Cisco Secure Access Control System (ACS) and Cisco Identity Services Engine (ISE) are two technologies for network access control and security policy management. ACS provides centralized management of access policies for wired, wireless, and remote network access using RADIUS/TACACS+ protocols. It supports flexible authentication methods and integration with external identity stores. ISE combines authentication, authorization, accounting, posture assessment, and device profiling into one appliance. It provides enhanced features such as source group tagging, guest access management, and scalability for large enterprise deployments. ISE offers improved visibility, context-aware security policies, and integration with other systems through protocols like pxGrid.
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
The document discusses Cisco's next generation SD-WAN solution which includes four main planes - orchestration, control, data, and management. The control plane is managed by Cisco vSmart controllers which facilitate fabric discovery, distribute policies to vEdge routers, and implement control plane policies. The data plane consists of Cisco vEdge routers which provide secure connectivity and implement data and application-aware routing policies. The solution offers a single pane of glass management system through Cisco vManage and provides analytics through Cisco vAnalytics.
The document discusses planning and designing a small network, including:
- Identifying common devices used such as routers, switches, wireless access points, and IP phones.
- Design considerations for a small network like IP addressing, redundancy, traffic prioritization.
- Common network applications and protocols used, including VoIP, DHCP, DNS.
- Ensuring the network can support real-time applications like voice and video.
- Planning for future growth of the network through documentation, traffic analysis, and protocol analysis.
This document discusses EVPN solutions and applications for data center (DC) and service provider (SP) segments. It provides an overview of EVPN, including its capabilities for multi-homing, fast convergence, and load balancing. The document outlines various IETF drafts related to EVPN for applications like DC fabrics, inter-route bridging (IRB), and inter-DC connectivity. It compares EVPN to other layer 2 VPN solutions and discusses uses of EVPN for VPWS, E-Tree, and in conjunction with Provider Backbone Bridging (PBB-EVPN).
The document provides an overview of the CCNA 7.0 curriculum from Cisco. Some key points:
- CCNA 7.0 has been enhanced with a modular course design to improve learning effectiveness and skills progression.
- The curriculum is delivered over three courses (Introduction to Networks, Switching/Routing Essentials, and Enterprise Networking) to provide hands-on experience and career skills for associate-level networking roles.
- CCNA 7.0 helps prepare students for the new consolidated CCNA certification exam by building skills in networking, security, automation, and other foundational areas.
Keystone at Openstack discussed multi-site deployment models for Openstack and the problems with using a shared Keystone database across sites. It introduced Keystone to Keystone (K2K) as a solution that allows federated authentication between Keystone instances. K2K enables each Keystone to act independently while still providing cross-cloud authentication. The presentation covered K2K's authentication flow, configuration, and benefits like independent upgrades and high availability of local users even if the Identity Provider is unavailable. Future work may include high availability and disaster recovery support for the Keystone Identity Provider site.
The document provides setup instructions for deploying and configuring an Aruba Instant wireless network. It describes how to set up the initial access point which will run the virtual controller software. Additional access points will automatically inherit settings from the virtual controller. The instructions also cover creating basic employee and guest wireless networks with options for security, client IP assignment, and access controls. The process involves a simple four step configuration for each network's basic info, IP settings, security, and access rules.
HSRP (Hot Standby Routing Protocol) defines an active-standby router configuration using virtual IP and MAC addresses to provide default gateway redundancy. The router with the highest priority value becomes the active router and sends periodic hello messages to the standby router. The show standby command can be used to verify the HSRP state and priority values of routers.
Cisco Secure Access Control System (ACS) and Cisco Identity Services Engine (ISE) are two technologies for network access control and security policy management. ACS provides centralized management of access policies for wired, wireless, and remote network access using RADIUS/TACACS+ protocols. It supports flexible authentication methods and integration with external identity stores. ISE combines authentication, authorization, accounting, posture assessment, and device profiling into one appliance. It provides enhanced features such as source group tagging, guest access management, and scalability for large enterprise deployments. ISE offers improved visibility, context-aware security policies, and integration with other systems through protocols like pxGrid.
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
The document discusses Cisco's next generation SD-WAN solution which includes four main planes - orchestration, control, data, and management. The control plane is managed by Cisco vSmart controllers which facilitate fabric discovery, distribute policies to vEdge routers, and implement control plane policies. The data plane consists of Cisco vEdge routers which provide secure connectivity and implement data and application-aware routing policies. The solution offers a single pane of glass management system through Cisco vManage and provides analytics through Cisco vAnalytics.
