsquo;s a pretty simple concept but typically we&amp;rsquo;re not trying to slow down our network, but rather speed it up.  Flow control can be used to slow traffic down rather than dropping frames.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How should Network Cables be Labeled?</title>
      <link>https://theithollow.com/2013/03/21/how-should-network-cables-be-labled/</link>
      <pubDate>Thu, 21 Mar 2013 14:40:22 +0000</pubDate>
      <guid>https://theithollow.com/2013/03/21/how-should-network-cables-be-labled/</guid>
      <description>&lt;p&gt;I&amp;rsquo;ve recently had to label more network cables than I care to discuss, but found my mind wondering over the best method to label these cables.  I&amp;rsquo;ve come up with three different ways to label networking cables and wanted to get some thoughts from other Engineers about how they go about this.&lt;/p&gt;
&lt;h2 id=&#34;method-1-same-label-on-both-sides&#34;&gt;Method 1:  Same label on both sides&lt;/h2&gt;
&lt;p&gt;This method creates 2 labels that are identical and puts one label on each side of the cable.  This give the advantage that if you&amp;rsquo;re running multiple batches of cables all at once, you can determine exactly which cable you&amp;rsquo;re working with.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HP Virtual Connect MAC Addresses and WWNs</title>
      <link>https://theithollow.com/2013/03/18/hp-virtual-connect-mac-addresses-and-wwns/</link>
      <pubDate>Mon, 18 Mar 2013 14:32:34 +0000</pubDate>
      <guid>https://theithollow.com/2013/03/18/hp-virtual-connect-mac-addresses-and-wwns/</guid>
      <description>&lt;p&gt;One of the benefits of using HP Virtual Connect in C-class blade Chassis is the ability to have MAC Addresses and WWNs set on a server bay as opposed to the physical server.  I&amp;rsquo;m sure you&amp;rsquo;re aware that each device that has a network card has a Media Access Control (MAC) address which is a burned in identifier that makes that NIC unique.&lt;/p&gt;
&lt;p&gt;HP decided that it might be nice to control those MAC Addresses in their blade chassis.  Before you setup any server profiles, you have the option to choose &amp;ldquo;Virtual Connect Assigned MAC Addresses&amp;rdquo;.  These are addresses that are assigned to each server bay so that no matter what blade is put into the bay, the MAC addresses will stay the same.  You might find this very useful in the case of a failed blade.  If you receive a new blade from HP and throw it into the same bay, it will retain all of the same MAC Addresses and thus look the same to your switches.&lt;/p&gt;</description>
    </item>
    <item>
      <title>NAT vs PAT</title>
      <link>https://theithollow.com/2013/03/05/nat-vs-pat/</link>
      <pubDate>Tue, 05 Mar 2013 14:12:16 +0000</pubDate>
      <guid>https://theithollow.com/2013/03/05/nat-vs-pat/</guid>
      <description>&lt;p&gt;I often hear Port Address Translation (PAT)referred to as Network Address Translation (NAT).  Its a pretty common to hear this and is really not a big deal because the two are similar and I know what is meant.  But to clear things up I decided to put together a quick post.&lt;/p&gt;
&lt;h2 id=&#34;network-address-translation&#34;&gt;Network Address Translation&lt;/h2&gt;
&lt;p&gt;NAT is the process of &amp;ldquo;translating&amp;rdquo; an IP Address in a router or firewall.  This is most commonly done to present a private IP Address into a Public IP Address that is accessible on the Internet.  For instance, you may want to have your E-mail server have a public address so that it can route mail.&lt;/p&gt;</description>
    </item>
    <item>
      <title>When to use Cat 6a</title>
      <link>https://theithollow.com/2013/02/12/when-to-use-cat-6a/</link>
      <pubDate>Tue, 12 Feb 2013 14:20:15 +0000</pubDate>
