I was recently asked to present at a local Network Engineering Meetup. The topic that I’m going to speak about is how I’m using KVM, OpenFlow, Network Overlays, and OVS to integrate my physical network lab and virtual network lab. The presentation can be found here.

Share on FacebookTweet about this on TwitterShare on LinkedInShare on RedditEmail this to someone

Here’s a handy debug command for tracking L3 Glean attacks on IOS based Cisco routers / L3 switches.

debug platform packet all receive buffer
show platform cpu packet buffered | i src|dst

From there, you can take the output, paste the contents into a file, then use some Linux foo to determine the attacker.

cat file.txt | awk '{print $2}' | sort | uniq -c | sort

Supporting documentation: Built-in CPU Sniffer

Share on FacebookTweet about this on TwitterShare on LinkedInShare on RedditEmail this to someone