BGP is a popular routing protocol used in the Data Center (DC). But as the protocol that powers the Internet, it also comes armed with a lot of sophistication that scares many who think a CCIE or CCNA is required to even understand it.
Watch this presentation and learn:
*How BGP fits in the DC with specific use cases
*How to configure and manage BGP traditionally and via new methods
How deep is your buffer – Demystifying buffers and application performanceCumulus Networks
Packet buffer memory is among the oldest topics in networking, and yet it never seems to fade in popularity. Starting from the days of buffers sized by the bandwidth delay product to what is now called "buffer bloat", from the days of 10Mbps to 100Gbps, the discussion around how deep should the buffers be never ceases to evoke opinionated responses.
In this webinar we will be joined by JR Rivers, co-founder and CTO of Cumulus Networks, a man who has designed many ultra-successful switching chips, switch products, and compute platforms, to discuss the innards of buffering. This webinar will cover data path theory, tools to evaluate network data path behavior, and the configuration variations that affect application visible outcomes.
Linux offers an extensive selection of programmable and configurable networking components from traditional bridges, encryption, to container optimized layer 2/3 devices, link aggregation, tunneling, several classification and filtering languages all the way up to full SDN components. This talk will provide an overview of many Linux networking components covering the Linux bridge, IPVLAN, MACVLAN, MACVTAP, Bonding/Team, OVS, classification & queueing, tunnel types, hidden routing tricks, IPSec, VTI, VRF and many others.
BGP is a popular routing protocol used in the Data Center (DC). But as the protocol that powers the Internet, it also comes armed with a lot of sophistication that scares many who think a CCIE or CCNA is required to even understand it.
Watch this presentation and learn:
*How BGP fits in the DC with specific use cases
*How to configure and manage BGP traditionally and via new methods
How deep is your buffer – Demystifying buffers and application performanceCumulus Networks
Packet buffer memory is among the oldest topics in networking, and yet it never seems to fade in popularity. Starting from the days of buffers sized by the bandwidth delay product to what is now called "buffer bloat", from the days of 10Mbps to 100Gbps, the discussion around how deep should the buffers be never ceases to evoke opinionated responses.
In this webinar we will be joined by JR Rivers, co-founder and CTO of Cumulus Networks, a man who has designed many ultra-successful switching chips, switch products, and compute platforms, to discuss the innards of buffering. This webinar will cover data path theory, tools to evaluate network data path behavior, and the configuration variations that affect application visible outcomes.
Linux offers an extensive selection of programmable and configurable networking components from traditional bridges, encryption, to container optimized layer 2/3 devices, link aggregation, tunneling, several classification and filtering languages all the way up to full SDN components. This talk will provide an overview of many Linux networking components covering the Linux bridge, IPVLAN, MACVLAN, MACVTAP, Bonding/Team, OVS, classification & queueing, tunnel types, hidden routing tricks, IPSec, VTI, VRF and many others.
In episode 1 of our 2 part webinar series, Cumulus Networks Chief Scientist Dinesh Dutt walks our audience through the drivers behind the industry movement towards web-scale networking. We then go into the fundamentals of network automation and best practices for using tools like Puppet, Chef, Ansible and more to simplify network automation.
What architectures are best suited for today’s date center network? And how does Cumulus Networks make it easier to build networks? Dinesh Dutt (@ddcumulus), Chief Scientist at Cumulus Networks goes on to answer these questions in an entertaining and lively presentation. Customers need simple building blocks with simple L2 networking (MLAG) and L3 Clos. Cumulus Linux supports both, it supports additional functionality to simplify configuration (ex. PTM, IP unnumbered, L2 & L3 automation) and it is a platform that people can innovate on top of.
this slide is created for understand open vswitch more easily.
so I tried to make it practical. if you just follow up this scenario, then you will get some knowledge about OVS.
In this document, I mainly use only two command "ip" and "ovs-vsctl" to show you the ability of these commands.
This presentation covers the basics about OpenvSwitch and its components. OpenvSwitch is a Open Source implementation of OpenFlow by the Nicira team.
It also also talks about OpenvSwitch and its role in OpenStack Networking
1. Setup router
//to create a name for network card
//to assign ip address to network card
//to create NAT rule
//to assign gateway
//to assign dns
//to create dhcp
2.Create login page(Hotspot)
How to link from Mikrotik to Radius server
This webinar presentation from July 2017 talks about the challenges that network operators and IT folks face after the network is configured. How do you handle changes after the initial configuration? What about rolling in new racks or DCs? Learn how DevOps can help with validation, troubleshooting, and life cycle management. Full recording of webinar can be accessed at http://go.cumulusnetworks.com/l/32472/2017-05-04/91sy7b
Kea DHCP – the new open source DHCP server from ISCMen and Mice
This webinar will highlight the differences between the old ISC DHCP and new Kea DHCP (database support, dynamic reconfiguration, performance wins, scripting hooks) and will showcase the Men & Mice Suite as a graphical front-end to both ISC DHCP and Kea to ease the migration.
● Що таке ITIL (коротко)?
● Що таке сервіс (service)?
● Сучасні проблеми керівників та менеджерів
● Що таке ITSM?
● Що таке ITIL (детально)?
● Стратегія сервісу, Дизайн сервісу,
Перехід(зміни) сервісу, Надання(робота)
сервісу, Постійне вдосконалення сервісу
● Відповідні стандарти та джерела
● Резюме
• Що таке continuous integration (CI)?
