Nokia Lab | LAB 5 RSVP-TE basic |


Hi!

RSVP-TE is a complex and wide range topic. I'm starting with RSVP-TE basic configuration and control plane processes - label signaling, session maintaining, timers, interaction between RSVP-TE and IGP. The next labs cover CSPF, Resource reservation, Resiliency.

Please check my first lab for input information.

Topology example

Lab tasks and questions:
  • basic RSVP-TE configuration
  • what we need for RSVP-TE infrastructure?
  • configure IGP with TE extension (e.g. OSPF)
  • add all p2p and "system" interfaces to MPLS and RSVP context
  • Do routers establish RSVP-TE adjacency? Why?
  • protocol operation
    • create LSP from R1 to R6 with an "empty" path
    • examine LSP signaling process(use debug or Wireshark)
    • capture PATH and RESV messages and examine their content
    • describe label signaling process
    • examine PSB and RSB (see "useful debug commands" section)
  • How do routers refresh RSVP sessions? What messages do they use?
  • How do routers maintain RSVP adjacency? What message do they use?
  • examine LSP tearing down process
    • break some link with active RSVP session and capture PathTear and ResvTear messages
    • describe tearing down process and message purpose
    • RSVP-TE timers
    • break some link with active RSVP session (e.g. LSP to_R6)
    • examine LSP on Head-end and check LSP  operation status

    Venerable Linux distro Slackware comes back to life

    Being first doesn't guarantee success in the technology industry. Remember the Netscape browser? Still, it can have its advantages, such as a different or unique approach to things.Such is the case with Slackware Linux. Slackware was the first formalized Linux distro, released in 1993, just two years after Linus Torvalds posted the Linux kernel. It was overtaken and overshadowed by Red Hat, SuSe, and Ubuntu, but it never went away. Now it's coming out of the shadows with an upgrade.Slackware creator Patrick Volkerding recently posted a beta version of Slackware 15, the first update to the distro since version 14.2 in 2016. If you think that's ancient, you should see their website.To read this article in full, please click here

    netsim-tools Release 0.6: BGP, IS-IS, SR-MPLS, FRR

    TL&DR: If you want to test BGP, OSPF, IS-IS, or SR-MPLS in a virtual lab, you might build the lab faster with netsim-tools release 0.6.

    In the netsim-tools release 0.6 I focused on adding routing protocol functionality:

    • IS-IS on Cisco IOS/IOS XE, Cisco NX-OS, Arista EOS, FRR, and Junos.
    • BGP on the same set of platforms, including support for multiple autonomous systems, EBGP, IBGP full mesh, IBGP with route reflectors, next-hop-self control, and BGP/IGP interaction.
    • Segment Routing with MPLS on Cisco IOS XE and Arista EOS.

    You’ll also get:

    Netsim-tools Release 0.6: BGP, IS-IS, SR-MPLS, FRR

    TL&DR: If you want to test BGP, OSPF, IS-IS, or SR-MPLS in a virtual lab, you might build the lab faster with netsim-tools release 0.6.

    In the netsim-tools release 0.6 I focused on adding routing protocol functionality:

    • IS-IS on Cisco IOS/IOS XE, Cisco NX-OS, Arista EOS, FRR, and Junos.
    • BGP on the same set of platforms, including support for multiple autonomous systems, EBGP, IBGP full mesh, IBGP with route reflectors, next-hop-self control, and BGP/IGP interaction.
    • Segment Routing with MPLS on Cisco IOS XE and Arista EOS.

    You’ll also get:

    Working with Linux VRFs

    The concept of VRFs is likely one that you’re familiar with. They are the de facto standard when we talk about isolating layer 3 networks. As we’ve talked about previously, they are used extensively in applications such as MPLS VPNs and really provide the foundation for layer 3 network isolation. They do this by allowing the creation of multiple routing tables. Any layer 3 construct can then be mapped into the VRF. For instance, I could assign an IP address to an interface and then map that interface into the VRF. Likewise, I could configure a static route and specify that the route is part of a given VRF. Going one step further I could establish a BGP session off of one of the VRF interfaces and receive remote BGP routes into the VRF. VRFs are to layer 3 like VLANs are to layer 2.