      <guid>https://theithollow.com/2013/02/12/when-to-use-cat-6a/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://assets.theithollow.com/wp-content/uploads/2013/02/IMG_20130202_152607.jpg&#34;&gt;&lt;img alt=&#34;Oh Noes!  I sense lolcats in this post.&#34; loading=&#34;lazy&#34; src=&#34;https://assets.theithollow.com/wp-content/uploads/2013/02/IMG_20130202_152607.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Oh Noes! I sense lolcats in this post.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve been seeing Category 6a cable if a few datacenters recently and thought it might be a good idea to review when and why we would use this type of cabling.&lt;/p&gt;
&lt;h2 id=&#34;wiring&#34;&gt;Wiring&lt;/h2&gt;
&lt;p&gt;The Category 6a cabling is wired the same as Category 5e at 1000BaseTX speeds.  Note: that you can get away with splitting two sets of pairs off of Cat5e, but this only allows 100BaseT Ethernet.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Jumbo Frames</title>
      <link>https://theithollow.com/2012/12/11/jumbo-frames/</link>
      <pubDate>Tue, 11 Dec 2012 16:00:54 +0000</pubDate>
      <guid>https://theithollow.com/2012/12/11/jumbo-frames/</guid>
      <description>&lt;p&gt;Jumbo frames can be useful to optimize IP networks, especially in storage networking.  This post should help to explain why using jumbo frames can be useful.&lt;/p&gt;
&lt;figure&gt;
    &lt;img loading=&#34;lazy&#34; src=&#34;http://shanksnet.files.wordpress.com/2012/12/jumbo0.png&#34;
         alt=&#34; I&amp;#39;m not Jumbo, I&amp;#39;m just big boned!&#34; width=&#34;354&#34;/&gt; &lt;figcaption&gt;
            &lt;p&gt;I&amp;rsquo;m not Jumbo, I&amp;rsquo;m just big boned!&lt;/p&gt;
        &lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p&gt;First, let&amp;rsquo;s define what we mean by the term jumbo frame.  As you can imagine it&amp;rsquo;s bigger than a normal frame.&lt;/p&gt;
&lt;p&gt;A Jumbo frame simply means any frame with an MTU larger than 1500 bytes.  What exactly does that mean?  To really understand that we need to look at an Ethernet frame.   The diagram below shows a hastily thrown together Ethernet frame and most of the frame we&amp;rsquo;re not concerned with for this topic.  Parts of the frame are used for determining where the frame is headed, where it came from and to make sure it arrived intact.  The section we&amp;rsquo;re looking at is the &amp;ldquo;Data&amp;rdquo; or &amp;ldquo;Payload&amp;rdquo; section of the frame.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A Quick Thought on VXLANs</title>
      <link>https://theithollow.com/2012/09/03/vxlans-a-good-idea/</link>
      <pubDate>Mon, 03 Sep 2012 11:00:48 +0000</pubDate>
      <guid>https://theithollow.com/2012/09/03/vxlans-a-good-idea/</guid>
      <description>&lt;p&gt;After attending VMworld this year, I decided I needed to try to understand VXLANs a little better.  Based off of the basic concept that it stretches a layer two broadcast domain over layer three networks, I was worried that I knew how this was accomplished.&lt;/p&gt;
&lt;h2 id=&#34;what-is-vxlan&#34;&gt;What is VXLAN?&lt;/h2&gt;
&lt;p&gt;VXLAN stands for Virtual Extensible LAN and is a fairly new method of making the datacenter network elastic.  Suppose for example that you want to be able to move your virtual machines from your own server room to a co-location and then to a public cloud depending on what the load was on your environment.  In order to do this without causing downtime, you&amp;rsquo;d need a way for your layer two ethernet frames to continue getting from your clients to your servers even, if a router is in that path.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HP Virtual Connect Networks</title>
      <link>https://theithollow.com/2012/08/14/hp-virtual-connect-networks/</link>
      <pubDate>Tue, 14 Aug 2012 07:00:46 +0000</pubDate>
      <guid>https://theithollow.com/2012/08/14/hp-virtual-connect-networks/</guid>
      <description>&lt;p&gt;I gave an overview of how HP blades are mapped to Virtual Connect Interconnect Modules in my last post.  &lt;a href=&#34;https://theithollow.com/2012/08/09/hp-virtual-connect-basics&#34;&gt;/2012/08/09/hp-virtual-connect-basics&lt;/a&gt;  This post focus more on understanding the networks created through HP Virtual Connect Manager.&lt;/p&gt;
