Archive

Category Archives for "Networking"

Red Hat announces Red Hat Edge initiative

During this week's Red Hat Summit, the company announced enhanced support for edge networking in its upcoming RHEL 8.4 release. The Red Hat Edge initiative promises new capabilities that will make RHEL a more powerful foundation for the open hybrid cloud.The Red Hat Edge aims to extend Red Hat’s open hybrid cloud portfolio to the edge. This will involve everything from telecommunications and transportation to smart automobiles and enterprise devices. With Red Hat technologies, the edge-ready technology stack uses Red Hat Enterprise Linux along with: Red Hat OpenShift – making it possible to deploy Kubernetes platform in both space- and resource-constrained locations Red Hat Advanced Cluster Management – adding Kubernetes management capabilities across the hybrid cloud Red Hat Ansible Automation Platform – automating workflows Red Hat Integration – connecting applications and data across edge and open cloud deployments Red Hat Data Services – storing, analyzing and distributing data across edge and data centers The company is also expanding its predictive analytics offering, Red Hat Insights, across the open hybrid cloud with the launch of Red Hat Insights for Red Hat OpenShift and Red Hat Ansible Automation Platform and with expanded capabilities for Red Hat Enterprise Linux (RHEL). Continue reading

Red Hat announces Red Hat Edge initiative

During this week's Red Hat Summit, the company announced enhanced support for edge networking in its upcoming RHEL 8.4 release. The Red Hat Edge initiative promises new capabilities that will make RHEL a more powerful foundation for the open hybrid cloud.The Red Hat Edge aims to extend Red Hat’s open hybrid cloud portfolio to the edge. This will involve everything from telecommunications and transportation to smart automobiles and enterprise devices. With Red Hat technologies, the edge-ready technology stack uses Red Hat Enterprise Linux along with: Red Hat OpenShift – making it possible to deploy Kubernetes platform in both space- and resource-constrained locations Red Hat Advanced Cluster Management – adding Kubernetes management capabilities across the hybrid cloud Red Hat Ansible Automation Platform – automating workflows Red Hat Integration – connecting applications and data across edge and open cloud deployments Red Hat Data Services – storing, analyzing and distributing data across edge and data centers The company is also expanding its predictive analytics offering, Red Hat Insights, across the open hybrid cloud with the launch of Red Hat Insights for Red Hat OpenShift and Red Hat Ansible Automation Platform and with expanded capabilities for Red Hat Enterprise Linux (RHEL). Continue reading

The Common Room: How an Artist Is Connecting Rural Indonesia One Village at a Time

A young person scrolls through Instagram to see the latest updates on their favorite profiles. To many around the world this doesn’t seem strange, but for a hamlet outside of a small village in Indonesia’s rural southwest, it’s revolutionary. And it’s in part thanks to the work of an Internet entrepreneur named Gustaff Harriman Iskandar. […]

The post The Common Room: How an Artist Is Connecting Rural Indonesia One Village at a Time appeared first on Internet Society.

Day Two Cloud 095: Grappling With The Open Source Business Model

Today on Day Two Cloud we get into a whole lot of things. For example, what is IT's value in the age of cloud? How can IT figure out what's actually providing value to the business vs. undifferentiated heavy lifting? How companies built on open-source software make their money? Our guest is Stu Miniman, Director of Market Insights at Red Hat.

The post Day Two Cloud 095: Grappling With The Open Source Business Model appeared first on Packet Pushers.

Nokia Lab | LAB 5 RSVP-TE basic |


Hi!

RSVP-TE is a complex and wide range topic. I'm starting with RSVP-TE basic configuration and control plane processes - label signaling, session maintaining, timers, interaction between RSVP-TE and IGP. The next labs cover CSPF, Resource reservation, Resiliency.

Please check my first lab for input information.

Topology example

Lab tasks and questions:
  • basic RSVP-TE configuration
  • what we need for RSVP-TE infrastructure?
  • configure IGP with TE extension (e.g. OSPF)
  • add all p2p and "system" interfaces to MPLS and RSVP context
  • Do routers establish RSVP-TE adjacency? Why?
  • protocol operation
    • create LSP from R1 to R6 with an "empty" path
    • examine LSP signaling process(use debug or Wireshark)
    • capture PATH and RESV messages and examine their content
    • describe label signaling process
    • examine PSB and RSB (see "useful debug commands" section)
  • How do routers refresh RSVP sessions? What messages do they use?
  • How do routers maintain RSVP adjacency? What message do they use?
  • examine LSP tearing down process
    • break some link with active RSVP session and capture PathTear and ResvTear messages
    • describe tearing down process and message purpose
    • RSVP-TE timers
    • break some link with active RSVP session (e.g. LSP to_R6)
    • examine LSP on Head-end and check LSP  operation status

