While searching for how to get started with Postman I found a lot of articles but nothing simple and strict to the point. As such here goes my attempt, with screenshots, at showing how a simple test looks. I will show case two simple operations:

  • getting a Keystone Token from Openstack via V3 API
  • using that Token and making a request to Contrail Controller to list the configured Virtual Networks

Continue reading

If you’ve reached this article, then for sure you’ve been searching for how to get Contrail (or its counterpart Tungsten Fabric) to work with a Cisco ASR9K. One of the first links you most likely hit has been: Contrail MX ASR903 posted in 2014 where the Cisco case is referring to IOS XE, Cisco ASR 903, which most probably, if you came here, does NOT apply to you .

One thing you have to know though, if IOS XE had a feature for building dynamic GRE tunnels, well IOS XR DOESN’T have this baked in yet. As with any vendor, based on popular demand from customers, some features get higher priority for implementing while others are left for later. This one seems to be the latter. As such, one will have to build static GRE tunnels to each Compute Node.

Continue reading

Most of you have probably always faced the question of which solution to use for your virtualization needs in order to build a personal lab for playing around. The two most common ones seen so far would most probably end up being Cisco VIRL (cloud and offline/your server versions) and Unetlab/EVE-NG . There are other variants related more or less to Eve-NG that also seem to do partially the job ( GNS3 ) but we won’t be talking about them here. Purpose is to show how to modify the templates of Unetlab in order to add the Juniper VMX phase 2, to show how one can debug Unetlab errors when trying to start your virtual devices (in order to figure out what the right parameters to put in the template are) and also add new options in the HTML interface (VMX with dual RE for example).

Continue reading

Gef

If any of you have played around with the Offensive Security certifications, then for sure you have discovered that they are quite creative and that the people administering them want to make you think by yourself with as little help as possible.
One of their courses, CTP (Cracking the Perimeter), even requires you to hack into a website, retrieve a code, decipher how to get a secret key and only then can you proceed with the registration which checks that you managed to fetch these values.
Without giving a way the challenge, I can only say that working with GDB is needed for the final tests and that I, being lazy, installed a plugin for it called GEF so that I could trace what happens with the registers and have the information visually displayed all the time.

Continue reading

Author's picture

Mihai Tanasescu

All Rounder and Jack of all trades (master of none? :) ).
Sailing the Cloud world with my fantastic team@Aviatrix, former Network, Systems Engineer (Cisco, Juniper, Linux, Openshift, Openstack).
A flavor of Security added to the mix (Offensive Security OSCE).
If there’s anything new and cool, then I like to learn about it. I’m also a fan of deep diving under the hood of a product to see what makes it tick as well as what breaks it.

Solutions Architect @ Aviatrix

Switzerland