The document discusses planning and designing a small network, including:
- Identifying common devices used such as routers, switches, wireless access points, and IP phones.
- Design considerations for a small network like IP addressing, redundancy, traffic prioritization.
- Common network applications and protocols used, including VoIP, DHCP, DNS.
- Ensuring the network can support real-time applications like voice and video.
- Planning for future growth of the network through documentation, traffic analysis, and protocol analysis.
This document discusses EVPN solutions and applications for data center (DC) and service provider (SP) segments. It provides an overview of EVPN, including its capabilities for multi-homing, fast convergence, and load balancing. The document outlines various IETF drafts related to EVPN for applications like DC fabrics, inter-route bridging (IRB), and inter-DC connectivity. It compares EVPN to other layer 2 VPN solutions and discusses uses of EVPN for VPWS, E-Tree, and in conjunction with Provider Backbone Bridging (PBB-EVPN).
The document provides an overview of the CCNA 7.0 curriculum from Cisco. Some key points:
- CCNA 7.0 has been enhanced with a modular course design to improve learning effectiveness and skills progression.
- The curriculum is delivered over three courses (Introduction to Networks, Switching/Routing Essentials, and Enterprise Networking) to provide hands-on experience and career skills for associate-level networking roles.
- CCNA 7.0 helps prepare students for the new consolidated CCNA certification exam by building skills in networking, security, automation, and other foundational areas.
Keystone at Openstack discussed multi-site deployment models for Openstack and the problems with using a shared Keystone database across sites. It introduced Keystone to Keystone (K2K) as a solution that allows federated authentication between Keystone instances. K2K enables each Keystone to act independently while still providing cross-cloud authentication. The presentation covered K2K's authentication flow, configuration, and benefits like independent upgrades and high availability of local users even if the Identity Provider is unavailable. Future work may include high availability and disaster recovery support for the Keystone Identity Provider site.
The document provides setup instructions for deploying and configuring an Aruba Instant wireless network. It describes how to set up the initial access point which will run the virtual controller software. Additional access points will automatically inherit settings from the virtual controller. The instructions also cover creating basic employee and guest wireless networks with options for security, client IP assignment, and access controls. The process involves a simple four step configuration for each network's basic info, IP settings, security, and access rules.
HSRP (Hot Standby Routing Protocol) defines an active-standby router configuration using virtual IP and MAC addresses to provide default gateway redundancy. The router with the highest priority value becomes the active router and sends periodic hello messages to the standby router. The show standby command can be used to verify the HSRP state and priority values of routers.
VXLAN is a protocol that allows large numbers of virtual LANs to be overlaid on a physical network by encapsulating Ethernet frames within UDP packets and transporting them over an IP network. It addresses the scalability limitations of VLANs in large multi-tenant cloud environments by using a 24-bit segment ID rather than a 12-bit VLAN ID. The document provides an overview of VXLAN, why it is used, key concepts like VTEPs and VNIs, and demonstrations of VXLAN configuration on Cisco and Arista switches.
Im 2021 tutorial next-generation closed-loop automation - an inside view - ...Ishan Vaishnavi
The document provides an overview of next-generation closed-loop automation by three experts - Laurent Ciavaglia from Nokia, Pedro Henrique Gomes from Ericsson, and Ishan Vaishnavi from Lenovo. It introduces the speakers and their backgrounds working on closed-loop automation standards. The tutorial aims to share experience in standards development and present the latest developments in standards and open source towards multi-vendor coordinated closed-loop automation solutions.
This document provides an overview of configuring the Ixia system for network testing. It describes the IxServer software that controls the Ixia chassis hardware. It also describes the IxExplorer software used to program the Ixia hardware and perform network testing. Key aspects covered include configuring packet streams and flows, frame data, filtering, and using the IxRouter window to configure protocol interfaces and traffic management.
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
The document discusses troubleshooting BGP routing issues using Juniper examples. It begins by outlining some caveats and assumptions. Then it covers topics like originating routes, filtering routes, summarizing routes, and next hop problems. Examples are provided using show commands on Juniper routers to verify routes are being advertised and received correctly. Troubleshooting steps like modifying routing policies are demonstrated to resolve issues like more specific routes being advertised or next hop reachability problems.
This document contains information about routing protocols like EIGRP, OSPF, BGP and IPv6 routing. It discusses various topics such as configuring and tuning EIGRP parameters like timers, authentication and metrics. It also covers topics related to OSPF like network types, route filtering, summarization etc. Redistribution between protocols and IPv6 routing concepts are also mentioned. The document contains practical exercises for configuring various routing features on sample networks.