    Venerable Linux distro Slackware comes back to life

    Being first doesn't guarantee success in the technology industry. Remember the Netscape browser? Still, it can have its advantages, such as a different or unique approach to things.Such is the case with Slackware Linux. Slackware was the first formalized Linux distro, released in 1993, just two years after Linus Torvalds posted the Linux kernel. It was overtaken and overshadowed by Red Hat, SuSe, and Ubuntu, but it never went away. Now it's coming out of the shadows with an upgrade.Slackware creator Patrick Volkerding recently posted a beta version of Slackware 15, the first update to the distro since version 14.2 in 2016. If you think that's ancient, you should see their website.To read this article in full, please click here

    Netsim-tools Release 0.6: BGP, IS-IS, SR-MPLS, FRR

    TL&DR: If you want to test BGP, OSPF, IS-IS, or SR-MPLS in a virtual lab, you might build the lab faster with netsim-tools release 0.6.

    In the netsim-tools release 0.6 I focused on adding routing protocol functionality:

    • IS-IS on Cisco IOS/IOS XE, Cisco NX-OS, Arista EOS, FRR, and Junos.
    • BGP on the same set of platforms, including support for multiple autonomous systems, EBGP, IBGP full mesh, IBGP with route reflectors, next-hop-self control, and BGP/IGP interaction.
    • Segment Routing with MPLS on Cisco IOS XE and Arista EOS.

    You’ll also get:

    Working with Linux VRFs

    The concept of VRFs is likely one that you’re familiar with. They are the de facto standard when we talk about isolating layer 3 networks. As we’ve talked about previously, they are used extensively in applications such as MPLS VPNs and really provide the foundation for layer 3 network isolation. They do this by allowing the creation of multiple routing tables. Any layer 3 construct can then be mapped into the VRF. For instance, I could assign an IP address to an interface and then map that interface into the VRF. Likewise, I could configure a static route and specify that the route is part of a given VRF. Going one step further I could establish a BGP session off of one of the VRF interfaces and receive remote BGP routes into the VRF. VRFs are to layer 3 like VLANs are to layer 2.

    So while we’ve talked about how they are typically used and implemented on networking hardware like routers and switches – we haven’t talked about how they’re implemented in Linux. Actually – they’re fairly new to the Linux space. The functionality was actually written by Cumulus Networks and then contributed to the Linux kernel (kudos Continue reading

    Heavy Networking 575: Designing Better Networking And Security With SASE (Sponsored)

    On today's Heavy Networking, sponsored by Palo Alto Networks, we examine what SASE means to you as a network engineer, its effects on how applications are protected and how you provide access to end users, and useful things to think about regarding how SASE services are provisioned and operated while you evaluate whether SASE is right for your org.

    The post Heavy Networking 575: Designing Better Networking And Security With SASE (Sponsored) appeared first on Packet Pushers.

    Join Tigera at KubeCon + CloudNativeCon Europe 2021

    We are excited to be a sponsor of this year’s virtual KubeCon + CloudNativeCon Europe conference, taking place May 4–7, 2021 online. We hope you’ll join us by visiting our virtual booth, where a team of Tigera experts will be standing by to speak with you.

    Visit us at our booth

    Our team will be conducting live demos, Ask the Architect sessions, 1:1 chats, and more during our booth hours.

    Tigera booth hours

    Live demo and Ask the Expert sessions

    We will have eight 30-minute interactive sessions focused on addressing questions about Kubernetes security and observability. Stop by our booth to check out the times for these sessions.

    Private 1:1 chats & calls

    Attendees can view each booth representative’s profile and initiate a private or group text chat, or request a video call.

    Public booth chat

    Our booth will have a built-in public chat window where booth representatives and attendees can post and reply to messages. Announcements about upcoming activities will be posted in this chat by Tigera representatives.

    Enter our raffle to win Apple AirPods

    We have 5 pairs of Apple AirPods to give away! The first 100 visitors to our booth will automatically be entered to win. Attendees Continue reading

    SSHing to my Raspberry Pi 400 from a browser, with Cloudflare Tunnel and Auditable Terminal

    SSHing to my Raspberry Pi 400 from a browser, with Cloudflare Tunnel and Auditable Terminal

    A few weeks ago I received a Raspberry Pi 400 as a gift. I didn’t have time to do anything beyond plug it in and verify that it works. It’s great that the Pi 400 comes with everything you need except for a screen: there’s the computer itself, mouse, HDMI cable and power adapter.

