<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Show IP Protocols</title><description>Build Your Dream Internet with Li-Ji Hong (洪李吉)</description><managingEditor>noreply@blogger.com (Li-Ji Hong)</managingEditor><pubDate>Sun, 5 Apr 2026 18:22:49 +0800</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">182</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>https://showipprotocols.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>This work by LI-JI HONG is licensed under a Creative Commons Attribution 3.0 Unported License.</copyright><itunes:image href="https://2.bp.blogspot.com/-bJm7V72DY64/WNsXe7AqF9I/AAAAAAAG3b4/53ZVwrrVQnkkbHLJx6cljzajBN5uqnjagCLcB/s1600/sip-logo-1-1400x1400.png"/><itunes:keywords>Internet,Cisco</itunes:keywords><itunes:summary>Audio version of Blog "Show IP Protocols".</itunes:summary><itunes:subtitle>Build Dream Internet</itunes:subtitle><itunes:category text="Education"><itunes:category text="Training"/></itunes:category><itunes:category text="Technology"/><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:owner><itunes:email>hongliji@gmail.com</itunes:email><itunes:name>Li-Ji Hong (洪李吉)</itunes:name></itunes:owner><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item><title>What can we do after “US bans new foreign-made routers”?</title><link>https://showipprotocols.blogspot.com/2026/04/after-us-foreign-router-ban.html</link><pubDate>Sun, 5 Apr 2026 18:16:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-6848043291864450923</guid><description>&lt;p&gt;On March 23, 2026, Federal Communications Commission (FCC) of the United States announced, “Covered List to Include Foreign-Made Consumer Routers, Prohibiting Approval of New Models”. When a product is in Covered List, it means FCC will not inspect that product. That is, no permission at all from FCC for us to import, sell, or use that product inside the United States. Effectively, the United States bans that product. That is why most press said, “US bans foreign-made routers.”&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;a href="https://docs.fcc.gov/public/attachments/DOC-420034A1.pdf" target="_blank"&gt;FACT SHEET: FCC Updates Covered List to Include Foreign-Made Consumer Routers, Prohibiting Approval of New Models&lt;/a&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;It looked frightening when I first read it. The impacts are not immediate, however.&lt;/p&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqpe4LQSJPihwwm5Cb1LcuHvsAkmj0s-j7v2BfOyEZfB39vQn5EGKZp-s5brGWsEZDGpX1x2udez2q6n0qvIFEn_2Vv7i_qh_97x-o-SBaZt9318vpP17245TTFT9NAHTxCf8vrHgjQ5kNwT6-2W55JoOMobWX4XOoHkuIYbq3ZCmygTtEe6ng9pWLLQw/s4032/IMG_3136.jpg" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="3024" data-original-width="4032" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqpe4LQSJPihwwm5Cb1LcuHvsAkmj0s-j7v2BfOyEZfB39vQn5EGKZp-s5brGWsEZDGpX1x2udez2q6n0qvIFEn_2Vv7i_qh_97x-o-SBaZt9318vpP17245TTFT9NAHTxCf8vrHgjQ5kNwT6-2W55JoOMobWX4XOoHkuIYbq3ZCmygTtEe6ng9pWLLQw/w640-h480/IMG_3136.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;a href="https://maps.app.goo.gl/zwLJ62yc6AuVHXFg6" target="_blank"&gt;Jianshan Hill Observation Deck (尖山觀景平台)&lt;/a&gt;&lt;br /&gt;overlooking Taipei City, New Taipei City, and Tamsui River of Taiwan.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;/span&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: left;"&gt;Only for new models&lt;/h3&gt;&lt;p&gt;This new policy only applies to new models of foreign-made routers. For any existing models already approved by FCC, we can still legally import, sell, or use them inside the United States.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote&gt;New devices on the Covered List, such as foreign-made consumer-grade routers, are prohibited from receiving FCC authorization and are therefore prohibited from being imported for use or sale in the U.S. This update to the Covered List does not prohibit the import, sale, or use of any existing device models the FCC previously authorized.&lt;/blockquote&gt;In addition, FCC also added exceptions to foreign-made routers on this new policy: if Department of War (DoW) or Department of Homeland Security (DHS) approves your foreign-made routers, they are exempt from the Covered List. FCC will inspect them as before and give permission for us to import, sell, or use them if they are qualified.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote&gt;Producers of consumer-grade routers that receive Conditional Approval from DoW or DHS can continue to receive FCC equipment authorizations. Interested applicants are encouraged to submit applications to conditional-approvals@fcc.gov.&lt;/blockquote&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;My suggestions for foreign manufacturers&lt;/h3&gt;&lt;p&gt;Impacts are NOT on consumers. Impacts are on foreign manufacturers. I have two suggestions for foreign manufacturers.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;1. Contact and arrange new product lines for approval by DoW or DHS.&lt;/h3&gt;&lt;p&gt;According to the same announcement: contact "conditional-approvals@fcc.gov". Although FCC did not provide further details, this is still a viable option.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;2. Migrate your manufacturing facilities into the United States.&lt;/h3&gt;&lt;p&gt;This new policy only applies to “foreign made” routers. That is, any routers manufactured inside the United States are exempt by this new policy.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h1 style="text-align: left;"&gt;One more thing…&lt;/h1&gt;&lt;p&gt;The United States raised security standards to protect her own security. I understand and I respect it.&lt;/p&gt;&lt;p&gt;This new policy only applies to “consumer routers.” Higher end routers such as Cisco’s enterprise grade routers are not among them. The United States has already set significantly stricter requirements for enterprise-grade routers, including NDAA compliance.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqpe4LQSJPihwwm5Cb1LcuHvsAkmj0s-j7v2BfOyEZfB39vQn5EGKZp-s5brGWsEZDGpX1x2udez2q6n0qvIFEn_2Vv7i_qh_97x-o-SBaZt9318vpP17245TTFT9NAHTxCf8vrHgjQ5kNwT6-2W55JoOMobWX4XOoHkuIYbq3ZCmygTtEe6ng9pWLLQw/s72-w640-h480-c/IMG_3136.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.4970294</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">-3.2839481361788465 86.3407794 53.336519536178841 156.6532794</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author></item><item><title> BGP Millionaire</title><link>https://showipprotocols.blogspot.com/2025/05/bgp-millionaire.html</link><category>BGP</category><pubDate>Sun, 4 May 2025 13:50:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-5166247166182234227</guid><description>&lt;p&gt;【 BGP Millionaire】&lt;/p&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiS0nfzpYzBHbZwtJmVKN99QnHSW-G1AgWYN8etl9HXtZ8TKpbtBxFGaPvBNlkQz_uYbTYt4qE2CxhGyb5egTuE94xyh1Yoxa06Dgt3l8Fkutz8uKP7Vyts8-KUeWTzmscXIdNn6-q0n445MkxtL9B2tw4D83uJRDrz5nd3i_vdHRUhDYldRwhtQheDXXo/s613/bgp-plot-feb-apr2025-mark.png" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="466" data-original-width="613" height="486" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiS0nfzpYzBHbZwtJmVKN99QnHSW-G1AgWYN8etl9HXtZ8TKpbtBxFGaPvBNlkQz_uYbTYt4qE2CxhGyb5egTuE94xyh1Yoxa06Dgt3l8Fkutz8uKP7Vyts8-KUeWTzmscXIdNn6-q0n445MkxtL9B2tw4D83uJRDrz5nd3i_vdHRUhDYldRwhtQheDXXo/w640-h486/bgp-plot-feb-apr2025-mark.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;I used &lt;a href="https://www.cidr-report.org/cgi-bin/plota?file=%2fvar%2fdata%2fbgp%2fas2.0%2fbgp%2dactive%2etxt&amp;amp;descr=Active%20BGP%20entries%20%28FIB%29&amp;amp;ylabel=Active%20BGP%20entries%20%28FIB%29&amp;amp;with=step" target="_blank"&gt;this tool&lt;/a&gt; to generate this plot.&lt;br /&gt;Plot Range: 01-Feb-2025 0001 to 30-Apr-2025 0030.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;p&gt;Recently I observed and noticed that, global IPv4 BGP table size has already grown over 1 million entries, around February to April time in this year, 2025.&lt;/p&gt;&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;a name='more'&gt;&lt;/a&gt;I want to clarify this first. By the number “one million” I mean exactly the number “1,000,000”. I understand most people are more familiar with another number “1,024*1,024=1,048,576” as “1 Mega” something. We do not have that many BGP entries today yet. I believe just in weeks the global IPv4 BGP table size will also surpass this “1 Mega” number.&lt;p&gt;&lt;/p&gt;&lt;p&gt;Will this event also trigger BGP packet forwarding problems just like that in 2014? I did a little research, and I found service providers’ routers in recent years have far more capacity than one million entries in hardware packet forwarding information base (FIB) entries. That is, no worry about any incidents at all. We can safely celebrate this “one million” day.&lt;/p&gt;&lt;p&gt;To all TCP/IP networkers, we are all Millionaires today.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;One more thing…&lt;/h2&gt;&lt;p&gt;How about the number of BGP entries for global IPv6? The global BGP table size for IPv6 is around 220,000, as of May 4, 2025.&lt;/p&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJUEXCCzg05mC-csNHXo-jUe5RqA_5JhVLnPUXcsiCOGVa3V7Mn3R4bxBaI8eCdzRUGpAp5kAh6IHc8wgr8gU2ZU2oxEb8LdQmdhSbw-cblIKi5V-Ly0rGg0DLJc6O7cFMbctT7WlP1gmMpIEKP3QsXkbGVhmyICiooFVWQU-Wqia2GnTnXz_8O4YIsvM/s615/ipv6-bgp-plot-y2025may4-mark.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="465" data-original-width="615" height="484" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJUEXCCzg05mC-csNHXo-jUe5RqA_5JhVLnPUXcsiCOGVa3V7Mn3R4bxBaI8eCdzRUGpAp5kAh6IHc8wgr8gU2ZU2oxEb8LdQmdhSbw-cblIKi5V-Ly0rGg0DLJc6O7cFMbctT7WlP1gmMpIEKP3QsXkbGVhmyICiooFVWQU-Wqia2GnTnXz_8O4YIsvM/w640-h484/ipv6-bgp-plot-y2025may4-mark.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;I used &lt;a href="https://www.cidr-report.org/cgi-bin/plota?file=%%2fvar%%2fdata%%2fbgp%%2fv6%%2fas2.0%%2fbgp%%2dactive%%2etxt&amp;amp;descr=Active%%20BGP%%20entries%%20%%28FIB%%29&amp;amp;ylabel=Active%%20BGP%%20entries%%20%%28FIB%%29&amp;amp;with=step" target="_blank"&gt;this tool&lt;/a&gt; to generate this plot.&lt;br /&gt;Plot Range: 01-Feb-2025 0001 to 04-May-2025 0004&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiS0nfzpYzBHbZwtJmVKN99QnHSW-G1AgWYN8etl9HXtZ8TKpbtBxFGaPvBNlkQz_uYbTYt4qE2CxhGyb5egTuE94xyh1Yoxa06Dgt3l8Fkutz8uKP7Vyts8-KUeWTzmscXIdNn6-q0n445MkxtL9B2tw4D83uJRDrz5nd3i_vdHRUhDYldRwhtQheDXXo/s72-w640-h486-c/bgp-plot-feb-apr2025-mark.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.4970294</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">-3.2839481361788465 86.3407794 53.336519536178841 156.6532794</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author></item><item><title> How do we fix a broken submarine fiber cable?</title><link>https://showipprotocols.blogspot.com/2025/01/how-do-we-fix-broken-submarine-fiber.html</link><category>Fiber Optics</category><pubDate>Sat, 11 Jan 2025 08:02:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-3713668200556879862</guid><description>&lt;p&gt;A submarine cable cutting incident happened recently at the &lt;a href="https://en.wikipedia.org/wiki/2024_Baltic_Sea_submarine_cable_disruptions" target="_blank"&gt;Baltic Sea&lt;/a&gt;. Another similar incident also happened &lt;a href="https://www.ft.com/content/be994bfb-7299-4334-829d-230dddbc7e25" target="_blank"&gt;north of Taiwan.&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;div class="video-container"&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" height="315" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/halaamAFcRU?si=oEmTIURyE-lq41_X" title="YouTube video player" width="560"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;p&gt;I wanted to know more about how to repair a broken submarine fiber cable. I did my research on the Internet. I summarize my findings and list the key fixing steps below.&lt;/p&gt;&lt;p&gt;1.&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;The submarine cable was working.&lt;/p&gt;&lt;p&gt;Initially, the working submarine cable was below the sea water and above the seabed. The submarine cable follows and fits the terrain of seabed.&lt;/p&gt;&lt;p&gt;2.&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;A fault happens.&lt;/p&gt;&lt;p&gt;Examples of faults are punctured insulation, fiber core breaks, and cable cut.&lt;/p&gt;&lt;p&gt;Faults could be natural factors, such as the aging of cable itself, earthquakes, falling rocks, and shark bites. Faults could also be human factors, such as fishing nets dragging, anchoring hits, and malicious sabotage.&lt;/p&gt;&lt;span&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;/span&gt;&lt;p&gt;3.&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;Use OTDR to pinpoint faulty segments. Send the repair ship to Location A.&lt;/p&gt;&lt;p&gt;Optical Time-domain Reflectometer (OTDR) is a device for us to measure the distance from fiber ends to the fiber core breaks. It will emit laser beams and measure its reflection travel time. With this distance estimation, we can locate the faulty segments on the fiber route map. Now we know faults are happening between Location A and Location B. We can send the repair ship to Location A.&lt;/p&gt;&lt;p&gt;4.&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;Cut the cable at the End A.&lt;/p&gt;&lt;p&gt;Because in the next step we will float End A of this cable to the surface of the sea water, we must cut the cable.&lt;/p&gt;&lt;p&gt;To find the cable and an appropriate spot to cut the cable under the sea water, we can make use of special towed grabbing devices, or undersea robots.&lt;/p&gt;&lt;p&gt;It might surprise you. We do not do undersea repairs of a broken cable. We simply cut the problematic segment away and replace it with spare cable. We do all the splicing at the surface on the repair ship.&lt;/p&gt;&lt;p&gt;5.&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;Attach a buoy to mark and float End A.&lt;/p&gt;&lt;p&gt;Now, we can attach a buoy to float End A to the surface. It also marks the location of End A at the surface so the repair ship can go back to grab End A later.&lt;/p&gt;&lt;p&gt;6.&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;Send repair ship to Location B. Grab End B to repair ship.&lt;/p&gt;&lt;p&gt;The repair ship now can travel to Location B. With the similar approach at Location A, the repair ship can also find and float End B to the repair ship.&lt;/p&gt;&lt;p&gt;We can now grab End B of the cable onto the repair ship.&lt;/p&gt;&lt;p&gt;7.&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;Splice End B to the spare new cable.&lt;/p&gt;&lt;p&gt;We can now splice End B of the cable to spare cable rolls. To splice fiber cables, we usually deploy special splicing and insulation kits to ease up fusion operations of fiber cores on the rocking repair ship.&lt;/p&gt;&lt;p&gt;8.&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;Lay the newly spliced cable way up to Location A.&lt;/p&gt;&lt;p&gt;After the splicing, the repair ship can now lay back the newly spliced cable down to the seabed gradually. Repeat this process all the way back to Location A at the buoy.&lt;/p&gt;&lt;p&gt;9.&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;Splice End A to the newly spliced cable.&lt;/p&gt;&lt;p&gt;At Location A, we can find floated End A of the cable easily because of the buoys. Grab End A to the repair ship and again splice End A to the newly spliced cable.&lt;/p&gt;&lt;p&gt;After this step, the connectivity of the cable restores. We can now also restore the cable back to its original location on the seabed.&lt;/p&gt;&lt;p&gt;10.&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;Release the cable down to seabed.&lt;/p&gt;&lt;p&gt;We can release the repaired cable now from the repair ship and drop it down to the original seabed. We might make cable adjustments when necessary.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;One more thing…&lt;/h2&gt;&lt;p&gt;We need specialized repair ships first before we can do any repairs of the broken cable. However, few such repair ships are standing by around the globe. Even when the repair ship can travel at a high speed of thirty knots, which is unlikely, it still cannot reach sixty kilometers per hour. It would take days or even weeks just for one repair ship to arrive at the faulty location.&lt;/p&gt;&lt;p&gt;For network operators, we must always have redundant paths and backup cables when we design a submarine fiber cable system.&lt;/p&gt;&lt;p&gt;Next, we also know that the spliced fiber would add up attenuation to the passing signal strength. When we have done enough count of repairing and splicing operations on the fiber cable, the whole fiber cable would become unusable anymore and that is the end of its life. That is, any deployed submarine fiber cables have a limited lifetime. We must be prepared to replace the whole fiber cable when it is out of its lifetime.&lt;/p&gt;&lt;p&gt;Last but not the least, should the broken submarine fiber cable incident be the result of human sabotage, I have two recommendations:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style="text-align: left;"&gt;&lt;li&gt;Add more repair ships near the troublesome area. This will reduce our waiting time for the repair ship to arrive.&lt;/li&gt;&lt;li&gt;Add patrolling guard ships along the submarine cable route. Normally, merchant ships should never be stationary and anchored in the middle of the sea. If they do, they are suspicious of intentional sabotage.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;

&lt;div class="flashcard"&gt;
    &lt;div class="front" onclick="gtag('event', 'PostFlashcardFrontClick');"&gt;
      &lt;p&gt;What do we use to measure the distance to the fiber core breaks?&lt;br /&gt;&lt;br /&gt;Click to show the answer.&lt;/p&gt;
    &lt;/div&gt;
    &lt;div class="back" onclick="gtag('event', 'PostFlashcardBackClick');"&gt;
      &lt;p&gt;"Optical Time-domain Reflectometer (OTDR)"&lt;/p&gt;
    &lt;/div&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/halaamAFcRU/default.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author></item><item><title>BGP AS-Path Filtering, Demonstration</title><link>https://showipprotocols.blogspot.com/2025/01/bgp-as-path-filtering-demonstration.html</link><category>BGP</category><pubDate>Sun, 5 Jan 2025 20:19:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-962981019932675321</guid><description>&lt;p&gt;How many of you are working with BGP in your daily job? Let me know in the comments below this post.&lt;/p&gt;&lt;p&gt;I also created a live demonstration about filtering based on BGP AS-Path with Regular Expressions. I hope it is helpful to you.&lt;/p&gt;&lt;div class="video-container"&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" height="315" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/ZhNPdVH52DE?si=NfKrqTKOfY0bKUBD" title="YouTube video player" width="560"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;
&lt;div class="flashcard"&gt;
    &lt;div class="front" onclick="gtag('event', 'PostFlashcardFrontClick');"&gt;
      &lt;p&gt;What is the main command demonstrated in this video?&lt;br/&gt;&lt;br/&gt;Click to show the answer.&lt;/p&gt;
    &lt;/div&gt;
    &lt;div class="back"  onclick="gtag('event', 'PostFlashcardBackClick');"&gt;
      &lt;p&gt;"show ip bgp regexp ..."&lt;/p&gt;
    &lt;/div&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/ZhNPdVH52DE/default.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author></item><item><title>Cisco IOS Live demo: Filtering with Regex</title><link>https://showipprotocols.blogspot.com/2024/12/cisco-ios-live-demo-filtering-with-regex.html</link><category>IOS</category><pubDate>Tue, 31 Dec 2024 16:22:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-8843794537637214364</guid><description>&lt;div&gt;&lt;br /&gt;&lt;/div&gt;I share my technique about how I use Regular Expression (regex) to filter out show commands' output.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;How do you like this video? Let me know at the comments area of this post, or on YouTube.&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;div class="video-container"&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" height="315" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/d65zAsQni-k?si=taBhtYyUGhDEW8J3" title="YouTube video player" width="560"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;
&lt;div class="flashcard"&gt;
    &lt;div class="front" onclick="gtag('event', 'PostFlashcardFrontClick');"&gt;
      &lt;p&gt;What is the main command demonstrated in this video?&lt;br/&gt;&lt;br/&gt;Click to show the answer.&lt;/p&gt;
    &lt;/div&gt;
    &lt;div class="back"  onclick="gtag('event', 'PostFlashcardBackClick');"&gt;
      &lt;p&gt;"show interfaces | include ..."&lt;/p&gt;
    &lt;/div&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/d65zAsQni-k/default.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author></item><item><title>Cool Immersive Cooling</title><link>https://showipprotocols.blogspot.com/2024/06/cool-immersive-cooling.html</link><category>Data Center</category><pubDate>Wed, 5 Jun 2024 13:47:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-2773088610559189396</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-Rle-xa5Nsr3xo7qcJmxmrlQAP_rBzj9B-PFn-x3b-FVBbeD3MORVUuDSLGkNMemJuAYMZM_4Dp5xQ2ETRvm1t-6qt0YsyJ8H4OwNABMcTfIwtrRAZkBPd2rbdROc2dkXggZxUfnOjcEtxVL7ETYgKWQ2oajZxvqguE2zgzKlr2cl-KG9Uu0WtPyeqXM/s720/ueVWzwnBFmljZxbo.mp4_snapshot_00.00_%5B2024.06.05_13.41.57%5D.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="720" data-original-width="720" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-Rle-xa5Nsr3xo7qcJmxmrlQAP_rBzj9B-PFn-x3b-FVBbeD3MORVUuDSLGkNMemJuAYMZM_4Dp5xQ2ETRvm1t-6qt0YsyJ8H4OwNABMcTfIwtrRAZkBPd2rbdROc2dkXggZxUfnOjcEtxVL7ETYgKWQ2oajZxvqguE2zgzKlr2cl-KG9Uu0WtPyeqXM/w200-h200/ueVWzwnBFmljZxbo.mp4_snapshot_00.00_%5B2024.06.05_13.41.57%5D.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;I was so amazed about this cooling technology. It is new to me.&lt;/p&gt;&lt;p&gt;Thinking about liquid cooling for servers and networking devices, coming into my mind are tightly sealed water pipes around the circuit boards. This is different. The circuit board and everything simply immerse in liquid.&lt;/p&gt;&lt;p&gt;&lt;a href="https://x.com/CiscoSP360/status/1797747657663754535" target="_blank"&gt;Cisco Service Provider Tweet&lt;/a&gt;&lt;/p&gt;&lt;span&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;/span&gt;&lt;p&gt;The cooling liquid looks like water to me. However, I know this simple physics that water is electrically conductive. Even a drop of water on a running circuit will surely short-circuit everything and burn break them all. Is there any new coating technology over the metal so circuit boards nowadays can be waterproof?&lt;/p&gt;&lt;p&gt;After watching this video, I now know the key is about the liquid itself.&lt;/p&gt;&lt;div class="video-container"&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" height="315" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/PvmMs6mU0NU?si=H3GEtq9uf1iNxONw" title="YouTube video player" width="560"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;p&gt;&lt;span face="&amp;quot;Aptos&amp;quot;,sans-serif" lang="EN-US" style="font-size: 12pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: 新細明體; mso-fareast-language: ZH-TW; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-latin;"&gt;&lt;a href="https://youtu.be/PvmMs6mU0NU?si=-NgiEM5AbHxdu_kE"&gt;https://youtu.be/PvmMs6mU0NU?si=-NgiEM5AbHxdu_kE&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;That liquid is a product named “ElectroCool Dielectric Coolant” by “Engineered Fluids.” It is not conductive up to tens of kilovolts with kiloamperes. When pouring this liquid onto a running circuit board, it is as if a “denser air” is filling and replacing original natural air. All the magic is the liquid itself.&lt;/p&gt;&lt;p&gt;Although I do not have confirmation from Cisco, I do believe the liquid used in Cisco Live demo video should be exactly “ElectroCool Dielectric Coolant,” or at least similar product from other vendors.&lt;/p&gt;&lt;p&gt;I can see benefits of this “cool” liquid coolant:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style="text-align: left;"&gt;&lt;li&gt;It is as transparent as air, not conductive, and better capacity for heat dissipation.&lt;/li&gt;&lt;li&gt;This technology makes less fan noises. It makes noisy data centers quiet.&lt;/li&gt;&lt;li&gt;This liquid is not toxic, according to the demo.&lt;/li&gt;&lt;li&gt;Easier to deploy. It is much easier than installing sealed water pipes around circuit boards.&lt;/li&gt;&lt;li&gt;Fiber optics are still working under this liquid. Refraction is not a problem.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h1 style="text-align: left;"&gt;One more thing…&lt;/h1&gt;&lt;p&gt;I also have a couple of doubts about deploying this technology.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style="text-align: left;"&gt;&lt;li&gt;Is this liquid corrosive so circuitry would stop working with enough time? What about rotating fans?&lt;/li&gt;&lt;li&gt;Will this liquid easily vaporize itself so we must refill the liquid frequently?&lt;/li&gt;&lt;li&gt;When this coolant contacts plain water, such as firewater, condensed water drops, or rain waters, what would happen?&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;It is an interesting new cooling technology for me to observe on.&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-Rle-xa5Nsr3xo7qcJmxmrlQAP_rBzj9B-PFn-x3b-FVBbeD3MORVUuDSLGkNMemJuAYMZM_4Dp5xQ2ETRvm1t-6qt0YsyJ8H4OwNABMcTfIwtrRAZkBPd2rbdROc2dkXggZxUfnOjcEtxVL7ETYgKWQ2oajZxvqguE2zgzKlr2cl-KG9Uu0WtPyeqXM/s72-w200-h200-c/ueVWzwnBFmljZxbo.mp4_snapshot_00.00_%5B2024.06.05_13.41.57%5D.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.4970294</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">-3.2839481361788465 86.3407794 53.336519536178841 156.6532794</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author></item><item><title>Breaking 100K Entries is the Global IPv6 BGP Table</title><link>https://showipprotocols.blogspot.com/2020/12/ipv6-bgp-over-100k.html</link><category>BGP</category><category>IPv6</category><pubDate>Sun, 6 Dec 2020 10:01:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-7263434070742648542</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBbWA0WhG5VNokeI3XYcuQLrbhSMK-BSdP1spPVFl-t0uHwhuaz4ZlD1eSL-MLA8dC4dAgcgG2PmSiaM3SHdYMjQmY4Tp9mvbFMFqrXEAzcI3bcjS_GyvGuTenMEplJjwqe6oqGagllyc/s4608/20201127_143724.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="3456" data-original-width="4608" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBbWA0WhG5VNokeI3XYcuQLrbhSMK-BSdP1spPVFl-t0uHwhuaz4ZlD1eSL-MLA8dC4dAgcgG2PmSiaM3SHdYMjQmY4Tp9mvbFMFqrXEAzcI3bcjS_GyvGuTenMEplJjwqe6oqGagllyc/w200-h150/20201127_143724.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;This year, 2020, around November I started to see the global IPv6 BGP Table is getting more than 100K entries. Although the number is going above and under 100K from time to time, starting from the end of November I can safely say it is breaking 100K entries right now.&lt;p&gt;&lt;/p&gt;&lt;p&gt;This is an interesting milestone for IPv6. That means a massive majority of people are using IPv6 today. I want to note down this moment. And I want to share 3 of my own observations about the IPv6 BGP table.&lt;/p&gt;&lt;span&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;/span&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgik_xhUuWdBWv_kOXIMYiQzZQ9MQ85SO2bjgQ8nj7fqmdGvADHyPPCtGfnPuUBcaSJMx30wZNcfwovZuUZ2eMdI51oR6tCl-wZpxoQYdW2uUnZwKKZ13xOEOrAY7c2ii3fD3h6vTE9JZI/s1920/0003.jpg" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="1080" data-original-width="1920" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgik_xhUuWdBWv_kOXIMYiQzZQ9MQ85SO2bjgQ8nj7fqmdGvADHyPPCtGfnPuUBcaSJMx30wZNcfwovZuUZ2eMdI51oR6tCl-wZpxoQYdW2uUnZwKKZ13xOEOrAY7c2ii3fD3h6vTE9JZI/w640-h360/0003.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Source:&amp;nbsp;&lt;a href="https://twitter.com/bgp6_table/status/1330964625127583744/photo/1" target="_blank"&gt;https://twitter.com/bgp6_table/status/1330964625127583744/photo/1&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Number of IPv6 BGP entries is going up and down&lt;/h3&gt;&lt;p&gt;Internet is a collection of distributed, self-managed networks. No single authority can dictate how the BGP configuration should be done on all different networks. Each of the network administrators could choose when and how to add or remove BGP entries in different occasions.&lt;/p&gt;&lt;p&gt;It is natural for BGP table to grow and shrink from time to time.&lt;/p&gt;&lt;p&gt;For example, network administrators might decide to remove assigned but not used yet networks from BGP configurations. By this action, the number of BGP entries could go down.&lt;/p&gt;&lt;p&gt;Another example, to achieve load spreading, administrators might break their own IPv6 prefixes into smaller ones and advertise them to different BGP neighbors. By this action, the number of BGP entries could go up.&lt;/p&gt;&lt;p&gt;And of course, upon expanding networks with more prefixes, or dying companies returning prefixes to Internet Regional Registries, the BGP table would grow or shrink accordingly.&lt;/p&gt;&lt;p&gt;Configuration errors could also result in fluctuations of the total number of BGP entries.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii94NOW3Smhcd_LmIsB2xNxcQ24sS1iV5t5rH8LZWIrvEirSHadT_wf2_ylaEfTtwrCd50foWeTp7tu4jIo5swwNsdp3DLmn_Xue3kkMWrqV5gSjd7tjecuP0zsC86Y_kwdeiyve7eCbY/s1920/0007.jpg" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="1080" data-original-width="1920" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii94NOW3Smhcd_LmIsB2xNxcQ24sS1iV5t5rH8LZWIrvEirSHadT_wf2_ylaEfTtwrCd50foWeTp7tu4jIo5swwNsdp3DLmn_Xue3kkMWrqV5gSjd7tjecuP0zsC86Y_kwdeiyve7eCbY/w640-h360/0007.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Source:&amp;nbsp;&lt;a href="https://www.cidr-report.org/v6/as2.0/" target="_blank"&gt;IPv6 CIDR Report for 30 Nov 20&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;&lt;/p&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: left;"&gt;Projection of 100K time is pretty accurate&lt;/h3&gt;&lt;p&gt;I have read web pages by APNIC and RIPE projecting the total number of IPv6 BGP entries. They all projected the time of 100K is around the second half of year 2020.&amp;nbsp;&lt;/p&gt;&lt;p&gt;They are pretty accurate in my opinion.&lt;/p&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiylwZYnddAOT2a1wRQzzbuBppvcA2Eg_3uVNRoAU0GX8ir06qe5LQPQA4np0OYuC3BbE2AjPewDG2EkSJPXOK_A5Xa8VQ_HG1q5KH7j5_huC60IUtHhq07ar5wizKP5wvAvkKEWOT9bDM/s1920/0011.jpg" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="1080" data-original-width="1920" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiylwZYnddAOT2a1wRQzzbuBppvcA2Eg_3uVNRoAU0GX8ir06qe5LQPQA4np0OYuC3BbE2AjPewDG2EkSJPXOK_A5Xa8VQ_HG1q5KH7j5_huC60IUtHhq07ar5wizKP5wvAvkKEWOT9bDM/w640-h360/0011.