VXLAN Design and Deployment discusses considerations for deploying VXLAN in a data center fabric. It covers why VXLAN is used to create overlay networks, VXLAN fundamentals like encapsulation and tunneling, and important factors for the underlay network like ensuring sufficient MTU for the VXLAN overhead, using point-to-point interfaces and protocols like OSPF or IS-IS for routing, enabling IP multicast, and deploying iBGP with a route reflector to distribute VTEP reachability. The document also discusses control plane protocols, evolution of VXLAN, and hardware support on Cisco platforms.
The document provides instructional materials for a chapter on the network layer. It covers topics like network layer protocols including IPv4 and IPv6, routing, routers, and configuring Cisco routers. Sections explain how network layer protocols support communication across networks and the purpose of fields in IPv4 and IPv6 packets. It also details how hosts, routers, and their routing tables determine the path for packets to travel to reach their destination on either the local network or remote networks.
Introduction to Software Defined Networking and OpenStack NeutronSana Khan
Virtualization allows for more efficient use of server resources by running multiple virtual machines on a single physical server. This is done through the use of a hypervisor which creates isolated virtual machines, each with their own operating system and applications. Networking in virtualized environments is enabled through software-defined networking which decouples the network control and forwarding functions from the underlying hardware, allowing for centralized programmatic control of network resources. Neutron is OpenStack's networking component that provides software-defined networking capabilities like network provisioning and virtual port management.
This document provides information about configuring a Cisco 2500 series router. It describes the basic components of a router including RAM, NVRAM, flash memory, ROM, and interfaces. It also discusses configuring the router hostname and passwords, showing status information, configuring interfaces, and setting up static and dynamic routing protocols like RIP, IGRP, OSPF, EIGRP, and BGP. Troubleshooting tips are also provided.
This document provides an overview of new features in Red Hat Enterprise Linux 8. It discusses improvements to system management with Cockpit, changes to package management with Application Streams and Flatpak, updated container technologies including Podman and Buildah, and the ability to build custom RHEL images with Image Builder. The document also notes changes to networking with IPVLAN, storage with Stratis, and security with the new nftables firewall.
The document discusses Cisco routers and routing concepts. It provides details about Cisco router components, configuration, interfaces, routing protocols like RIP and IGRP, and autonomous systems. Cisco routers range from small access layer routers like the 700 series to large core routers like the 12000 series. Configuration is done through the console port initially and involves tasks like setting the hostname, passwords, interfaces and routing.
Ccnp presentation day 4 sd-access vs traditional network architectureSagarR24
The document discusses Cisco's Software-Defined Access (SD-Access) architecture. SD-Access combines Cisco's campus fabric design with the Digital Network Architecture Center (Cisco DNA or DNAC) to add fabric capabilities and automation to enterprise networks using SD-Access technology. It provides automated end-to-end segmentation of user, device, and application traffic without requiring network redesign. With its fabric capabilities, SD-Access enables services like host mobility and enhanced security in addition to normal switching and routing. A key component is VXLAN, which encapsulates Layer 2 frames in Layer 3 UDP packets to create virtualized Layer 2 subnets that span physical networks.
Introduction to nexux from zero to HeroDhruv Sharma
The document provides information about Cisco Nexus switches, including the Nexus 7000 and 7700 series switches. It describes the key components of Nexus switches like chassis, I/O modules, supervisor engines, and fabric modules. It also compares different Nexus 7000 and 7700 chassis models in terms of specifications like slots, bandwidth, switching capacity, and port density. Additionally, it discusses some differences between Nexus switches and Cisco Catalyst switches, such as licensing requirements, user accounts, NX-OS image structure, and use of port profiles instead of macros. Finally, it provides an overview of features supported on Nexus switches like virtual device contexts (VDCs).
Cloud-init is a set of services that handles early initialization and configuration of virtual machines. It retrieves user-data and metadata from cloud providers to customize VMs during boot. Cloud-init runs in stages, starting with network setup and continuing through configuration and finalization. It supports various data sources like CloudStack and ConfigDrive and runs modules specified in /etc/cloud/cloud.cfg to perform tasks like package installation, user management, and more.
