Oracle Cloud의 상시 무료 서비스를 활용하여 Open VPN 구성 방법 소개
https://www.oracle.com/kr/cloud/free/?source=:ad:pas:go:dg:a_apac::71700000083888244-58700007132907252-p67253618169:RC_WWMK160606P00040C0016:&SC=:ad:pas:go:dg:a_apac::RC_WWMK160606P00040C0016:&ds_rl=1298214&gclid=Cj0KCQiA15yNBhDTARIsAGnwe0UaVV7rYx8ud6rux08A-s5Icl43BCrVhtdUolZ4kAILtMsGwViO0-caAtFeEALw_wcB&gclsrc=aw.ds
This document provides a CCNA command cheat sheet covering Cisco IOS commands for the CCNA exam. It includes sections summarizing commands for Cisco device configuration, interface configuration, routing protocols, privilege mode commands, and more. The cheat sheet covers both ICND exam parts 1 and 2 and is intended to help review the majority of commands found on the CCNA exam.
Kubernetes Networking with Cilium - Deep DiveMichal Rostecki
Cilium is open source software for providing and transparently securing network connectivity and load balancing between application workloads such as application containers or processes. Cilium operates at Layer 3/4 to provide traditional networking and security services as well as Layer 7 to protect and secure use of modern application protocols such as HTTP, gRPC and Kafka. The foundation of Cilium is the new Linux kernel technology BPF which supports the dynamic insertion of BPF bytecode into the Linux kernel at various integration points. This presentation reveals the secrets of Kubernetes networking and gives you a deep dive into Cilium and why it is awesome!
Cisco Secure Access Control System (ACS) and Cisco Identity Services Engine (ISE) are two technologies for network access control and security policy management. ACS provides centralized management of access policies for wired, wireless, and remote network access using RADIUS/TACACS+ protocols. It supports flexible authentication methods and integration with external identity stores. ISE combines authentication, authorization, accounting, posture assessment, and device profiling into one appliance. It provides enhanced features such as source group tagging, guest access management, and scalability for large enterprise deployments. ISE offers improved visibility, context-aware security policies, and integration with other systems through protocols like pxGrid.
Cisco's journey from Verbs to LibfabricJeff Squyres
This document summarizes Cisco's transition from using the Verbs API to using the Libfabric API for their usNIC network interface card. The Verbs API has limitations that make it difficult to support Ethernet features. Libfabric addresses these issues and more closely matches Cisco's hardware. Performance tests show Libfabric outperforming Verbs. Open MPI was adapted to support Libfabric through new plugins. This allows Libfabric to be used for both provider-specific and portable communication, benefiting MPI implementations. Cisco believes Libfabric is the best path forward as it matches their hardware, has performance benefits, and features MPI implementations have wanted.
This document contains slides from a Cisco presentation on firewall certification. It discusses the CCNP Security Firewall v2.0 exam, including exam details, recommended reading, and high-level topics covered. It also provides an overview of Cisco firewall technology including the Adaptive Security Appliance and its features. Configuration topics like licensing, interfaces, NAT, routing, inspection policies and transparent mode are briefly outlined.
Oracle Cloud의 상시 무료 서비스를 활용하여 Open VPN 구성 방법 소개
https://www.oracle.com/kr/cloud/free/?source=:ad:pas:go:dg:a_apac::71700000083888244-58700007132907252-p67253618169:RC_WWMK160606P00040C0016:&SC=:ad:pas:go:dg:a_apac::RC_WWMK160606P00040C0016:&ds_rl=1298214&gclid=Cj0KCQiA15yNBhDTARIsAGnwe0UaVV7rYx8ud6rux08A-s5Icl43BCrVhtdUolZ4kAILtMsGwViO0-caAtFeEALw_wcB&gclsrc=aw.ds
This document provides a CCNA command cheat sheet covering Cisco IOS commands for the CCNA exam. It includes sections summarizing commands for Cisco device configuration, interface configuration, routing protocols, privilege mode commands, and more. The cheat sheet covers both ICND exam parts 1 and 2 and is intended to help review the majority of commands found on the CCNA exam.