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Source:&amp;nbsp;APNIC, &lt;a href="https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig29-v6-bgp-active-day.png" target="_blank"&gt;"BGP in 2019 - The BGP Table"&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrzOKDS_-IKWQ1XNLSNGr_QNO9eAranhNOSlmZRA8efOvNbUeM4n1C_2KWtFUWZpuygr7IJHxubizg6uNjMOd-Wy4ya3HvmVxC2c754PSMH32USecvOu7eJGgUX3co0dW8XIeDLOJ_lxo/s1920/0014.jpg" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="1080" data-original-width="1920" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrzOKDS_-IKWQ1XNLSNGr_QNO9eAranhNOSlmZRA8efOvNbUeM4n1C_2KWtFUWZpuygr7IJHxubizg6uNjMOd-Wy4ya3HvmVxC2c754PSMH32USecvOu7eJGgUX3co0dW8XIeDLOJ_lxo/w640-h360/0014.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Source:&amp;nbsp;RIPE, &lt;a href="https://labs.ripe.net/Members/gih/bgp-in-2016" target="_blank"&gt;"BGP in 2016"&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;IPv6 BGP table is growing much faster than IPv4&lt;/h3&gt;&lt;p&gt;For IPv6 BGP: Last year, 2019, around October, I observed IPv6 BGP table is around 80K in size. After around 1 year now, it is over 100K. That is, the growth rate in this interval is 25% (=20/80).&lt;/p&gt;&lt;p&gt;For IPv4 BGP: same interval as above, October 2019, I observed IPv4 BGP table is around 800K in size. After the same 1 year up to now, it is over 850K in size. That is, the growth rate in this interval is 6.25% (=50/800)&lt;/p&gt;&lt;p&gt;My conclusion is: the growth rate of IPv6 is much higher than that of IPv4, in this interval.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;One more thing…&lt;/h2&gt;&lt;p&gt;Many people are also interested in estimates of router memory consumption to hold the whole global BGP table. For IPv6, unfortunately, I cannot find good firsthand samples about the number of entries versus the memory size consumed. I now try to estimate the memory consumption by samples of IPv4.&lt;/p&gt;&lt;p&gt;For single IP address, IPv4 is 32 bits, and IPv6 is 128 bits. One IPv6 address is 4 times the size of one IPv4 address. Because essentially BGP entry fields are IP addresses, here I roughly assume IPv6 BGP table should not take more than 4 times the memory consumption of IPv4 BGP table of the same number of entries.&lt;/p&gt;&lt;p&gt;I already wrote about this before: &lt;a href="https://showipprotocols.blogspot.com/2009/08/bgp-memory-requirement-estimation.html" target="_blank"&gt;every 100K IPv4 BGP entries could take no more than 80 Megabytes of memory.&lt;/a&gt; Therefore, my estimate for the same 100K entries of IPv6 BGP table, should not take more than 320 Megabytes of memory.&lt;/p&gt;&lt;p&gt;Do you have firsthand numbers of IPv6 BGP memory consumption? How wrong is my estimate ? I would like to hear from you in the comment section below.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW09ZYRJKuxAXIos649NLbiPtuZU5Jk0ZsrYus5rJkykOVS8-aA4ESp-UkEkWVy5U00SslfOzuYWVZDrr6MGJCMdWloagx1zI4Y83WLmhJ7ysTZnxvhbg32PTl_o81PpVbCMSVLCNGQic/s4608/20201127_143724.jpg" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="3456" data-original-width="4608" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW09ZYRJKuxAXIos649NLbiPtuZU5Jk0ZsrYus5rJkykOVS8-aA4ESp-UkEkWVy5U00SslfOzuYWVZDrr6MGJCMdWloagx1zI4Y83WLmhJ7ysTZnxvhbg32PTl_o81PpVbCMSVLCNGQic/w640-h480/20201127_143724.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Overlooking from the top floor of &lt;a href="https://goo.gl/maps/G5Vk4BiCJY6v31No9" target="_blank"&gt;Dragon and Tiger Pagodas (龍虎塔)&lt;/a&gt;&lt;br /&gt;Zuoying District, Kaohsiung City, Taiwan&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;p&gt;I am Li-Ji Hong. This is my blog “Show IP Protocols”. See you next time!&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20201206/hongliji-sip-p-20201206.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBbWA0WhG5VNokeI3XYcuQLrbhSMK-BSdP1spPVFl-t0uHwhuaz4ZlD1eSL-MLA8dC4dAgcgG2PmSiaM3SHdYMjQmY4Tp9mvbFMFqrXEAzcI3bcjS_GyvGuTenMEplJjwqe6oqGagllyc/s72-w200-h150-c/20201127_143724.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.4970294</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">-3.2839481361788465 86.3407794 53.336519536178841 156.6532794</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>This year, 2020, around November I started to see the global IPv6 BGP Table is getting more than 100K entries. Although the number is going above and under 100K from time to time, starting from the end of November I can safely say it is breaking 100K entries right now. This is an interesting milestone for IPv6. That means a massive majority of people are using IPv6 today. I want to note down this moment. And I want to share 3 of my own observations about the IPv6 BGP table.Source:&amp;nbsp;https://twitter.com/bgp6_table/status/1330964625127583744/photo/1 Number of IPv6 BGP entries is going up and down Internet is a collection of distributed, self-managed networks. No single authority can dictate how the BGP configuration should be done on all different networks. Each of the network administrators could choose when and how to add or remove BGP entries in different occasions. It is natural for BGP table to grow and shrink from time to time. For example, network administrators might decide to remove assigned but not used yet networks from BGP configurations. By this action, the number of BGP entries could go down. Another example, to achieve load spreading, administrators might break their own IPv6 prefixes into smaller ones and advertise them to different BGP neighbors. By this action, the number of BGP entries could go up. And of course, upon expanding networks with more prefixes, or dying companies returning prefixes to Internet Regional Registries, the BGP table would grow or shrink accordingly. Configuration errors could also result in fluctuations of the total number of BGP entries. Source:&amp;nbsp;IPv6 CIDR Report for 30 Nov 20 Projection of 100K time is pretty accurate I have read web pages by APNIC and RIPE projecting the total number of IPv6 BGP entries. They all projected the time of 100K is around the second half of year 2020.&amp;nbsp; They are pretty accurate in my opinion.Source:&amp;nbsp;APNIC, "BGP in 2019 - The BGP Table" Source:&amp;nbsp;RIPE, "BGP in 2016" IPv6 BGP table is growing much faster than IPv4 For IPv6 BGP: Last year, 2019, around October, I observed IPv6 BGP table is around 80K in size. After around 1 year now, it is over 100K. That is, the growth rate in this interval is 25% (=20/80). For IPv4 BGP: same interval as above, October 2019, I observed IPv4 BGP table is around 800K in size. After the same 1 year up to now, it is over 850K in size. That is, the growth rate in this interval is 6.25% (=50/800) My conclusion is: the growth rate of IPv6 is much higher than that of IPv4, in this interval. One more thing… Many people are also interested in estimates of router memory consumption to hold the whole global BGP table. For IPv6, unfortunately, I cannot find good firsthand samples about the number of entries versus the memory size consumed. I now try to estimate the memory consumption by samples of IPv4. For single IP address, IPv4 is 32 bits, and IPv6 is 128 bits. One IPv6 address is 4 times the size of one IPv4 address. Because essentially BGP entry fields are IP addresses, here I roughly assume IPv6 BGP table should not take more than 4 times the memory consumption of IPv4 BGP table of the same number of entries. I already wrote about this before: every 100K IPv4 BGP entries could take no more than 80 Megabytes of memory. Therefore, my estimate for the same 100K entries of IPv6 BGP table, should not take more than 320 Megabytes of memory. Do you have firsthand numbers of IPv6 BGP memory consumption? How wrong is my estimate ? I would like to hear from you in the comment section below. Overlooking from the top floor of Dragon and Tiger Pagodas (龍虎塔) Zuoying District, Kaohsiung City, Taiwan I am Li-Ji Hong. This is my blog “Show IP Protocols”. See you next time!</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>This year, 2020, around November I started to see the global IPv6 BGP Table is getting more than 100K entries. Although the number is going above and under 100K from time to time, starting from the end of November I can safely say it is breaking 100K entries right now. This is an interesting milestone for IPv6. That means a massive majority of people are using IPv6 today. I want to note down this moment. And I want to share 3 of my own observations about the IPv6 BGP table.Source:&amp;nbsp;https://twitter.com/bgp6_table/status/1330964625127583744/photo/1 Number of IPv6 BGP entries is going up and down Internet is a collection of distributed, self-managed networks. No single authority can dictate how the BGP configuration should be done on all different networks. Each of the network administrators could choose when and how to add or remove BGP entries in different occasions. It is natural for BGP table to grow and shrink from time to time. For example, network administrators might decide to remove assigned but not used yet networks from BGP configurations. By this action, the number of BGP entries could go down. Another example, to achieve load spreading, administrators might break their own IPv6 prefixes into smaller ones and advertise them to different BGP neighbors. By this action, the number of BGP entries could go up. And of course, upon expanding networks with more prefixes, or dying companies returning prefixes to Internet Regional Registries, the BGP table would grow or shrink accordingly. Configuration errors could also result in fluctuations of the total number of BGP entries. Source:&amp;nbsp;IPv6 CIDR Report for 30 Nov 20 Projection of 100K time is pretty accurate I have read web pages by APNIC and RIPE projecting the total number of IPv6 BGP entries. They all projected the time of 100K is around the second half of year 2020.&amp;nbsp; They are pretty accurate in my opinion.Source:&amp;nbsp;APNIC, "BGP in 2019 - The BGP Table" Source:&amp;nbsp;RIPE, "BGP in 2016" IPv6 BGP table is growing much faster than IPv4 For IPv6 BGP: Last year, 2019, around October, I observed IPv6 BGP table is around 80K in size. After around 1 year now, it is over 100K. That is, the growth rate in this interval is 25% (=20/80). For IPv4 BGP: same interval as above, October 2019, I observed IPv4 BGP table is around 800K in size. After the same 1 year up to now, it is over 850K in size. That is, the growth rate in this interval is 6.25% (=50/800) My conclusion is: the growth rate of IPv6 is much higher than that of IPv4, in this interval. One more thing… Many people are also interested in estimates of router memory consumption to hold the whole global BGP table. For IPv6, unfortunately, I cannot find good firsthand samples about the number of entries versus the memory size consumed. I now try to estimate the memory consumption by samples of IPv4. For single IP address, IPv4 is 32 bits, and IPv6 is 128 bits. One IPv6 address is 4 times the size of one IPv4 address. Because essentially BGP entry fields are IP addresses, here I roughly assume IPv6 BGP table should not take more than 4 times the memory consumption of IPv4 BGP table of the same number of entries. I already wrote about this before: every 100K IPv4 BGP entries could take no more than 80 Megabytes of memory. Therefore, my estimate for the same 100K entries of IPv6 BGP table, should not take more than 320 Megabytes of memory. Do you have firsthand numbers of IPv6 BGP memory consumption? How wrong is my estimate ? I would like to hear from you in the comment section below. Overlooking from the top floor of Dragon and Tiger Pagodas (龍虎塔) Zuoying District, Kaohsiung City, Taiwan I am Li-Ji Hong. This is my blog “Show IP Protocols”. See you next time!</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>Three possible scenarios of Software Defined Networking (SDN)</title><link>https://showipprotocols.blogspot.com/2019/12/three-possible-scenarios-sdn.html</link><category>Data Center</category><category>SDN</category><pubDate>Sun, 8 Dec 2019 02:14:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-7986805280374000744</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7mOmNpsvYJAIf9z0HWus81vHcyb9kPZ4utqrM7fEzXUUxEbJJhirkJav3cK8Yp87oTeS5DyJr_OuA-YpXaiZ1EmQaCeWLLxlUMEjV_e_ua_vEL9rhrCNVi671IzX5MibqTy-Oxh_7RUs/s1600/table.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="720" data-original-width="1280" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7mOmNpsvYJAIf9z0HWus81vHcyb9kPZ4utqrM7fEzXUUxEbJJhirkJav3cK8Yp87oTeS5DyJr_OuA-YpXaiZ1EmQaCeWLLxlUMEjV_e_ua_vEL9rhrCNVi671IzX5MibqTy-Oxh_7RUs/s320/table.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
Software-defined networking (SDN) is an approach to create a centrally controlled programmable packet network. Any protocols with the same approach could be considered as SDN as well.&lt;br /&gt;
&lt;br /&gt;
For open protocols, we have one popular standard protocol “OpenFlow” talking among the central controllers to all managed networking devices. Open Network Foundation (ONF) defines OpenFlow protocol.&lt;br /&gt;
&lt;br /&gt;
In fact, vendors also have developed proprietary protocols to implement this same approach. For example, Cisco’s ACI is a proprietary SDN solution.&lt;br /&gt;
&lt;br /&gt;
Here I summarize 3 most probable scenarios when we deploy SDN.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h3&gt;
Scenario 1: Open protocol, open multiple vendors&lt;/h3&gt;
&lt;br /&gt;
Since OpenFlow protocol from ONF is open, any vendors can develop inter-operable software and hardware products. For enterprise customers, the first natural approach is to buy from multiple networking venders.&lt;br /&gt;
&lt;br /&gt;
For example, controllers from vendor A, some switches from vendor B, some routers from vendor C, and so on and so forth.&lt;br /&gt;
&lt;br /&gt;
The most obvious benefit of this scenario is lower buying cost. Enterprises can buy any compatible networking products from any vendors in the market with the lowest price. White-brand, or no-brand vendors have opportunities to compete on price against existing networking vendors.&lt;br /&gt;
&lt;br /&gt;
However, only the buying cost is lower. We also must consider other costs to build and maintain a working network. Integration of software and hardware itself is a heavy project.&lt;br /&gt;
&lt;br /&gt;
When we already have a capable team of hardware and software integration, we can work comfortably with this approach. If we simply don’t have such a “Tiger Team”, or we are just about to create a team from scratch, this scenario could be difficult and costly. It could cancel out all benefits of lower buying cost.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Scenario 2: Open protocol, one major vendor&lt;/h3&gt;
&lt;br /&gt;
Some vendors are capable to provide all components for OpenFlow. For example, Cisco. In this scenario, basically we buy controllers and network devices from single major vendor. For less important areas, we buy some from other venders in the market.&lt;br /&gt;
&lt;br /&gt;
In this approach, we might have higher buying costs. Because we now have a major vender, we can gain better support from that major vendor. We can also achieve less integration cost because our team have fewer combinations of products to experiment and integrate with. We don’t need a huge team like previous scenario.&lt;br /&gt;
&lt;br /&gt;
I am more familiar with Cisco. Let me summarize what Cisco can provide for OpenFlow.&lt;br /&gt;
&lt;br /&gt;
“Cisco Open SDN Controller” is OpenFlow protocol controller. The software is a commercial distribution of OpenDaylight by OpenDaylight open source project. This software is packaged as a virtual machine format.&lt;br /&gt;
&lt;br /&gt;
In addition, Cisco’s Nexus 3000 and 9000 family switches can run “Cisco OpenFlow Agent” inside to become OpenFlow switches so they can be controlled by standard OpenFlow controllers.&lt;br /&gt;
&lt;br /&gt;
We can deploy OpenFlow by simply selecting all components from Cisco. Because OpenFlow protocol is open, we also have the flexibility to add non-Cisco but OpenFlow compatible devices.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Scenario 3: Close protocol, one vendor&lt;/h3&gt;
&lt;br /&gt;
Some vendor can provide all features and benefits of “centrally controlled programmable packet network”, with proprietary protocol. For example, again, Cisco.&lt;br /&gt;
&lt;br /&gt;
Cisco’s Application Centric Infrastructure (ACI) is Cisco’s proprietary SDN solution. With Cisco’s ACI, we can achieve even more than OpenFlow such as:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Device management&lt;/li&gt;
&lt;li&gt;Better integration with non-networking devices such as Layer 7 switches and stateful firewalls&lt;/li&gt;
&lt;li&gt;Better programmer-friendly abstraction instead of VLANs and subnets.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
In this scenario, we have the highest buying cost and we are locked into single vendor. However, we have the lowest integration cost and we now have full support from that single vendor. We only need an even smaller support team and concentrate all resources on using the network instead of experimenting interoperability among vendors.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEis4BaBf4PQLxNHNWUdZnkPeLNyiIb3aNc06Tel2RUGRhyvbUCTV89mqy1OrKkV2sMDhNeCnubHE3r-7tvasegsxf1-SqZ-fmZwHpvyTCv3_sBSvNbWGzM488yRcb9MuNdOu1H474zypao/s1600/table.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="720" data-original-width="1280" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEis4BaBf4PQLxNHNWUdZnkPeLNyiIb3aNc06Tel2RUGRhyvbUCTV89mqy1OrKkV2sMDhNeCnubHE3r-7tvasegsxf1-SqZ-fmZwHpvyTCv3_sBSvNbWGzM488yRcb9MuNdOu1H474zypao/s640/table.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
One more thing…&lt;/h3&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtTuX_QNhVxr4w-1BZIJLQ3UFvGmo_CaebTGaiNMXYPWV2j9_XLQP6NGrVRrL72EzD0fuim1spybaYFa7DZO-_B3DTG-toCNeiJ7eMhkXVBaxjePCs3dC6GqEG8vYN4wLJ9S8qhKZUb-U/s1600/20191202_124907.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtTuX_QNhVxr4w-1BZIJLQ3UFvGmo_CaebTGaiNMXYPWV2j9_XLQP6NGrVRrL72EzD0fuim1spybaYFa7DZO-_B3DTG-toCNeiJ7eMhkXVBaxjePCs3dC6GqEG8vYN4wLJ9S8qhKZUb-U/s640/20191202_124907.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Winter flowers near Taoyuan High Speed Rail Station.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEYuxL9-_pUVQDgxxK1ky8SmInw7HhRPP_DQekUVVhnXOISU3tVqdenro_sQYwB3EF52LQsAxPHQ6_rTZWJ0KqxozSnFPpwIUu7_utMP6LbHLkUV-NZZnD1pZS48r_dlvQG_xg0HOD5ng/s1600/20191202_124958.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEYuxL9-_pUVQDgxxK1ky8SmInw7HhRPP_DQekUVVhnXOISU3tVqdenro_sQYwB3EF52LQsAxPHQ6_rTZWJ0KqxozSnFPpwIUu7_utMP6LbHLkUV-NZZnD1pZS48r_dlvQG_xg0HOD5ng/s320/20191202_124958.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
SDN is a promising approach for next generation networking. Programmable network indeed is the foundation for network automation.&lt;br /&gt;
&lt;br /&gt;
On the other hand, I don’t think it fits well for all types and sizes of customers. Let me talk more about who needs SDN in the coming posts.&lt;br /&gt;
&lt;br /&gt;
I am Li-Ji Hong. This is my blog “Show IP Protocols”. See you next time!</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20191208/hongliji-sip-p-20191208.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7mOmNpsvYJAIf9z0HWus81vHcyb9kPZ4utqrM7fEzXUUxEbJJhirkJav3cK8Yp87oTeS5DyJr_OuA-YpXaiZ1EmQaCeWLLxlUMEjV_e_ua_vEL9rhrCNVi671IzX5MibqTy-Oxh_7RUs/s72-c/table.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.49702939999997</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">24.9687357 121.41634839999998 25.083835699999998 121.57771039999997</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>Software-defined networking (SDN) is an approach to create a centrally controlled programmable packet network. Any protocols with the same approach could be considered as SDN as well. For open protocols, we have one popular standard protocol “OpenFlow” talking among the central controllers to all managed networking devices. Open Network Foundation (ONF) defines OpenFlow protocol. In fact, vendors also have developed proprietary protocols to implement this same approach. For example, Cisco’s ACI is a proprietary SDN solution. Here I summarize 3 most probable scenarios when we deploy SDN. Scenario 1: Open protocol, open multiple vendors Since OpenFlow protocol from ONF is open, any vendors can develop inter-operable software and hardware products. For enterprise customers, the first natural approach is to buy from multiple networking venders. For example, controllers from vendor A, some switches from vendor B, some routers from vendor C, and so on and so forth. The most obvious benefit of this scenario is lower buying cost. Enterprises can buy any compatible networking products from any vendors in the market with the lowest price. White-brand, or no-brand vendors have opportunities to compete on price against existing networking vendors. However, only the buying cost is lower. We also must consider other costs to build and maintain a working network. Integration of software and hardware itself is a heavy project. When we already have a capable team of hardware and software integration, we can work comfortably with this approach. If we simply don’t have such a “Tiger Team”, or we are just about to create a team from scratch, this scenario could be difficult and costly. It could cancel out all benefits of lower buying cost. Scenario 2: Open protocol, one major vendor Some vendors are capable to provide all components for OpenFlow. For example, Cisco. In this scenario, basically we buy controllers and network devices from single major vendor. For less important areas, we buy some from other venders in the market. In this approach, we might have higher buying costs. Because we now have a major vender, we can gain better support from that major vendor. We can also achieve less integration cost because our team have fewer combinations of products to experiment and integrate with. We don’t need a huge team like previous scenario. I am more familiar with Cisco. Let me summarize what Cisco can provide for OpenFlow. “Cisco Open SDN Controller” is OpenFlow protocol controller. The software is a commercial distribution of OpenDaylight by OpenDaylight open source project. This software is packaged as a virtual machine format. In addition, Cisco’s Nexus 3000 and 9000 family switches can run “Cisco OpenFlow Agent” inside to become OpenFlow switches so they can be controlled by standard OpenFlow controllers. We can deploy OpenFlow by simply selecting all components from Cisco. Because OpenFlow protocol is open, we also have the flexibility to add non-Cisco but OpenFlow compatible devices. Scenario 3: Close protocol, one vendor Some vendor can provide all features and benefits of “centrally controlled programmable packet network”, with proprietary protocol. For example, again, Cisco. Cisco’s Application Centric Infrastructure (ACI) is Cisco’s proprietary SDN solution. With Cisco’s ACI, we can achieve even more than OpenFlow such as: Device management Better integration with non-networking devices such as Layer 7 switches and stateful firewalls Better programmer-friendly abstraction instead of VLANs and subnets. In this scenario, we have the highest buying cost and we are locked into single vendor. However, we have the lowest integration cost and we now have full support from that single vendor. We only need an even smaller support team and concentrate all resources on using the network instead of experimenting interoperability among vendors. One more thing… Winter flowers near Taoyuan High Speed Rail Station. SDN is a promising approach for next generation networking. Programmable network indeed is the foundation for network automation. On the other hand, I don’t think it fits well for all types and sizes of customers. Let me talk more about who needs SDN in the coming posts. I am Li-Ji Hong. This is my blog “Show IP Protocols”. See you next time!</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>Software-defined networking (SDN) is an approach to create a centrally controlled programmable packet network. Any protocols with the same approach could be considered as SDN as well. For open protocols, we have one popular standard protocol “OpenFlow” talking among the central controllers to all managed networking devices. Open Network Foundation (ONF) defines OpenFlow protocol. In fact, vendors also have developed proprietary protocols to implement this same approach. For example, Cisco’s ACI is a proprietary SDN solution. Here I summarize 3 most probable scenarios when we deploy SDN. Scenario 1: Open protocol, open multiple vendors Since OpenFlow protocol from ONF is open, any vendors can develop inter-operable software and hardware products. For enterprise customers, the first natural approach is to buy from multiple networking venders. For example, controllers from vendor A, some switches from vendor B, some routers from vendor C, and so on and so forth. The most obvious benefit of this scenario is lower buying cost. Enterprises can buy any compatible networking products from any vendors in the market with the lowest price. White-brand, or no-brand vendors have opportunities to compete on price against existing networking vendors. However, only the buying cost is lower. We also must consider other costs to build and maintain a working network. Integration of software and hardware itself is a heavy project. When we already have a capable team of hardware and software integration, we can work comfortably with this approach. If we simply don’t have such a “Tiger Team”, or we are just about to create a team from scratch, this scenario could be difficult and costly. It could cancel out all benefits of lower buying cost. Scenario 2: Open protocol, one major vendor Some vendors are capable to provide all components for OpenFlow. For example, Cisco. In this scenario, basically we buy controllers and network devices from single major vendor. For less important areas, we buy some from other venders in the market. In this approach, we might have higher buying costs. Because we now have a major vender, we can gain better support from that major vendor. We can also achieve less integration cost because our team have fewer combinations of products to experiment and integrate with. We don’t need a huge team like previous scenario. I am more familiar with Cisco. Let me summarize what Cisco can provide for OpenFlow. “Cisco Open SDN Controller” is OpenFlow protocol controller. The software is a commercial distribution of OpenDaylight by OpenDaylight open source project. This software is packaged as a virtual machine format. In addition, Cisco’s Nexus 3000 and 9000 family switches can run “Cisco OpenFlow Agent” inside to become OpenFlow switches so they can be controlled by standard OpenFlow controllers. We can deploy OpenFlow by simply selecting all components from Cisco. Because OpenFlow protocol is open, we also have the flexibility to add non-Cisco but OpenFlow compatible devices. Scenario 3: Close protocol, one vendor Some vendor can provide all features and benefits of “centrally controlled programmable packet network”, with proprietary protocol. For example, again, Cisco. Cisco’s Application Centric Infrastructure (ACI) is Cisco’s proprietary SDN solution. With Cisco’s ACI, we can achieve even more than OpenFlow such as: Device management Better integration with non-networking devices such as Layer 7 switches and stateful firewalls Better programmer-friendly abstraction instead of VLANs and subnets. In this scenario, we have the highest buying cost and we are locked into single vendor. However, we have the lowest integration cost and we now have full support from that single vendor. We only need an even smaller support team and concentrate all resources on using the network instead of experimenting interoperability among vendors. One more thing… Winter flowers near Taoyuan High Speed Rail Station. SDN is a promising approach for next generation networking. Programmable network indeed is the foundation for network automation. On the other hand, I don’t think it fits well for all types and sizes of customers. Let me talk more about who needs SDN in the coming posts. I am Li-Ji Hong. This is my blog “Show IP Protocols”. See you next time!</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>Where do we use Cisco Wildcard Masks?</title><link>https://showipprotocols.blogspot.com/2019/11/where-do-we-use-wildcard-masks.html</link><category>CCNA</category><pubDate>Mon, 18 Nov 2019 18:52:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-7837547876255862006</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8uzAhQLNYeH_85qwcxpuKnJgb_hjW1GVvx1snXtXNPtS1t0AwOddLu3ybjmcFHJiQYqMAinmzPS0e5Cy3-AsBKobrOEkj86VPbatpw-qDIb8xW7pPz445-mYokYOnn0K2MjvjE6ure3g/s1600/wc-excel.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="341" data-original-width="1055" height="103" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8uzAhQLNYeH_85qwcxpuKnJgb_hjW1GVvx1snXtXNPtS1t0AwOddLu3ybjmcFHJiQYqMAinmzPS0e5Cy3-AsBKobrOEkj86VPbatpw-qDIb8xW7pPz445-mYokYOnn0K2MjvjE6ure3g/s320/wc-excel.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
People might still be interested in about Cisco Wildcard Masks. I try to summarize interesting information about Wildcard Masks in this post.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Use Case 1: IPv4 Access Control Lists on Cisco IOS, IOS XE, and IOS XR&lt;/h3&gt;
&lt;br /&gt;
Wildcard masks are for us to select only subsets of IPv4 addresses.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
When we define selected source or destination IPv4 addresses for an Access Control List (ACL), we use Wildcard Mask. Here is an example for Cisco IOS and IOS XE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace;"&gt;ip access-list extended ACL-NAME&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace;"&gt;&amp;nbsp;deny tcp 172.16.9.0 0.0.0.255 172.16.0.0 0.0.255.255 eq 22&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace;"&gt;&amp;nbsp;permit ip any any&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is an equivalent ACL example for Cisco IOS XR.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace;"&gt;ipv4 access-list ACL-NAME&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace;"&gt;&amp;nbsp;deny tcp 172.16.9.0 0.0.0.255 172.16.0.0 0.0.255.255 eq 22&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace;"&gt;&amp;nbsp;permit ip any any&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All Cisco IOS XR Access Control Lists are “extended, and named” in Cisco IOS’s sense. And we don’t need “&lt;span style="font-family: Courier New, Courier, monospace;"&gt;extended&lt;/span&gt;” keyword in IOS XR commands.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Use Case 2: Selecting interfaces to start Routing Protocols on Cisco IOS, and IOS XE&lt;/h3&gt;
&lt;br /&gt;
