At DKNOG12 I talked about lessons learned in the implementation of a new network automation platform for a service provider network with thousands of existing business to business services. It's now been in operation for almost two and a half years.
Since then, the platform has grown, bugs have appeared and been squashed, and new functionality has been steadily added.
This talk will...
An exploration of network automation, specifically crafted for experienced network engineers. This session will guide you through different automation types, from scripting for task automation to the advanced strategies of intent-based networking. We'll clarify the vital role of a 'Source of Truth' in network automation, discuss the integration of workflow engines into broader network...
A recent RPKI incident emphasised the crucial role of a robust RPKI infrastructure, rigorous testing, and well-defined outage procedures. Despite a temporary disruption, the prompt response and the underlying RPKI infrastructure's resilience averted significant Internet disturbances. To minimise RPKI outages and enhance Internet security, organisations should adopt practices such as regular...
SCION is a secure path-aware Internet architecture, designed to achieve high resilience to routing attacks and path selection for Internet users and operators with safety critical traffic such as in the financial, healthcare and power sectors. RPKI/ROV is useful for origin validation but does not validate paths, ASPA is still an experimental technology, whilst BGPSEC has yet to be widely...
Originally developed as an access protocol tester, the BNG Blaster has undergone a significant evolution, transforming into a comprehensive network testing tool that now encompasses both access and routing functionalities. Its scope has expanded beyond the assessment of access protocols and now encompasses a broader spectrum, involving the evaluation of network functionalities at large....
This talk is about DNS monitoring with Prometheus and dns_exporter, a multi-target Prometheus exporter with an exclusive focus on DNS monitoring. It is built on the excellent libraries dnspython and the Prometheus Python client library.
dns_exporter can be used to monitor availability and performance of DNS servers, and to validate the responses they return. It can monitor recursive and...
Is spoofed traffic coming through your network? Are you absolutely sure? Service providers have an obligation to identify and remediate spoofed traffic coming through their networks. This talk discusses how a NetFlow analysis platform and be used to identify and remediate the spoofed traffic that drives DDoS attacks.
With the speed of 400G coherent technology was introduced to pluggable optical transceivers (OIF 400ZR and OpenZR+). This technology is complex and powerful for your network, it even has influence on your network device operating system.
This talk will provide first insight in Nokia's implementation as well as known or potential interoperability issues addressed by the OIForum. If your...
The data rate and performance of small form factor optical transceivers have developed tremendously over the past couple of decades, and the latest generation pluggable DWDM transceivers deliver very good reach performance without sacrificing router faceplate density. However, there are some risk areas to consider when swapping transponders for pluggables.
DWDM technology is getting closer...
Showing often seen issues at peering configurations and speaking about their consequences and duties when operating a network and expecting traffic engineering behaving as per the plan.
Jakub Horn, Cisco Principal TME in MIG BU responsible for Segment Routing has the ability to join this year event and give an Update on SRv6 uSID.
NaWas provides internet service providers such as hosting and cloud companies with unique protection against DDoS attacks. This type of attack poses a growing problem for the digital infrastructure. Members work together to keep the costs of DDoS mitigation low and maintain high availability and knowledge on this subject.
In this presentation we will look at how Service Providers can leverage existing and widely available network equipment including (virtual) routers and (virtual) firewalls to build scale out security services, for example CGNAT, clusters. As Service Providers are pushing more and more traffic from their (residential) customers towards the internet there is a need for higher bandwidth CGNAT....
RPKI is more and more widespread, and as more networks create their ROAs, the global routing becomes more and more secure. There is, however, an aspect of having more widespread use of RPKI, that has not yet been considered. Some networks have decided to perform Route Origin Validation (ROV) and then put the resulting information in BGP communities.
This action, while done with the best...
Software defined networking (SDN) has made it possible to move the control plane to the software allowing for converged management and control of the network elements (NE) by utilizing standard open interfaces for both the southbound (SBI) and the northbound (NBI) interfaces thereby paving the path for open and disaggregated optical networks. The disaggregation requires interoperability, is...
DKNOG has decided to launch a mentorship program. This talk will describe who is eligible to participate, how the program will look like and what one can expect from it. For more info and to register please refer to:
https://events.dknog.dk/e/mentorship
The DKNOG quiz will close off the meeting with an opportunity to win prizes by showing off how closely you were following the talks at DKNOG14...