Next Generation Nexus 9000 ArchitectureCisco Canada
In the upcoming year, 2016, the industry will see a significant capacity, capability and cost point shift in Data Center switching. The introduction of 25/100G supplementing the previous standard of 10/40G at the same cost points and power efficiency which represents a 250% increase in capacity for roughly the same capital costs is just one example of the scope of the change. These changes are occurring due to the introduction of new generations of ASICs leveraging improvements in semiconductor fabrication combined with innovative developments in network algorithms, SerDes capabilities and ASIC design approaches. This session will take a deep dive look at the technology changes enabling this shift and the architecture of the next generation nexus 9000 Data Center switches enabled due to these changes. Topics will include a discussion of the introduction of 25/50/100G to compliment existing 10/40G, why next generation fabrication techniques enable much larger forwarding scale, more intelligent buffering and queuing algorithms and embedded telemetry enabling big data analytics based on network traffic
This document lists various Linux terminal commands useful for DevOps tasks. It covers commands for viewing files and directories (ls, pwd, cd), manipulating text output (echo, cat), managing users and permissions (sudo, useradd, passwd, chown, chmod), archiving and extracting files (tar, gzip), finding and editing text (grep, sed, awk), networking (ip, ifconfig, netstat, curl), system monitoring (free, df), and installing software (apt-get). The commands allow viewing system information, navigating and manipulating the filesystem, editing configuration files, and installing and managing software.
This document discusses OVN (Open Virtual Network) and its integration with OpenStack Neutron. It provides an overview of OVN, how it integrates with Neutron, deployment models, and performance comparisons with ML2/OVS. Some key advantages of ML2/OVN include native support for DHCP, distributed routing, load balancing, and DPDK support. Disadvantages include lack of firewall and VPN support and some quality of service limitations.
CCNA 2 Routing and Switching v5.0 Chapter 1Nil Menon
The document is a chapter from a Cisco textbook that introduces switched networks. It discusses the convergence of data, voice and video networks and the benefits of a single, converged network. It describes the core, distribution and access layers of hierarchical network design and how switches use MAC address tables, store-and-forward or cut-through switching to segment networks into separate collision domains while maintaining a common broadcast domain. The chapter objectives are to explain switched network design and frame forwarding processes.
CCNA 1 Routing and Switching v5.0 Chapter 2Nil Menon
This document provides an overview of configuring a Cisco IOS network operating system. It discusses accessing and navigating the Cisco IOS using the command line interface, including setting hostnames, limiting access using passwords, and saving configurations. It also covers basic networking concepts like addressing schemes and verifying connectivity between devices.
This talk will briefly review LDAP concepts, cover common uses of LDAP, and present examples of advanced LDAP usage to inspire using LDAP. It will not provide installation or configuration details for specific operating systems. The speaker will link to online slides and get information about the audience's LDAP knowledge and usage.
Hi! Ho! Hi! Ho! SQL Server on Linux We Go!SolarWinds
SQL Server has been running on Windows for years. Now Microsoft is making it available on Linux in order to provide a consistent database platform across Window and Linux servers, as well as on-premises and in the cloud. In this presentation, Janis Griffin, database performance evangelist at SolarWinds, discusses the advantages of using SQL Server on Linux, comparing architecture, cost and performance.
VXLAN is a protocol that allows large numbers of virtual LANs to be overlaid on a physical network by encapsulating Ethernet frames within UDP packets and transporting them over an IP network. It addresses the scalability limitations of VLANs in large multi-tenant cloud environments by using a 24-bit segment ID rather than a 12-bit VLAN ID. The document provides an overview of VXLAN, why it is used, key concepts like VTEPs and VNIs, and demonstrations of VXLAN configuration on Cisco and Arista switches.
Im 2021 tutorial next-generation closed-loop automation - an inside view - ...Ishan Vaishnavi
The document provides an overview of next-generation closed-loop automation by three experts - Laurent Ciavaglia from Nokia, Pedro Henrique Gomes from Ericsson, and Ishan Vaishnavi from Lenovo. It introduces the speakers and their backgrounds working on closed-loop automation standards. The tutorial aims to share experience in standards development and present the latest developments in standards and open source towards multi-vendor coordinated closed-loop automation solutions.
This document provides an overview of configuring the Ixia system for network testing. It describes the IxServer software that controls the Ixia chassis hardware. It also describes the IxExplorer software used to program the Ixia hardware and perform network testing. Key aspects covered include configuring packet streams and flows, frame data, filtering, and using the IxRouter window to configure protocol interfaces and traffic management.
