Posts

Showing posts from February, 2025

Designing a Secure Multi-VPC Architecture with AWS Transit Gateway and IGW

Image
 Preface In an AWS cloud Proof of Concept (PoC), Transit Gateway (TGW) and Internet Gateway (IGW) are key to secure, scalable and efficient communication between different VPCs and external networks. Transit Gateway (TGW) is a central routing hub where multiple VPCs can communicate without the complexity of multiple VPC peering connections. It simplifies network management, scales and enforces security policies through route tables to control traffic between connected VPCs. Internet Gateway (IGW) is required for outbound and inbound internet access for resources in public subnets. It allows public facing workloads like web servers and APIs to talk to external services while keeping private subnets secure through NAT Gateways . Together TGW and IGW provide a structured and controlled networking environment, so critical workloads are secure, isolated when needed and connected efficiently in a multi-VPC architecture. POC  The proposed Proof of Concept (PoC) focuses on estab...

Ghost Ports in Nokia Routers: Impact on Link Validation and Best Practices for Troubleshooting

Image
Glance Link validation is an important process in network operations to ensure physical and logical connections are configured and operational. Protocols like LLDP (Link Layer Discovery Protocol) and CDP (Cisco Discovery Protocol) help with device discovery and link verification. LLDP is an open standard protocol and CDP is a Cisco proprietary protocol that allows devices to advertise their identity, capabilities and interconnects to adjacent devices. These protocols allow network admins to verify neighbor relationships, detect misconfigurations and confirm link attributes like VLAN assignments and port details. Including LLDP and CDP in link validation workflows helps identify discrepancies like ghost ports or mismatched configurations so you can get accurate topology mapping and better network performance. It’s a critical process to ensure network integrity and reliability as it verifies the operational state and configuration of network links. But ghost ports – non-existent or mis...