The “network” commands for OSPFv2 and EIGRP are to select interfaces to start OSPF or EIGRP by interfaces’ IPv4 addresses. For example:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace;"&gt;router eigrp 99&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace;"&gt;&amp;nbsp;network 192.168.199.0 0.0.0.255&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Courier New, Courier, monospace;"&gt;router ospf 1&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace;"&gt;&amp;nbsp;network 192.168.201.0 0.0.0.255 area 0&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here, all interfaces with IPv4 addresses covered by “&lt;span style="font-family: Courier New, Courier, monospace;"&gt;192.168.199.0 0.0.0.255&lt;/span&gt;” would be enabled with EIGRP AS 99, and all interfaces with IPv4 addresses covered by “&lt;span style="font-family: Courier New, Courier, monospace;"&gt;192.168.201.0 0.0.0.255&lt;/span&gt;“ would be enabled with OSPF and assigned to area 0.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Just in case you need some help about visualizing Wildcard Masks, you can download an Excel Spreadsheet Wildcard Mask Calculator in this post:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;a href="https://showipprotocols.blogspot.com/2019/11/revised-covering-subnet-calculator.html" target="_blank"&gt;&lt;span style="font-size: large;"&gt;Revised post: Covering Subnet Calculator to understand more about Wildcard Mask&lt;/span&gt;&lt;/a&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;br /&gt;
That's all for use cases. We simply don't use Wildcard Masks, in any other scenarios.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
NX-OS, ASA, and IPv6 we do not have Wildcard Masks&lt;/h3&gt;
&lt;br /&gt;
If you are lucky enough to work on Cisco NX-OS, Cisco ASA alone, you don’t need Wildcard Masks because they are not supported at all on these operating systems.&lt;br /&gt;
&lt;br /&gt;
Or, if you work in IPv6-only world without IPv4, you don’t need Wildcard Masks at all because all IPv6 commands of any Cisco’s operating systems do not use Wildcard Masks at all.&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmkEBru-J_YX3OeG4pH92MFH8fo8fzMEX90N8IquGOPl1CZFxwZWjIofcrg9Q1IDFH_fv7hP2ovHJhufJIWXzV_KFxoGXHhwvCsVXPxgg583tQFhSPyNP8dNiuQpfagj9-rtnHnVh_S7c/s1600/20191117_171849.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmkEBru-J_YX3OeG4pH92MFH8fo8fzMEX90N8IquGOPl1CZFxwZWjIofcrg9Q1IDFH_fv7hP2ovHJhufJIWXzV_KFxoGXHhwvCsVXPxgg583tQFhSPyNP8dNiuQpfagj9-rtnHnVh_S7c/s640/20191117_171849.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Tamsui River (淡水河) Estuary after sunset.&lt;br /&gt;Tamsui District, New Taipei City, Taiwan.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;h3&gt;
One more thing…&lt;/h3&gt;
&lt;br /&gt;
I always say that we can simply assume Cisco IOS Wildcard Mask are derived by mapping 1s to 0s and 0s to 1s of equivalent subnet mask in binary notation. This brings up a question: why do we need Wildcard Mask at the first place? Why not just reuse IP subnet masks instead of creating new objects like Wildcard Masks?&lt;br /&gt;
&lt;br /&gt;
I don’t have any official information source. In my opinion, “flexibility” might be the cause.&lt;br /&gt;
&lt;br /&gt;
I try to imagine two possible cases. We only want to select IP subnets with “even-number 3rd digits”, or, we want to select any hosts end with number “77”. Here are single line Wildcard Masks to select them out.&lt;br /&gt;
&lt;br /&gt;
Single line Wildcard Mask “&lt;span style="font-family: Courier New, Courier, monospace;"&gt;192.168.0.0 0.0.254.255&lt;/span&gt;” selects IP subnets &lt;span style="font-family: Courier New, Courier, monospace;"&gt;192.168.0.0/24, 192.168.2.0/24. 192.168.4.0/24 … 192.168.254.0/24&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
Single line Wildcard Mask “&lt;span style="font-family: Courier New, Courier, monospace;"&gt;192.168.0.77 0.0.255.0&lt;/span&gt;” selects &lt;span style="font-family: Courier New, Courier, monospace;"&gt;192.168.0.77, 192.168.1.77, 192.168.2.77 … 192.168.255.77&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
Subnet masks are not flexible. All subnet masks must begin with contiguous “1”s, and rest of the digits must be “0”s, it is complex to combine many more subnet masks to define the identical selections for above two imaginary examples.&lt;br /&gt;
&lt;br /&gt;
Please don’t get me wrong! I don’t like Wildcard Masks, either. I always avoid Wildcard Masks when managing a network. I do Wildcard Masks only when taking exams. These two imaginary examples are rare in practical networks. Most administrators I know of always group endpoints with IP subnets, instead of confusing even-odd way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Maybe I will create another post to tell you how I avoid Wildcard Masks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I am Li-Ji Hong. And this is my blog “Show IP Protocols”. See you next time!</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20191118/hongliji-sip-p-20191118.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8uzAhQLNYeH_85qwcxpuKnJgb_hjW1GVvx1snXtXNPtS1t0AwOddLu3ybjmcFHJiQYqMAinmzPS0e5Cy3-AsBKobrOEkj86VPbatpw-qDIb8xW7pPz445-mYokYOnn0K2MjvjE6ure3g/s72-c/wc-excel.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.49702939999997</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">24.9687357 121.41634839999998 25.083835699999998 121.57771039999997</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>People might still be interested in about Cisco Wildcard Masks. I try to summarize interesting information about Wildcard Masks in this post. Use Case 1: IPv4 Access Control Lists on Cisco IOS, IOS XE, and IOS XR Wildcard masks are for us to select only subsets of IPv4 addresses. When we define selected source or destination IPv4 addresses for an Access Control List (ACL), we use Wildcard Mask. Here is an example for Cisco IOS and IOS XE. ip access-list extended ACL-NAME &amp;nbsp;deny tcp 172.16.9.0 0.0.0.255 172.16.0.0 0.0.255.255 eq 22 &amp;nbsp;permit ip any any Here is an equivalent ACL example for Cisco IOS XR. ipv4 access-list ACL-NAME &amp;nbsp;deny tcp 172.16.9.0 0.0.0.255 172.16.0.0 0.0.255.255 eq 22 &amp;nbsp;permit ip any any All Cisco IOS XR Access Control Lists are “extended, and named” in Cisco IOS’s sense. And we don’t need “extended” keyword in IOS XR commands. Use Case 2: Selecting interfaces to start Routing Protocols on Cisco IOS, and IOS XE The “network” commands for OSPFv2 and EIGRP are to select interfaces to start OSPF or EIGRP by interfaces’ IPv4 addresses. For example: router eigrp 99 &amp;nbsp;network 192.168.199.0 0.0.0.255 router ospf 1 &amp;nbsp;network 192.168.201.0 0.0.0.255 area 0 Here, all interfaces with IPv4 addresses covered by “192.168.199.0 0.0.0.255” would be enabled with EIGRP AS 99, and all interfaces with IPv4 addresses covered by “192.168.201.0 0.0.0.255“ would be enabled with OSPF and assigned to area 0. Just in case you need some help about visualizing Wildcard Masks, you can download an Excel Spreadsheet Wildcard Mask Calculator in this post: Revised post: Covering Subnet Calculator to understand more about Wildcard Mask That's all for use cases. We simply don't use Wildcard Masks, in any other scenarios. NX-OS, ASA, and IPv6 we do not have Wildcard Masks If you are lucky enough to work on Cisco NX-OS, Cisco ASA alone, you don’t need Wildcard Masks because they are not supported at all on these operating systems. Or, if you work in IPv6-only world without IPv4, you don’t need Wildcard Masks at all because all IPv6 commands of any Cisco’s operating systems do not use Wildcard Masks at all. Tamsui River (淡水河) Estuary after sunset. Tamsui District, New Taipei City, Taiwan. One more thing… I always say that we can simply assume Cisco IOS Wildcard Mask are derived by mapping 1s to 0s and 0s to 1s of equivalent subnet mask in binary notation. This brings up a question: why do we need Wildcard Mask at the first place? Why not just reuse IP subnet masks instead of creating new objects like Wildcard Masks? I don’t have any official information source. In my opinion, “flexibility” might be the cause. I try to imagine two possible cases. We only want to select IP subnets with “even-number 3rd digits”, or, we want to select any hosts end with number “77”. Here are single line Wildcard Masks to select them out. Single line Wildcard Mask “192.168.0.0 0.0.254.255” selects IP subnets 192.168.0.0/24, 192.168.2.0/24. 192.168.4.0/24 … 192.168.254.0/24. Single line Wildcard Mask “192.168.0.77 0.0.255.0” selects 192.168.0.77, 192.168.1.77, 192.168.2.77 … 192.168.255.77. Subnet masks are not flexible. All subnet masks must begin with contiguous “1”s, and rest of the digits must be “0”s, it is complex to combine many more subnet masks to define the identical selections for above two imaginary examples. Please don’t get me wrong! I don’t like Wildcard Masks, either. I always avoid Wildcard Masks when managing a network. I do Wildcard Masks only when taking exams. These two imaginary examples are rare in practical networks. Most administrators I know of always group endpoints with IP subnets, instead of confusing even-odd way. Maybe I will create another post to tell you how I avoid Wildcard Masks! I am Li-Ji Hong. And this is my blog “Show IP Protocols”. See you next time!</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>People might still be interested in about Cisco Wildcard Masks. I try to summarize interesting information about Wildcard Masks in this post. Use Case 1: IPv4 Access Control Lists on Cisco IOS, IOS XE, and IOS XR Wildcard masks are for us to select only subsets of IPv4 addresses. When we define selected source or destination IPv4 addresses for an Access Control List (ACL), we use Wildcard Mask. Here is an example for Cisco IOS and IOS XE. ip access-list extended ACL-NAME &amp;nbsp;deny tcp 172.16.9.0 0.0.0.255 172.16.0.0 0.0.255.255 eq 22 &amp;nbsp;permit ip any any Here is an equivalent ACL example for Cisco IOS XR. ipv4 access-list ACL-NAME &amp;nbsp;deny tcp 172.16.9.0 0.0.0.255 172.16.0.0 0.0.255.255 eq 22 &amp;nbsp;permit ip any any All Cisco IOS XR Access Control Lists are “extended, and named” in Cisco IOS’s sense. And we don’t need “extended” keyword in IOS XR commands. Use Case 2: Selecting interfaces to start Routing Protocols on Cisco IOS, and IOS XE The “network” commands for OSPFv2 and EIGRP are to select interfaces to start OSPF or EIGRP by interfaces’ IPv4 addresses. For example: router eigrp 99 &amp;nbsp;network 192.168.199.0 0.0.0.255 router ospf 1 &amp;nbsp;network 192.168.201.0 0.0.0.255 area 0 Here, all interfaces with IPv4 addresses covered by “192.168.199.0 0.0.0.255” would be enabled with EIGRP AS 99, and all interfaces with IPv4 addresses covered by “192.168.201.0 0.0.0.255“ would be enabled with OSPF and assigned to area 0. Just in case you need some help about visualizing Wildcard Masks, you can download an Excel Spreadsheet Wildcard Mask Calculator in this post: Revised post: Covering Subnet Calculator to understand more about Wildcard Mask That's all for use cases. We simply don't use Wildcard Masks, in any other scenarios. NX-OS, ASA, and IPv6 we do not have Wildcard Masks If you are lucky enough to work on Cisco NX-OS, Cisco ASA alone, you don’t need Wildcard Masks because they are not supported at all on these operating systems. Or, if you work in IPv6-only world without IPv4, you don’t need Wildcard Masks at all because all IPv6 commands of any Cisco’s operating systems do not use Wildcard Masks at all. Tamsui River (淡水河) Estuary after sunset. Tamsui District, New Taipei City, Taiwan. One more thing… I always say that we can simply assume Cisco IOS Wildcard Mask are derived by mapping 1s to 0s and 0s to 1s of equivalent subnet mask in binary notation. This brings up a question: why do we need Wildcard Mask at the first place? Why not just reuse IP subnet masks instead of creating new objects like Wildcard Masks? I don’t have any official information source. In my opinion, “flexibility” might be the cause. I try to imagine two possible cases. We only want to select IP subnets with “even-number 3rd digits”, or, we want to select any hosts end with number “77”. Here are single line Wildcard Masks to select them out. Single line Wildcard Mask “192.168.0.0 0.0.254.255” selects IP subnets 192.168.0.0/24, 192.168.2.0/24. 192.168.4.0/24 … 192.168.254.0/24. Single line Wildcard Mask “192.168.0.77 0.0.255.0” selects 192.168.0.77, 192.168.1.77, 192.168.2.77 … 192.168.255.77. Subnet masks are not flexible. All subnet masks must begin with contiguous “1”s, and rest of the digits must be “0”s, it is complex to combine many more subnet masks to define the identical selections for above two imaginary examples. Please don’t get me wrong! I don’t like Wildcard Masks, either. I always avoid Wildcard Masks when managing a network. I do Wildcard Masks only when taking exams. These two imaginary examples are rare in practical networks. Most administrators I know of always group endpoints with IP subnets, instead of confusing even-odd way. Maybe I will create another post to tell you how I avoid Wildcard Masks! I am Li-Ji Hong. And this is my blog “Show IP Protocols”. See you next time!</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>Revised post: Covering Subnet Calculator to understand more about Wildcard Mask</title><link>https://showipprotocols.blogspot.com/2019/11/revised-covering-subnet-calculator.html</link><category>CCNA</category><pubDate>Tue, 5 Nov 2019 18:05:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-2228079924861874701</guid><description>&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhe1R-KnfcKEDoqRBVBSd5v5oUQ8x-iCR5Et48C00UtfAj3L6W_1_Pwm_TfEInNEOYj_KQsAgEbrLmVNygwTn6tWQE_ymCE8bcQSu5rmahhtfpntvR66W0efMl4OVjPG72LPZZA77q54wM/s1600/try2.mp4_snapshot_00.05_%255B2019.11.05_17.27.31%255D.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="720" data-original-width="1280" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhe1R-KnfcKEDoqRBVBSd5v5oUQ8x-iCR5Et48C00UtfAj3L6W_1_Pwm_TfEInNEOYj_KQsAgEbrLmVNygwTn6tWQE_ymCE8bcQSu5rmahhtfpntvR66W0efMl4OVjPG72LPZZA77q54wM/s320/try2.mp4_snapshot_00.05_%255B2019.11.05_17.27.31%255D.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
This tool is an update to my previous post:&lt;br /&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;a href="https://showipprotocols.blogspot.com/2013/11/cisco-ios-ipv4-wildcard-mask.html" target="_blank"&gt;Simple visual tool to calculate Cisco IOS Wildcard Mask&lt;/a&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;h3&gt;
Notes for Cisco IOS Wildcard Mask&lt;/h3&gt;
&lt;br /&gt;
You can simply assume Cisco IOS Wildcard Mask are derived by mapping 1s to 0s and 0s to 1s of equivalent subnet mask in binary notation.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
By definition, “0” bits in a wildcard mask denote the bits you must match the base prefix, and “1” bits denote the bits you simply don’t care.&lt;br /&gt;
&lt;br /&gt;
All subnet masks must begin with contiguous “1”s, and rest of the digits must be “0”. On the other hand, no such requirements are for wildcard masks. That is the major difference between subnet mask and wildcard mask.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipUEgjU7BkMcDP1uMDqscSqcZXlgDX7SlLptLo6tHm9nMgRmEZLwzOxrB3NJvrSNcEdjgB11FtNfzGeOmFjbYDiIdEeBEa7X-MC9FPYMmuHYOmBObzaN4Bi-9QeubZ0WhPhZET113J6j8/s1600/try2.mp4_snapshot_01.23_%255B2019.11.05_17.32.02%255D.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="720" data-original-width="1280" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipUEgjU7BkMcDP1uMDqscSqcZXlgDX7SlLptLo6tHm9nMgRmEZLwzOxrB3NJvrSNcEdjgB11FtNfzGeOmFjbYDiIdEeBEa7X-MC9FPYMmuHYOmBObzaN4Bi-9QeubZ0WhPhZET113J6j8/s640/try2.mp4_snapshot_01.23_%255B2019.11.05_17.32.02%255D.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3&gt;
Updates&lt;/h3&gt;
&lt;br /&gt;
I changed my flow of using this Excel file. You simply input “Starting IPv4 Address”, and the number of contiguous hosts you desire to cover with a single IPv4 subnet, and then this Excel file calculate everything else for you.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Getting this Excel file&lt;/h3&gt;
&lt;br /&gt;
Original Excel file is here. You need Microsoft Excel software or LibreOffice Calc to open and play with this file.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;a href="https://drive.google.com/file/d/1lq3l20Ez-p_zuPacmkKMK1lpugwgfZzf/view?usp=sharing" target="_blank"&gt;&lt;span style="font-size: large;"&gt;“ipv4-covering-first-last.xlsx”&lt;/span&gt;&lt;/a&gt;&lt;/blockquote&gt;
&lt;br /&gt;
If you are familiar with Google Docs, you can also “&lt;a href="https://docs.google.com/spreadsheets/d/e/2PACX-1vTAzvYnZrmhegwfJydyDIAWaJFiHDmKxpsm4XJ1Xw3pUs5tQT07J3rV3hR8vNlmdy7SScmGJSqNRQ2A/pubhtml" target="_blank"&gt;Use this template&lt;/a&gt;” or &lt;a href="https://docs.google.com/spreadsheets/d/e/2PACX-1vTAzvYnZrmhegwfJydyDIAWaJFiHDmKxpsm4XJ1Xw3pUs5tQT07J3rV3hR8vNlmdy7SScmGJSqNRQ2A/pubhtml" target="_blank"&gt;save this file&lt;/a&gt; to Google Drive for viewing and playing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="video-container"&gt;
&lt;iframe src="https://docs.google.com/spreadsheets/d/e/2PACX-1vTAzvYnZrmhegwfJydyDIAWaJFiHDmKxpsm4XJ1Xw3pUs5tQT07J3rV3hR8vNlmdy7SScmGJSqNRQ2A/pubhtml?widget=true&amp;amp;headers=false"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
One more thing…&lt;/h3&gt;
&lt;br /&gt;
I also created a demonstration video using this Calculator on YouTube.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="video-container"&gt;
&lt;iframe allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="" frameborder="0" height="480" src="https://www.youtube.com/embed/4VTtfArkwxM" width="853"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
I am Li-Ji Hong. And this is my blog “Show IP Protocols”. See you next time!&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20191105/hongliji-sip-p-20191105.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhe1R-KnfcKEDoqRBVBSd5v5oUQ8x-iCR5Et48C00UtfAj3L6W_1_Pwm_TfEInNEOYj_KQsAgEbrLmVNygwTn6tWQE_ymCE8bcQSu5rmahhtfpntvR66W0efMl4OVjPG72LPZZA77q54wM/s72-c/try2.mp4_snapshot_00.05_%255B2019.11.05_17.27.31%255D.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.49702939999997</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">24.9687357 121.41634839999998 25.083835699999998 121.57771039999997</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>This tool is an update to my previous post: Simple visual tool to calculate Cisco IOS Wildcard Mask Notes for Cisco IOS Wildcard Mask You can simply assume Cisco IOS Wildcard Mask are derived by mapping 1s to 0s and 0s to 1s of equivalent subnet mask in binary notation. By definition, “0” bits in a wildcard mask denote the bits you must match the base prefix, and “1” bits denote the bits you simply don’t care. All subnet masks must begin with contiguous “1”s, and rest of the digits must be “0”. On the other hand, no such requirements are for wildcard masks. That is the major difference between subnet mask and wildcard mask. Updates I changed my flow of using this Excel file. You simply input “Starting IPv4 Address”, and the number of contiguous hosts you desire to cover with a single IPv4 subnet, and then this Excel file calculate everything else for you. Getting this Excel file Original Excel file is here. You need Microsoft Excel software or LibreOffice Calc to open and play with this file. “ipv4-covering-first-last.xlsx” If you are familiar with Google Docs, you can also “Use this template” or save this file to Google Drive for viewing and playing. One more thing… I also created a demonstration video using this Calculator on YouTube. I am Li-Ji Hong. And this is my blog “Show IP Protocols”. See you next time!</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>This tool is an update to my previous post: Simple visual tool to calculate Cisco IOS Wildcard Mask Notes for Cisco IOS Wildcard Mask You can simply assume Cisco IOS Wildcard Mask are derived by mapping 1s to 0s and 0s to 1s of equivalent subnet mask in binary notation. By definition, “0” bits in a wildcard mask denote the bits you must match the base prefix, and “1” bits denote the bits you simply don’t care. All subnet masks must begin with contiguous “1”s, and rest of the digits must be “0”. On the other hand, no such requirements are for wildcard masks. That is the major difference between subnet mask and wildcard mask. Updates I changed my flow of using this Excel file. You simply input “Starting IPv4 Address”, and the number of contiguous hosts you desire to cover with a single IPv4 subnet, and then this Excel file calculate everything else for you. Getting this Excel file Original Excel file is here. You need Microsoft Excel software or LibreOffice Calc to open and play with this file. “ipv4-covering-first-last.xlsx” If you are familiar with Google Docs, you can also “Use this template” or save this file to Google Drive for viewing and playing. One more thing… I also created a demonstration video using this Calculator on YouTube. I am Li-Ji Hong. And this is my blog “Show IP Protocols”. See you next time!</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>Global BGP IPv4 table is around 800K in size</title><link>https://showipprotocols.blogspot.com/2019/11/global-bgp-ipv4-table-800k.html</link><category>BGP</category><pubDate>Sun, 3 Nov 2019 14:32:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-4655413839530714132</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7jQjucNEFbiuZoVSMIO8tUMZHf4mPto4f1t1-GMCbYKPPrHihiQ_aZSYz0z_H3zE7d1pm637hHEhXJ8EQJelXNeFQMdfziKfQTRMFI876JgGgWea06C2nFxLOPE_Fu_XCrm5UTB3fHOk/s1600/20190821_170817.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7jQjucNEFbiuZoVSMIO8tUMZHf4mPto4f1t1-GMCbYKPPrHihiQ_aZSYz0z_H3zE7d1pm637hHEhXJ8EQJelXNeFQMdfziKfQTRMFI876JgGgWea06C2nFxLOPE_Fu_XCrm5UTB3fHOk/s320/20190821_170817.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
This week the global BGP IPv4 table is &lt;a href="https://www.cidr-report.org/as2.0/" target="_blank"&gt;around 800,000 entries in size&lt;/a&gt;. I bring this up just to give you a head-up and say a “Wow”. I don’t want to make you worry about the number. This is not my intention.&lt;br /&gt;
&lt;br /&gt;
I still remember the “old good time” when I had installed a BGP router (Cisco 3660) with 256 Megabytes of DRAM memory in year 2001. At that time, the BGP table is below 150,000 entries so that router worked well.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFCSTXtvLlgE8_uBU5VnwcxCx0vYSYAWvYwrqB5E9b7i_70fhjNIM3WXFH7CQKo4MMK9PdaxgocgGERvEaRcsTkLXrJ42m5C7lm5KR9OhzxmndDuDALCkVypnE1ccbzyTx2zORQ6h7PMA/s1600/bgp-800k-nov-2019.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="281" data-original-width="1125" height="158" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFCSTXtvLlgE8_uBU5VnwcxCx0vYSYAWvYwrqB5E9b7i_70fhjNIM3WXFH7CQKo4MMK9PdaxgocgGERvEaRcsTkLXrJ42m5C7lm5KR9OhzxmndDuDALCkVypnE1ccbzyTx2zORQ6h7PMA/s640/bgp-800k-nov-2019.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Screen capture of &lt;a href="https://www.cidr-report.org/as2.0/" target="_blank"&gt;CIDR REPORT website on November 3, 2019&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
The size of router DRAM memory is not a problem today for most of BGP administrators. I had created &lt;a href="https://showipprotocols.blogspot.com/2009/08/bgp-memory-requirement-estimation.html" target="_blank"&gt;a post about BGP memory consumption&lt;/a&gt; and had this rough estimate: every 100K BGP entries from a single peer requires 80 Megabytes of DRAM.&lt;br /&gt;
&lt;br /&gt;
In other words, to store 800,000 entries today, we simply need around 800 Megabytes (that is 0.8 Gigabytes) DRAM for BGP protocol. This is simply a piece of cake for today’s router hardware.&lt;br /&gt;
&lt;br /&gt;
Even an old &lt;a href="https://www.cisco.com/c/en/us/products/collateral/routers/asr-1000-series-aggregation-services-routers/data_sheet_c78-441072.html" target="_blank"&gt;Cisco ASR 1000 RP1 router&lt;/a&gt; with 4 Gigabytes DRAM supports “up to 1,000,000 IPv4 routes”. No worry on 800K BGP entries.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7jQjucNEFbiuZoVSMIO8tUMZHf4mPto4f1t1-GMCbYKPPrHihiQ_aZSYz0z_H3zE7d1pm637hHEhXJ8EQJelXNeFQMdfziKfQTRMFI876JgGgWea06C2nFxLOPE_Fu_XCrm5UTB3fHOk/s1600/20190821_170817.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7jQjucNEFbiuZoVSMIO8tUMZHf4mPto4f1t1-GMCbYKPPrHihiQ_aZSYz0z_H3zE7d1pm637hHEhXJ8EQJelXNeFQMdfziKfQTRMFI876JgGgWea06C2nFxLOPE_Fu_XCrm5UTB3fHOk/s640/20190821_170817.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Taipei City view over &lt;a href="https://en.wikipedia.org/wiki/Taipei_Main_Station" target="_blank"&gt;Taipei Main Station (台北車站)&lt;/a&gt;.&lt;br /&gt;
August 21, 2019&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
One more thing…&lt;/h3&gt;
&lt;br /&gt;
I just want to remind you when you are planning for BGP Route Reflectors. The memory size could be an issue because you must multiply the above estimates to the number of BGP protocol peers.&lt;br /&gt;
&lt;br /&gt;
Again, with Cisco ASR 1000 RP1 router with 4 Gigabytes DRAM, BGP Route Reflector scalability is “up to 5,000,000 IPv4 routes”. If you are planning a route reflector using this model to have more than 5 BGP peers, you must examine the table size more carefully.&lt;br /&gt;
&lt;br /&gt;
And by the way, IPv6 global BGP table size is &lt;a href="http://www.cidr-report.org/v6/as2.0/" target="_blank"&gt;around 80K&lt;/a&gt; this week. IPv6 table size is still not that huge compared to IPv4 today.&lt;br /&gt;
&lt;br /&gt;
I am Li-Ji Hong. This is my blog “Show IP Protocols”. See you next time!&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20191103/hongliji-sip-p-20191103.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7jQjucNEFbiuZoVSMIO8tUMZHf4mPto4f1t1-GMCbYKPPrHihiQ_aZSYz0z_H3zE7d1pm637hHEhXJ8EQJelXNeFQMdfziKfQTRMFI876JgGgWea06C2nFxLOPE_Fu_XCrm5UTB3fHOk/s72-c/20190821_170817.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.49702939999997</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">24.9687357 121.41634839999998 25.083835699999998 121.57771039999997</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>This week the global BGP IPv4 table is around 800,000 entries in size. I bring this up just to give you a head-up and say a “Wow”. I don’t want to make you worry about the number. This is not my intention. I still remember the “old good time” when I had installed a BGP router (Cisco 3660) with 256 Megabytes of DRAM memory in year 2001. At that time, the BGP table is below 150,000 entries so that router worked well. Screen capture of CIDR REPORT website on November 3, 2019 The size of router DRAM memory is not a problem today for most of BGP administrators. I had created a post about BGP memory consumption and had this rough estimate: every 100K BGP entries from a single peer requires 80 Megabytes of DRAM. In other words, to store 800,000 entries today, we simply need around 800 Megabytes (that is 0.8 Gigabytes) DRAM for BGP protocol. This is simply a piece of cake for today’s router hardware. Even an old Cisco ASR 1000 RP1 router with 4 Gigabytes DRAM supports “up to 1,000,000 IPv4 routes”. No worry on 800K BGP entries. Taipei City view over Taipei Main Station (台北車站). August 21, 2019 One more thing… I just want to remind you when you are planning for BGP Route Reflectors. The memory size could be an issue because you must multiply the above estimates to the number of BGP protocol peers. Again, with Cisco ASR 1000 RP1 router with 4 Gigabytes DRAM, BGP Route Reflector scalability is “up to 5,000,000 IPv4 routes”. If you are planning a route reflector using this model to have more than 5 BGP peers, you must examine the table size more carefully. And by the way, IPv6 global BGP table size is around 80K this week. IPv6 table size is still not that huge compared to IPv4 today. I am Li-Ji Hong. This is my blog “Show IP Protocols”. See you next time!</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>This week the global BGP IPv4 table is around 800,000 entries in size. I bring this up just to give you a head-up and say a “Wow”. I don’t want to make you worry about the number. This is not my intention. I still remember the “old good time” when I had installed a BGP router (Cisco 3660) with 256 Megabytes of DRAM memory in year 2001. At that time, the BGP table is below 150,000 entries so that router worked well. Screen capture of CIDR REPORT website on November 3, 2019 The size of router DRAM memory is not a problem today for most of BGP administrators. I had created a post about BGP memory consumption and had this rough estimate: every 100K BGP entries from a single peer requires 80 Megabytes of DRAM. In other words, to store 800,000 entries today, we simply need around 800 Megabytes (that is 0.8 Gigabytes) DRAM for BGP protocol. This is simply a piece of cake for today’s router hardware. Even an old Cisco ASR 1000 RP1 router with 4 Gigabytes DRAM supports “up to 1,000,000 IPv4 routes”. No worry on 800K BGP entries. Taipei City view over Taipei Main Station (台北車站). August 21, 2019 One more thing… I just want to remind you when you are planning for BGP Route Reflectors. The memory size could be an issue because you must multiply the above estimates to the number of BGP protocol peers. Again, with Cisco ASR 1000 RP1 router with 4 Gigabytes DRAM, BGP Route Reflector scalability is “up to 5,000,000 IPv4 routes”. If you are planning a route reflector using this model to have more than 5 BGP peers, you must examine the table size more carefully. And by the way, IPv6 global BGP table size is around 80K this week. IPv6 table size is still not that huge compared to IPv4 today. I am Li-Ji Hong. This is my blog “Show IP Protocols”. See you next time!</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>Scanning active IPv4 addresses is difficult? Simpler than you think</title><link>https://showipprotocols.blogspot.com/2019/10/powershell-one-liner-pingsweep.html</link><category>PowerShell</category><category>Security</category><pubDate>Sun, 20 Oct 2019 23:07:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-5471956281871239288</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwmilJTplgGdPvNGvF3UuOjb6Aq9YF18hR-wZe48JxaGp_pUqSS80x4SvtDbjScJzbi1ruHUoyG0hLKyj9cHJVKd2bbfGLWcFMyy8rXbWuxtfWx9QiEA6rGvrwHHrGaQovhrkVrmP9XHY/s1600/20190825_172115.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwmilJTplgGdPvNGvF3UuOjb6Aq9YF18hR-wZe48JxaGp_pUqSS80x4SvtDbjScJzbi1ruHUoyG0hLKyj9cHJVKd2bbfGLWcFMyy8rXbWuxtfWx9QiEA6rGvrwHHrGaQovhrkVrmP9XHY/s320/20190825_172115.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
It is always a best practice to keep full track of all IP address assignments inside our local area network. From time to time, it might also be a good idea for security purposes to check whether we have any hidden nodes inside our network.&lt;br /&gt;
&lt;br /&gt;
To discover any node with active IP addresses inside our network, we might imagine that we must acquire powerful tools such as Cisco Prime Infrastructure before we can achieve anything. In fact, it might be much easier than you have expected. Let me show you how.&lt;br /&gt;
&lt;br /&gt;
All you must have is a Windows 10 PC. I think that should be easy.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h4&gt;
Step 1: Start a PowerShell window with normal user privilege&lt;/h4&gt;