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
The document discusses troubleshooting BGP routing issues using Juniper examples. It begins by outlining some caveats and assumptions. Then it covers topics like originating routes, filtering routes, summarizing routes, and next hop problems. Examples are provided using show commands on Juniper routers to verify routes are being advertised and received correctly. Troubleshooting steps like modifying routing policies are demonstrated to resolve issues like more specific routes being advertised or next hop reachability problems.
This document contains information about routing protocols like EIGRP, OSPF, BGP and IPv6 routing. It discusses various topics such as configuring and tuning EIGRP parameters like timers, authentication and metrics. It also covers topics related to OSPF like network types, route filtering, summarization etc. Redistribution between protocols and IPv6 routing concepts are also mentioned. The document contains practical exercises for configuring various routing features on sample networks.
VXLAN Design and Deployment discusses considerations for deploying VXLAN in a data center fabric. It covers why VXLAN is used to create overlay networks, VXLAN fundamentals like encapsulation and tunneling, and important factors for the underlay network like ensuring sufficient MTU for the VXLAN overhead, using point-to-point interfaces and protocols like OSPF or IS-IS for routing, enabling IP multicast, and deploying iBGP with a route reflector to distribute VTEP reachability. The document also discusses control plane protocols, evolution of VXLAN, and hardware support on Cisco platforms.
The document provides instructional materials for a chapter on the network layer. It covers topics like network layer protocols including IPv4 and IPv6, routing, routers, and configuring Cisco routers. Sections explain how network layer protocols support communication across networks and the purpose of fields in IPv4 and IPv6 packets. It also details how hosts, routers, and their routing tables determine the path for packets to travel to reach their destination on either the local network or remote networks.
Introduction to Software Defined Networking and OpenStack NeutronSana Khan
Virtualization allows for more efficient use of server resources by running multiple virtual machines on a single physical server. This is done through the use of a hypervisor which creates isolated virtual machines, each with their own operating system and applications. Networking in virtualized environments is enabled through software-defined networking which decouples the network control and forwarding functions from the underlying hardware, allowing for centralized programmatic control of network resources. Neutron is OpenStack's networking component that provides software-defined networking capabilities like network provisioning and virtual port management.
This document provides information about configuring a Cisco 2500 series router. It describes the basic components of a router including RAM, NVRAM, flash memory, ROM, and interfaces. It also discusses configuring the router hostname and passwords, showing status information, configuring interfaces, and setting up static and dynamic routing protocols like RIP, IGRP, OSPF, EIGRP, and BGP. Troubleshooting tips are also provided.
This document provides an overview of new features in Red Hat Enterprise Linux 8. It discusses improvements to system management with Cockpit, changes to package management with Application Streams and Flatpak, updated container technologies including Podman and Buildah, and the ability to build custom RHEL images with Image Builder. The document also notes changes to networking with IPVLAN, storage with Stratis, and security with the new nftables firewall.
The document discusses Cisco routers and routing concepts. It provides details about Cisco router components, configuration, interfaces, routing protocols like RIP and IGRP, and autonomous systems. Cisco routers range from small access layer routers like the 700 series to large core routers like the 12000 series. Configuration is done through the console port initially and involves tasks like setting the hostname, passwords, interfaces and routing.
Ccnp presentation day 4 sd-access vs traditional network architectureSagarR24
The document discusses Cisco's Software-Defined Access (SD-Access) architecture. SD-Access combines Cisco's campus fabric design with the Digital Network Architecture Center (Cisco DNA or DNAC) to add fabric capabilities and automation to enterprise networks using SD-Access technology. It provides automated end-to-end segmentation of user, device, and application traffic without requiring network redesign. With its fabric capabilities, SD-Access enables services like host mobility and enhanced security in addition to normal switching and routing. A key component is VXLAN, which encapsulates Layer 2 frames in Layer 3 UDP packets to create virtualized Layer 2 subnets that span physical networks.
Introduction to nexux from zero to HeroDhruv Sharma
The document provides information about Cisco Nexus switches, including the Nexus 7000 and 7700 series switches. It describes the key components of Nexus switches like chassis, I/O modules, supervisor engines, and fabric modules. It also compares different Nexus 7000 and 7700 chassis models in terms of specifications like slots, bandwidth, switching capacity, and port density. Additionally, it discusses some differences between Nexus switches and Cisco Catalyst switches, such as licensing requirements, user accounts, NX-OS image structure, and use of port profiles instead of macros. Finally, it provides an overview of features supported on Nexus switches like virtual device contexts (VDCs).