    So while we’ve talked about how they are typically used and implemented on networking hardware like routers and switches – we haven’t talked about how they’re implemented in Linux. Actually – they’re fairly new to the Linux space. The functionality was actually written by Cumulus Networks and then contributed to the Linux kernel (kudos Continue reading

    Heavy Networking 575: Designing Better Networking And Security With SASE (Sponsored)

    On today's Heavy Networking, sponsored by Palo Alto Networks, we examine what SASE means to you as a network engineer, its effects on how applications are protected and how you provide access to end users, and useful things to think about regarding how SASE services are provisioned and operated while you evaluate whether SASE is right for your org.

    The post Heavy Networking 575: Designing Better Networking And Security With SASE (Sponsored) appeared first on Packet Pushers.

    Join Tigera at KubeCon + CloudNativeCon Europe 2021

    We are excited to be a sponsor of this year’s virtual KubeCon + CloudNativeCon Europe conference, taking place May 4–7, 2021 online. We hope you’ll join us by visiting our virtual booth, where a team of Tigera experts will be standing by to speak with you.

    Visit us at our booth

    Our team will be conducting live demos, Ask the Architect sessions, 1:1 chats, and more during our booth hours.

    Tigera booth hours

    Live demo and Ask the Expert sessions

    We will have eight 30-minute interactive sessions focused on addressing questions about Kubernetes security and observability. Stop by our booth to check out the times for these sessions.

    Private 1:1 chats & calls

    Attendees can view each booth representative’s profile and initiate a private or group text chat, or request a video call.

    Public booth chat

    Our booth will have a built-in public chat window where booth representatives and attendees can post and reply to messages. Announcements about upcoming activities will be posted in this chat by Tigera representatives.

    Enter our raffle to win Apple AirPods

    We have 5 pairs of Apple AirPods to give away! The first 100 visitors to our booth will automatically be entered to win. Attendees Continue reading

    Arm Puts Some Muscle Into Future Neoverse Server CPU Designs

    Arm is hosting its annual Tech Day shindig, virtually (again) thanks to the coronavirus pandemic, and is providing a lot more insight into the future Neoverse core and processor designs that will be adopted and modified by those who have a hankering to take on the hegemony of the X86 processor – which now includes pretty solid CPUs from Intel and AMD – in the datacenter and at the edge.

    Arm Puts Some Muscle Into Future Neoverse Server CPU Designs was written by Timothy Prickett Morgan at The Next Platform.

    SSHing to my Raspberry Pi 400 from a browser, with Cloudflare Tunnel and Auditable Terminal

    SSHing to my Raspberry Pi 400 from a browser, with Cloudflare Tunnel and Auditable Terminal

    A few weeks ago I received a Raspberry Pi 400 as a gift. I didn’t have time to do anything beyond plug it in and verify that it works. It’s great that the Pi 400 comes with everything you need except for a screen: there’s the computer itself, mouse, HDMI cable and power adapter.

    SSHing to my Raspberry Pi 400 from a browser, with Cloudflare Tunnel and Auditable Terminal

    The Pi 400 has been sitting gathering dust when Cloudflare launched Auditable Terminal giving me the perfect excuse to get out the Pi 400 and hook it up.

    Auditable Terminal gives you a fully featured SSH client in your browser. You authenticate using Cloudflare Access and can log into a computer from anywhere just using the browser and get a terminal. And using Cloudflare Tunnel you can securely connect a computer to Cloudflare without punching holes in a firewall. And you end up with a consistent terminal experience across devices: 256 colours, Unicode support and the same fonts everywhere.

    SSHing to my Raspberry Pi 400 from a browser, with Cloudflare Tunnel and Auditable Terminal

    This is ideal for my use case: set up the Pi 400 on my home network, use Cloudflare Tunnel to connect it to the Cloudflare network, use Auditable Terminal to connect to the Pi 400 via Cloudflare and the tunnel using nothing more than a browser.