&lt;br /&gt;
Type “Windows Logo Key ❖ + R”, in the popup dialog, type “powershell”, and press Enter key to start a new PowerShell window.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Step 2: Type in or copy/paste this one-liner, and press Enter key to run&lt;/h4&gt;
&lt;br /&gt;
Here is a PowerShell one-liner I tested on my computer.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;$ipv4prefix=$(ipconfig | where {$_ -match 'IPv4.+\s(\d{1,3}\.\d{1,3}\.\d{1,3}\.)' } | out-null; $Matches[1]); 0..255 | %{"$ipv4prefix$_"}| % {"$($_): $(Test-Connection -count 1 -quiet -ComputerName $($_))"}&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Just in case the variable “$ipv4prefix” is not parsed correctly, or you simply want to scan other networks in different IPv4 prefix, you can manually assign that string. For example, your IP address range is in “192.168.1.X”, you can assign “$ipv4prefix” variable with “&lt;span style="background-color: yellow;"&gt;192.168.1&lt;u&gt;.&lt;/u&gt;&lt;/span&gt;”. Please be careful, we need a dot at the end of string. The modified one-liner now becomes like this:&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;$ipv4prefix="192.168.1."; 0..255 | %{"$ipv4prefix$_"}| % {"$($_): $(Test-Connection -count 1 -quiet -ComputerName $($_))"} &lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;h4&gt;
Step 3: Wait for about 5 minutes to finish the scanning and capture your PowerShell window screen.&lt;/h4&gt;
&lt;br /&gt;
The output should be something like this screen:&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;192.168.1.0: False&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;192.168.1.1: True&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;192.168.1.2: False&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;192.168.1.3: False&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;192.168.1.4: False&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;192.168.1.5: True&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;…&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Those lines with “True” result are active IP addresses inside your network. The rest of IP addresses are not responding at all.&lt;br /&gt;
&lt;br /&gt;
If you want to print out only active ones, you can attach filters at the end of previous one-liners with “&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;| Select-String True&lt;/span&gt;”. For example:&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;$ipv4prefix=$(ipconfig | where {$_ -match 'IPv4.+\s(\d{1,3}\.\d{1,3}\.\d{1,3}\.)' } | out-null; $Matches[1]); 0..255 | %{"$ipv4prefix$_"}| % {"$($_): $(Test-Connection -count 1 -quiet -ComputerName $($_))"} | Select-String True&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;br /&gt;&lt;/span&gt;
The output should be like this:&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;192.168.1.1: True&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;192.168.1.5: True&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;…&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwmilJTplgGdPvNGvF3UuOjb6Aq9YF18hR-wZe48JxaGp_pUqSS80x4SvtDbjScJzbi1ruHUoyG0hLKyj9cHJVKd2bbfGLWcFMyy8rXbWuxtfWx9QiEA6rGvrwHHrGaQovhrkVrmP9XHY/s1600/20190825_172115.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwmilJTplgGdPvNGvF3UuOjb6Aq9YF18hR-wZe48JxaGp_pUqSS80x4SvtDbjScJzbi1ruHUoyG0hLKyj9cHJVKd2bbfGLWcFMyy8rXbWuxtfWx9QiEA6rGvrwHHrGaQovhrkVrmP9XHY/s640/20190825_172115.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Playground inside Central Culture Park (中央藝文公園、華山大草原)&lt;br /&gt;
Taipei City, Taiwan&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;div class="video-container"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="450" src="https://www.google.com/maps/embed?pb=!1m14!1m8!1m3!1d3039.517648601159!2d121.52525971265929!3d25.047102062924104!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x0%3A0xddf0559d94496ed0!2sCentral%20Art%20Park!5e0!3m2!1sen!2stw!4v1571583390015!5m2!1sen!2stw" style="border: 0;" width="600"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h3&gt;
One more thing…&lt;/h3&gt;
&lt;br /&gt;
In this post I just showed you how easily you can explore your network with simply your Windows 10 PC. You can now imagine that with a Linux desktop we can do even more powerful discovery than this. Here is a one-liner for BASH together with standard tool “awk”:&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;ipv4prefix="192.168.1."; for i in `seq 1 255`; do ping -c 1 ${ipv4prefix}$i | tr \\n ' ' | awk '/1 received/ {print $2}'; done&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Now you have no excuses to say, I cannot do any network exploration until I have Cisco Prime Infrastructure. You can start network discovery right now after reading my post here.&lt;br /&gt;
&lt;br /&gt;
And now you know how easily malicious hackers can find your public IP addresses, and create trouble for you if your public-facing network devices are vulnerable, just like this incident.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;a href="https://showipprotocols.blogspot.com/2018/07/bank-lost-million-dollars-because-of-outdated-routers.html" target="_blank"&gt;Show IP Protocols: Bank lost 1 million US Dollars because of outdated routers&lt;/a&gt;&lt;/blockquote&gt;
&lt;br /&gt;
I am Li-Ji Hong. This is my blog “Show IP Protocols”. See you next time!</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20191020/hongliji-sip-p-20191020.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwmilJTplgGdPvNGvF3UuOjb6Aq9YF18hR-wZe48JxaGp_pUqSS80x4SvtDbjScJzbi1ruHUoyG0hLKyj9cHJVKd2bbfGLWcFMyy8rXbWuxtfWx9QiEA6rGvrwHHrGaQovhrkVrmP9XHY/s72-c/20190825_172115.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.49702939999997</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">24.9687357 121.41634839999998 25.083835699999998 121.57771039999997</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>It is always a best practice to keep full track of all IP address assignments inside our local area network. From time to time, it might also be a good idea for security purposes to check whether we have any hidden nodes inside our network. To discover any node with active IP addresses inside our network, we might imagine that we must acquire powerful tools such as Cisco Prime Infrastructure before we can achieve anything. In fact, it might be much easier than you have expected. Let me show you how. All you must have is a Windows 10 PC. I think that should be easy. Step 1: Start a PowerShell window with normal user privilege Type “Windows Logo Key ❖ + R”, in the popup dialog, type “powershell”, and press Enter key to start a new PowerShell window. Step 2: Type in or copy/paste this one-liner, and press Enter key to run Here is a PowerShell one-liner I tested on my computer. $ipv4prefix=$(ipconfig | where {$_ -match 'IPv4.+\s(\d{1,3}\.\d{1,3}\.\d{1,3}\.)' } | out-null; $Matches[1]); 0..255 | %{"$ipv4prefix$_"}| % {"$($_): $(Test-Connection -count 1 -quiet -ComputerName $($_))"} Just in case the variable “$ipv4prefix” is not parsed correctly, or you simply want to scan other networks in different IPv4 prefix, you can manually assign that string. For example, your IP address range is in “192.168.1.X”, you can assign “$ipv4prefix” variable with “192.168.1.”. Please be careful, we need a dot at the end of string. The modified one-liner now becomes like this: $ipv4prefix="192.168.1."; 0..255 | %{"$ipv4prefix$_"}| % {"$($_): $(Test-Connection -count 1 -quiet -ComputerName $($_))"} Step 3: Wait for about 5 minutes to finish the scanning and capture your PowerShell window screen. The output should be something like this screen: 192.168.1.0: False 192.168.1.1: True 192.168.1.2: False 192.168.1.3: False 192.168.1.4: False 192.168.1.5: True … Those lines with “True” result are active IP addresses inside your network. The rest of IP addresses are not responding at all. If you want to print out only active ones, you can attach filters at the end of previous one-liners with “| Select-String True”. For example: $ipv4prefix=$(ipconfig | where {$_ -match 'IPv4.+\s(\d{1,3}\.\d{1,3}\.\d{1,3}\.)' } | out-null; $Matches[1]); 0..255 | %{"$ipv4prefix$_"}| % {"$($_): $(Test-Connection -count 1 -quiet -ComputerName $($_))"} | Select-String True The output should be like this: 192.168.1.1: True 192.168.1.5: True … Playground inside Central Culture Park (中央藝文公園、華山大草原) Taipei City, Taiwan One more thing… In this post I just showed you how easily you can explore your network with simply your Windows 10 PC. You can now imagine that with a Linux desktop we can do even more powerful discovery than this. Here is a one-liner for BASH together with standard tool “awk”: ipv4prefix="192.168.1."; for i in `seq 1 255`; do ping -c 1 ${ipv4prefix}$i | tr \\n ' ' | awk '/1 received/ {print $2}'; done Now you have no excuses to say, I cannot do any network exploration until I have Cisco Prime Infrastructure. You can start network discovery right now after reading my post here. And now you know how easily malicious hackers can find your public IP addresses, and create trouble for you if your public-facing network devices are vulnerable, just like this incident. Show IP Protocols: Bank lost 1 million US Dollars because of outdated routers I am Li-Ji Hong. This is my blog “Show IP Protocols”. See you next time!</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>It is always a best practice to keep full track of all IP address assignments inside our local area network. From time to time, it might also be a good idea for security purposes to check whether we have any hidden nodes inside our network. To discover any node with active IP addresses inside our network, we might imagine that we must acquire powerful tools such as Cisco Prime Infrastructure before we can achieve anything. In fact, it might be much easier than you have expected. Let me show you how. All you must have is a Windows 10 PC. I think that should be easy. Step 1: Start a PowerShell window with normal user privilege Type “Windows Logo Key ❖ + R”, in the popup dialog, type “powershell”, and press Enter key to start a new PowerShell window. Step 2: Type in or copy/paste this one-liner, and press Enter key to run Here is a PowerShell one-liner I tested on my computer. $ipv4prefix=$(ipconfig | where {$_ -match 'IPv4.+\s(\d{1,3}\.\d{1,3}\.\d{1,3}\.)' } | out-null; $Matches[1]); 0..255 | %{"$ipv4prefix$_"}| % {"$($_): $(Test-Connection -count 1 -quiet -ComputerName $($_))"} Just in case the variable “$ipv4prefix” is not parsed correctly, or you simply want to scan other networks in different IPv4 prefix, you can manually assign that string. For example, your IP address range is in “192.168.1.X”, you can assign “$ipv4prefix” variable with “192.168.1.”. Please be careful, we need a dot at the end of string. The modified one-liner now becomes like this: $ipv4prefix="192.168.1."; 0..255 | %{"$ipv4prefix$_"}| % {"$($_): $(Test-Connection -count 1 -quiet -ComputerName $($_))"} Step 3: Wait for about 5 minutes to finish the scanning and capture your PowerShell window screen. The output should be something like this screen: 192.168.1.0: False 192.168.1.1: True 192.168.1.2: False 192.168.1.3: False 192.168.1.4: False 192.168.1.5: True … Those lines with “True” result are active IP addresses inside your network. The rest of IP addresses are not responding at all. If you want to print out only active ones, you can attach filters at the end of previous one-liners with “| Select-String True”. For example: $ipv4prefix=$(ipconfig | where {$_ -match 'IPv4.+\s(\d{1,3}\.\d{1,3}\.\d{1,3}\.)' } | out-null; $Matches[1]); 0..255 | %{"$ipv4prefix$_"}| % {"$($_): $(Test-Connection -count 1 -quiet -ComputerName $($_))"} | Select-String True The output should be like this: 192.168.1.1: True 192.168.1.5: True … Playground inside Central Culture Park (中央藝文公園、華山大草原) Taipei City, Taiwan One more thing… In this post I just showed you how easily you can explore your network with simply your Windows 10 PC. You can now imagine that with a Linux desktop we can do even more powerful discovery than this. Here is a one-liner for BASH together with standard tool “awk”: ipv4prefix="192.168.1."; for i in `seq 1 255`; do ping -c 1 ${ipv4prefix}$i | tr \\n ' ' | awk '/1 received/ {print $2}'; done Now you have no excuses to say, I cannot do any network exploration until I have Cisco Prime Infrastructure. You can start network discovery right now after reading my post here. And now you know how easily malicious hackers can find your public IP addresses, and create trouble for you if your public-facing network devices are vulnerable, just like this incident. Show IP Protocols: Bank lost 1 million US Dollars because of outdated routers I am Li-Ji Hong. This is my blog “Show IP Protocols”. See you next time!</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>CCNA 2020, My summary of changes</title><link>https://showipprotocols.blogspot.com/2019/06/ccna-2020-my-summary-of-changes.html</link><category>CCNA</category><pubDate>Thu, 27 Jun 2019 18:12:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-6983155353734890968</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijt4tXX1azfcsCGVs1mn5XMbgXCExQuM_WEoXNlSzqlN6G1Q6pntmgkoScrMlYePE7vmoQqWAxPhGzP5uXFr7Uu5_Te1NXXjuHx0kzDVp9yJzbVZy0Qp-GcxDf5gwrBPOzoop4mzZZAcA/s1600/20190625_091044.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijt4tXX1azfcsCGVs1mn5XMbgXCExQuM_WEoXNlSzqlN6G1Q6pntmgkoScrMlYePE7vmoQqWAxPhGzP5uXFr7Uu5_Te1NXXjuHx0kzDVp9yJzbVZy0Qp-GcxDf5gwrBPOzoop4mzZZAcA/s320/20190625_091044.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
Cisco recently announced major changes of certification programs and they all will take place on February 24, 2020. In this post, I am giving you my quick summary on CCNA alone.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
CCNA Exam Changes (200-301)&lt;/h3&gt;
&lt;br /&gt;
The official new exam name for CCNA 2020 is “Cisco Certified Network Associate v2.0 (CCNA 200-301)”. I know it is quite confusing since CCNA exams has already been changed for a couple of times in recent years. I will call this 2020 CCNA by its exam code “200-301” instead.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Compared to current single 200-125 exam, more topics and questions would be tested in the new 200-301, such as Wireless LAN, Automation and Programming. The exam time is also increased. For short, the new CCNA exam would be more challenging to prepare over the current exams.&lt;br /&gt;
&lt;br /&gt;
The good news is, we still have around 8 months to take current single 200-125 exam, before February 24, 2020 from today.&lt;br /&gt;
&lt;br /&gt;
If you are in the middle of CCNA preparation, I recommend keep going, which is also what Cisco recommends. Eight months should be enough for you, no matter you plan to dedicate days to take a classroom training, online training, or use self-studying kits, as tools for exam preparations.&lt;br /&gt;
&lt;br /&gt;
Let’s move on to impacts.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Impacts to CCENT holders&lt;/h3&gt;
&lt;br /&gt;
If you plan to achieve CCNA by passing 2 exams in 2 stages, the 2020 changes could impact you the most. This is because CCENT certification itself is also gone after February 24, 2020! Your CCENT passing status could not be re-certified after February 24.&lt;br /&gt;
&lt;br /&gt;
To acquire your CCNA, you must pass both ICND1 (100-105) and ICND2 (200-105) in 8 months from today. Otherwise, you can only restart your whole CCNA certification process after February 24.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Impacts to specialized CCNA, e.g. CCNA Wireless&lt;/h3&gt;
&lt;br /&gt;
Specialized CCNA certifications, such as CCNA Wireless, would all be gone after February 24! They all will become the single certification: CCNA. No more individual specialized CCNA anymore. Here is the list of “specialized CCNA” I know would be gone:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;CCNA Cloud&lt;/li&gt;
&lt;li&gt;CCNA Collaboration&lt;/li&gt;
&lt;li&gt;CCNA Cyber Ops&lt;/li&gt;
&lt;li&gt;CCNA Data Center&lt;/li&gt;
&lt;li&gt;CCDA&lt;/li&gt;
&lt;li&gt;CCNA Industrial&lt;/li&gt;
&lt;li&gt;CCNA Routing and Switching&lt;/li&gt;
&lt;li&gt;CCNA Security&lt;/li&gt;
&lt;li&gt;CCNA Service Provider&lt;/li&gt;
&lt;li&gt;CCNA Wireless&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
Wait a minute, what about my passing status of these above certifications?&lt;br /&gt;
&lt;br /&gt;
In fact, Cisco will send you a new CCNA certificate if you are still a valid specialized CCNA holder on February 24. Since you have paid extra efforts for specialized CCNA, Cisco would recognize and count them in credits. These credits would be counted for your future CCNA recertification. I will talk more on CCNA recertification soon in next topic.&lt;br /&gt;
&lt;br /&gt;
For short, if you already are specialized CCNA certificate holder, you still preserve your extra efforts over plain CCNA. If you are in the middle of taking specialized CCNA exam, unless your exam costs are sponsored or requested to do it anyway, then I recommend wait until February 24.&lt;br /&gt;
&lt;br /&gt;
I want to clarify that Cisco do also announce new Cisco Certified Specialist (or CCS for short) certifications. However, do not confuse them with specialized CCNA. Your specialized CCNA exam passing status would not help you to acquire the new CCS certifications. Although the tested topics might be overlapping with your specialized CCNA, you still must take new CCS exams after February 24 to acquire your new CCS certification.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Impacts on CCNA Recertification&lt;/h3&gt;
&lt;br /&gt;
After February 24, you have more paths to recertify your CCNA. Originally, you can only re-take the same CCNA exam every 3 years to recertify. After February 24, you have more options. You can take any training classes that Cisco recognizes with credits. If you have acquired more than 30 credits every 3 years, you recertify your CCNA without taking any exams.&lt;br /&gt;
&lt;br /&gt;
Although up to this moment, I don’t find any “credit” assignment rules to training classes yet. I believe Cisco would announce them soon.&lt;br /&gt;
&lt;br /&gt;
In my opinion, this is a more flexible approach because many people have completed many major training classes, and they just don’t have the time to pass the exams.&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijt4tXX1azfcsCGVs1mn5XMbgXCExQuM_WEoXNlSzqlN6G1Q6pntmgkoScrMlYePE7vmoQqWAxPhGzP5uXFr7Uu5_Te1NXXjuHx0kzDVp9yJzbVZy0Qp-GcxDf5gwrBPOzoop4mzZZAcA/s1600/20190625_091044.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijt4tXX1azfcsCGVs1mn5XMbgXCExQuM_WEoXNlSzqlN6G1Q6pntmgkoScrMlYePE7vmoQqWAxPhGzP5uXFr7Uu5_Te1NXXjuHx0kzDVp9yJzbVZy0Qp-GcxDf5gwrBPOzoop4mzZZAcA/s640/20190625_091044.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;a href="https://goo.gl/maps/t24Us31nxPUPNKKF8" target="_blank"&gt;Shimen Red House (西門紅樓)&lt;/a&gt;&lt;br /&gt;
Taipei City, Taiwan&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;h3&gt;
One more thing…&lt;/h3&gt;
&lt;br /&gt;
I like the new changes to CCNA certification. Although it would be more difficult to prepare for new exams, adding topics such as Automation and Programming is great because this is the trend for TCP/IP networking. I will talk more on automation and programming soon in future posts.&lt;br /&gt;
&lt;br /&gt;
In addition to CCNA, Cisco also announced major changes to CCNP and CCIE, and they all take place on February 24, 2020. If you want to know more on CCNP and CCIE certification changes, please let me know by leaving your questions below.&lt;br /&gt;
&lt;br /&gt;
This is my blog “Show IP Protocols”. I am Li-Ji Hong! Stay tuned!&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;
Links on Cisco.com:&lt;br /&gt;
&lt;a href="https://learningnetwork.cisco.com/community/certifications/ccna-cert/ccna-exam/exam-topics" target="_blank"&gt;Cisco Certified Network Associate (200-301)&lt;/a&gt;&lt;br /&gt;
&lt;a href="https://learningnetwork.cisco.com/thread/134625" target="_blank"&gt;New CCNA exam goes live on February 24, 2020&lt;/a&gt;&lt;/div&gt;
</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20190627/hongliji-sip-p-20190627.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijt4tXX1azfcsCGVs1mn5XMbgXCExQuM_WEoXNlSzqlN6G1Q6pntmgkoScrMlYePE7vmoQqWAxPhGzP5uXFr7Uu5_Te1NXXjuHx0kzDVp9yJzbVZy0Qp-GcxDf5gwrBPOzoop4mzZZAcA/s72-c/20190625_091044.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.49702939999997</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">24.9687357 121.41634839999998 25.083835699999998 121.57771039999997</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>Cisco recently announced major changes of certification programs and they all will take place on February 24, 2020. In this post, I am giving you my quick summary on CCNA alone. CCNA Exam Changes (200-301) The official new exam name for CCNA 2020 is “Cisco Certified Network Associate v2.0 (CCNA 200-301)”. I know it is quite confusing since CCNA exams has already been changed for a couple of times in recent years. I will call this 2020 CCNA by its exam code “200-301” instead. Compared to current single 200-125 exam, more topics and questions would be tested in the new 200-301, such as Wireless LAN, Automation and Programming. The exam time is also increased. For short, the new CCNA exam would be more challenging to prepare over the current exams. The good news is, we still have around 8 months to take current single 200-125 exam, before February 24, 2020 from today. If you are in the middle of CCNA preparation, I recommend keep going, which is also what Cisco recommends. Eight months should be enough for you, no matter you plan to dedicate days to take a classroom training, online training, or use self-studying kits, as tools for exam preparations. Let’s move on to impacts. Impacts to CCENT holders If you plan to achieve CCNA by passing 2 exams in 2 stages, the 2020 changes could impact you the most. This is because CCENT certification itself is also gone after February 24, 2020! Your CCENT passing status could not be re-certified after February 24. To acquire your CCNA, you must pass both ICND1 (100-105) and ICND2 (200-105) in 8 months from today. Otherwise, you can only restart your whole CCNA certification process after February 24. Impacts to specialized CCNA, e.g. CCNA Wireless Specialized CCNA certifications, such as CCNA Wireless, would all be gone after February 24! They all will become the single certification: CCNA. No more individual specialized CCNA anymore. Here is the list of “specialized CCNA” I know would be gone: CCNA Cloud CCNA Collaboration CCNA Cyber Ops CCNA Data Center CCDA CCNA Industrial CCNA Routing and Switching CCNA Security CCNA Service Provider CCNA Wireless Wait a minute, what about my passing status of these above certifications? In fact, Cisco will send you a new CCNA certificate if you are still a valid specialized CCNA holder on February 24. Since you have paid extra efforts for specialized CCNA, Cisco would recognize and count them in credits. These credits would be counted for your future CCNA recertification. I will talk more on CCNA recertification soon in next topic. For short, if you already are specialized CCNA certificate holder, you still preserve your extra efforts over plain CCNA. If you are in the middle of taking specialized CCNA exam, unless your exam costs are sponsored or requested to do it anyway, then I recommend wait until February 24. I want to clarify that Cisco do also announce new Cisco Certified Specialist (or CCS for short) certifications. However, do not confuse them with specialized CCNA. Your specialized CCNA exam passing status would not help you to acquire the new CCS certifications. Although the tested topics might be overlapping with your specialized CCNA, you still must take new CCS exams after February 24 to acquire your new CCS certification. Impacts on CCNA Recertification After February 24, you have more paths to recertify your CCNA. Originally, you can only re-take the same CCNA exam every 3 years to recertify. After February 24, you have more options. You can take any training classes that Cisco recognizes with credits. If you have acquired more than 30 credits every 3 years, you recertify your CCNA without taking any exams. Although up to this moment, I don’t find any “credit” assignment rules to training classes yet. I believe Cisco would announce them soon. In my opinion, this is a more flexible approach because many people have completed many major training classes, and they just don’t have the time to pass the exams. Shimen Red House (西門紅樓) Taipei City, Taiwan One more thing… I like the new changes to CCNA certification. Although it would be more difficult to prepare for new exams, adding topics such as Automation and Programming is great because this is the trend for TCP/IP networking. I will talk more on automation and programming soon in future posts. In addition to CCNA, Cisco also announced major changes to CCNP and CCIE, and they all take place on February 24, 2020. If you want to know more on CCNP and CCIE certification changes, please let me know by leaving your questions below. This is my blog “Show IP Protocols”. I am Li-Ji Hong! Stay tuned! Links on Cisco.com: Cisco Certified Network Associate (200-301) New CCNA exam goes live on February 24, 2020</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>Cisco recently announced major changes of certification programs and they all will take place on February 24, 2020. In this post, I am giving you my quick summary on CCNA alone. CCNA Exam Changes (200-301) The official new exam name for CCNA 2020 is “Cisco Certified Network Associate v2.0 (CCNA 200-301)”. I know it is quite confusing since CCNA exams has already been changed for a couple of times in recent years. I will call this 2020 CCNA by its exam code “200-301” instead. Compared to current single 200-125 exam, more topics and questions would be tested in the new 200-301, such as Wireless LAN, Automation and Programming. The exam time is also increased. For short, the new CCNA exam would be more challenging to prepare over the current exams. The good news is, we still have around 8 months to take current single 200-125 exam, before February 24, 2020 from today. If you are in the middle of CCNA preparation, I recommend keep going, which is also what Cisco recommends. Eight months should be enough for you, no matter you plan to dedicate days to take a classroom training, online training, or use self-studying kits, as tools for exam preparations. Let’s move on to impacts. Impacts to CCENT holders If you plan to achieve CCNA by passing 2 exams in 2 stages, the 2020 changes could impact you the most. This is because CCENT certification itself is also gone after February 24, 2020! Your CCENT passing status could not be re-certified after February 24. To acquire your CCNA, you must pass both ICND1 (100-105) and ICND2 (200-105) in 8 months from today. Otherwise, you can only restart your whole CCNA certification process after February 24. Impacts to specialized CCNA, e.g. CCNA Wireless Specialized CCNA certifications, such as CCNA Wireless, would all be gone after February 24! They all will become the single certification: CCNA. No more individual specialized CCNA anymore. Here is the list of “specialized CCNA” I know would be gone: CCNA Cloud CCNA Collaboration CCNA Cyber Ops CCNA Data Center CCDA CCNA Industrial CCNA Routing and Switching CCNA Security CCNA Service Provider CCNA Wireless Wait a minute, what about my passing status of these above certifications? In fact, Cisco will send you a new CCNA certificate if you are still a valid specialized CCNA holder on February 24. Since you have paid extra efforts for specialized CCNA, Cisco would recognize and count them in credits. These credits would be counted for your future CCNA recertification. I will talk more on CCNA recertification soon in next topic. For short, if you already are specialized CCNA certificate holder, you still preserve your extra efforts over plain CCNA. If you are in the middle of taking specialized CCNA exam, unless your exam costs are sponsored or requested to do it anyway, then I recommend wait until February 24. I want to clarify that Cisco do also announce new Cisco Certified Specialist (or CCS for short) certifications. However, do not confuse them with specialized CCNA. Your specialized CCNA exam passing status would not help you to acquire the new CCS certifications. Although the tested topics might be overlapping with your specialized CCNA, you still must take new CCS exams after February 24 to acquire your new CCS certification. Impacts on CCNA Recertification After February 24, you have more paths to recertify your CCNA. Originally, you can only re-take the same CCNA exam every 3 years to recertify. After February 24, you have more options. You can take any training classes that Cisco recognizes with credits. If you have acquired more than 30 credits every 3 years, you recertify your CCNA without taking any exams. Although up to this moment, I don’t find any “credit” assignment rules to training classes yet. I believe Cisco would announce them soon. In my opinion, this is a more flexible approach because many people have completed many major training classes, and they just don’t have the time to pass the exams. Shimen Red House (西門紅樓) Taipei City, Taiwan One more thing… I like the new changes to CCNA certification. Although it would be more difficult to prepare for new exams, adding topics such as Automation and Programming is great because this is the trend for TCP/IP networking. I will talk more on automation and programming soon in future posts. In addition to CCNA, Cisco also announced major changes to CCNP and CCIE, and they all take place on February 24, 2020. If you want to know more on CCNP and CCIE certification changes, please let me know by leaving your questions below. This is my blog “Show IP Protocols”. I am Li-Ji Hong! Stay tuned! Links on Cisco.com: Cisco Certified Network Associate (200-301) New CCNA exam goes live on February 24, 2020</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>Google is terminating Google+ service</title><link>https://showipprotocols.blogspot.com/2019/02/migration-from-google-plus.html</link><pubDate>Thu, 14 Feb 2019 22:02:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-2629396272440532674</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrB8MR71eBrjjFwc5ZTM04BEFMtv0VgqTlLCxjWikO870t4iFB2P2ntGLnXPFlnOL_UV2A9J-j_ycJyREvVMkYjEa84QZ_BHDlRxokByixgZ4WKcu1ffiyWxpfu22Ncxegp63M5G1Xo20/s1600/20190207_153241.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrB8MR71eBrjjFwc5ZTM04BEFMtv0VgqTlLCxjWikO870t4iFB2P2ntGLnXPFlnOL_UV2A9J-j_ycJyREvVMkYjEa84QZ_BHDlRxokByixgZ4WKcu1ffiyWxpfu22Ncxegp63M5G1Xo20/s200/20190207_153241.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