Cloud-init is a set of services that handles early initialization and configuration of virtual machines. It retrieves user-data and metadata from cloud providers to customize VMs during boot. Cloud-init runs in stages, starting with network setup and continuing through configuration and finalization. It supports various data sources like CloudStack and ConfigDrive and runs modules specified in /etc/cloud/cloud.cfg to perform tasks like package installation, user management, and more.
Next Generation Nexus 9000 ArchitectureCisco Canada
In the upcoming year, 2016, the industry will see a significant capacity, capability and cost point shift in Data Center switching. The introduction of 25/100G supplementing the previous standard of 10/40G at the same cost points and power efficiency which represents a 250% increase in capacity for roughly the same capital costs is just one example of the scope of the change. These changes are occurring due to the introduction of new generations of ASICs leveraging improvements in semiconductor fabrication combined with innovative developments in network algorithms, SerDes capabilities and ASIC design approaches. This session will take a deep dive look at the technology changes enabling this shift and the architecture of the next generation nexus 9000 Data Center switches enabled due to these changes. Topics will include a discussion of the introduction of 25/50/100G to compliment existing 10/40G, why next generation fabrication techniques enable much larger forwarding scale, more intelligent buffering and queuing algorithms and embedded telemetry enabling big data analytics based on network traffic
This document lists various Linux terminal commands useful for DevOps tasks. It covers commands for viewing files and directories (ls, pwd, cd), manipulating text output (echo, cat), managing users and permissions (sudo, useradd, passwd, chown, chmod), archiving and extracting files (tar, gzip), finding and editing text (grep, sed, awk), networking (ip, ifconfig, netstat, curl), system monitoring (free, df), and installing software (apt-get). The commands allow viewing system information, navigating and manipulating the filesystem, editing configuration files, and installing and managing software.
This document discusses OVN (Open Virtual Network) and its integration with OpenStack Neutron. It provides an overview of OVN, how it integrates with Neutron, deployment models, and performance comparisons with ML2/OVS. Some key advantages of ML2/OVN include native support for DHCP, distributed routing, load balancing, and DPDK support. Disadvantages include lack of firewall and VPN support and some quality of service limitations.
CCNA 2 Routing and Switching v5.0 Chapter 1Nil Menon
The document is a chapter from a Cisco textbook that introduces switched networks. It discusses the convergence of data, voice and video networks and the benefits of a single, converged network. It describes the core, distribution and access layers of hierarchical network design and how switches use MAC address tables, store-and-forward or cut-through switching to segment networks into separate collision domains while maintaining a common broadcast domain. The chapter objectives are to explain switched network design and frame forwarding processes.
CCNA 1 Routing and Switching v5.0 Chapter 2Nil Menon
This document provides an overview of configuring a Cisco IOS network operating system. It discusses accessing and navigating the Cisco IOS using the command line interface, including setting hostnames, limiting access using passwords, and saving configurations. It also covers basic networking concepts like addressing schemes and verifying connectivity between devices.
This talk will briefly review LDAP concepts, cover common uses of LDAP, and present examples of advanced LDAP usage to inspire using LDAP. It will not provide installation or configuration details for specific operating systems. The speaker will link to online slides and get information about the audience's LDAP knowledge and usage.
Hi! Ho! Hi! Ho! SQL Server on Linux We Go!SolarWinds
SQL Server has been running on Windows for years. Now Microsoft is making it available on Linux in order to provide a consistent database platform across Window and Linux servers, as well as on-premises and in the cloud. In this presentation, Janis Griffin, database performance evangelist at SolarWinds, discusses the advantages of using SQL Server on Linux, comparing architecture, cost and performance.
This document provides an overview of LDAP (Lightweight Directory Access Protocol). It discusses what directory services are, the need for LDAP to centralize user information, and some key LDAP concepts like its data model, schemas, and LDIF format. It also covers setting up an OpenLDAP server, including configuration, indexing, access control, and integration with other LDAP tools and applications.
This document provides an overview of LDAP (Lightweight Directory Access Protocol). It discusses directory services and the need for LDAP, provides an introduction to LDAP including its benefits and basics, and covers setting up and tuning OpenLDAP as well as other LDAP tools and applications.
Oracle Recovery Manager (Oracle RMAN) has evolved since being released in version 8i. With the newest version of Oracle 12c , RMAN has great new features that will allow you to reduce your down time in case of a disaster. In this session you will learn about the new features that were introduced in Oracle 12c and how can you take advantage of them from the first day you upgrade to this version.
Apache Solr! Enterprise Search Solutions at your Fingertips!Murshed Ahmmad Khan
Get an overview of Apache Solr as an enterprise search server. Get to know the available alternatives and why the Solr is cool! Get Excited! Enterprise Search Solutions are ready to pick.