Kubernetes Networking with Cilium - Deep DiveMichal Rostecki
Cilium is open source software for providing and transparently securing network connectivity and load balancing between application workloads such as application containers or processes. Cilium operates at Layer 3/4 to provide traditional networking and security services as well as Layer 7 to protect and secure use of modern application protocols such as HTTP, gRPC and Kafka. The foundation of Cilium is the new Linux kernel technology BPF which supports the dynamic insertion of BPF bytecode into the Linux kernel at various integration points. This presentation reveals the secrets of Kubernetes networking and gives you a deep dive into Cilium and why it is awesome!
Cisco Secure Access Control System (ACS) and Cisco Identity Services Engine (ISE) are two technologies for network access control and security policy management. ACS provides centralized management of access policies for wired, wireless, and remote network access using RADIUS/TACACS+ protocols. It supports flexible authentication methods and integration with external identity stores. ISE combines authentication, authorization, accounting, posture assessment, and device profiling into one appliance. It provides enhanced features such as source group tagging, guest access management, and scalability for large enterprise deployments. ISE offers improved visibility, context-aware security policies, and integration with other systems through protocols like pxGrid.
Cisco's journey from Verbs to LibfabricJeff Squyres
This document summarizes Cisco's transition from using the Verbs API to using the Libfabric API for their usNIC network interface card. The Verbs API has limitations that make it difficult to support Ethernet features. Libfabric addresses these issues and more closely matches Cisco's hardware. Performance tests show Libfabric outperforming Verbs. Open MPI was adapted to support Libfabric through new plugins. This allows Libfabric to be used for both provider-specific and portable communication, benefiting MPI implementations. Cisco believes Libfabric is the best path forward as it matches their hardware, has performance benefits, and features MPI implementations have wanted.
This document contains slides from a Cisco presentation on firewall certification. It discusses the CCNP Security Firewall v2.0 exam, including exam details, recommended reading, and high-level topics covered. It also provides an overview of Cisco firewall technology including the Adaptive Security Appliance and its features. Configuration topics like licensing, interfaces, NAT, routing, inspection policies and transparent mode are briefly outlined.
CCNA 1 Routing and Switching v5.0 Chapter 8Nil Menon
This document chapter discusses IP addressing and provides objectives for learning about IPv4 and IPv6 addressing structures, types of addresses, and network connectivity testing tools. Specifically, it will cover the binary and decimal structures of IPv4 addresses, subnet masks and how they define the network and host portions of an IP, the different types of IPv4 unicast, broadcast and multicast addressing, public vs private IP address spaces, the motivation and features of IPv6, and how to configure and test basic IPv4 and IPv6 connectivity.
XDP in Practice: DDoS Mitigation @CloudflareC4Media
Video and slides synchronized, mp3 and slide download available at URL https://bit.ly/2NtlaER.
Gilberto Bertin discusses the architecture of Cloudflare’s automatic DDoS mitigation pipeline, the initial packet filtering solution based on Iptables, and why Cloudflare had to introduce userspace offload. Bertin also describes how they switched from a proprietary offload technology to XDP for network stack bypass and how they are using XDP to load balance traffic. Filmed at qconlondon.com.
Gilberto Bertin works as a System Engineer at Cloudflare London. After working on variety of technologies like P2P VPNs and userspace TCP/IP stacks, he joined the Cloudflare DDoS team in London to help filter all the bad internet traffic.
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
- Show you how GoBGP can be used as a software router in conjunction with quagga
- (Tutorial) Walk through the setup of IXP connecting router using GoBGP
Automate DBA tasks with Ansible describes using Ansible to automate database administration tasks. The document discusses installing and configuring Ansible, using modules to execute tasks, organizing tasks into playbooks and roles, and using templates. It provides an example of using Ansible to install an Oracle 11g database including creating directories, templating a response file, running the installer, and applying patches with a custom Oracle patching module.
