VyOS és una distribució basada en programari lliure optimitzat per dispositius d’encaminament de xarxa. La xerrada que us proposem planteja solucions alternatives a les tecnologies propietàries en el context del projecte Guifi.net.
La xerrada serà a càrrec de la gent de sentrium.io i es farà en anglès i castellà. Teniu doncs una cita el proper 20 d’octubre a les 19:00 a l’espai Hangar, carrer Emilia Coranty 16 de Barcelona.
——————-
VyOS quick facts
——————-
* Focus on enterprise and service provider networks
(carrier-grade approach, dynamic routing protocols, redundancy etc.)
* Command line interface in the style of JunOS
* Completely free and open source, with community-driven development
* Runs on x86 and all major hypervisors (KVM, Xen, VMware, Hyper-V), experimental builds on ARM
* Commercial support is available.
——————-
Where VyOS comes from?
——————-
VyOS is a fork of now defunct Vyatta distribution.
2006: Vyatta Community (later Vyatta Core) first release
2011: Ubiquiti Networks makes a fork of Vyatta under EdgeOS name and
starts the EdgeMax product line with it.
2012: Open source Vyatta development goes stale, the original company shifts the focus to a proprietary version, later gets acquired by Brocade who renames it to Brocade vRouter.
2013: Any hope that Vyatta Core development will resume is gone, a group of users starts
a fork under VyOS name.
——————-
VyOS development philosophy
——————-
* Not controlled by any corporate entity (i.e. won’t just disappear one day at their will)
* Open to contributions of all kinds (no programming required but welcome)
* Maintainers don’t keep anything to themselves: everything required to build it from scratch
is public
* Documented APIs for integrating new features
* One-step image build process, users can build custom images for their needs
——————
Feature checklist
——————-
* Network: 802.1q VLANs, 802.3ad QinQ, LACP and other bonding types, bridging, mirroring and redirection
* Routing protocols: BGP (IPv4 and IPv6), OSPFv2, RIP, RIPng
* Firewall: IPv4 and IPv6, stateful filtering, zone-based policies, address/port/network groups for IPv4
* NAT: Source NAT, port-address translation, one to many and many to many translations
* VPN: Site-to-site IPsec, VTI, DMVPN, PPTP and L2TP servers, OpenVPN (client-server and s2s)
* Tunnels: GRE, IPIP, SIT, IP6IP, umanaged L2TPv3, VXLAN
* Redundancy: VRRP for IPv4, conntrack sync
* Your feature request here
——————
Focus on reliability
——————-
* Versioned upgrades: if something goes wrong, you can reboot to previous version
* Versioned configuration: you can view previous revisions and diffs and rollback
* Stateful configuration system: no actual changes are made until you issue a commit command
* Multi-user friendly CLI: changes are staged into user’s sessions, users are notified of one another’s changes
——————-
Configuration Examples / Use Cases
——————-
To be announced