The document provides a summary of Ramesh Kumar's work experience and qualifications. He has over 17 years of experience as an Oracle Database Administrator supporting various versions of Oracle Database in UNIX/Linux environments. Currently, he works as a Lead Consultant at Wipro handling production Oracle RAC, ASM, and Data Guard databases up to 14TB in size on Exadata platforms. He has extensive experience installing, configuring, tuning, and troubleshooting Oracle databases.
Integrating Apple Macs Using Novell TechnologiesNovell
Apple Macs continue to increase in popularity and make up an increasingly large percentage of enterprise desktops. In this session, we'll explore the various Novell products and technologies that can be used to integrate Macs into your environment. You'll leave with a clear understanding of the issues involved and the options available to support the Mac user community in a Novell environment. You'll also have a chance to discuss suggestions for improving on this support.
Security and LDAP integration in InduSoft Web StudioAVEVA
With cybersecurity threat vectors increasing and attacks on industrial control systems on the rise, it’s more important than ever to take proper safety precautions when developing HMI or SCADA applications. In this webinar, we’ll go over how your application can be integrated with LDAP, and some best practices for developing more secure SCADA/HMI systems.
Hi! Ho! Hi! Ho! SQL Server on Linux We Go!SolarWinds
SQL Server has been running on Windows for years. Now Microsoft is making it available on Linux in order to provide a consistent database platform across Window and Linux servers, as well as on-premises and in the cloud. In this presentation, Janis Griffin, database performance evangelist at SolarWinds, discusses the advantages of using SQL Server on Linux, comparing architecture, cost and performance.
Rod Anderson
For the small business support person being able to provide PostgreSQL hosting for a small set of specific applications without having to build and support several Pg installations is necessary. By building a multi-tenant Pg cluster with one tenant per database and each application in it's own schema maintenance and support is much simpler. The issues that present themselves are how to provide and control dba and user access to the database and get the applications into their own schema. With this comes need to make logging in to the database (pg_hba.conf) as non-complex as possible.
This document provides an overview of essential Linux commands and utilities for SQL Server DBAs. It covers topics such as Linux history, users and permissions, file editing and navigation commands like vi, process monitoring with ps and top, and system diagnostic utilities like sar, vmstat, and mpstat. The document aims to teach SQL Server DBAs basic Linux skills to manage their environment and troubleshoot issues.
Building Enterprise Search Engines using Open Source TechnologiesRahul Singh
Enterprise Search is a challenging problem for most organizations. Public search technologies such as Google can index content and use link popularity to rank content in addition to the basic keyword matches. Enterprise Search is different. Sometimes it requires specially designed indexes as well as several processing steps.
At the U.S. Patent & Trademark Office, part of the Department of Commerce, a team of professionals is building the next generation of search tools using open source technologies. Like any large undertaking, it’s not a simple plug and play project.
Main topics to be covered in this talk:
+ Architectures for Large Scale Enterprise Search
+ Leveraging Apache Cassandra & Spark
+ Customizing / Configuring Apache SolR and Indexing
+ Writing a custom Parser for SolR in Scala
Building Enterprise Search Engines using Open Source TechnologiesAnant Corporation
Enterprise Search is a challenging problem for most organizations. Public search technologies such as Google can index content and use link popularity to rank content in addition to the basic keyword matches. Enterprise Search is different. Sometimes it requires specially designed indexes as well as several processing steps.
At the U.S. Patent & Trademark Office, part of the Department of Commerce, a team of professionals is building the next generation of search tools using open source technologies. Like any large undertaking, it’s not a simple plug and play project.
Main topics to be covered in this talk:
+ Architectures for Large Scale Enterprise Search
+ Leveraging Apache Cassandra & Spark
+ Customizing / Configuring Apache SolR and Indexing
+ Writing a custom Parser for SolR in Scala
PASS Summit - SQL Server 2017 Deep DiveTravis Wright
Deep dive into SQL Server 2017 covering SQL Server on Linux, containers, HA improvements, SQL graph, machine learning, python, adaptive query processing, and much much more.
Real time Analytics with Apache Kafka and Apache SparkRahul Jain
A presentation cum workshop on Real time Analytics with Apache Kafka and Apache Spark. Apache Kafka is a distributed publish-subscribe messaging while other side Spark Streaming brings Spark's language-integrated API to stream processing, allows to write streaming applications very quickly and easily. It supports both Java and Scala. In this workshop we are going to explore Apache Kafka, Zookeeper and Spark with a Web click streaming example using Spark Streaming. A clickstream is the recording of the parts of the screen a computer user clicks on while web browsing.