This document discusses network security technologies and Cisco solutions. It covers topics like 802.1X authentication, identity management with Cisco ACS, port security, DHCP snooping, and securing the network infrastructure with Network Foundation Protection. The document appears to be slides from a training course on Cisco's SECURE certification that provides an overview of various network security concepts and Cisco products.
Ccnp presentation day 4 sd-access vs traditional network architectureSagarR24
The document discusses Cisco's Software-Defined Access (SD-Access) architecture. SD-Access combines Cisco's campus fabric design with the Digital Network Architecture Center (Cisco DNA or DNAC) to add fabric capabilities and automation to enterprise networks using SD-Access technology. It provides automated end-to-end segmentation of user, device, and application traffic without requiring network redesign. With its fabric capabilities, SD-Access enables services like host mobility and enhanced security in addition to normal switching and routing. A key component is VXLAN, which encapsulates Layer 2 frames in Layer 3 UDP packets to create virtualized Layer 2 subnets that span physical networks.
[오픈소스컨설팅] Red Hat ReaR (relax and-recover) Quick GuideJi-Woong Choi
본 문서는 RHEL에 내장된 재해복구솔루션 ReaR (Relax and Recover)를 이용하여 OS 영역의 데이터를 백업하고 복구하는 방법을 다루고 있습니다. ReaR는 iso를 비롯한 다양한 백업 데이터 포맷을 지원하나, 이 문서에서는 CD/DVD 미디어 반입/보관이 보안상 대부분 허용되지 않는 기업 환경에서도 원활히 사용할 수 있는 PXE boot를 지원하는 포맷으로 ReaR 백업 데이터를 생성하고 복구하는 방법만을 자세히 설명합니다.
We talk a lot about Galera Cluster being great for High Availability, but what about Disaster Recovery (DR)? Database outages can occur when you lose a data centre due to data center power outages or natural disaster, so why not plan appropriately in advance?
In this webinar, we will discuss the business considerations including achieving the highest possible uptime, analysis business impact as well as risk, focus on disaster recovery itself, as well as discussing various scenarios, from having no offsite data to having synchronous replication to another data centre.
This webinar will cover MySQL with Galera Cluster, as well as branches MariaDB Galera Cluster as well as Percona XtraDB Cluster (PXC). We will focus on architecture solutions, DR scenarios and have you on your way to success at the end of it.
This document contains configuration details for setting up an ACI Multi-Pod topology including IPN switches, APIC clusters, POD fabrics, access policies, and BGP route reflectors. It provides instructions on configuring the network topology with leaf-spine switches connected across multiple PODs, configuring the APICs with fabric profiles and settings, and setting policies for switch, interface, and fabric configurations.
[Pgday.Seoul 2019] Citus를 이용한 분산 데이터베이스PgDay.Seoul
This document summarizes how to set up and use Citus, an open-source PostgreSQL-based distributed database. It explains how to install Citus, add worker nodes, create distributed tables, and use features like reference tables to perform distributed queries across the cluster.
New features in ProxySQL 2.0 (updated to 2.0.9) by Rene Cannao (ProxySQL)Altinity Ltd
ProxySQL 2.0 includes several new features such as query cache improvements, GTID causal reads for consistency, native Galera cluster support, Amazon Aurora integration, LDAP authentication, improved SSL support, a new audit log, and performance enhancements. It also adds new monitoring tables, variables, and configuration options to support these features.
The Zen of High Performance Messaging with NATS NATS
The Zen of High Performance Messaging with NATS
Waldemar Quevedo Salinas, Senior Software Engineer
NATS is an open source, high performant messaging system with a design oriented towards both being as simple and reliable as possible without at the same time trading off scalability. Originally written in Ruby, and then rewritten in Go, a NATS server can nowadays push over 11M messages per second.
In this talk, we will cover how following simplicity as the main design constraint as well as focusing on a limited built-in feature set, resulted in a system which is easy to operate and reason about, making up for an attractive choice for when building many types of distributed systems where low latency and high availability are very important.
