Cooperative Education – Networking Fall 2009 Network Team Saigon Institute of Technology
Introduction to Vyatta 1. Overview 2. Feature
1. Overview Open-source networking solutions: enterprise-class Router/Firewall/VPN Vyatta solutions offer Better value Better performance Better scalability Better flexibility Better ecosystem The word "vyatta" is ancient Sanskrit and means "open“ Pronounced vee-AH-tah
2. Features 2.1. Subscription Services 2.2. Command Line 2.3. Web-Based GUI 2.4. Hardware Support 2.5. Virtualization 2.6. Interfaces 2.7. IP/Routing Protocols 2.8. IP Address Management 2.9. Encapsulations Security High Availability Logging & Monitoring Debugging
2.1. Subscription Services Stable software Regular updates Regular bug fixes All new features All enhancements Technical support Web knowledge-base
2.2. Command Line Integrated CLI Single configuration file Telnet SSHv2
2.3. Web-Based GUI
2.4. Hardware Support Standard 32-bt x86 processors and systems e_cat.php neral/Vyatta_Cisco_Replacement_Guide.pdf neral/Vyatta_Hardware_Guidelines_v1.0.pdf
2.5. Virtualization
2.6. Interfaces LAN interfaces: 10/100/1000 Ethernet NICs WAN interfaces: T1/E1, T3/E3 cards
2.7. IP/Routing Protocols IP IPv4 IPv6* Routing protocols OSPFv2 (Open Shortest Path First)- Support for the most popular interior routing protocol for large networks BGP-4 (Border Gateway Protocol) - Support for the core routing protocol of the Internet RIPv2 (Routing Information Protocol) - Easily build and connect internal networks Static routes - Simplifies basic router configurations
2.8. IP Address Management Static/Dynamic IP Address DHCP Server DHCP Relay
2.9. Encapsulations LAN encapsulations Ethernet 802.1Q VLANs WAN encapsulations PPP (point to Point Protocol) Multilink PPP Frame Relay HDLC WAN encapsulations PPP (point to Point Protocol) Multilink PPP Frame Relay HDLC
2.10. Security Stateful inspection firewall Network address translation (NAT) Site-to-site IPsec VPN DES(56-bit), 3DES(168-bit), AES(128,256-bit) Encryption MD5 and SHA-1 Authentication RSA, Diffie Helman Key Management NAT Traversal Dead Peer Detection RADIUS authentication Individual user accounts and passwords
2.11. High Availability VRRP (Virtual Router Redundancy Protocol) IPSec VPN Clustering Support for multiple power supplies Each protocol sandboxed from others, providing fault isolation
1.12. Logging & Monitoring Syslog SNMPv2c - Simple Network Monitoring Protocol Manage network performance Find and solve network problems Plan for network growth.
2.13. Debugging Tcpdump Wireshark
Reference Vyatta home page: p / /
Slide History Author: Nguyen Hai Son, Network Team, Saigon Institute of Technology Created: Jan 30 th, 2008 Last modify:Oct. 30 th, 2009