1) Apache Ambari is an open-source platform for provisioning, managing and monitoring Hadoop clusters.
2) New features in Ambari 2.4 include additional services, role-based access control, management packs and a Grafana UI for visualizing metrics.
3) Ambari simplifies cluster operations through an intuitive UI for deploying, securing, monitoring and upgrading Hadoop clusters on-premises and in the cloud.
1. Apache Ambari is an open-source platform for provisioning, managing and monitoring Hadoop clusters.
2. New features in Ambari 2.4 include additional services, role-based access control, management packs and a Grafana UI for visualizing metrics.
3. Ambari simplifies cluster operations through deploying clusters via blueprints, automated Kerberos integration, host discovery and stack advisors. It also supports upgrading clusters with either rolling or express upgrades.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
1. Keystone with LDAP
What works, and what doesn’t?
Jesse Pretorius aka @odyssey4me
Rackspace Software Developer
OpenStack-Ansible PTL
OpenStack Manchester Meetup
19 Jan 2016
2. Keystone Back-Ends
Identity
The Identity back-end provides the ability for Keystone to access Users, Groups and the
assignment of Users to Groups.
Resource
The Resource back-end (introduced in Kilo) provides the ability for Keystone to access
Projects, Domains and the Assignment of Projects to Domains.
Assignment
The Assignment back-end (introduced in Havana) provides Roles and handles the
assignments between Identities, Resources and Roles.
3. Keystone Identity Back-End
• Drivers
– SQL (only one back-end supported)
– LDAP (many back-ends supported)
– Hybrid SQL/LDAP [1] (SUSE Cloud only, not upstream)
• Domain-specific Back-end Driver Configuration [2]
– Configuration can be in file
• /etc/keystone/domains/keystone.<domain_name>.conf
– Configuration can be in SQL (experimental in Kilo)
4. Keystone Back-Ends (continued…)
• Resource Drivers
– SQL
– LDAP driver deprecated in Liberty, scheduled for removal in Mitaka [3]
• Assignment Drivers
– SQL
– LDAP driver deprecated in Kilo, scheduled for removal in Mitaka [4]
5. Using Multiple Keystone Domains
• The Keystone v3 API is required to use multiple domains
• To use the Keystone v3 API, you have to use the OpenStack CLI
– Keystone CLI has been deprecated in Liberty
– python-keystoneclient is moving towards being a library only
• When multiple domains are present, all Admin queries relating to
Users/Groups have to be scoped to the domain.
– Even for the Default domain, eg:
openstack user list --domain Default
6. Best Practice, in my opinion
• ‘Default’ Domain
– Should use the SQL Driver for its Identity back-end
– Should be used for Service accounts
• Resource & Assignment Back-Ends
– Should use the SQL Driver
7. A practical example
### in /etc/keystone/domains/keystone.Users.conf ###
[identity]
driver = ldap
[ldap]
group_id_attribute = cn
group_name_attribute = cn
group_objectclass = groupOfUniqueNames
group_tree_dn = ou=Groups,dc=example,dc=com
password = secrete
suffix = DC=example,DC=com
url = ldap://aio1_openldap_server_container-b083299d
user = cn=Manager,dc=example,dc=com
user_id_attribute = uid
user_mail_attribute = mail
user_name_attribute = cn
user_tree_dn = ou=People,dc=example,dc=com
### in /etc/keystone/keystone.conf ###
[identity]
driver = sql
domain_config_dir = /etc/keystone/domains
domain_specific_drivers_enabled = True
[resource]
driver = sql
[role]
driver = sql
### execute on the appropriate host ###
# create the domain
openstack domain create Users
# restart the keystone service now
# this is required for the conf file and
# domain association to work
service apache2 restart || service keystone restart
# list the domain users
openstack user list --domain Users
10. Get Involved in OpenStack-Ansible
• Launchpad Landing Page
– https://launchpad.net/openstack-ansible
• Documentation
– http://docs.openstack.org/developer/openstack-ansible
– http://docs.openstack.org/developer/openstack-ansible/developer-
docs/quickstart-aio.html
• Attend community meetings
– https://wiki.openstack.org/wiki/Meetings/openstack-ansible
• Get help
– Mailing Lists: [openstack-ansible] in subject line
– IRC: #openstack-ansible in Freenode