Hi, this is Li-Ji Hong speaking. We now know Google is terminating Google+ service. I understand that many of you came from Google+ to find and visit my web site “Show IP Protocols”. To keep updated and connected to my web site “Show IP Protocols”, I recommend you adding at least one of these three services: Twitter, Facebook, and Email subscription.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;Twitter&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Number 1 is Twitter. In my opinion, Twitter is so much like Google+. I will keep posting new contents on Twitter even after Google+ stops.&lt;br /&gt;
&lt;br /&gt;
If you are already a Twitter user, you can simply follow my handle: hongliji. The full Twitter link is:&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://twitter.com/hongliji" target="_blank"&gt;https://twitter.com/hongliji&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Even if you are not Twitter user at all, I still recommend you adding this link to your browser bookmark. You can come back easier from time to time. On “Show IP Protocols” you basically find only posts that I create. When I come across good articles by others around the web, I would share them to Twitter.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;Facebook&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Number 2 is Facebook. I started a Facebook Page for “Show IP Protocols” long time ago although I am not managing well on Facebook. If you stay on Facebook all the time, you can simply “Like” or follow this Facebook Page for “Show IP Protocols”.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://www.facebook.com/showipprotocols" target="_blank"&gt;https://www.facebook.com/showipprotocols&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The contents posted on this page should be the same as Twitter.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;Email subscription&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Last one, Email subscription. Email subscription is my recommended method. You will receive the full texts and photos of my every post via Emails. Email subscription service would be always available even I understand many people like phone Apps more than Emails today.&lt;br /&gt;
&lt;br /&gt;
Click open this link to subscribe on FeedBurner:&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://feedburner.google.com/fb/a/mailverify?uri=ShowIPProtocols&amp;amp;loc=en_US" target="_blank"&gt;http://feedburner.google.com/fb/a/mailverify?uri=ShowIPProtocols&amp;amp;loc=en_US&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;One more thing…&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
I felt surprised and sad to know that Google is terminating Google+ service. On the other hand, technologies of Internet would always evolve and be innovated. I will keep my web site “Show IP Protocols” evolving and being innovated, so you would always learn new things when visiting my web site “Show IP Protocols”.&lt;br /&gt;
&lt;br /&gt;
I am Li-Ji Hong. This is “Show IP Protocols”. See you next time!&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPEE0hgWShWiXYqfVDBc65Y8hA63SK8QO4Tw8L7m8tYm36U05ZXxxdxYvWXAGmoyHGrb8EYYLgbJ2oWMkF5tmwS0Vs2unQOYTBWmYmxeKMIU_88Jyrx5pVkTWuZep5DOy9RgeVlStpZQw/s1600/20190207_153241.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPEE0hgWShWiXYqfVDBc65Y8hA63SK8QO4Tw8L7m8tYm36U05ZXxxdxYvWXAGmoyHGrb8EYYLgbJ2oWMkF5tmwS0Vs2unQOYTBWmYmxeKMIU_88Jyrx5pVkTWuZep5DOy9RgeVlStpZQw/s640/20190207_153241.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Cherry blossoms in Taoyuan&amp;nbsp;Brewery (桃園觀光酒廠) of&amp;nbsp;Taiwan Tobacco &amp;amp; Liquor Corporation (TTL)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20190214/hongliji-sip-p-20190214.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrB8MR71eBrjjFwc5ZTM04BEFMtv0VgqTlLCxjWikO870t4iFB2P2ntGLnXPFlnOL_UV2A9J-j_ycJyREvVMkYjEa84QZ_BHDlRxokByixgZ4WKcu1ffiyWxpfu22Ncxegp63M5G1Xo20/s72-c/20190207_153241.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.49702939999997</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">24.9687357 121.41634839999998 25.083835699999998 121.57771039999997</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>Hi, this is Li-Ji Hong speaking. We now know Google is terminating Google+ service. I understand that many of you came from Google+ to find and visit my web site “Show IP Protocols”. To keep updated and connected to my web site “Show IP Protocols”, I recommend you adding at least one of these three services: Twitter, Facebook, and Email subscription. Twitter Number 1 is Twitter. In my opinion, Twitter is so much like Google+. I will keep posting new contents on Twitter even after Google+ stops. If you are already a Twitter user, you can simply follow my handle: hongliji. The full Twitter link is: https://twitter.com/hongliji Even if you are not Twitter user at all, I still recommend you adding this link to your browser bookmark. You can come back easier from time to time. On “Show IP Protocols” you basically find only posts that I create. When I come across good articles by others around the web, I would share them to Twitter. Facebook Number 2 is Facebook. I started a Facebook Page for “Show IP Protocols” long time ago although I am not managing well on Facebook. If you stay on Facebook all the time, you can simply “Like” or follow this Facebook Page for “Show IP Protocols”. https://www.facebook.com/showipprotocols The contents posted on this page should be the same as Twitter. Email subscription Last one, Email subscription. Email subscription is my recommended method. You will receive the full texts and photos of my every post via Emails. Email subscription service would be always available even I understand many people like phone Apps more than Emails today. Click open this link to subscribe on FeedBurner: http://feedburner.google.com/fb/a/mailverify?uri=ShowIPProtocols&amp;amp;loc=en_US One more thing… I felt surprised and sad to know that Google is terminating Google+ service. On the other hand, technologies of Internet would always evolve and be innovated. I will keep my web site “Show IP Protocols” evolving and being innovated, so you would always learn new things when visiting my web site “Show IP Protocols”. I am Li-Ji Hong. This is “Show IP Protocols”. See you next time! Cherry blossoms in Taoyuan&amp;nbsp;Brewery (桃園觀光酒廠) of&amp;nbsp;Taiwan Tobacco &amp;amp; Liquor Corporation (TTL)</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>Hi, this is Li-Ji Hong speaking. We now know Google is terminating Google+ service. I understand that many of you came from Google+ to find and visit my web site “Show IP Protocols”. To keep updated and connected to my web site “Show IP Protocols”, I recommend you adding at least one of these three services: Twitter, Facebook, and Email subscription. Twitter Number 1 is Twitter. In my opinion, Twitter is so much like Google+. I will keep posting new contents on Twitter even after Google+ stops. If you are already a Twitter user, you can simply follow my handle: hongliji. The full Twitter link is: https://twitter.com/hongliji Even if you are not Twitter user at all, I still recommend you adding this link to your browser bookmark. You can come back easier from time to time. On “Show IP Protocols” you basically find only posts that I create. When I come across good articles by others around the web, I would share them to Twitter. Facebook Number 2 is Facebook. I started a Facebook Page for “Show IP Protocols” long time ago although I am not managing well on Facebook. If you stay on Facebook all the time, you can simply “Like” or follow this Facebook Page for “Show IP Protocols”. https://www.facebook.com/showipprotocols The contents posted on this page should be the same as Twitter. Email subscription Last one, Email subscription. Email subscription is my recommended method. You will receive the full texts and photos of my every post via Emails. Email subscription service would be always available even I understand many people like phone Apps more than Emails today. Click open this link to subscribe on FeedBurner: http://feedburner.google.com/fb/a/mailverify?uri=ShowIPProtocols&amp;amp;loc=en_US One more thing… I felt surprised and sad to know that Google is terminating Google+ service. On the other hand, technologies of Internet would always evolve and be innovated. I will keep my web site “Show IP Protocols” evolving and being innovated, so you would always learn new things when visiting my web site “Show IP Protocols”. I am Li-Ji Hong. This is “Show IP Protocols”. See you next time! Cherry blossoms in Taoyuan&amp;nbsp;Brewery (桃園觀光酒廠) of&amp;nbsp;Taiwan Tobacco &amp;amp; Liquor Corporation (TTL)</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>400G Ethernet, My Observation Notes</title><link>https://showipprotocols.blogspot.com/2018/11/400G-Ethernet-my-observation-notes.html</link><category>Ethernet</category><pubDate>Sun, 4 Nov 2018 17:51:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-2579985660530229290</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja3skGEmVDttwYefgezWOiT-7ljhGet0q_GJuF6yB8L4K62CDrtk4R0JS8e0eN3XjLrSgfSuZ_lqBHZ9vMJQwUOxEIuQpuI6GKrzvApIRcq35FY2WmcvGzMWHubu81Ncvcj0L_R6S1mAg/s1600/20180714_164254.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja3skGEmVDttwYefgezWOiT-7ljhGet0q_GJuF6yB8L4K62CDrtk4R0JS8e0eN3XjLrSgfSuZ_lqBHZ9vMJQwUOxEIuQpuI6GKrzvApIRcq35FY2WmcvGzMWHubu81Ncvcj0L_R6S1mAg/s320/20180714_164254.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
I saw &lt;a href="https://blogs.cisco.com/datacenter/400g-done-right-with-cisco-nexus-portfolio" target="_blank"&gt;a post&lt;/a&gt; about Cisco has announced 400G Ethernet switch products.&lt;br /&gt;
&lt;br /&gt;
400G Ethernet means the bit rate can be up to 400 Gbps. Here are some of my observation notes on 400G Ethernet products.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;

&lt;b&gt;Cisco announced four models of Nexus 400G switches&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguLqaSRr_vqu5NcHVJnQhQR1H9NF8xEv0aoJQ1N6DvvxyjXmpy4ISEMj8tj1239mcsWO3V5XXM9xlKmXIBitbAWXdwqTxTowM7w6xceDvPh_nQelq_ZCs2ZNQgjnX2s5r7ivjf39QSWWs/s1600/%25E6%258A%2595%25E5%25BD%25B1%25E7%2589%25872.JPG" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="720" data-original-width="1280" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguLqaSRr_vqu5NcHVJnQhQR1H9NF8xEv0aoJQ1N6DvvxyjXmpy4ISEMj8tj1239mcsWO3V5XXM9xlKmXIBitbAWXdwqTxTowM7w6xceDvPh_nQelq_ZCs2ZNQgjnX2s5r7ivjf39QSWWs/s640/%25E6%258A%2595%25E5%25BD%25B1%25E7%2589%25872.JPG" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Screen capture on&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/solutions/data-center/high-capacity-400g-data-center-networking/index.html" target="_blank"&gt;Cisco.com&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
In the product page, Cisco announced 4 new models of Nexus switches with 400G Ethernet capability.&lt;br /&gt;
&lt;br /&gt;
Nexus 9316D-GX is for Cisco ACI Spine. Nexus 93600CD-GX is for Cisco ACI Leaf. Nexus 3408-S and Nexus 3432D-S are non-ACI Ethernet switches.&lt;br /&gt;
&lt;br /&gt;
Cisco's Product page is:&lt;br /&gt;
&lt;a href="https://www.cisco.com/c/en/us/solutions/data-center/high-capacity-400g-data-center-networking/index.html"&gt;https://www.cisco.com/c/en/us/solutions/data-center/high-capacity-400g-data-center-networking/index.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;400G port transceivers: QSFP-DD&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
All four models use QSFP-DD as 400G Ethernet transceiver type.&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMk_Bkpiw5ggtIzHlnOXkf6UUybkQEPTHcpAI67CQatzlsiyuHmNxkHkneGEoNgDO0w7pUdyJFHz-Ub4lMrazkV7TG2azsIu6cXAD6wgt5C2a8giy407zhZvr3LzGafdsesV5lsEql_gk/s1600/%25E6%258A%2595%25E5%25BD%25B1%25E7%2589%25873.JPG" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="720" data-original-width="1280" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMk_Bkpiw5ggtIzHlnOXkf6UUybkQEPTHcpAI67CQatzlsiyuHmNxkHkneGEoNgDO0w7pUdyJFHz-Ub4lMrazkV7TG2azsIu6cXAD6wgt5C2a8giy407zhZvr3LzGafdsesV5lsEql_gk/s640/%25E6%258A%2595%25E5%25BD%25B1%25E7%2589%25873.JPG" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Screen capture on &lt;a href="https://blogs.cisco.com/sp/ofc-2017-demo-cisco-400gbe-optical-module" target="_blank"&gt;Cisco.com&lt;/a&gt;.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
QSFP Double Density (QSFP-DD) transceivers are the same size on the switch front panel as QSFP transceivers. The switch ports are also compatible with existing QSFP28 transceivers. That means, my current 100G transceivers can be inserted and reused on these new faster Nexus switches.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The fiber connectors: LC or MPO-12&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Fiber connectors should be in LC or MPO-12 types.&lt;br /&gt;
&lt;br /&gt;
I cannot find an official datasheet to confirm that at this moment. However, I believe this should be true when I saw photos published on Cisco official web site.&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1Kb0_e-vtO_ECHUesGb1liaDvtuPu7Zk7mAIUFghk3u5ugdDFQNGrkKn38eDNzGBIeJ2o2F2XihvCeoh0aDxWKKhbv_w2IJccuQSxvhWAxad5nEXwPDJyMUqyMPtPDrZKkMFK_g5s-VM/s1600/%25E6%258A%2595%25E5%25BD%25B1%25E7%2589%25874.JPG" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="720" data-original-width="1280" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1Kb0_e-vtO_ECHUesGb1liaDvtuPu7Zk7mAIUFghk3u5ugdDFQNGrkKn38eDNzGBIeJ2o2F2XihvCeoh0aDxWKKhbv_w2IJccuQSxvhWAxad5nEXwPDJyMUqyMPtPDrZKkMFK_g5s-VM/s640/%25E6%258A%2595%25E5%25BD%25B1%25E7%2589%25874.JPG" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Screen capture on &lt;a href="https://blogs.cisco.com/datacenter/bidirectional-bidi-optical-networking-to-400-gigabit-ethernet-realm" target="_blank"&gt;Cisco.com&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOFtWFEz1Kj3XBX-RmEkXw4v8Zvk_lmi8OB7zfY89mGnqfgf8yc9mVjbLluy-W91EDjevh929dO0qNm9Jbv3MqBX16zhjfp8YG4CTI8xOzS40EZzIQ6DGbLOoH9eGu10DtEAuYhqJ8IwU/s1600/%25E6%258A%2595%25E5%25BD%25B1%25E7%2589%25875.JPG" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="720" data-original-width="1280" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOFtWFEz1Kj3XBX-RmEkXw4v8Zvk_lmi8OB7zfY89mGnqfgf8yc9mVjbLluy-W91EDjevh929dO0qNm9Jbv3MqBX16zhjfp8YG4CTI8xOzS40EZzIQ6DGbLOoH9eGu10DtEAuYhqJ8IwU/s640/%25E6%258A%2595%25E5%25BD%25B1%25E7%2589%25875.JPG" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Screen capture on &lt;a href="https://blogs.cisco.com/sp/new-msa-formed-to-tackle-400ge-over-multi-mode-fiber" target="_blank"&gt;Cisco.com&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
If my fiber cabling connectors are in types of LC or MPO-12, I can reuse my existing fiber infrastructure to upgrade to 400G Ethernet. When you are planning for new fiber installation, I also recommend choosing LC and MPO-12 connectors.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;One more thing…&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
I believe 400G Ethernet should still be very expensive today in year 2018. I might not need it soon. I know I can reuse my existing expensive 100G Ethernet transceivers and fiber infrastructures when I upgrade to 400G Ethernet in the future. And this makes me feel better.&lt;br /&gt;
&lt;br /&gt;
I am Li-Ji Hong. What do you think about 400G Ethernet? Please share your ideas with me in the comments below! Thank you!&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3czZ0t260bCOxHAWZzo9qqUrTuP0vX7CkeDNm4A9eXeyEKT2lqQkoXAIRIiSJtOhWS4ZkjQDitLhHV5D2iEumpQ9ARGwAt8j1MuSq4kcMlOYjQEubw-P2hHgCVMCjHDgElYLTwHGmAfQ/s1600/20180714_164254.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3czZ0t260bCOxHAWZzo9qqUrTuP0vX7CkeDNm4A9eXeyEKT2lqQkoXAIRIiSJtOhWS4ZkjQDitLhHV5D2iEumpQ9ARGwAt8j1MuSq4kcMlOYjQEubw-P2hHgCVMCjHDgElYLTwHGmAfQ/s640/20180714_164254.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Lotus pond inside &lt;a href="https://en.wikipedia.org/wiki/Taipei_Botanical_Garden" target="_blank"&gt;Taipei Botanical Garden&lt;/a&gt;&amp;nbsp;(台北植物園).&lt;br /&gt;
Taipei City, Taiwan&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20181104/hongliji-sip-p-20181104.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja3skGEmVDttwYefgezWOiT-7ljhGet0q_GJuF6yB8L4K62CDrtk4R0JS8e0eN3XjLrSgfSuZ_lqBHZ9vMJQwUOxEIuQpuI6GKrzvApIRcq35FY2WmcvGzMWHubu81Ncvcj0L_R6S1mAg/s72-c/20180714_164254.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.49702939999997</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">24.9687357 121.41634839999998 25.083835699999998 121.57771039999997</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>I saw a post about Cisco has announced 400G Ethernet switch products. 400G Ethernet means the bit rate can be up to 400 Gbps. Here are some of my observation notes on 400G Ethernet products. Cisco announced four models of Nexus 400G switches Screen capture on&amp;nbsp;Cisco.com In the product page, Cisco announced 4 new models of Nexus switches with 400G Ethernet capability. Nexus 9316D-GX is for Cisco ACI Spine. Nexus 93600CD-GX is for Cisco ACI Leaf. Nexus 3408-S and Nexus 3432D-S are non-ACI Ethernet switches. Cisco's Product page is: https://www.cisco.com/c/en/us/solutions/data-center/high-capacity-400g-data-center-networking/index.html 400G port transceivers: QSFP-DD All four models use QSFP-DD as 400G Ethernet transceiver type. Screen capture on Cisco.com. QSFP Double Density (QSFP-DD) transceivers are the same size on the switch front panel as QSFP transceivers. The switch ports are also compatible with existing QSFP28 transceivers. That means, my current 100G transceivers can be inserted and reused on these new faster Nexus switches. The fiber connectors: LC or MPO-12 Fiber connectors should be in LC or MPO-12 types. I cannot find an official datasheet to confirm that at this moment. However, I believe this should be true when I saw photos published on Cisco official web site. Screen capture on Cisco.com Screen capture on Cisco.com If my fiber cabling connectors are in types of LC or MPO-12, I can reuse my existing fiber infrastructure to upgrade to 400G Ethernet. When you are planning for new fiber installation, I also recommend choosing LC and MPO-12 connectors. One more thing… I believe 400G Ethernet should still be very expensive today in year 2018. I might not need it soon. I know I can reuse my existing expensive 100G Ethernet transceivers and fiber infrastructures when I upgrade to 400G Ethernet in the future. And this makes me feel better. I am Li-Ji Hong. What do you think about 400G Ethernet? Please share your ideas with me in the comments below! Thank you! Lotus pond inside Taipei Botanical Garden&amp;nbsp;(台北植物園). Taipei City, Taiwan</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>I saw a post about Cisco has announced 400G Ethernet switch products. 400G Ethernet means the bit rate can be up to 400 Gbps. Here are some of my observation notes on 400G Ethernet products. Cisco announced four models of Nexus 400G switches Screen capture on&amp;nbsp;Cisco.com In the product page, Cisco announced 4 new models of Nexus switches with 400G Ethernet capability. Nexus 9316D-GX is for Cisco ACI Spine. Nexus 93600CD-GX is for Cisco ACI Leaf. Nexus 3408-S and Nexus 3432D-S are non-ACI Ethernet switches. Cisco's Product page is: https://www.cisco.com/c/en/us/solutions/data-center/high-capacity-400g-data-center-networking/index.html 400G port transceivers: QSFP-DD All four models use QSFP-DD as 400G Ethernet transceiver type. Screen capture on Cisco.com. QSFP Double Density (QSFP-DD) transceivers are the same size on the switch front panel as QSFP transceivers. The switch ports are also compatible with existing QSFP28 transceivers. That means, my current 100G transceivers can be inserted and reused on these new faster Nexus switches. The fiber connectors: LC or MPO-12 Fiber connectors should be in LC or MPO-12 types. I cannot find an official datasheet to confirm that at this moment. However, I believe this should be true when I saw photos published on Cisco official web site. Screen capture on Cisco.com Screen capture on Cisco.com If my fiber cabling connectors are in types of LC or MPO-12, I can reuse my existing fiber infrastructure to upgrade to 400G Ethernet. When you are planning for new fiber installation, I also recommend choosing LC and MPO-12 connectors. One more thing… I believe 400G Ethernet should still be very expensive today in year 2018. I might not need it soon. I know I can reuse my existing expensive 100G Ethernet transceivers and fiber infrastructures when I upgrade to 400G Ethernet in the future. And this makes me feel better. I am Li-Ji Hong. What do you think about 400G Ethernet? Please share your ideas with me in the comments below! Thank you! Lotus pond inside Taipei Botanical Garden&amp;nbsp;(台北植物園). Taipei City, Taiwan</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>Bank lost 1 million US Dollars because of outdated routers</title><link>https://showipprotocols.blogspot.com/2018/07/bank-lost-million-dollars-because-of-outdated-routers.html</link><category>Security</category><pubDate>Wed, 25 Jul 2018 19:00:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-1577173059427899815</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxDY62fAZeAfmdC4x4UbSczJoI5B1ezEGQBzxDi8UYK5vReiCwlQHQ1eEbhbuSu1eVbG6bLdVR1CybdfbvD3HIJjSH4sLYj_Dxjq_D1MPSMqvCsp9BsAOSkuAj2A92Hx2Vcq6qhx_ud5I/s1600/20180429_142137.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxDY62fAZeAfmdC4x4UbSczJoI5B1ezEGQBzxDi8UYK5vReiCwlQHQ1eEbhbuSu1eVbG6bLdVR1CybdfbvD3HIJjSH4sLYj_Dxjq_D1MPSMqvCsp9BsAOSkuAj2A92Hx2Vcq6qhx_ud5I/s320/20180429_142137.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
A recent news was about hackers hacked into a Russian bank because of outdated routers. When I saw the keyword “router”, I felt that I must dig further about what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
What I have understood now&lt;/h3&gt;
&lt;br /&gt;
The victim is PIR Bank. One of the suspects is MoneyTaker. After the breach, PIR Bank hired company Group-IB to do the clean-ups, recovery, and investigating how the hackers got into their internal network.&lt;br /&gt;
&lt;br /&gt;
Up to this moment, Group-IB disclosed hackers exploited the outdated routers of PIR Bank. The model of the routers was &lt;a href="https://www.bankinfosecurity.com/bank-hackers-exploit-outdated-router-to-steal-1-million-a-11227" target="_blank"&gt;Cisco 800 series routers&lt;/a&gt;, which was already declared publicly that the End of Support date would be someday in Year 2016, by Cisco. The running Cisco IOS version was 12.4.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h3&gt;
My understanding&lt;/h3&gt;
&lt;br /&gt;
All the routers involved in this incident in my opinion must had been deployed as Internet VPN routers. They must connect directly to the public Internet. Suppose those routers were purely internal routers without public Internet connections at all, hackers can only have access to them by getting through layers of firewalls. Suppose hackers already had broken through layers of firewalls, then hackers could have attacked directly without exploiting any of those outdated routers.&lt;br /&gt;
&lt;br /&gt;
I believe the VPN protocol used should be IPSec. However, IPSec was not to blame for this incident. Vulnerabilities were in the software or the hardware of those installed routers. It might be some discovered vulnerabilities and hackers took advantages of Zero-day Exploits to hack into the network. Hackers either used the hijacked router as a hopping location or changed the access rules so hackers had backdoor accesses to the internal network.&lt;br /&gt;
&lt;br /&gt;
I also want to emphasize that Cisco is not to blame. Cisco had already announced End of Support long time ago. If a customer insisted to keep using the old outdated routers, customers should take most of the responsibilities.&lt;br /&gt;
&lt;br /&gt;
It was a pity for a loss of nearly 1 Million US Dollars. One million dollars is enough to buy and replace a lot of new routers to prevent this loss.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Enterprises should take actions, my suggestions&lt;/h3&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Create a complete inventory of routers, especially for those connected to public Internet.&lt;/li&gt;
&lt;li&gt;Confirm with network hardware providers which routers are being or getting out of support. Create schedules to replace them as early as possible.&lt;/li&gt;
&lt;li&gt;Make sure all supported routers are running most up-to-date patched operating systems and software.&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6qkXuHdimmQmj4uIVSt3tA7THhrs8KaEI25kqpVSXc05HLDvolmsHcg_DKFlzmMXcgCUS0vqw4iaKdPSo7ybqqJilE4F8uSlNNDkasuNHB21P5EVPf9aanpIHvGBDlDcXZ2pKr_BEwZA/s1600/20180429_142137.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6qkXuHdimmQmj4uIVSt3tA7THhrs8KaEI25kqpVSXc05HLDvolmsHcg_DKFlzmMXcgCUS0vqw4iaKdPSo7ybqqJilE4F8uSlNNDkasuNHB21P5EVPf9aanpIHvGBDlDcXZ2pKr_BEwZA/s640/20180429_142137.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Sun flowers in &lt;a href="https://agriexpo.tycg.gov.tw/En" target="_blank"&gt;Taoyuan Agriculture Expo&lt;/a&gt;&amp;nbsp;(桃園農業博覽會) 2018.&lt;br /&gt;
Taoyuan City, Taiwan&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKgv6cDlNtwuRhGh7SSkMAj11e6fUnzo63ohTGcu-jQpXikNll3xFvZCsN7iPcJUCUgzPKxmCwjuwy1siBBWjDevumSrDTkC9lclUIV8_GKc6s3Zd6X8d8gAS3XLsict1cjlFB4lWXECw/s1600/20180429_142225.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKgv6cDlNtwuRhGh7SSkMAj11e6fUnzo63ohTGcu-jQpXikNll3xFvZCsN7iPcJUCUgzPKxmCwjuwy1siBBWjDevumSrDTkC9lclUIV8_GKc6s3Zd6X8d8gAS3XLsict1cjlFB4lWXECw/s640/20180429_142225.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiE28ofvs3ZhU-dHiBKm0d2gQ6RKVA7wsb_8tGwrl1Fb_hnjiNvB-72O1E9E3NfVOTo3t2fVilh5TchGgEhv3e35zDosMOMhAGMO2swDFtj_LKPX43AAuC_21Qp9QNMQKCX7fvkYOP_Lz4/s1600/20180429_151301.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiE28ofvs3ZhU-dHiBKm0d2gQ6RKVA7wsb_8tGwrl1Fb_hnjiNvB-72O1E9E3NfVOTo3t2fVilh5TchGgEhv3e35zDosMOMhAGMO2swDFtj_LKPX43AAuC_21Qp9QNMQKCX7fvkYOP_Lz4/s640/20180429_151301.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFOd2sqDc9LNOSu3iSRHyJ_3R3kfD1ObAEW0ZTdb695dmaZSSQF3IOTy4Oa8l4A5rgLK7tVF4h8sci0aDR9N5RZKPkI5p7T6biuQrVTUixzuVK0ZQ_PdDiiEU3zvOe3RHhi-yA28rcR9g/s1600/20180429_142818.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="546" data-original-width="1600" height="218" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFOd2sqDc9LNOSu3iSRHyJ_3R3kfD1ObAEW0ZTdb695dmaZSSQF3IOTy4Oa8l4A5rgLK7tVF4h8sci0aDR9N5RZKPkI5p7T6biuQrVTUixzuVK0ZQ_PdDiiEU3zvOe3RHhi-yA28rcR9g/s640/20180429_142818.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h3&gt;
One more thing…&lt;/h3&gt;
&lt;br /&gt;
I don't think we should worry about the architecture of Internet VPN and IPSec protocol itself. Many new technologies are relying on Internet VPN and IPSec. For example, Software-defined Wide Area Network (SD WAN) is built on top of Internet VPN and IPSec.&lt;br /&gt;
&lt;br /&gt;
If we make sure all running VPN routers are in healthy condition, Internet VPN architecture is still a cost-effective WAN solution with great flexibilities for enterprises.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20180725/hongliji-sip-p-20180725.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxDY62fAZeAfmdC4x4UbSczJoI5B1ezEGQBzxDi8UYK5vReiCwlQHQ1eEbhbuSu1eVbG6bLdVR1CybdfbvD3HIJjSH4sLYj_Dxjq_D1MPSMqvCsp9BsAOSkuAj2A92Hx2Vcq6qhx_ud5I/s72-c/20180429_142137.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.49702939999997</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">24.9687357 121.41634839999998 25.083835699999998 121.57771039999997</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>A recent news was about hackers hacked into a Russian bank because of outdated routers. When I saw the keyword “router”, I felt that I must dig further about what really happened. What I have understood now The victim is PIR Bank. One of the suspects is MoneyTaker. After the breach, PIR Bank hired company Group-IB to do the clean-ups, recovery, and investigating how the hackers got into their internal network. Up to this moment, Group-IB disclosed hackers exploited the outdated routers of PIR Bank. The model of the routers was Cisco 800 series routers, which was already declared publicly that the End of Support date would be someday in Year 2016, by Cisco. The running Cisco IOS version was 12.4. My understanding All the routers involved in this incident in my opinion must had been deployed as Internet VPN routers. They must connect directly to the public Internet. Suppose those routers were purely internal routers without public Internet connections at all, hackers can only have access to them by getting through layers of firewalls. Suppose hackers already had broken through layers of firewalls, then hackers could have attacked directly without exploiting any of those outdated routers. I believe the VPN protocol used should be IPSec. However, IPSec was not to blame for this incident. Vulnerabilities were in the software or the hardware of those installed routers. It might be some discovered vulnerabilities and hackers took advantages of Zero-day Exploits to hack into the network. Hackers either used the hijacked router as a hopping location or changed the access rules so hackers had backdoor accesses to the internal network. I also want to emphasize that Cisco is not to blame. Cisco had already announced End of Support long time ago. If a customer insisted to keep using the old outdated routers, customers should take most of the responsibilities. It was a pity for a loss of nearly 1 Million US Dollars. One million dollars is enough to buy and replace a lot of new routers to prevent this loss. Enterprises should take actions, my suggestions Create a complete inventory of routers, especially for those connected to public Internet. Confirm with network hardware providers which routers are being or getting out of support. Create schedules to replace them as early as possible. Make sure all supported routers are running most up-to-date patched operating systems and software. Sun flowers in Taoyuan Agriculture Expo&amp;nbsp;(桃園農業博覽會) 2018. Taoyuan City, Taiwan One more thing… I don't think we should worry about the architecture of Internet VPN and IPSec protocol itself. Many new technologies are relying on Internet VPN and IPSec. For example, Software-defined Wide Area Network (SD WAN) is built on top of Internet VPN and IPSec. If we make sure all running VPN routers are in healthy condition, Internet VPN architecture is still a cost-effective WAN solution with great flexibilities for enterprises.</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>A recent news was about hackers hacked into a Russian bank because of outdated routers. When I saw the keyword “router”, I felt that I must dig further about what really happened. What I have understood now The victim is PIR Bank. One of the suspects is MoneyTaker. After the breach, PIR Bank hired company Group-IB to do the clean-ups, recovery, and investigating how the hackers got into their internal network. Up to this moment, Group-IB disclosed hackers exploited the outdated routers of PIR Bank. The model of the routers was Cisco 800 series routers, which was already declared publicly that the End of Support date would be someday in Year 2016, by Cisco. The running Cisco IOS version was 12.4. My understanding All the routers involved in this incident in my opinion must had been deployed as Internet VPN routers. They must connect directly to the public Internet. Suppose those routers were purely internal routers without public Internet connections at all, hackers can only have access to them by getting through layers of firewalls. Suppose hackers already had broken through layers of firewalls, then hackers could have attacked directly without exploiting any of those outdated routers. I believe the VPN protocol used should be IPSec. However, IPSec was not to blame for this incident. Vulnerabilities were in the software or the hardware of those installed routers. It might be some discovered vulnerabilities and hackers took advantages of Zero-day Exploits to hack into the network. Hackers either used the hijacked router as a hopping location or changed the access rules so hackers had backdoor accesses to the internal network. I also want to emphasize that Cisco is not to blame. Cisco had already announced End of Support long time ago. If a customer insisted to keep using the old outdated routers, customers should take most of the responsibilities. It was a pity for a loss of nearly 1 Million US Dollars. One million dollars is enough to buy and replace a lot of new routers to prevent this loss. Enterprises should take actions, my suggestions Create a complete inventory of routers, especially for those connected to public Internet. Confirm with network hardware providers which routers are being or getting out of support. Create schedules to replace them as early as possible. Make sure all supported routers are running most up-to-date patched operating systems and software. Sun flowers in Taoyuan Agriculture Expo&amp;nbsp;(桃園農業博覽會) 2018. Taoyuan City, Taiwan One more thing… I don't think we should worry about the architecture of Internet VPN and IPSec protocol itself. Many new technologies are relying on Internet VPN and IPSec. For example, Software-defined Wide Area Network (SD WAN) is built on top of Internet VPN and IPSec. If we make sure all running VPN routers are in healthy condition, Internet VPN architecture is still a cost-effective WAN solution with great flexibilities for enterprises.</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>BGP Injection instead of Leak, my observation notes for MyEtherWallet incident</title><link>https://showipprotocols.blogspot.com/2018/04/bgp-injection-MyEtherWallet.html</link><category>BGP</category><category>Security</category><pubDate>Fri, 27 Apr 2018 03:12:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-4975710505702915939</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHdaUxnlgiHupohfWgMF4VnVSrA8S4v-dcHEbrH6bsv9ecXv3nKsOQ65YIhfZVaCWxEjXhK5ZNq2vB-t-mg-R-ANab3A_VmR08qsEZNGQ0fnobIx1DF1LEqM4h8ZdmOxiBi4t6xp7gULA/s1600/20180408_155751.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHdaUxnlgiHupohfWgMF4VnVSrA8S4v-dcHEbrH6bsv9ecXv3nKsOQ65YIhfZVaCWxEjXhK5ZNq2vB-t-mg-R-ANab3A_VmR08qsEZNGQ0fnobIx1DF1LEqM4h8ZdmOxiBi4t6xp7gULA/s320/20180408_155751.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
