INTRODUCTION For resiliency purposes, Layer2 topologies are designed and deployed in a physical loop. Unlike the IP protocol which uses the TTL field as a built-in mechanism for preventing packets from looping endlessly through the network, the Ethernet protocol does not provide such facility and therefore, unless we can prevent a layer2 loop, the following problems would occur: Broadcast storms – endless broadcast of frames through the entire L2 domain Hosts end-up receiving duplicates frames from different switches Unstable mac-address tables due to continuous host mac address learning on different ports The STP (Spanning Tree Protocol) was developed to avoid…
I would like in this blog to shed some light over the utility of a class. Though I will be using Python, these concepts apply regardless the programming language used.
When you first deploy an F5 load balancer in your network, a self-signed device digital certificate is generated and stored on the F5-BIGIP appliance. While this is ok and works perfectly fine, it is not ideal in a production environment. In this blog I will show you how to add your own Digital Certificate on a F5-BIG-IP load balancer device.
Automating a graceful shutdown of the VMware VCSA upon power cut to the ESXi host using PowerChute and APC UPS.