    Here’s Continue reading

    Manipulating the Ubuntu dock to keep favorite apps handy

    If you're a Linux user, you are undoubtedly familiar with the "dock"--that column of icons lined up on the side of your screen that includes important applications, your favorites. It allows you to open the applications simply by left clicking on one of the icons. Sandra Henry-Stocker / IDG But did you know that you can add or remove applications from your dock and sometimes even change the location of the dock on your screen? This post shows you how to make these changes on Ubuntu.To read this article in full, please click here

    Siemens and Google Cloud team to deliver AI-based manufacturing solutions

    Coming soon to a factory floor near you: Google AI.Google Cloud and Siemens have announced an agreement that calls for Siemens to integrate Google Cloud's AI and machine learning technologies into its factory automation products.Google Cloud's AI/ML capabilities will be combined with Siemens Digital Industries' factory automation portfolio, allowing manufacturers to harmonize their factory data, run cloud-based AI/ML models on top of that data, and deploy algorithms at the network edge. This enables applications such as the visual inspection of products or predicting the wear-and-tear of machines on the assembly line.To read this article in full, please click here

    Manipulating the Ubuntu dock to keep favorite apps handy

    If you're a Linux user, you are undoubtedly familiar with the "dock"--that column of icons lined up on the side of your screen that includes important applications, your favorites. It allows you to open the applications simply by left clicking on one of the icons. Sandra Henry-Stocker / IDG But did you know that you can add or remove applications from your dock and sometimes even change the location of the dock on your screen? This post shows you how to make these changes on Ubuntu.To read this article in full, please click here

    Nokia Lab | LAB 4 LDP |


    Hi!

    Move forward to MPLS stack. The first one is LDP.  I make emphasis on LDP session process and interaction between LIB and LFIB. I recommend you use traffic dumps and debug for investigation. 
    Please check my first lab for input information.

    Topology example




    Lab tasks and questions:
    • Basic LDP
    • prepare basic and IGP configuration (Multi-area OSPF, area type - normal, add "system" to OSPF)
    • enable LDP on P2P interfaces
    • LDP session
    • examine LDP neighbor discovery process
    • What is the destination IP address of Hello messages?
  • examine LDP session establishment
    • What address does SR-OS router use as a transport address for LDP control plane?
  • examine Label exchange
    • What label mapping does SR-OS router generate by default?
  • LIB and LFIB
    • examine LIB and LFIB
    • What is the difference between LIB and LFIB?
    • configure ECMP 2 (e.g. on R1) and examine RT, LIB and LFIB
  • Export policy and summarization
    • create two additional loopback interfaces on R1 with addresses from the same subnet (e.g. 172.16.0.0/32, 172.16.0.1/32)
    • export prefixes to LDP by policy
    • examine LFIB on R2
    • Does it contain entries with target prefixes? What about LIB?
    • What is the reason for this difference?
  • add loopback Continue reading
  • A Digital Dystopia: How Calls for Backdoors to Encryption Would Ruin the Internet for Everyone

    A little over a year into the COVID-19 pandemic, our reliance on private, safe, and secure communication has become more critical than ever. So it’s no surprise that organizations across all sectors are increasingly adopting encryption. It’s our strongest digital security tool online, keeping the information we share in daily activities like online banking, working […]

    The post A Digital Dystopia: How Calls for Backdoors to Encryption Would Ruin the Internet for Everyone appeared first on Internet Society.

    MUST READ: Deploy AWS Security Rules in a GitOps World with Terraform, GitLab CI, Slack, and Python

    I know the title sounds like a buzzword-bingo-winning clickbait, but it’s true. Adrian Giacometti decided to merge the topics of two ipSpace.net online courses and automated deployment of AWS security rules using Terraform within GitLab CI pipeline, with Slack messages serving as manual checks and approvals.

    Not only did he do a great job mastering- and gluing together so many diverse bits and pieces, he also documented the solution and published the source code:

    Want to build something similar? Join our Network Automation and/or Public Cloud course and get started. Need something similar in your environment? Adrian is an independent consultant and ready to work on your projects.

    MUST READ: Deploy AWS Security Rules in a GitOps World with AWS, Terraform, GitLab CI, Slack, and Python

    I know the title sounds like a buzzword-bingo-winning clickbait, but it’s true. Adrian Giacometti decided to merge the topics of two ipSpace.net online courses and automated deployment of AWS security rules using Terraform within GitLab CI pipeline, with Slack messages serving as manual checks and approvals.

    Not only did he do a great job mastering- and gluing together so many diverse bits and pieces, he also documented the solution and published the source code:

    Want to build something similar? Join our Network Automation and/or Public Cloud course and get started. Need something similar in your environment? Adrian is an independent consultant and ready to work on your projects.

    IPv4 in the Headlines

    The world of IPv4 addresses is a relatively obscure backwater of the Internet. All that drama of IPv4 address exhaustion happened with little in the way of mainstream media attention. So it came as a bit of a surprise to see a recent headline in the Washington Post about IPv4 addresses.