After reading articles by &lt;a href="https://blogs.oracle.com/internetintelligence/bgp-hijack-of-amazon-dns-to-steal-crypto-currency" target="_blank"&gt;Doug Madory&lt;/a&gt;, and by &lt;a href="https://blog.cloudflare.com/bgp-leaks-and-crypto-currencies/" target="_blank"&gt;Louis Poinsignon&lt;/a&gt;, here are some notes I observed and learned.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[What happened in this incident?]&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Hackers somehow made some BGP routers of “eNet” to falsely announce that they own the following 5 IP subnets, which are indeed NOT belonging to “eNet”. The true owner is Amazon. To be more specific, they are for Amazon’s Route 53 DNS name resolution services.&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;205.251.192.0/24&lt;/li&gt;
&lt;li&gt;205.251.193.0/24&lt;/li&gt;
&lt;li&gt;205.251.195.0/24&lt;/li&gt;
&lt;li&gt;205.251.197.0/24&lt;/li&gt;
&lt;li&gt;205.251.199.0/24&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
The registered domain server for domain “MyEtherWallet.com” is hosted on Amazon Route 53.&lt;br /&gt;
&lt;br /&gt;
Hackers also somehow embedded malicious DNS server (or servers, I really don’t know) also inside service network of “eNet”.&lt;br /&gt;
&lt;br /&gt;
After that, any affected clients’ DNS query for domain “MyEtherWallet.com” would hit hacker’s malicious DNS server. Of course, malicious DNS server would respond with false IP addresses, and those false IP addresses are indeed hacker’s own web servers.&lt;br /&gt;
&lt;br /&gt;
At this moment, clients thought they were accessing “MyEtherWallet.com”, and they indeed were accessing hacker’s web servers.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;[Which clients are affected?]&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
I believe all clients inside “eNet”, and any clients in other Internet Service Providers who trusted “eNet”’s false announcements, would be affected as well.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[Network “eNet” should have been compromised for enough time]&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
To falsely announce BGP routes, we must either change configurations of hardware routers, or BGP route servers (maybe on Linux).&lt;br /&gt;
&lt;br /&gt;
For me, to configure BGP correctly on a couple of Cisco routers is already a heavy task. It’s not easy. To modify existing BGP configurations to inject false announcements without getting noticed, or without breaking anything at the same time, is even a more difficult task for me.&lt;br /&gt;
&lt;br /&gt;
I really don’t think it would be easier to achieve the same results by working on BGP route servers.&lt;br /&gt;
&lt;br /&gt;
Moreover, hackers even embedded DNS server inside “eNet”’s service network. I really believe hackers had already controlled most of the hardware routers and some hardware servers, maybe for quite a long time, long enough for them to do all such modifications.&lt;br /&gt;
&lt;br /&gt;
I really think some hackers involved in this incident are quite skillful at network hardware maybe Cisco’s or Juniper’s. They could also be CCIEs.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[BGP Injection, instead of BGP Leak]&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
So, the last thing I want to say is, I would rather call this incident as BGP injection, instead of BGP leak.&lt;br /&gt;
&lt;br /&gt;
Why?&lt;br /&gt;
&lt;br /&gt;
If I hear someone says BGP Leaks, I would feel maybe some unknown bugs inside BGP protocol or some configuration errors caused this incident. As far as I understand now, I really think the false BGP announcements are “intentional”. I would rather say it is BGP Injection.&lt;br /&gt;
&lt;br /&gt;
Although no strong security mechanisms are defined in BGP protocol itself, in this case BGP protocol is not to blame.&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGZs_c1vuYV8OHkRiKRlNUVi13Sl6_jkgz11yWwbMvzBlCxfmcId-xSlj4eMJFPtzfCyhBjYESSMNQ50-win48VpbTdMlLWnNYHtUUwHLlpYkj0nzxnih7_aFBSReFO3E9sFOhBlh12VE/s1600/20180408_155751.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGZs_c1vuYV8OHkRiKRlNUVi13Sl6_jkgz11yWwbMvzBlCxfmcId-xSlj4eMJFPtzfCyhBjYESSMNQ50-win48VpbTdMlLWnNYHtUUwHLlpYkj0nzxnih7_aFBSReFO3E9sFOhBlh12VE/s640/20180408_155751.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Flowers of East Asian sage, around &lt;a href="https://goo.gl/maps/wSmkkNRYUd22" target="_blank"&gt;Zhoumei Xian Zai Gang Park (洲美蜆仔港公園)&lt;/a&gt;&lt;br /&gt;Taipei City, Taiwan.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;One more thing…&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Amazon is also not to blame for this incident. Clients’ DNS query packets never reached Amazon at all.&lt;br /&gt;
&lt;br /&gt;
I suggest Internet Service Providers should pay more attention to the security of their service infrastructure. Don’t become another “eNet”.&lt;br /&gt;
&lt;br /&gt;
I also suggest Internet Service Providers should review their incoming BGP policy. In this case, some ISPs other than “eNet” were also affected because their BGP routers “trusted” “eNet”’s false announcements. They affected their own customers and forwarded that false information on at the same time.</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20180427/hongliji-sip-p-20180427.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHdaUxnlgiHupohfWgMF4VnVSrA8S4v-dcHEbrH6bsv9ecXv3nKsOQ65YIhfZVaCWxEjXhK5ZNq2vB-t-mg-R-ANab3A_VmR08qsEZNGQ0fnobIx1DF1LEqM4h8ZdmOxiBi4t6xp7gULA/s72-c/20180408_155751.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.49702939999997</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">24.9687357 121.41634839999998 25.083835699999998 121.57771039999997</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>After reading articles by Doug Madory, and by Louis Poinsignon, here are some notes I observed and learned. [What happened in this incident?] Hackers somehow made some BGP routers of “eNet” to falsely announce that they own the following 5 IP subnets, which are indeed NOT belonging to “eNet”. The true owner is Amazon. To be more specific, they are for Amazon’s Route 53 DNS name resolution services. 205.251.192.0/24 205.251.193.0/24 205.251.195.0/24 205.251.197.0/24 205.251.199.0/24 The registered domain server for domain “MyEtherWallet.com” is hosted on Amazon Route 53. Hackers also somehow embedded malicious DNS server (or servers, I really don’t know) also inside service network of “eNet”. After that, any affected clients’ DNS query for domain “MyEtherWallet.com” would hit hacker’s malicious DNS server. Of course, malicious DNS server would respond with false IP addresses, and those false IP addresses are indeed hacker’s own web servers. At this moment, clients thought they were accessing “MyEtherWallet.com”, and they indeed were accessing hacker’s web servers. [Which clients are affected?] I believe all clients inside “eNet”, and any clients in other Internet Service Providers who trusted “eNet”’s false announcements, would be affected as well. [Network “eNet” should have been compromised for enough time] To falsely announce BGP routes, we must either change configurations of hardware routers, or BGP route servers (maybe on Linux). For me, to configure BGP correctly on a couple of Cisco routers is already a heavy task. It’s not easy. To modify existing BGP configurations to inject false announcements without getting noticed, or without breaking anything at the same time, is even a more difficult task for me. I really don’t think it would be easier to achieve the same results by working on BGP route servers. Moreover, hackers even embedded DNS server inside “eNet”’s service network. I really believe hackers had already controlled most of the hardware routers and some hardware servers, maybe for quite a long time, long enough for them to do all such modifications. I really think some hackers involved in this incident are quite skillful at network hardware maybe Cisco’s or Juniper’s. They could also be CCIEs. [BGP Injection, instead of BGP Leak] So, the last thing I want to say is, I would rather call this incident as BGP injection, instead of BGP leak. Why? If I hear someone says BGP Leaks, I would feel maybe some unknown bugs inside BGP protocol or some configuration errors caused this incident. As far as I understand now, I really think the false BGP announcements are “intentional”. I would rather say it is BGP Injection. Although no strong security mechanisms are defined in BGP protocol itself, in this case BGP protocol is not to blame. Flowers of East Asian sage, around Zhoumei Xian Zai Gang Park (洲美蜆仔港公園) Taipei City, Taiwan. One more thing… Amazon is also not to blame for this incident. Clients’ DNS query packets never reached Amazon at all. I suggest Internet Service Providers should pay more attention to the security of their service infrastructure. Don’t become another “eNet”. I also suggest Internet Service Providers should review their incoming BGP policy. In this case, some ISPs other than “eNet” were also affected because their BGP routers “trusted” “eNet”’s false announcements. They affected their own customers and forwarded that false information on at the same time.</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>After reading articles by Doug Madory, and by Louis Poinsignon, here are some notes I observed and learned. [What happened in this incident?] Hackers somehow made some BGP routers of “eNet” to falsely announce that they own the following 5 IP subnets, which are indeed NOT belonging to “eNet”. The true owner is Amazon. To be more specific, they are for Amazon’s Route 53 DNS name resolution services. 205.251.192.0/24 205.251.193.0/24 205.251.195.0/24 205.251.197.0/24 205.251.199.0/24 The registered domain server for domain “MyEtherWallet.com” is hosted on Amazon Route 53. Hackers also somehow embedded malicious DNS server (or servers, I really don’t know) also inside service network of “eNet”. After that, any affected clients’ DNS query for domain “MyEtherWallet.com” would hit hacker’s malicious DNS server. Of course, malicious DNS server would respond with false IP addresses, and those false IP addresses are indeed hacker’s own web servers. At this moment, clients thought they were accessing “MyEtherWallet.com”, and they indeed were accessing hacker’s web servers. [Which clients are affected?] I believe all clients inside “eNet”, and any clients in other Internet Service Providers who trusted “eNet”’s false announcements, would be affected as well. [Network “eNet” should have been compromised for enough time] To falsely announce BGP routes, we must either change configurations of hardware routers, or BGP route servers (maybe on Linux). For me, to configure BGP correctly on a couple of Cisco routers is already a heavy task. It’s not easy. To modify existing BGP configurations to inject false announcements without getting noticed, or without breaking anything at the same time, is even a more difficult task for me. I really don’t think it would be easier to achieve the same results by working on BGP route servers. Moreover, hackers even embedded DNS server inside “eNet”’s service network. I really believe hackers had already controlled most of the hardware routers and some hardware servers, maybe for quite a long time, long enough for them to do all such modifications. I really think some hackers involved in this incident are quite skillful at network hardware maybe Cisco’s or Juniper’s. They could also be CCIEs. [BGP Injection, instead of BGP Leak] So, the last thing I want to say is, I would rather call this incident as BGP injection, instead of BGP leak. Why? If I hear someone says BGP Leaks, I would feel maybe some unknown bugs inside BGP protocol or some configuration errors caused this incident. As far as I understand now, I really think the false BGP announcements are “intentional”. I would rather say it is BGP Injection. Although no strong security mechanisms are defined in BGP protocol itself, in this case BGP protocol is not to blame. Flowers of East Asian sage, around Zhoumei Xian Zai Gang Park (洲美蜆仔港公園) Taipei City, Taiwan. One more thing… Amazon is also not to blame for this incident. Clients’ DNS query packets never reached Amazon at all. I suggest Internet Service Providers should pay more attention to the security of their service infrastructure. Don’t become another “eNet”. I also suggest Internet Service Providers should review their incoming BGP policy. In this case, some ISPs other than “eNet” were also affected because their BGP routers “trusted” “eNet”’s false announcements. They affected their own customers and forwarded that false information on at the same time.</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>Prepare Python 2.7 on Microsoft Windows using PowerShell</title><link>https://showipprotocols.blogspot.com/2017/09/prepare-python-27-using-powershell.html</link><category>PowerShell</category><category>Python</category><pubDate>Sun, 10 Sep 2017 12:23:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-787713746465743759</guid><description>Everyone today talks about the programming language Python while discussing Software-defined Networking (SDN). Since Python is so popular, it would be a good idea for network administrators to know more about Python. First thing first. I talk about how I prepare Python running environment on Microsoft Windows.&lt;br /&gt;
&lt;br /&gt;
It would be nothing special if I only download the installation software from Python official web site by mouse clicking. Instead, I use PowerShell to download and install for me. That is, prepare one scripting running environment using another scripting language.&lt;br /&gt;
&lt;br /&gt;
Here is the recorded video of how I do this.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="video-container"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/b65Sw1cA6ys" width="560"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
The version I talk about is version 2.7.13.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
One key step of this PowerShell script is to find out the appropriate direct binary download URL first. You can easily copy the URL after visiting Python.ORG official web site.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvOAPydmmznujHd72v-Fv1TkJhENr58R0sUo0uobfcsFdtuLtu2-JKNkLPwunvKur-8OEHXW1bhWfd3QgzXi4lLqDLxLyd-9NKs1gowCGPri05w3fPCOCf_Dc3c1cW8hsQZhM7KJ90bx0/s1600/python-download.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="637" data-original-width="981" height="414" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvOAPydmmznujHd72v-Fv1TkJhENr58R0sUo0uobfcsFdtuLtu2-JKNkLPwunvKur-8OEHXW1bhWfd3QgzXi4lLqDLxLyd-9NKs1gowCGPri05w3fPCOCf_Dc3c1cW8hsQZhM7KJ90bx0/s640/python-download.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
I list the original PowerShell script below for you to copy/paste. You can try it for yourself.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-US"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace; font-size: x-small;"&gt;--- COPY BELOW ---&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-US"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace; font-size: x-small;"&gt;$url =
"https://www.python.org/ftp/python/2.7.13/python-2.7.13.amd64.msi"&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-US"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace; font-size: x-small;"&gt;$output =
"python-2.7.13.amd64.msi"&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-US"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace; font-size: x-small;"&gt;$start_time = Get-Date&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-US"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace; font-size: x-small;"&gt;Invoke-WebRequest -Uri $url -OutFile
$output&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-US"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace; font-size: x-small;"&gt;Write-Output "Time taken:
$((Get-Date).Subtract($start_time).Seconds) second(s)"&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-US"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace; font-size: x-small;"&gt;.\python-2.7.13.amd64.msi&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-US"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace; font-size: x-small;"&gt;--- END OF COPY ---&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;One more thing…&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In my opinion, any programming languages should be working well to implement a successful SDN system. Because most of the SDN controller is running on top of a Linux server, basically any programming languages supported by Linux is a good choice.&lt;br /&gt;
&lt;br /&gt;
My conclusion is: if you are already familiar and skillful enough in any mainstream programming languages, such as C, C++, Java, or Perl, you really don’t need to learn Python at all. Python is just one of the options.&lt;br /&gt;
&lt;br /&gt;
However, if you are not good at any programming languages at all, and you only have time to study single language, then my best recommendation for you would be Python. Python is so easy to learn and use. And the most important reason is this. Because Python is so popular, you can find any examples and answers you might ask for by simply a Google Search.&lt;br /&gt;
&lt;br /&gt;
I plan to talk more on Python in the future. What do you think about it? Let me know by leaving your comments below this post.&lt;br /&gt;
&lt;br /&gt;
(I learned the PowerShell script from&amp;nbsp;&lt;a href="https://blog.jourdant.me/post/3-ways-to-download-files-with-powershell" target="_blank"&gt;Hey, I'm Jourdan. "3 ways to download files with PowerShell"&lt;/a&gt;)</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20170910/hongliji-sip-p-20170910.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/b65Sw1cA6ys/default.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.49702939999997</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">24.9687357 121.41634839999998 25.083835699999998 121.57771039999997</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>Everyone today talks about the programming language Python while discussing Software-defined Networking (SDN). Since Python is so popular, it would be a good idea for network administrators to know more about Python. First thing first. I talk about how I prepare Python running environment on Microsoft Windows. It would be nothing special if I only download the installation software from Python official web site by mouse clicking. Instead, I use PowerShell to download and install for me. That is, prepare one scripting running environment using another scripting language. Here is the recorded video of how I do this. The version I talk about is version 2.7.13. One key step of this PowerShell script is to find out the appropriate direct binary download URL first. You can easily copy the URL after visiting Python.ORG official web site. I list the original PowerShell script below for you to copy/paste. You can try it for yourself. --- COPY BELOW --- $url = "https://www.python.org/ftp/python/2.7.13/python-2.7.13.amd64.msi" $output = "python-2.7.13.amd64.msi" $start_time = Get-Date Invoke-WebRequest -Uri $url -OutFile $output Write-Output "Time taken: $((Get-Date).Subtract($start_time).Seconds) second(s)" .\python-2.7.13.amd64.msi --- END OF COPY --- One more thing… In my opinion, any programming languages should be working well to implement a successful SDN system. Because most of the SDN controller is running on top of a Linux server, basically any programming languages supported by Linux is a good choice. My conclusion is: if you are already familiar and skillful enough in any mainstream programming languages, such as C, C++, Java, or Perl, you really don’t need to learn Python at all. Python is just one of the options. However, if you are not good at any programming languages at all, and you only have time to study single language, then my best recommendation for you would be Python. Python is so easy to learn and use. And the most important reason is this. Because Python is so popular, you can find any examples and answers you might ask for by simply a Google Search. I plan to talk more on Python in the future. What do you think about it? Let me know by leaving your comments below this post. (I learned the PowerShell script from&amp;nbsp;Hey, I'm Jourdan. "3 ways to download files with PowerShell")</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>Everyone today talks about the programming language Python while discussing Software-defined Networking (SDN). Since Python is so popular, it would be a good idea for network administrators to know more about Python. First thing first. I talk about how I prepare Python running environment on Microsoft Windows. It would be nothing special if I only download the installation software from Python official web site by mouse clicking. Instead, I use PowerShell to download and install for me. That is, prepare one scripting running environment using another scripting language. Here is the recorded video of how I do this. The version I talk about is version 2.7.13. One key step of this PowerShell script is to find out the appropriate direct binary download URL first. You can easily copy the URL after visiting Python.ORG official web site. I list the original PowerShell script below for you to copy/paste. You can try it for yourself. --- COPY BELOW --- $url = "https://www.python.org/ftp/python/2.7.13/python-2.7.13.amd64.msi" $output = "python-2.7.13.amd64.msi" $start_time = Get-Date Invoke-WebRequest -Uri $url -OutFile $output Write-Output "Time taken: $((Get-Date).Subtract($start_time).Seconds) second(s)" .\python-2.7.13.amd64.msi --- END OF COPY --- One more thing… In my opinion, any programming languages should be working well to implement a successful SDN system. Because most of the SDN controller is running on top of a Linux server, basically any programming languages supported by Linux is a good choice. My conclusion is: if you are already familiar and skillful enough in any mainstream programming languages, such as C, C++, Java, or Perl, you really don’t need to learn Python at all. Python is just one of the options. However, if you are not good at any programming languages at all, and you only have time to study single language, then my best recommendation for you would be Python. Python is so easy to learn and use. And the most important reason is this. Because Python is so popular, you can find any examples and answers you might ask for by simply a Google Search. I plan to talk more on Python in the future. What do you think about it? Let me know by leaving your comments below this post. (I learned the PowerShell script from&amp;nbsp;Hey, I'm Jourdan. "3 ways to download files with PowerShell")</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>Starting IS-IS routing protocol without CCNP training</title><link>https://showipprotocols.blogspot.com/2017/05/starting-is-is-routing-protocol-without-ccnp.html</link><category>IS-IS</category><pubDate>Thu, 18 May 2017 13:22:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-1910922445827596481</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-vA-UuBWMMx7bK4nnrEKMRFvq9Lc1YkdZH3hnG1uFIgcP1_sho2ncQ5X82vyjtghP2cCMe3PK_O-SKLYPqenYseXwCE_5klWq-HdsShpR55MX8DB09__S-xQPq5ANLtyC7qh757ZrszY/s1600/20170122_170754.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-vA-UuBWMMx7bK4nnrEKMRFvq9Lc1YkdZH3hnG1uFIgcP1_sho2ncQ5X82vyjtghP2cCMe3PK_O-SKLYPqenYseXwCE_5klWq-HdsShpR55MX8DB09__S-xQPq5ANLtyC7qh757ZrszY/s200/20170122_170754.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
The routing protocol Intermediate System to Intermediate System (IS-IS) is an advanced and robust link-state protocol used in many service provider networks. Most of the other enterprises I know of prefer to use protocols like OSPF or EIGRP instead of IS-IS. Therefore, enterprise administrators might not be familiar to this protocol at all.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
Here I want to share my short note to start IS-IS quickly without digging into protocol details. In case you must configure and maintain an IS-IS network, this note might save you some time.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;You can follow these five steps to start IS-IS routing protocol in short time.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 1: Prepare a pool of IPv4 addresses as non-overlapping Router-IDs&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Router ID is a unique identifier of any single router. Identifiers are just unique numbers. We know one citizen should have one and only one Citizen Identifier. No two citizens share the same identifier. This is the same for router IDs.&lt;br /&gt;
&lt;br /&gt;
No matter we are starting a production network or we just want to practice in lab, my recommendation is to always start from this step. The earlier we do this, the lesser time we might waste afterwards.&lt;br /&gt;
&lt;br /&gt;
In addition, I also recommend reserving a pool of IPv4 addresses just for router IDs. This pool should not overlap with any other network addresses. Any host route (/32) in this pool is for a single router. For easier discussion, I assume we reserve 10.0.0.0/16 for router IDs. Router 1 (R1) is assigned router ID: 10.0.0.1/32, and Router 2 (R2) is assigned router ID: 10.0.0.2/32, and so on.&lt;br /&gt;
&lt;br /&gt;
This unique host address is not just for identifying a single router. We can use this address for management protocols such as SSH, SNMP, and SSL. We can even add DNS mapping so we don’t have to remember the IPv4 address. For example, R1.MyDomain.COM can be mapped to 10.0.0.1. When I am about to manage a router on command line, all I do is starting a SSH to R1.MyDomain.COM, like “ssh admin@R1.MyDomain.COM”.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Step 2: Pick a unique Area ID for Level 1&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Here I want to emphasis starting from Level 1 (First Floor, Ground Floor) area. My recommendation is always start from Level 1. Expands to Level 2 only when necessary (most of the time we never need Level 2).&lt;br /&gt;
&lt;br /&gt;
Area ID is a unique number within 0000 to FFFF in hexadecimal (or 0~65,535 in decimal).&lt;br /&gt;
&lt;br /&gt;
If you really want, Area ID Zero (0000) is also a legal IS-IS area number. Area 0000 in&lt;br /&gt;
IS-IS is just a normal Level 1 area. This is quite different from OSPF. Because we might easily confuse this area with the special OSPF Area Zero (Backbone Area), I recommend avoid using this area number at all.&lt;br /&gt;
&lt;br /&gt;
Many connected routers are grouped into a single area. All routers in the same area should be assigned with the same Area ID.&lt;br /&gt;
&lt;br /&gt;
For easier discussion, I assume we use Area 7 for Level 1.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 3: Compose Network Entity Title (NET) for every router&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Network Entity Title (NET) is really an awkward name for many network administrators. It’s just a name used in ISO documents that define IS-IS protocol. It is the format IS-IS protocol recognizes as Router-ID.&lt;br /&gt;
&lt;br /&gt;
You are correct, NET must also be unique, and we must convert the router IDs in Step 1 into this NET format. The question now is “How”.&lt;br /&gt;
&lt;br /&gt;
I learned on Cisco Live an easy trick to convert unique IPv4 address into a unique NET. Here you are.&lt;br /&gt;
&lt;br /&gt;
First, expand the four decimal numbers of IPv4 address to 3 digits. For example,&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class="tr_bq"&gt;
10.0.0.1 -&amp;gt; 010.000.000.001.&lt;/blockquote&gt;
&lt;br /&gt;
Now we have a 12-digit string. Then, we just see this number as hexadecimal in digits, and reposition the “dots” to separate into 3 parts instead of 4. For example,&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class="tr_bq"&gt;
010.000.000.001 -&amp;gt; 0100.0000.0001&lt;/blockquote&gt;