You can learn more about NATS at http://www.nats.io
Fuzzing is a technique for automatically finding bugs. It involves the process of generating random inputs for programs until it crashes. If the program crashes then we found a bug and if it does’nt then we continue the process in order to find bugs.
DTrace and SystemTap are dynamic tracing frameworks available for Solaris and Linux respectively. This session will give an overview of the static DTrace probes available in both Drizzle and MySQL and show numerous examples of scripts that utilize these probes. Mixing dynamic and static probes will also be discussed.
Aula04 - configuração da topologia ppp - resolvidoCarlos Veiga
The document describes the configuration of routers R1, R2, R3 and the ISP router to set up a network topology. It includes configuring basic settings like hostname, passwords, and interfaces on each router. The interfaces are configured with IP addresses and protocols. Route tables are also configured to route traffic between the routers and networks. The configurations are saved.
CCNA 1 Routing and Switching v5.0 Chapter 8Nil Menon
This document chapter discusses IP addressing and provides objectives for learning about IPv4 and IPv6 addressing structures, types of addresses, and network connectivity testing tools. Specifically, it will cover the binary and decimal structures of IPv4 addresses, subnet masks and how they define the network and host portions of an IP, the different types of IPv4 unicast, broadcast and multicast addressing, public vs private IP address spaces, the motivation and features of IPv6, and how to configure and test basic IPv4 and IPv6 connectivity.
XDP in Practice: DDoS Mitigation @CloudflareC4Media
Video and slides synchronized, mp3 and slide download available at URL https://bit.ly/2NtlaER.
Gilberto Bertin discusses the architecture of Cloudflare’s automatic DDoS mitigation pipeline, the initial packet filtering solution based on Iptables, and why Cloudflare had to introduce userspace offload. Bertin also describes how they switched from a proprietary offload technology to XDP for network stack bypass and how they are using XDP to load balance traffic. Filmed at qconlondon.com.
Gilberto Bertin works as a System Engineer at Cloudflare London. After working on variety of technologies like P2P VPNs and userspace TCP/IP stacks, he joined the Cloudflare DDoS team in London to help filter all the bad internet traffic.
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
- Show you how GoBGP can be used as a software router in conjunction with quagga
- (Tutorial) Walk through the setup of IXP connecting router using GoBGP
Automate DBA tasks with Ansible describes using Ansible to automate database administration tasks. The document discusses installing and configuring Ansible, using modules to execute tasks, organizing tasks into playbooks and roles, and using templates. It provides an example of using Ansible to install an Oracle 11g database including creating directories, templating a response file, running the installer, and applying patches with a custom Oracle patching module.
This document discusses network security technologies and Cisco solutions. It covers topics like 802.1X authentication, identity management with Cisco ACS, port security, DHCP snooping, and securing the network infrastructure with Network Foundation Protection. The document appears to be slides from a training course on Cisco's SECURE certification that provides an overview of various network security concepts and Cisco products.
Ccnp presentation day 4 sd-access vs traditional network architectureSagarR24
The document discusses Cisco's Software-Defined Access (SD-Access) architecture. SD-Access combines Cisco's campus fabric design with the Digital Network Architecture Center (Cisco DNA or DNAC) to add fabric capabilities and automation to enterprise networks using SD-Access technology. It provides automated end-to-end segmentation of user, device, and application traffic without requiring network redesign. With its fabric capabilities, SD-Access enables services like host mobility and enhanced security in addition to normal switching and routing. A key component is VXLAN, which encapsulates Layer 2 frames in Layer 3 UDP packets to create virtualized Layer 2 subnets that span physical networks.
[오픈소스컨설팅] Red Hat ReaR (relax and-recover) Quick GuideJi-Woong Choi
본 문서는 RHEL에 내장된 재해복구솔루션 ReaR (Relax and Recover)를 이용하여 OS 영역의 데이터를 백업하고 복구하는 방법을 다루고 있습니다. ReaR는 iso를 비롯한 다양한 백업 데이터 포맷을 지원하나, 이 문서에서는 CD/DVD 미디어 반입/보관이 보안상 대부분 허용되지 않는 기업 환경에서도 원활히 사용할 수 있는 PXE boot를 지원하는 포맷으로 ReaR 백업 데이터를 생성하고 복구하는 방법만을 자세히 설명합니다.