    SSHing to my Raspberry Pi 400 from a browser, with Cloudflare Tunnel and Auditable Terminal

    The Pi 400 has been sitting gathering dust when Cloudflare launched Auditable Terminal giving me the perfect excuse to get out the Pi 400 and hook it up.

    Auditable Terminal gives you a fully featured SSH client in your browser. You authenticate using Cloudflare Access and can log into a computer from anywhere just using the browser and get a terminal. And using Cloudflare Tunnel you can securely connect a computer to Cloudflare without punching holes in a firewall. And you end up with a consistent terminal experience across devices: 256 colours, Unicode support and the same fonts everywhere.

    SSHing to my Raspberry Pi 400 from a browser, with Cloudflare Tunnel and Auditable Terminal

    This is ideal for my use case: set up the Pi 400 on my home network, use Cloudflare Tunnel to connect it to the Cloudflare network, use Auditable Terminal to connect to the Pi 400 via Cloudflare and the tunnel using nothing more than a browser.

    Here’s Continue reading

    Siemens and Google Cloud team to deliver AI-based manufacturing solutions

    Coming soon to a factory floor near you: Google AI.Google Cloud and Siemens have announced an agreement that calls for Siemens to integrate Google Cloud's AI and machine learning technologies into its factory automation products.Google Cloud's AI/ML capabilities will be combined with Siemens Digital Industries' factory automation portfolio, allowing manufacturers to harmonize their factory data, run cloud-based AI/ML models on top of that data, and deploy algorithms at the network edge. This enables applications such as the visual inspection of products or predicting the wear-and-tear of machines on the assembly line.To read this article in full, please click here

    Manipulating the Ubuntu dock to keep favorite apps handy

    If you're a Linux user, you are undoubtedly familiar with the "dock"--that column of icons lined up on the side of your screen that includes important applications, your favorites. It allows you to open the applications simply by left clicking on one of the icons. Sandra Henry-Stocker / IDG But did you know that you can add or remove applications from your dock and sometimes even change the location of the dock on your screen? This post shows you how to make these changes on Ubuntu.To read this article in full, please click here

    Manipulating the Ubuntu dock to keep favorite apps handy

    If you're a Linux user, you are undoubtedly familiar with the "dock"--that column of icons lined up on the side of your screen that includes important applications, your favorites. It allows you to open the applications simply by left clicking on one of the icons. Sandra Henry-Stocker / IDG But did you know that you can add or remove applications from your dock and sometimes even change the location of the dock on your screen? This post shows you how to make these changes on Ubuntu.To read this article in full, please click here

    Nokia Lab | LAB 4 LDP |


    Hi!

    Move forward to MPLS stack. The first one is LDP.  I make emphasis on LDP session process and interaction between LIB and LFIB. I recommend you use traffic dumps and debug for investigation. 
    Please check my first lab for input information.

    Topology example




    Lab tasks and questions:
    • Basic LDP
    • prepare basic and IGP configuration (Multi-area OSPF, area type - normal, add "system" to OSPF)
    • enable LDP on P2P interfaces
    • LDP session
    • examine LDP neighbor discovery process
    • What is the destination IP address of Hello messages?
  • examine LDP session establishment
    • What address does SR-OS router use as a transport address for LDP control plane?
  • examine Label exchange
    • What label mapping does SR-OS router generate by default?
  • LIB and LFIB
    • examine LIB and LFIB
    • What is the difference between LIB and LFIB?
    • configure ECMP 2 (e.g. on R1) and examine RT, LIB and LFIB
  • Export policy and summarization
    • create two additional loopback interfaces on R1 with addresses from the same subnet (e.g. 172.16.0.0/32, 172.16.0.1/32)
    • export prefixes to LDP by policy
    • examine LFIB on R2
    • Does it contain entries with target prefixes? What about LIB?
    • What is the reason for this difference?
  • add loopback Continue reading
  • A Digital Dystopia: How Calls for Backdoors to Encryption Would Ruin the Internet for Everyone

    A little over a year into the COVID-19 pandemic, our reliance on private, safe, and secure communication has become more critical than ever. So it’s no surprise that organizations across all sectors are increasingly adopting encryption. It’s our strongest digital security tool online, keeping the information we share in daily activities like online banking, working […]

    The post A Digital Dystopia: How Calls for Backdoors to Encryption Would Ruin the Internet for Everyone appeared first on Internet Society.