&lt;p&gt;In the last post I described out blade NICs map to the Interconnect Bays in the back of an HP C7000 Chassis using the downlinks.  Now let&amp;rsquo;s talk about how those NICs can get added to a specific Network.  HP calls these networks inside of a c7000 chassis &amp;ldquo;vNets&amp;rdquo;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HP Virtual Connect Basics</title>
      <link>https://theithollow.com/2012/08/09/hp-virtual-connect-basics/</link>
      <pubDate>Fri, 10 Aug 2012 01:00:15 +0000</pubDate>
      <guid>https://theithollow.com/2012/08/09/hp-virtual-connect-basics/</guid>
      <description>&lt;p&gt;HP Virtual Connect is a great way to handle network setup for an HP Blade Chassis.  When I first started with Virtual Connect it was very confusing for me to understand where everything was, and how the blades connected to the interconnect bays.  This really is fairly simple, but might be confusing to anyone that&amp;rsquo;s new to this technology.  Hopefully this post will give newcomers the tools they need to get started.&lt;/p&gt;</description>
    </item>
    <item>
      <title>NLB in vSphere (Unicast or Multicast)?</title>
      <link>https://theithollow.com/2012/05/08/nlb-in-vsphere-unicast-or-multicast/</link>
      <pubDate>Tue, 08 May 2012 18:37:56 +0000</pubDate>
      <guid>https://theithollow.com/2012/05/08/nlb-in-vsphere-unicast-or-multicast/</guid>
      <description>&lt;p&gt;Suppose you have multiple virtual machines that you would like to distribute load across that are housed inside of your virtual environment.  How do we go about setting up Network Load Balancing so that it will still work with things like DRS and VMotion?&lt;/p&gt;
&lt;h2 id=&#34;switch-refresher&#34;&gt;Switch Refresher&lt;/h2&gt;
&lt;p&gt;In most networks we have switches that listen for MAC addresses and store them in their MAC Address Table for future use.  If a switch receives a request and it knows which port the destination MAC address is associated with, it will forward that request out the single port.  If a switch doesn&amp;rsquo;t know which port a MAC Address is associated with, it will basically send that frame out all of it&amp;rsquo;s ports (known as flooding) so that the destination can hopefully still receive it.    This is why we&amp;rsquo;ve moved away from hubs and moved towards switches.  Hubs will flood everything because they don&amp;rsquo;t keep track of the MAC Addresses.  You can see how this extra traffic on the network is unwanted.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Virtual Routing for Bubble Networks</title>
      <link>https://theithollow.com/2012/04/18/virtual-routing-for-bubble-networks/</link>
      <pubDate>Wed, 18 Apr 2012 14:13:57 +0000</pubDate>
      <guid>https://theithollow.com/2012/04/18/virtual-routing-for-bubble-networks/</guid>
      <description>&lt;p&gt;A question often comes up about what to do when you have a segmented virtual network that needs to be able to traverse subnets.  This might happen if you&amp;rsquo;re doing some testing and don&amp;rsquo;t want the machines to contact the production network, or perhaps doing a test SRM failover and having the virtual machines in their own test network.  Virtual machines in subnet (A) might need to contact other virtual machines in subnet (B) but don&amp;rsquo;t have access to the physical router any longer, so they can&amp;rsquo;t communicate.  To solve this issue, how about we try a virtual router?&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Broadcast Across Subnets</title>
      <link>https://theithollow.com/2012/04/06/how-to-broadcast-across-subnets/</link>
      <pubDate>Sat, 07 Apr 2012 03:26:20 +0000</pubDate>
      <guid>https://theithollow.com/2012/04/06/how-to-broadcast-across-subnets/</guid>
      <description>&lt;p&gt;Many services such as DHCP or TFTP use broadcast packets to find a particular server. In the case of DHCP, a device when connecting to a network will send out a broadcast to find a DHCP server to get an IP address to use. But what if you have multiple subnets on your network? You could have a DHCP server on each of your subnets, but this seems a bit overkill.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