&lt;br /&gt;
In case you really want to know, this converted number “0100.0000.0001” is called System ID in IS-IS protocol. We will need this number again when we are expanding the IS-IS network to Level 2 connected topology.&lt;br /&gt;
&lt;br /&gt;
Finally, we can create NET now.&lt;br /&gt;
&lt;br /&gt;
NET is in a format of &lt;b&gt;49&lt;/b&gt;.&lt;span style="background-color: yellow;"&gt;[Area ID]&lt;/span&gt;.&lt;span style="background-color: cyan;"&gt;[System ID]&lt;/span&gt;.&lt;b&gt;00&lt;/b&gt;.&lt;br /&gt;
The NET for R1 is now “49.&lt;span style="background-color: yellow;"&gt;0007&lt;/span&gt;.&lt;span style="background-color: cyan;"&gt;0100.0000.0001&lt;/span&gt;.00”.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 4: Start IS-IS on every router&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
We can start IS-IS protocol on every router with the following partial commands.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace; font-size: x-small;"&gt;router isis&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace; font-size: x-small;"&gt;&amp;nbsp;net 49.0007.0100.0000.0001.00&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace; font-size: x-small;"&gt;&amp;nbsp;is-type level-1&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace; font-size: x-small;"&gt;&amp;nbsp;metric-style wide&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace; font-size: x-small;"&gt;Interface loopback 999999&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace; font-size: x-small;"&gt;! This interface is for easier management only. IS-IS doesn’t need it.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace; font-size: x-small;"&gt;&amp;nbsp;ip address 10.0.0.1 255.255.255.255&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace; font-size: x-small;"&gt;&amp;nbsp;ipv6 address fd00::1/128&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace; font-size: x-small;"&gt;&amp;nbsp;ip router isis&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace; font-size: x-small;"&gt;&amp;nbsp;ipv6 router isis&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
I purposely neglect the explanation of every components of NET.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Step 5: Enable IS-IS on interfaces.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
It is simpler than you might expect. We look at the network map and every connected interface of every connected router should be enabled with IS-IS protocol, like this example.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace; font-size: x-small;"&gt;interface Ethernet0/0&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace; font-size: x-small;"&gt;&amp;nbsp;no shutdown&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace; font-size: x-small;"&gt;&amp;nbsp;ip router isis&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace; font-size: x-small;"&gt;&amp;nbsp;ipv6 router isis&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
That’s all. Folks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;One more thing…&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In the partial configuration example above, “interface loopback 999999” is only for easier management. IS-IS doesn’t need this interface at all. We can safely skip it for plain IS-IS practice.&lt;br /&gt;
&lt;br /&gt;
We can even assign illegal IPv4 address such as 0.0.0.1 or 0.0.0.2 as router IDs for easier typing IS-IS lab practices.&lt;br /&gt;
&lt;br /&gt;
In ISO documents, they don’t call routers as “routers”. They call routers the “Intermediate Systems” instead. Therefore, IS-IS protocol is exactly a protocol for “routers to routers”. Straightforward, isn’t it!&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvs7vqeUVHIodBgnBNaHE2iMyTBtd8o5CLp4j-mUEDBW-7zY9Q2ZGRY8pXz0_0REMVb-JOtIMCFGhfZGQABx40t13d2PhonHjuFrpzwd21uhHystZN3NeFhq0qZBvfWJY_R9hSCySJL7I/s1600/20170122_170754.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvs7vqeUVHIodBgnBNaHE2iMyTBtd8o5CLp4j-mUEDBW-7zY9Q2ZGRY8pXz0_0REMVb-JOtIMCFGhfZGQABx40t13d2PhonHjuFrpzwd21uhHystZN3NeFhq0qZBvfWJY_R9hSCySJL7I/s640/20170122_170754.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Sunset at&amp;nbsp;&lt;a href="https://goo.gl/maps/7ie8irNcu1v" target="_blank"&gt;Gongguan Waterfront Plaza (公館水岸廣場)&lt;/a&gt;&lt;br /&gt;Taipei City, Taiwan&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20170518/hongliji-sip-p-20170518.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-vA-UuBWMMx7bK4nnrEKMRFvq9Lc1YkdZH3hnG1uFIgcP1_sho2ncQ5X82vyjtghP2cCMe3PK_O-SKLYPqenYseXwCE_5klWq-HdsShpR55MX8DB09__S-xQPq5ANLtyC7qh757ZrszY/s72-c/20170122_170754.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.49702939999997</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">24.9687357 121.41634839999998 25.083835699999998 121.57771039999997</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>The routing protocol Intermediate System to Intermediate System (IS-IS) is an advanced and robust link-state protocol used in many service provider networks. Most of the other enterprises I know of prefer to use protocols like OSPF or EIGRP instead of IS-IS. Therefore, enterprise administrators might not be familiar to this protocol at all. Here I want to share my short note to start IS-IS quickly without digging into protocol details. In case you must configure and maintain an IS-IS network, this note might save you some time. You can follow these five steps to start IS-IS routing protocol in short time. Step 1: Prepare a pool of IPv4 addresses as non-overlapping Router-IDs Router ID is a unique identifier of any single router. Identifiers are just unique numbers. We know one citizen should have one and only one Citizen Identifier. No two citizens share the same identifier. This is the same for router IDs. No matter we are starting a production network or we just want to practice in lab, my recommendation is to always start from this step. The earlier we do this, the lesser time we might waste afterwards. In addition, I also recommend reserving a pool of IPv4 addresses just for router IDs. This pool should not overlap with any other network addresses. Any host route (/32) in this pool is for a single router. For easier discussion, I assume we reserve 10.0.0.0/16 for router IDs. Router 1 (R1) is assigned router ID: 10.0.0.1/32, and Router 2 (R2) is assigned router ID: 10.0.0.2/32, and so on. This unique host address is not just for identifying a single router. We can use this address for management protocols such as SSH, SNMP, and SSL. We can even add DNS mapping so we don’t have to remember the IPv4 address. For example, R1.MyDomain.COM can be mapped to 10.0.0.1. When I am about to manage a router on command line, all I do is starting a SSH to R1.MyDomain.COM, like “ssh admin@R1.MyDomain.COM”. Step 2: Pick a unique Area ID for Level 1 Here I want to emphasis starting from Level 1 (First Floor, Ground Floor) area. My recommendation is always start from Level 1. Expands to Level 2 only when necessary (most of the time we never need Level 2). Area ID is a unique number within 0000 to FFFF in hexadecimal (or 0~65,535 in decimal). If you really want, Area ID Zero (0000) is also a legal IS-IS area number. Area 0000 in IS-IS is just a normal Level 1 area. This is quite different from OSPF. Because we might easily confuse this area with the special OSPF Area Zero (Backbone Area), I recommend avoid using this area number at all. Many connected routers are grouped into a single area. All routers in the same area should be assigned with the same Area ID. For easier discussion, I assume we use Area 7 for Level 1. Step 3: Compose Network Entity Title (NET) for every router Network Entity Title (NET) is really an awkward name for many network administrators. It’s just a name used in ISO documents that define IS-IS protocol. It is the format IS-IS protocol recognizes as Router-ID. You are correct, NET must also be unique, and we must convert the router IDs in Step 1 into this NET format. The question now is “How”. I learned on Cisco Live an easy trick to convert unique IPv4 address into a unique NET. Here you are. First, expand the four decimal numbers of IPv4 address to 3 digits. For example, 10.0.0.1 -&amp;gt; 010.000.000.001. Now we have a 12-digit string. Then, we just see this number as hexadecimal in digits, and reposition the “dots” to separate into 3 parts instead of 4. For example, 010.000.000.001 -&amp;gt; 0100.0000.0001 In case you really want to know, this converted number “0100.0000.0001” is called System ID in IS-IS protocol. We will need this number again when we are expanding the IS-IS network to Level 2 connected topology. Finally, we can create NET now. NET is in a format of 49.[Area ID].[System ID].00. The NET for R1 is now “49.0007.0100.0000.0001.00”. Step 4: Start IS-IS on every router We can start IS-IS protocol on every router with the following partial commands. router isis &amp;nbsp;net 49.0007.0100.0000.0001.00 &amp;nbsp;is-type level-1 &amp;nbsp;metric-style wide Interface loopback 999999 ! This interface is for easier management only. IS-IS doesn’t need it. &amp;nbsp;ip address 10.0.0.1 255.255.255.255 &amp;nbsp;ipv6 address fd00::1/128 &amp;nbsp;ip router isis &amp;nbsp;ipv6 router isis I purposely neglect the explanation of every components of NET. Step 5: Enable IS-IS on interfaces. It is simpler than you might expect. We look at the network map and every connected interface of every connected router should be enabled with IS-IS protocol, like this example. interface Ethernet0/0 &amp;nbsp;no shutdown &amp;nbsp;ip router isis &amp;nbsp;ipv6 router isis That’s all. Folks! One more thing… In the partial configuration example above, “interface loopback 999999” is only for easier management. IS-IS doesn’t need this interface at all. We can safely skip it for plain IS-IS practice. We can even assign illegal IPv4 address such as 0.0.0.1 or 0.0.0.2 as router IDs for easier typing IS-IS lab practices. In ISO documents, they don’t call routers as “routers”. They call routers the “Intermediate Systems” instead. Therefore, IS-IS protocol is exactly a protocol for “routers to routers”. Straightforward, isn’t it! Sunset at&amp;nbsp;Gongguan Waterfront Plaza (公館水岸廣場) Taipei City, Taiwan</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>The routing protocol Intermediate System to Intermediate System (IS-IS) is an advanced and robust link-state protocol used in many service provider networks. Most of the other enterprises I know of prefer to use protocols like OSPF or EIGRP instead of IS-IS. Therefore, enterprise administrators might not be familiar to this protocol at all. Here I want to share my short note to start IS-IS quickly without digging into protocol details. In case you must configure and maintain an IS-IS network, this note might save you some time. You can follow these five steps to start IS-IS routing protocol in short time. Step 1: Prepare a pool of IPv4 addresses as non-overlapping Router-IDs Router ID is a unique identifier of any single router. Identifiers are just unique numbers. We know one citizen should have one and only one Citizen Identifier. No two citizens share the same identifier. This is the same for router IDs. No matter we are starting a production network or we just want to practice in lab, my recommendation is to always start from this step. The earlier we do this, the lesser time we might waste afterwards. In addition, I also recommend reserving a pool of IPv4 addresses just for router IDs. This pool should not overlap with any other network addresses. Any host route (/32) in this pool is for a single router. For easier discussion, I assume we reserve 10.0.0.0/16 for router IDs. Router 1 (R1) is assigned router ID: 10.0.0.1/32, and Router 2 (R2) is assigned router ID: 10.0.0.2/32, and so on. This unique host address is not just for identifying a single router. We can use this address for management protocols such as SSH, SNMP, and SSL. We can even add DNS mapping so we don’t have to remember the IPv4 address. For example, R1.MyDomain.COM can be mapped to 10.0.0.1. When I am about to manage a router on command line, all I do is starting a SSH to R1.MyDomain.COM, like “ssh admin@R1.MyDomain.COM”. Step 2: Pick a unique Area ID for Level 1 Here I want to emphasis starting from Level 1 (First Floor, Ground Floor) area. My recommendation is always start from Level 1. Expands to Level 2 only when necessary (most of the time we never need Level 2). Area ID is a unique number within 0000 to FFFF in hexadecimal (or 0~65,535 in decimal). If you really want, Area ID Zero (0000) is also a legal IS-IS area number. Area 0000 in IS-IS is just a normal Level 1 area. This is quite different from OSPF. Because we might easily confuse this area with the special OSPF Area Zero (Backbone Area), I recommend avoid using this area number at all. Many connected routers are grouped into a single area. All routers in the same area should be assigned with the same Area ID. For easier discussion, I assume we use Area 7 for Level 1. Step 3: Compose Network Entity Title (NET) for every router Network Entity Title (NET) is really an awkward name for many network administrators. It’s just a name used in ISO documents that define IS-IS protocol. It is the format IS-IS protocol recognizes as Router-ID. You are correct, NET must also be unique, and we must convert the router IDs in Step 1 into this NET format. The question now is “How”. I learned on Cisco Live an easy trick to convert unique IPv4 address into a unique NET. Here you are. First, expand the four decimal numbers of IPv4 address to 3 digits. For example, 10.0.0.1 -&amp;gt; 010.000.000.001. Now we have a 12-digit string. Then, we just see this number as hexadecimal in digits, and reposition the “dots” to separate into 3 parts instead of 4. For example, 010.000.000.001 -&amp;gt; 0100.0000.0001 In case you really want to know, this converted number “0100.0000.0001” is called System ID in IS-IS protocol. We will need this number again when we are expanding the IS-IS network to Level 2 connected topology. Finally, we can create NET now. NET is in a format of 49.[Area ID].[System ID].00. The NET for R1 is now “49.0007.0100.0000.0001.00”. Step 4: Start IS-IS on every router We can start IS-IS protocol on every router with the following partial commands. router isis &amp;nbsp;net 49.0007.0100.0000.0001.00 &amp;nbsp;is-type level-1 &amp;nbsp;metric-style wide Interface loopback 999999 ! This interface is for easier management only. IS-IS doesn’t need it. &amp;nbsp;ip address 10.0.0.1 255.255.255.255 &amp;nbsp;ipv6 address fd00::1/128 &amp;nbsp;ip router isis &amp;nbsp;ipv6 router isis I purposely neglect the explanation of every components of NET. Step 5: Enable IS-IS on interfaces. It is simpler than you might expect. We look at the network map and every connected interface of every connected router should be enabled with IS-IS protocol, like this example. interface Ethernet0/0 &amp;nbsp;no shutdown &amp;nbsp;ip router isis &amp;nbsp;ipv6 router isis That’s all. Folks! One more thing… In the partial configuration example above, “interface loopback 999999” is only for easier management. IS-IS doesn’t need this interface at all. We can safely skip it for plain IS-IS practice. We can even assign illegal IPv4 address such as 0.0.0.1 or 0.0.0.2 as router IDs for easier typing IS-IS lab practices. In ISO documents, they don’t call routers as “routers”. They call routers the “Intermediate Systems” instead. Therefore, IS-IS protocol is exactly a protocol for “routers to routers”. Straightforward, isn’t it! Sunset at&amp;nbsp;Gongguan Waterfront Plaza (公館水岸廣場) Taipei City, Taiwan</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>How do we repair a broken submarine fiber cable?</title><link>https://showipprotocols.blogspot.com/2017/04/how-do-we-repair-broken-submarine-fiber.html</link><category>Fiber Optics</category><pubDate>Wed, 26 Apr 2017 23:43:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-2318626194143956358</guid><description>&lt;div&gt;(Updated here:&amp;nbsp;&lt;a href="https://showipprotocols.blogspot.com/2025/01/how-do-we-fix-broken-submarine-fiber.html"&gt;https://showipprotocols.blogspot.com/2025/01/how-do-we-fix-broken-submarine-fiber.html&lt;/a&gt;)&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;On April 22, 2017, one segment of &lt;a href="https://zh.wikipedia.org/wiki/%E4%BA%9A%E5%A4%AA2%E5%8F%B7%E6%B5%B7%E5%BA%95%E7%94%B5%E7%BC%86" target="_blank"&gt;Asia-Pacific Cable Network 2&lt;/a&gt; (APCN2) that serves Taiwan’s major Internet connectivity with Japan, Europe, and America, was broken. According to &lt;a href="http://focustaiwan.tw/news/aeco/201704230014.aspx" target="_blank"&gt;some news sources&lt;/a&gt;, it might take one month just to fix this outage. I live in Taiwan, and I do feel the Internet speed became slow after this outage. I was wondering how could the repairing take one month.&lt;br /&gt;
&lt;br /&gt;
I want to know how to repair a broken submarine fiber cable. I searched on Google and I found this video. This video was created and published by &lt;a href="http://www.te.com/usa-en/industries/subsea-communications.html" target="_blank"&gt;TE SubCom&lt;/a&gt;. I summarize the key steps mentioned in this video, and I also added some of my own notes all in this post. I hope this post together with the original video would help you to understand the repairing operation as well.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="video-container"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/m6qTk5WNq9E" width="560"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;How could the submarine fiber cable break in the first place?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Other than uncontrollable natural events such as earthquakes, most of the incidents are caused by human. For example, a towed fishing net might tangle with the cable and snap it. Sometimes biting the cable by sea animals might also damage it.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;How to locate the broken spot?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In fact, we can use &lt;a href="https://en.wikipedia.org/wiki/Optical_time-domain_reflectometer" target="_blank"&gt;Optical Time-domain Reflectometer&lt;/a&gt; (OTDR) to measure the cable length to the broken spot from a known location first, and then determine this spot according to the cable run map.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Repairing steps in this video&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMzwC1lAJ8RGE5BSedJj4n0_U21a6McwVjBa7xp_R6PNdEZIvCyD5QIaC4i4dArM-i8GABdEcNAfv9u4zFTLkq4SXGHCqCp9vrfdMEkKDpB68fCldXH4xxm4K7TxXhtKtMU0bAbVt7nwg/s1600/Submarine-Fiber-Repair.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMzwC1lAJ8RGE5BSedJj4n0_U21a6McwVjBa7xp_R6PNdEZIvCyD5QIaC4i4dArM-i8GABdEcNAfv9u4zFTLkq4SXGHCqCp9vrfdMEkKDpB68fCldXH4xxm4K7TxXhtKtMU0bAbVt7nwg/s640/Submarine-Fiber-Repair.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;ol&gt;
&lt;li&gt;&lt;b&gt;Cutting grapnel deployed on seabed to cut target cable&lt;/b&gt;. (0:23)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Holding grapnel deployed on seabed for recovery of cable end&lt;/b&gt;. (0:37)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Cable end recovered to cable repair ship&lt;/b&gt;. (0:50)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Buoy launch to mark end of cable&lt;/b&gt;. (0:56) I call it End A.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Holding grapnel deployed to recover second cable end&lt;/b&gt;. I call it End B. (1:42)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Cable end is recovered and brought to shipboard jointing shop&lt;/b&gt;. (2:02)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Initial splice - spare cable is spliced to recovered cable end&lt;/b&gt;. (2:11)&lt;br /&gt;&lt;br /&gt;I believe in this step we must also examine the recovered cable end and cut remove the damaged portions of the cable. Here I call the new End B as End B’. After this step, End B’ is sliced with one end of the spare cable.&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Millenia Cable Joint Assembly&lt;/b&gt;. (2:53) I believe this is a special hardware to protect the cable joint.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Cable joint and spare cable are deployed as repair ship moves to recover cable buoy&lt;/b&gt;. (3:07)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Cable repair ship is positioned to recover buoy and first cable end&lt;/b&gt;. That is, End A. (3:16)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Cable ship using dynamic positioning to maneuver. I believe this is to ensure the cable slack&lt;/b&gt;. (3:31)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Final cable splice - First cable end is spliced to the end of the spare cable&lt;/b&gt;. That is, End A is sliced to the other end of the spare cable. (4:32)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Millenia Cable Joint Assembly&lt;/b&gt;. (4:42)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Final splice deployment&lt;/b&gt;. (4:53)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Repair complete - Final splice released&lt;/b&gt;. (5:07)&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;One more thing…&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
We need special repair ships first before we can do anything to repair the broken cable. However, few such ships are standing by around the globe. It would take days or even weeks just to move one such ship to the location of repair.&lt;br /&gt;
&lt;br /&gt;
We must always include backup paths of cables when we design a submarine fiber cable system. This is what I learned first.&lt;br /&gt;
&lt;br /&gt;
Second, we also know that the spliced fiber would add up attenuation to the signal strength. When we have done enough number of repairing and slicing operations on the fiber, the whole fiber would become unusable and thus be at the end of its life.&lt;br /&gt;
&lt;br /&gt;
That is, any submarine fiber cables have a limited lifetime. We must be prepared to replace the whole fiber cable when it is out of its lifetime.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20170426/hongliji-sip-p-20170426.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/m6qTk5WNq9E/default.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.49702939999997</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">24.9687357 121.41634839999998 25.083835699999998 121.57771039999997</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>(Updated here:&amp;nbsp;https://showipprotocols.blogspot.com/2025/01/how-do-we-fix-broken-submarine-fiber.html) On April 22, 2017, one segment of Asia-Pacific Cable Network 2 (APCN2) that serves Taiwan’s major Internet connectivity with Japan, Europe, and America, was broken. According to some news sources, it might take one month just to fix this outage. I live in Taiwan, and I do feel the Internet speed became slow after this outage. I was wondering how could the repairing take one month. I want to know how to repair a broken submarine fiber cable. I searched on Google and I found this video. This video was created and published by TE SubCom. I summarize the key steps mentioned in this video, and I also added some of my own notes all in this post. I hope this post together with the original video would help you to understand the repairing operation as well. How could the submarine fiber cable break in the first place? Other than uncontrollable natural events such as earthquakes, most of the incidents are caused by human. For example, a towed fishing net might tangle with the cable and snap it. Sometimes biting the cable by sea animals might also damage it. How to locate the broken spot? In fact, we can use Optical Time-domain Reflectometer (OTDR) to measure the cable length to the broken spot from a known location first, and then determine this spot according to the cable run map. Repairing steps in this video Cutting grapnel deployed on seabed to cut target cable. (0:23) Holding grapnel deployed on seabed for recovery of cable end. (0:37) Cable end recovered to cable repair ship. (0:50) Buoy launch to mark end of cable. (0:56) I call it End A. Holding grapnel deployed to recover second cable end. I call it End B. (1:42) Cable end is recovered and brought to shipboard jointing shop. (2:02) Initial splice - spare cable is spliced to recovered cable end. (2:11) I believe in this step we must also examine the recovered cable end and cut remove the damaged portions of the cable. Here I call the new End B as End B’. After this step, End B’ is sliced with one end of the spare cable. Millenia Cable Joint Assembly. (2:53) I believe this is a special hardware to protect the cable joint. Cable joint and spare cable are deployed as repair ship moves to recover cable buoy. (3:07) Cable repair ship is positioned to recover buoy and first cable end. That is, End A. (3:16) Cable ship using dynamic positioning to maneuver. I believe this is to ensure the cable slack. (3:31) Final cable splice - First cable end is spliced to the end of the spare cable. That is, End A is sliced to the other end of the spare cable. (4:32) Millenia Cable Joint Assembly. (4:42) Final splice deployment. (4:53) Repair complete - Final splice released. (5:07) One more thing… We need special repair ships first before we can do anything to repair the broken cable. However, few such ships are standing by around the globe. It would take days or even weeks just to move one such ship to the location of repair. We must always include backup paths of cables when we design a submarine fiber cable system. This is what I learned first. Second, we also know that the spliced fiber would add up attenuation to the signal strength. When we have done enough number of repairing and slicing operations on the fiber, the whole fiber would become unusable and thus be at the end of its life. That is, any submarine fiber cables have a limited lifetime. We must be prepared to replace the whole fiber cable when it is out of its lifetime.</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>(Updated here:&amp;nbsp;https://showipprotocols.blogspot.com/2025/01/how-do-we-fix-broken-submarine-fiber.html) On April 22, 2017, one segment of Asia-Pacific Cable Network 2 (APCN2) that serves Taiwan’s major Internet connectivity with Japan, Europe, and America, was broken. According to some news sources, it might take one month just to fix this outage. I live in Taiwan, and I do feel the Internet speed became slow after this outage. I was wondering how could the repairing take one month. I want to know how to repair a broken submarine fiber cable. I searched on Google and I found this video. This video was created and published by TE SubCom. I summarize the key steps mentioned in this video, and I also added some of my own notes all in this post. I hope this post together with the original video would help you to understand the repairing operation as well. How could the submarine fiber cable break in the first place? Other than uncontrollable natural events such as earthquakes, most of the incidents are caused by human. For example, a towed fishing net might tangle with the cable and snap it. Sometimes biting the cable by sea animals might also damage it. How to locate the broken spot? In fact, we can use Optical Time-domain Reflectometer (OTDR) to measure the cable length to the broken spot from a known location first, and then determine this spot according to the cable run map. Repairing steps in this video Cutting grapnel deployed on seabed to cut target cable. (0:23) Holding grapnel deployed on seabed for recovery of cable end. (0:37) Cable end recovered to cable repair ship. (0:50) Buoy launch to mark end of cable. (0:56) I call it End A. Holding grapnel deployed to recover second cable end. I call it End B. (1:42) Cable end is recovered and brought to shipboard jointing shop. (2:02) Initial splice - spare cable is spliced to recovered cable end. (2:11) I believe in this step we must also examine the recovered cable end and cut remove the damaged portions of the cable. Here I call the new End B as End B’. After this step, End B’ is sliced with one end of the spare cable. Millenia Cable Joint Assembly. (2:53) I believe this is a special hardware to protect the cable joint. Cable joint and spare cable are deployed as repair ship moves to recover cable buoy. (3:07) Cable repair ship is positioned to recover buoy and first cable end. That is, End A. (3:16) Cable ship using dynamic positioning to maneuver. I believe this is to ensure the cable slack. (3:31) Final cable splice - First cable end is spliced to the end of the spare cable. That is, End A is sliced to the other end of the spare cable. (4:32) Millenia Cable Joint Assembly. (4:42) Final splice deployment. (4:53) Repair complete - Final splice released. (5:07) One more thing… We need special repair ships first before we can do anything to repair the broken cable. However, few such ships are standing by around the globe. It would take days or even weeks just to move one such ship to the location of repair. We must always include backup paths of cables when we design a submarine fiber cable system. This is what I learned first. Second, we also know that the spliced fiber would add up attenuation to the signal strength. When we have done enough number of repairing and slicing operations on the fiber, the whole fiber would become unusable and thus be at the end of its life. That is, any submarine fiber cables have a limited lifetime. We must be prepared to replace the whole fiber cable when it is out of its lifetime.</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>Clear configured allowed VSAN list on trunk ports of Cisco MDS</title><link>https://showipprotocols.blogspot.com/2017/03/clear-allowed-vsan-list-cisco-mds.html</link><category>Data Center</category><category>SAN</category><pubDate>Wed, 29 Mar 2017 12:10:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-6239960478841038146</guid><description>A friend asked a good question about how this command works on Cisco MDS FibreChannel switch: “&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;switchport trunk allowed vsan all&lt;/span&gt;”.&lt;br /&gt;
&lt;br /&gt;
To my surprise, I cannot find any specific official documents to explain it clearly. I did some experiment on one Cisco MDS 9148. And here is my conclusion.&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgvHOpqxWewZUh9Q01AVo7-yBaS2Xe8HJeFwWEafB6J9V9nhq1IyeKRGzKpI_7bm0k6dQanYRr45L-ZtWf7EsgzyMsBX0RZDhXrtjT9IbkzM74WipX3ebjVdu9cYfKlF2wQuMl2K82a6Y/s1600/20161122_104727.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgvHOpqxWewZUh9Q01AVo7-yBaS2Xe8HJeFwWEafB6J9V9nhq1IyeKRGzKpI_7bm0k6dQanYRr45L-ZtWf7EsgzyMsBX0RZDhXrtjT9IbkzM74WipX3ebjVdu9cYfKlF2wQuMl2K82a6Y/s640/20161122_104727.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Bay, beach, and cliff near Chung-De Station. (&lt;a href="https://www.google.com/maps/place/%E5%B4%87%E5%BE%B7%E6%B5%B7%E7%81%A3/@24.1812668,121.6447812,14.75z/data=!4m13!1m7!3m6!1s0x0:0x0!2zMjTCsDEwJzU1LjkiTiAxMjHCsDM5JzM0LjAiRQ!3b1!8m2!3d24.1822014!4d121.6594314!3m4!1s0x0:0xa134df8de802b24!8m2!3d24.1781343!4d121.6575564" target="_blank"&gt;崇德海灣&lt;/a&gt;).&lt;br /&gt;