We talk a lot about Galera Cluster being great for High Availability, but what about Disaster Recovery (DR)? Database outages can occur when you lose a data centre due to data center power outages or natural disaster, so why not plan appropriately in advance?
In this webinar, we will discuss the business considerations including achieving the highest possible uptime, analysis business impact as well as risk, focus on disaster recovery itself, as well as discussing various scenarios, from having no offsite data to having synchronous replication to another data centre.
This webinar will cover MySQL with Galera Cluster, as well as branches MariaDB Galera Cluster as well as Percona XtraDB Cluster (PXC). We will focus on architecture solutions, DR scenarios and have you on your way to success at the end of it.
This document contains configuration details for setting up an ACI Multi-Pod topology including IPN switches, APIC clusters, POD fabrics, access policies, and BGP route reflectors. It provides instructions on configuring the network topology with leaf-spine switches connected across multiple PODs, configuring the APICs with fabric profiles and settings, and setting policies for switch, interface, and fabric configurations.
[Pgday.Seoul 2019] Citus를 이용한 분산 데이터베이스PgDay.Seoul
This document summarizes how to set up and use Citus, an open-source PostgreSQL-based distributed database. It explains how to install Citus, add worker nodes, create distributed tables, and use features like reference tables to perform distributed queries across the cluster.
New features in ProxySQL 2.0 (updated to 2.0.9) by Rene Cannao (ProxySQL)Altinity Ltd
ProxySQL 2.0 includes several new features such as query cache improvements, GTID causal reads for consistency, native Galera cluster support, Amazon Aurora integration, LDAP authentication, improved SSL support, a new audit log, and performance enhancements. It also adds new monitoring tables, variables, and configuration options to support these features.
The Zen of High Performance Messaging with NATS NATS
The Zen of High Performance Messaging with NATS
Waldemar Quevedo Salinas, Senior Software Engineer
NATS is an open source, high performant messaging system with a design oriented towards both being as simple and reliable as possible without at the same time trading off scalability. Originally written in Ruby, and then rewritten in Go, a NATS server can nowadays push over 11M messages per second.
In this talk, we will cover how following simplicity as the main design constraint as well as focusing on a limited built-in feature set, resulted in a system which is easy to operate and reason about, making up for an attractive choice for when building many types of distributed systems where low latency and high availability are very important.
You can learn more about NATS at http://www.nats.io
Fuzzing is a technique for automatically finding bugs. It involves the process of generating random inputs for programs until it crashes. If the program crashes then we found a bug and if it does’nt then we continue the process in order to find bugs.
DTrace and SystemTap are dynamic tracing frameworks available for Solaris and Linux respectively. This session will give an overview of the static DTrace probes available in both Drizzle and MySQL and show numerous examples of scripts that utilize these probes. Mixing dynamic and static probes will also be discussed.
Aula04 - configuração da topologia ppp - resolvidoCarlos Veiga
The document describes the configuration of routers R1, R2, R3 and the ISP router to set up a network topology. It includes configuring basic settings like hostname, passwords, and interfaces on each router. The interfaces are configured with IP addresses and protocols. Route tables are also configured to route traffic between the routers and networks. The configurations are saved.
리눅스 pacemaker 기반의 High Availaiblity 구성방법에 대해 설명합니다. pacemaker를 사용하는 다른 리눅스 기반도 구성이 가능합니다.
Pacemaker 기반 Linux High Availability 입문용으로는 적합하지 않을 수 있습니다. Pacemaker 기반 Linux High Availability를 한 번도 설치 및 구성을 하지 않은 리눅스 관리자라면 설치 문서를 먼저 참고하십시오.
RHEL7 및 CentOS 7을 중심으로 레드햇 계열의 리눅스에 적합한 내용으로 작성되었습니다.