INTRODUCTION For resiliency purposes, Layer2 topologies are designed and deployed in a physical loop. Unlike the IP protocol which uses the TTL field as a built-in mechanism for preventing packets from looping endlessly through the network, the Ethernet protocol does not provide such facility and therefore, unless we can prevent a layer2 loop, the following problems would occur: Broadcast storms – endless broadcast of frames through the entire L2 domain Hosts end-up receiving duplicates frames from different switches Unstable mac-address tables due to continuous host mac address learning on different ports The STP (Spanning Tree Protocol) was developed to avoid…
In this blog I’m using a Python script to generate the set of commands needed to created a SNAT pool on the F5 appliance; the SNAT pool includes a network range, instead of loose IPs.
In this short blog I will put together a checklist of what I believe are *basic* concepts and tools a network engineer should have in his/her arsenal
There will be situations when you just need to replicate sections (or all) of your configuration from one BIGIP device, to another – only with slight differences. In this blog, I’ll show you how to do this via the CLI.