Hualian County, Taiwan.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;To clear whole allowed VSAN list and make every VSAN allowed at the same time, use “&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;switchport trunk allowed vsan all&lt;/span&gt;” in the interface configuration mode.&lt;br /&gt;
&lt;br /&gt;
To clear whole allowed VSAN list and make every VSAN &lt;span style="background-color: yellow;"&gt;NOT&lt;/span&gt;-allowed at the same time, use “&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="background-color: yellow;"&gt;no&lt;/span&gt; switchport trunk allowed vsan all&lt;/span&gt;”, in the interface configuration mode as well.&lt;br /&gt;
&lt;br /&gt;
Otherwise, just use “&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;switchport trunk allowed vsan&lt;/span&gt;” or “&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;switchport trunk allowed vsan add&lt;/span&gt;” commands to edit the list of allowed VSAN list.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;One more thing…&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
To edit the allowed VSAN list, remember to use “&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;switchport trunk allowed vsan&lt;/span&gt;” command first before “&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;switchport trunk allowed vsan &lt;span style="background-color: yellow;"&gt;add&lt;/span&gt;&lt;/span&gt;” commands.&lt;br /&gt;
&lt;br /&gt;
On production network, remember to maintain the allowed VSAN list instead of allowing every new VSANs, just in case you created unnecessary VSANs by typing errors and they might have negative impacts on your MDS performance.</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20170328/hongliji-sip-p-20170328.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgvHOpqxWewZUh9Q01AVo7-yBaS2Xe8HJeFwWEafB6J9V9nhq1IyeKRGzKpI_7bm0k6dQanYRr45L-ZtWf7EsgzyMsBX0RZDhXrtjT9IbkzM74WipX3ebjVdu9cYfKlF2wQuMl2K82a6Y/s72-c/20161122_104727.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>A friend asked a good question about how this command works on Cisco MDS FibreChannel switch: “switchport trunk allowed vsan all”. To my surprise, I cannot find any specific official documents to explain it clearly. I did some experiment on one Cisco MDS 9148. And here is my conclusion. Bay, beach, and cliff near Chung-De Station. (崇德海灣). Hualian County, Taiwan. To clear whole allowed VSAN list and make every VSAN allowed at the same time, use “switchport trunk allowed vsan all” in the interface configuration mode. To clear whole allowed VSAN list and make every VSAN NOT-allowed at the same time, use “no switchport trunk allowed vsan all”, in the interface configuration mode as well. Otherwise, just use “switchport trunk allowed vsan” or “switchport trunk allowed vsan add” commands to edit the list of allowed VSAN list. One more thing… To edit the allowed VSAN list, remember to use “switchport trunk allowed vsan” command first before “switchport trunk allowed vsan add” commands. On production network, remember to maintain the allowed VSAN list instead of allowing every new VSANs, just in case you created unnecessary VSANs by typing errors and they might have negative impacts on your MDS performance.</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>A friend asked a good question about how this command works on Cisco MDS FibreChannel switch: “switchport trunk allowed vsan all”. To my surprise, I cannot find any specific official documents to explain it clearly. I did some experiment on one Cisco MDS 9148. And here is my conclusion. Bay, beach, and cliff near Chung-De Station. (崇德海灣). Hualian County, Taiwan. To clear whole allowed VSAN list and make every VSAN allowed at the same time, use “switchport trunk allowed vsan all” in the interface configuration mode. To clear whole allowed VSAN list and make every VSAN NOT-allowed at the same time, use “no switchport trunk allowed vsan all”, in the interface configuration mode as well. Otherwise, just use “switchport trunk allowed vsan” or “switchport trunk allowed vsan add” commands to edit the list of allowed VSAN list. One more thing… To edit the allowed VSAN list, remember to use “switchport trunk allowed vsan” command first before “switchport trunk allowed vsan add” commands. On production network, remember to maintain the allowed VSAN list instead of allowing every new VSANs, just in case you created unnecessary VSANs by typing errors and they might have negative impacts on your MDS performance.</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>Cisco IOS/IOS XE Vulnerabiliy announced. Disable TELNET fast</title><link>https://showipprotocols.blogspot.com/2017/03/disable-telnet.html</link><category>Security</category><pubDate>Thu, 23 Mar 2017 07:10:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-2515212602095921970</guid><description>This is just a short notice for you in case you are not aware of it. Cisco announced a vulnerability on Cisco IOS and IOS XE operating system. For short, you only have to disable incoming TELNET service onto the router itself to avoid this vulnerability. You can use Secure Shell (SSH) instead for remote management. SSH is not vulnerable in this problem.&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvVQ66OcRhS2GSKl-NQIc4d8FS4D_F-szZ1dMMVhWpKiBKEH2cIkJgt1DiwbixIKw6CdNbRjfqNqpvs4mWyyOhx6ImH5Gm_r157_1Nw4F9tTxnma8c-easz1GpFVXwEbXvhBytvrwnaow/s1600/20170227_132249.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvVQ66OcRhS2GSKl-NQIc4d8FS4D_F-szZ1dMMVhWpKiBKEH2cIkJgt1DiwbixIKw6CdNbRjfqNqpvs4mWyyOhx6ImH5Gm_r157_1Nw4F9tTxnma8c-easz1GpFVXwEbXvhBytvrwnaow/s640/20170227_132249.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;The Jin-Dai Bridge (錦帶橋) in&amp;nbsp;&lt;a href="https://en.wikipedia.org/wiki/Dahu_Park" target="_blank"&gt;Dahu Park (大湖公園)&lt;/a&gt;.&lt;br /&gt;Taipei City, Taiwan.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
You can read the original announcement for technical details.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp" target="_blank"&gt;Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution Vulnerability&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;One more thing…&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
You can disable TELNET service and enable SSH at the same time by this command:&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace;"&gt;transport input ssh&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
You can list listening ports by these commands:&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace;"&gt;show control-plane host open-ports&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Courier New, Courier, monospace;"&gt;show tcp brief&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20170322/hongliji-sip-p-20170322.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvVQ66OcRhS2GSKl-NQIc4d8FS4D_F-szZ1dMMVhWpKiBKEH2cIkJgt1DiwbixIKw6CdNbRjfqNqpvs4mWyyOhx6ImH5Gm_r157_1Nw4F9tTxnma8c-easz1GpFVXwEbXvhBytvrwnaow/s72-c/20170227_132249.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.49702939999997</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">24.9687357 121.41634839999998 25.083835699999998 121.57771039999997</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>This is just a short notice for you in case you are not aware of it. Cisco announced a vulnerability on Cisco IOS and IOS XE operating system. For short, you only have to disable incoming TELNET service onto the router itself to avoid this vulnerability. You can use Secure Shell (SSH) instead for remote management. SSH is not vulnerable in this problem. The Jin-Dai Bridge (錦帶橋) in&amp;nbsp;Dahu Park (大湖公園). Taipei City, Taiwan. You can read the original announcement for technical details. Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution Vulnerability One more thing… You can disable TELNET service and enable SSH at the same time by this command: transport input ssh You can list listening ports by these commands: show control-plane host open-ports show tcp brief</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>This is just a short notice for you in case you are not aware of it. Cisco announced a vulnerability on Cisco IOS and IOS XE operating system. For short, you only have to disable incoming TELNET service onto the router itself to avoid this vulnerability. You can use Secure Shell (SSH) instead for remote management. SSH is not vulnerable in this problem. The Jin-Dai Bridge (錦帶橋) in&amp;nbsp;Dahu Park (大湖公園). Taipei City, Taiwan. You can read the original announcement for technical details. Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution Vulnerability One more thing… You can disable TELNET service and enable SSH at the same time by this command: transport input ssh You can list listening ports by these commands: show control-plane host open-ports show tcp brief</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>Do more with “the same”</title><link>https://showipprotocols.blogspot.com/2016/08/do-more-with-same.html</link><category>My Opinions</category><pubDate>Wed, 24 Aug 2016 10:31:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-3611468283710882107</guid><description>To emphasis the effectiveness of a new tool, we always hear some people say it would make you “do more with less”. This is so attractive to Chief Officers. How would the other staffs think about this?&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG9IEr2ZHyNSI5h-XnAEv8Uzl4FPVZzy9EX_dYQerFucaH9Bdu3nlVr1asW7pQ1zTN2YGC5047Se-vqRfcDK6kyw9coocw_gflEfkVbgdYw1067BmvgLGfGhojdTwY9GOhzG9k937MJDU/s1600/20160804_162535.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG9IEr2ZHyNSI5h-XnAEv8Uzl4FPVZzy9EX_dYQerFucaH9Bdu3nlVr1asW7pQ1zTN2YGC5047Se-vqRfcDK6kyw9coocw_gflEfkVbgdYw1067BmvgLGfGhojdTwY9GOhzG9k937MJDU/s640/20160804_162535.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;a href="https://www.travelking.com.tw/eng/tourguide/yilan/dongshan-river-water-park.html" target="_blank"&gt;Dongshan River Water Park (冬山河親水公園)&lt;/a&gt;.&lt;br /&gt;
The venue of &amp;nbsp;&lt;a href="https://en.wikipedia.org/wiki/Yilan_International_Children%27s_Folklore_and_Folkgame_Festival" target="_blank"&gt;Yilan International Children's Folklore and Folkgame Festival (YICFFF, 宜蘭國際童玩藝術節)&lt;/a&gt;.&amp;nbsp;Yilan County, Taiwan.&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;b&gt;The problem of “do more with less”&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
With the word “less”, what does that mean? Does that imply we don’t need that much budgets anymore? Does that imply we don’t need more hardware? Does that imply the workforce would be cut down?&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Under a not-so-good economic situation, cutting workforce means people would lose their jobs. In the end, I might not welcome and I might defend myself from such new good tools.&lt;br /&gt;
&lt;br /&gt;
It is really a sad story for an effective new tool X becomes an enemy to the people it is going to help.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;How about, with the same, we can do more&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
My suggestion is we change the phrase a little bit, maybe it might not be so offensive to working staffs this way.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class="tr_bq"&gt;
Do more, with the same.&lt;/blockquote&gt;
&lt;br /&gt;
That means, we don’t have to reduce budgets. We still need to buy new things. And the most important of all, we would not lose our jobs even if we embrace the new tool.&lt;br /&gt;
&lt;br /&gt;
We all still understand this new tool is so effective, because we can still “do more”.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Embrace new tools, enable business growth&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
For example, assume we need 100 staffs to take good care of 10 large data centers before. After we add new tool X, we can now take good care of 1,000 large data centers with exactly the same 100 staffs.&lt;br /&gt;
&lt;br /&gt;
With this changed mindset, we don’t need to avoid new automation tools any more. We can now live happily together with the new tools.&lt;br /&gt;
&lt;br /&gt;
The Chief Officers still achieve their business growth. This is a win-win situation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;One more thing...&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
New tools would save us a lot of time. What can we do then with those extra time?&lt;br /&gt;
&lt;br /&gt;
Of course, you could spend more time browsing my website. Or, you now have enough time to watch all the videos on Cisco Live website.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmykP7i909qonomqFgdxpN0cg1GYGPWmwGDdOcUGMheN_erBcjuhrxqSWAtHvkN5jgknhJs7GZs-lZzp6dnNlbixfg07o0V-q19RodKH3CxVYKuTSPpGY4ATRMIlzjJFf4S1jb2V9qk1Q/s1600/20160804_163840.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmykP7i909qonomqFgdxpN0cg1GYGPWmwGDdOcUGMheN_erBcjuhrxqSWAtHvkN5jgknhJs7GZs-lZzp6dnNlbixfg07o0V-q19RodKH3CxVYKuTSPpGY4ATRMIlzjJFf4S1jb2V9qk1Q/s640/20160804_163840.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqHDZMx5BrKtWWJP3kLkE733MJRfyeSSKaUqBbfef8dUatJXhBk-WhQtnjjGPMZLiYUdTgz3P_omEGDFeUmBwAm1sNNOYMbTvZh-M4IJWBZQSGKkt50upphB9qahY4ufNPp3iuQ5mBfc8/s1600/20160804_103741.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqHDZMx5BrKtWWJP3kLkE733MJRfyeSSKaUqBbfef8dUatJXhBk-WhQtnjjGPMZLiYUdTgz3P_omEGDFeUmBwAm1sNNOYMbTvZh-M4IJWBZQSGKkt50upphB9qahY4ufNPp3iuQ5mBfc8/s640/20160804_103741.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
All photos in this post were taken here:&lt;br /&gt;
&lt;br /&gt;
&lt;div class="video-container"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="450" src="https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d4353.32264891508!2d121.81202758391734!3d24.671173904543874!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x0%3A0x0!2zMjTCsDQwJzE1LjkiTiAxMjHCsDQ4JzUyLjkiRQ!5e0!3m2!1sen!2s!4v1472100571010" style="border: 0;" width="600"&gt;&lt;/iframe&gt;&lt;/div&gt;
</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20160824/hongliji-sip-p-20160824.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG9IEr2ZHyNSI5h-XnAEv8Uzl4FPVZzy9EX_dYQerFucaH9Bdu3nlVr1asW7pQ1zTN2YGC5047Se-vqRfcDK6kyw9coocw_gflEfkVbgdYw1067BmvgLGfGhojdTwY9GOhzG9k937MJDU/s72-c/20160804_162535.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.49702939999997</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">24.9687357 121.41634839999998 25.083835699999998 121.57771039999997</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>To emphasis the effectiveness of a new tool, we always hear some people say it would make you “do more with less”. This is so attractive to Chief Officers. How would the other staffs think about this? Dongshan River Water Park (冬山河親水公園). The venue of &amp;nbsp;Yilan International Children's Folklore and Folkgame Festival (YICFFF, 宜蘭國際童玩藝術節).&amp;nbsp;Yilan County, Taiwan.&amp;nbsp; The problem of “do more with less” With the word “less”, what does that mean? Does that imply we don’t need that much budgets anymore? Does that imply we don’t need more hardware? Does that imply the workforce would be cut down? Under a not-so-good economic situation, cutting workforce means people would lose their jobs. In the end, I might not welcome and I might defend myself from such new good tools. It is really a sad story for an effective new tool X becomes an enemy to the people it is going to help. How about, with the same, we can do more My suggestion is we change the phrase a little bit, maybe it might not be so offensive to working staffs this way. Do more, with the same. That means, we don’t have to reduce budgets. We still need to buy new things. And the most important of all, we would not lose our jobs even if we embrace the new tool. We all still understand this new tool is so effective, because we can still “do more”. Embrace new tools, enable business growth For example, assume we need 100 staffs to take good care of 10 large data centers before. After we add new tool X, we can now take good care of 1,000 large data centers with exactly the same 100 staffs. With this changed mindset, we don’t need to avoid new automation tools any more. We can now live happily together with the new tools. The Chief Officers still achieve their business growth. This is a win-win situation. One more thing... New tools would save us a lot of time. What can we do then with those extra time? Of course, you could spend more time browsing my website. Or, you now have enough time to watch all the videos on Cisco Live website. All photos in this post were taken here:</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>To emphasis the effectiveness of a new tool, we always hear some people say it would make you “do more with less”. This is so attractive to Chief Officers. How would the other staffs think about this? Dongshan River Water Park (冬山河親水公園). The venue of &amp;nbsp;Yilan International Children's Folklore and Folkgame Festival (YICFFF, 宜蘭國際童玩藝術節).&amp;nbsp;Yilan County, Taiwan.&amp;nbsp; The problem of “do more with less” With the word “less”, what does that mean? Does that imply we don’t need that much budgets anymore? Does that imply we don’t need more hardware? Does that imply the workforce would be cut down? Under a not-so-good economic situation, cutting workforce means people would lose their jobs. In the end, I might not welcome and I might defend myself from such new good tools. It is really a sad story for an effective new tool X becomes an enemy to the people it is going to help. How about, with the same, we can do more My suggestion is we change the phrase a little bit, maybe it might not be so offensive to working staffs this way. Do more, with the same. That means, we don’t have to reduce budgets. We still need to buy new things. And the most important of all, we would not lose our jobs even if we embrace the new tool. We all still understand this new tool is so effective, because we can still “do more”. Embrace new tools, enable business growth For example, assume we need 100 staffs to take good care of 10 large data centers before. After we add new tool X, we can now take good care of 1,000 large data centers with exactly the same 100 staffs. With this changed mindset, we don’t need to avoid new automation tools any more. We can now live happily together with the new tools. The Chief Officers still achieve their business growth. This is a win-win situation. One more thing... New tools would save us a lot of time. What can we do then with those extra time? Of course, you could spend more time browsing my website. Or, you now have enough time to watch all the videos on Cisco Live website. All photos in this post were taken here:</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>CCNA v3 Exam is cheaper than v2</title><link>https://showipprotocols.blogspot.com/2016/05/ccna-v3-exam-is-cheaper-than-v2.html</link><category>CCNA</category><category>Timely Info</category><pubDate>Wed, 18 May 2016 22:57:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-1913150163563574588</guid><description>I create this post just to remind you in case you did not notice it yet.&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHKTzmid9T60_X9sTAqz69T8_QPM_of6cDdXClGtHBQyMIm0sGj6mYTrMMAUJrljM0SuDreNL6SREl-MOwM7GSTEEe3srlaJTTFUhAO5GK4WbXEV0hiCCJtUe1oAjNV3e4KjrBoToNKdU/s1600/20160501_160343.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHKTzmid9T60_X9sTAqz69T8_QPM_of6cDdXClGtHBQyMIm0sGj6mYTrMMAUJrljM0SuDreNL6SREl-MOwM7GSTEEe3srlaJTTFUhAO5GK4WbXEV0hiCCJtUe1oAjNV3e4KjrBoToNKdU/s640/20160501_160343.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Shihmen Dam (石門水庫), Taoyuan City, Taiwan. &amp;nbsp;(&lt;a href="https://en.wikipedia.org/wiki/Shihmen_Dam" target="_blank"&gt;Wikipedia&lt;/a&gt;)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;b&gt;Version 3 Exam costs $250&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
CCNA Routing Switching Version 3 exam cost is now US$ 250. This is a good news because in v2 the exam cost was US$ 295. That is, the new exam is US$ 45 less than before.&lt;br /&gt;
&lt;br /&gt;
This is great! Isn’t it!&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
&lt;b&gt;You can take v3 now&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Just like before, you can now book CCNA v3 exam on VUE.com. The new exam code for v3 is “200-125”.&lt;br /&gt;
&lt;br /&gt;
If you cannot find this exam on the list, remember to search inside VUE search box with exam code “200-125”.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Last day for v2 is August 20, 2016&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If you have to stick to v2 exam, you should remember one thing. The last day to take v2 exam is August 20, 2016, this year. You only have a couple of months left to pass this v2 exam.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;One more thing…&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Are you preparing CCNA exam? What is the most difficult topic for you to study? Remember to share your story with me in the comments below!&lt;br /&gt;
&lt;br /&gt;
Source: &lt;a href="http://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna-routing-switching.html" target="_blank"&gt;"CCNA Routing and Switching" on Cisco.com&lt;/a&gt;</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20160518/hongliji-sip-p-20160518.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHKTzmid9T60_X9sTAqz69T8_QPM_of6cDdXClGtHBQyMIm0sGj6mYTrMMAUJrljM0SuDreNL6SREl-MOwM7GSTEEe3srlaJTTFUhAO5GK4WbXEV0hiCCJtUe1oAjNV3e4KjrBoToNKdU/s72-c/20160501_160343.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>I create this post just to remind you in case you did not notice it yet. Shihmen Dam (石門水庫), Taoyuan City, Taiwan. &amp;nbsp;(Wikipedia) Version 3 Exam costs $250 CCNA Routing Switching Version 3 exam cost is now US$ 250. This is a good news because in v2 the exam cost was US$ 295. That is, the new exam is US$ 45 less than before. This is great! Isn’t it! You can take v3 now Just like before, you can now book CCNA v3 exam on VUE.com. The new exam code for v3 is “200-125”. If you cannot find this exam on the list, remember to search inside VUE search box with exam code “200-125”. Last day for v2 is August 20, 2016 If you have to stick to v2 exam, you should remember one thing. The last day to take v2 exam is August 20, 2016, this year. You only have a couple of months left to pass this v2 exam. One more thing… Are you preparing CCNA exam? What is the most difficult topic for you to study? Remember to share your story with me in the comments below! Source: "CCNA Routing and Switching" on Cisco.com</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>I create this post just to remind you in case you did not notice it yet. Shihmen Dam (石門水庫), Taoyuan City, Taiwan. &amp;nbsp;(Wikipedia) Version 3 Exam costs $250 CCNA Routing Switching Version 3 exam cost is now US$ 250. This is a good news because in v2 the exam cost was US$ 295. That is, the new exam is US$ 45 less than before. This is great! Isn’t it! You can take v3 now Just like before, you can now book CCNA v3 exam on VUE.com. The new exam code for v3 is “200-125”. If you cannot find this exam on the list, remember to search inside VUE search box with exam code “200-125”. Last day for v2 is August 20, 2016 If you have to stick to v2 exam, you should remember one thing. The last day to take v2 exam is August 20, 2016, this year. You only have a couple of months left to pass this v2 exam. One more thing… Are you preparing CCNA exam? What is the most difficult topic for you to study? Remember to share your story with me in the comments below! Source: "CCNA Routing and Switching" on Cisco.com</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item><item><title>Diffie and Hellman Receive Turing Award 2015</title><link>https://showipprotocols.blogspot.com/2016/03/diffie-hellman-receive-turing-award-2015.html</link><category>IPSec</category><pubDate>Thu, 3 Mar 2016 01:41:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6616815944293602407.post-5581605503859257764</guid><description>When we study IPSec, we know Mr. Diffie and Mr. Hellman invented a method &lt;a href="https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange" target="_blank"&gt;in year 1976&lt;/a&gt; that is the core of Internet Key Exchange (IKE) to create mutually shared secret. We also have to specify and configure DH Group Number in ISAKMP policy sets (crypto-map in Cisco IOS).&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRUiiapMAZvlflnBzftCRuB1CnuVtsnLUSb7Us5mzkvf733cNQ3njVCWmSKJIOyRI8OzUBUSY1BhasLJdDyJE-8gEiwf9UrxrXDvCMxIQLHuc5XgnAv-Y0rz7yD5EqosgCxFNPxZDNLbg/s1600/acm-desktopcta.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRUiiapMAZvlflnBzftCRuB1CnuVtsnLUSb7Us5mzkvf733cNQ3njVCWmSKJIOyRI8OzUBUSY1BhasLJdDyJE-8gEiwf9UrxrXDvCMxIQLHuc5XgnAv-Y0rz7yD5EqosgCxFNPxZDNLbg/s640/acm-desktopcta.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;A.M. Turing Award Logo. Captured on &lt;a href="http://www.acm.org/binaries/content/gallery/acm/ctas/turing_spotlight_blue.jpg/turing_spotlight_blue.jpg/acm%3Adesktopcta" target="_blank"&gt;ACM Official Website&lt;/a&gt;.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
I am not going to dig in the details about the mathematics behind Diffie-Hellman method. I just want you to know Mr. Diffie and Mr. Hellman receive Turing Award 2015 together.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyfPaQ9yNGvUhMsUQes59b4Vpvd2bYvBrrnGUzzcypfyuA-PzzHglTF1k13eBAYO7jGuqdsdniBVwZ4Ee5TLkrmLNwQ48EDJLAK1Y9XQYdLbHCn_AaknTQVKFpEIYqaVhD0R2GNW1I9NI/s1600/whitfield_diffie_turing.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="546" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyfPaQ9yNGvUhMsUQes59b4Vpvd2bYvBrrnGUzzcypfyuA-PzzHglTF1k13eBAYO7jGuqdsdniBVwZ4Ee5TLkrmLNwQ48EDJLAK1Y9XQYdLbHCn_AaknTQVKFpEIYqaVhD0R2GNW1I9NI/s640/whitfield_diffie_turing.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Photo of Whitfield Diffie, captured on &lt;a href="http://www.acm.org/awards/2015-turing" target="_blank"&gt;ACM Official Website&lt;/a&gt;.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7TbYo2BBe6AwI3dwTd-QTptsw1ULn3MYsR2CiSGXXtDnW1K6hiVOKTks8jOm1dmShu0lzlKh9922K-K6QUcmTeuXagsTEOSZxJP57zh6axiDiTaleYZPwTS1zaJcdcJb_bhbs_VEYEIE/s1600/martin_hellman_turing.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="552" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7TbYo2BBe6AwI3dwTd-QTptsw1ULn3MYsR2CiSGXXtDnW1K6hiVOKTks8jOm1dmShu0lzlKh9922K-K6QUcmTeuXagsTEOSZxJP57zh6axiDiTaleYZPwTS1zaJcdcJb_bhbs_VEYEIE/s640/martin_hellman_turing.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Photo of&amp;nbsp;Martin E. Hellman, captured on &lt;a href="http://www.acm.org/awards/2015-turing" target="_blank"&gt;ACM Website&lt;/a&gt;.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
A.M. Turing Award of Association for Computing Machinery (ACM) is the highest honorable award in computer science just like &lt;a href="https://en.wikipedia.org/wiki/Nobel_Prize" target="_blank"&gt;Nobel Prize&lt;/a&gt;&amp;nbsp;for other fields of science.&lt;br /&gt;
&lt;br /&gt;
This was &lt;a href="http://www.acm.org/media-center/2016/march/turing-award-2015" target="_blank"&gt;released on March 1, 2016&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="360" src="https://www.youtube.com/embed/ICfH72lG8QE" width="640"&gt;&lt;/iframe&gt;
&lt;/div&gt;
&lt;b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/b&gt;
&lt;b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/b&gt;
&lt;b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;/b&gt;
&lt;b&gt;One more thing…&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In case you want to know more about Diffie-Hellman method, I found one video on &lt;a href="https://youtu.be/YEBfamv-_do" target="_blank"&gt;YouTube&lt;/a&gt; is quite helpful for you to understand it more.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="video-container"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="480" src="https://www.youtube.com/embed/YEBfamv-_do" width="640"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
Have fun!&lt;/div&gt;
&lt;br /&gt;</description><enclosure length="0" type="audio/mpeg" url="https://archive.org/download/hongliji-sip-p-20160303/hongliji-sip-p-20160303.mp3"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRUiiapMAZvlflnBzftCRuB1CnuVtsnLUSb7Us5mzkvf733cNQ3njVCWmSKJIOyRI8OzUBUSY1BhasLJdDyJE-8gEiwf9UrxrXDvCMxIQLHuc5XgnAv-Y0rz7yD5EqosgCxFNPxZDNLbg/s72-c/acm-desktopcta.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Wanhua District, Taipei City, Taiwan 108</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">25.0262857 121.49702939999997</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">24.9687357 121.41634839999998 25.083835699999998 121.57771039999997</georss:box><author>hongliji@gmail.com (Li-Ji Hong (洪李吉))</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>When we study IPSec, we know Mr. Diffie and Mr. Hellman invented a method in year 1976 that is the core of Internet Key Exchange (IKE) to create mutually shared secret. We also have to specify and configure DH Group Number in ISAKMP policy sets (crypto-map in Cisco IOS). A.M. Turing Award Logo. Captured on ACM Official Website. I am not going to dig in the details about the mathematics behind Diffie-Hellman method. I just want you to know Mr. Diffie and Mr. Hellman receive Turing Award 2015 together. Photo of Whitfield Diffie, captured on ACM Official Website. Photo of&amp;nbsp;Martin E. Hellman, captured on ACM Website. A.M. Turing Award of Association for Computing Machinery (ACM) is the highest honorable award in computer science just like Nobel Prize&amp;nbsp;for other fields of science. This was released on March 1, 2016. One more thing… In case you want to know more about Diffie-Hellman method, I found one video on YouTube is quite helpful for you to understand it more. Have fun!</itunes:subtitle><itunes:author>Li-Ji Hong (洪李吉)</itunes:author><itunes:summary>When we study IPSec, we know Mr. Diffie and Mr. Hellman invented a method in year 1976 that is the core of Internet Key Exchange (IKE) to create mutually shared secret. We also have to specify and configure DH Group Number in ISAKMP policy sets (crypto-map in Cisco IOS). A.M. Turing Award Logo. Captured on ACM Official Website. I am not going to dig in the details about the mathematics behind Diffie-Hellman method. I just want you to know Mr. Diffie and Mr. Hellman receive Turing Award 2015 together. Photo of Whitfield Diffie, captured on ACM Official Website. Photo of&amp;nbsp;Martin E. Hellman, captured on ACM Website. A.M. Turing Award of Association for Computing Machinery (ACM) is the highest honorable award in computer science just like Nobel Prize&amp;nbsp;for other fields of science. This was released on March 1, 2016. One more thing… In case you want to know more about Diffie-Hellman method, I found one video on YouTube is quite helpful for you to understand it more. Have fun!</itunes:summary><itunes:keywords>Internet,Cisco</itunes:keywords></item></channel></rss>