• Побудова фічі з CI
• Практики та Переваги
• Впровадження
• Інструменти
• Приклади проектів -
Java, PHP, Android
• Висновки
In episode 1 of our 2 part webinar series, Cumulus Networks Chief Scientist Dinesh Dutt walks our audience through the drivers behind the industry movement towards web-scale networking. We then go into the fundamentals of network automation and best practices for using tools like Puppet, Chef, Ansible and more to simplify network automation.
What architectures are best suited for today’s date center network? And how does Cumulus Networks make it easier to build networks? Dinesh Dutt (@ddcumulus), Chief Scientist at Cumulus Networks goes on to answer these questions in an entertaining and lively presentation. Customers need simple building blocks with simple L2 networking (MLAG) and L3 Clos. Cumulus Linux supports both, it supports additional functionality to simplify configuration (ex. PTM, IP unnumbered, L2 & L3 automation) and it is a platform that people can innovate on top of.
this slide is created for understand open vswitch more easily.
so I tried to make it practical. if you just follow up this scenario, then you will get some knowledge about OVS.
In this document, I mainly use only two command "ip" and "ovs-vsctl" to show you the ability of these commands.
This presentation covers the basics about OpenvSwitch and its components. OpenvSwitch is a Open Source implementation of OpenFlow by the Nicira team.
It also also talks about OpenvSwitch and its role in OpenStack Networking
1. Setup router
//to create a name for network card
//to assign ip address to network card
//to create NAT rule
//to assign gateway
//to assign dns
//to create dhcp
2.Create login page(Hotspot)
How to link from Mikrotik to Radius server
This webinar presentation from July 2017 talks about the challenges that network operators and IT folks face after the network is configured. How do you handle changes after the initial configuration? What about rolling in new racks or DCs? Learn how DevOps can help with validation, troubleshooting, and life cycle management. Full recording of webinar can be accessed at http://go.cumulusnetworks.com/l/32472/2017-05-04/91sy7b
Kea DHCP – the new open source DHCP server from ISCMen and Mice
This webinar will highlight the differences between the old ISC DHCP and new Kea DHCP (database support, dynamic reconfiguration, performance wins, scripting hooks) and will showcase the Men & Mice Suite as a graphical front-end to both ISC DHCP and Kea to ease the migration.
● Що таке ITIL (коротко)?
● Що таке сервіс (service)?
● Сучасні проблеми керівників та менеджерів
● Що таке ITSM?
● Що таке ITIL (детально)?
● Стратегія сервісу, Дизайн сервісу,
Перехід(зміни) сервісу, Надання(робота)
сервісу, Постійне вдосконалення сервісу
● Відповідні стандарти та джерела
● Резюме
• Що таке continuous integration (CI)?
• Побудова фічі з CI
• Практики та Переваги
• Впровадження
• Інструменти
• Приклади проектів -
Java, PHP, Android
• Висновки
● What is Unit Testing?
● Benefits
● What is PHPUnit?
● Installation
● The Bank Account Example
● Categories of (Unit) Tests / Software Testing
Pyramid
● Links
● Why this is important? What to do?
● Security threats & Mitigations
● Designing Secure Web Applications
● Building Secure Web Applications
● Securing Your Network, Web Server and
Database
● Assessing Your Security
● Що таке Continuous Integration?
● Jenkins (Oracle Hudson)
● Установка Jenkins (Ubuntu Server)
● Створення завдання на прикладі Java
● Інструменти статичного аналізу
● Sonar. Установка. Аналітика.
Чому це важливо?
Життєвий цикл. Наука відладки. Помилки
Приклад відладки. Процес
Розуміння помилок. Поведінка. Серйозність.
Пріорітет. Додаткові атрибути
Ізоляція. Аналіз. Рішення
Тестування. Неоптимальний процес
Попередження
● PHP and the OWASP Top Ten Security
Vulnerabilities
● Secure Programming With The Zend
Framework
● Apache HTTPD
Security
● MySQL Security
● PHP Security Tools
What is continuous integration?
Building a feature with continuous integration
Practices of continuous integration
Benefits of continuous integration
Introducing continuous integration
Final thoughts
Continuous integration tools
• Хто ми є
• Agile і методології/Принципи Lean
• Коротко про Kanban
• Інструменти та процес
• Експерименти з обмеженнями
• Команди та рівномірне навантаження
• Приклад Канбан-процесу
• Дошки, картки, персоналізація, діаграми
• Резюме та посилання
Типи баз даних
● Реляційні бази даних (OLTP)
● Обробка транзакцій (ACID)
● Database-centric архітектура
● Моделювання даних. Узгодження іменування
● Нормалізація та денормалізація
● Індексування. Найкращі практики
● Що таке "цикл зворотнього зв'язку"?
● Цикли зворотнього зв'язку у eXtreme
Programming
● Зміцнення та скорочення циклу
зворотнього зв'язку
● Декларація взаємозалежності
● Запитання та обговорення
Anton Moldovan "Building an efficient replication system for thousands of ter...Fwdays
For one of our projects, we needed to improve the current content delivery system for terminals. In this talk, I will share our experience in building an efficient data replication system for thousands of terminals. We will touch on architecture decisions and tradeoffs, technologies that we used, and a bit of load testing.
Spoiler: We didn't use Kafka.
This is an introductory presentation regarding the issues in designing a campus network infrastructure. Unlike theoretical approaches, this presentation actually was used to describe some of the real configurations performed by Server Administrators and Network Managers. This is for an introductory audience with very little background in computer networks assumed.
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...ir. Carmelo Zaccone
This workshop will start with a presentation of results of a study that was conducted for the European Commission on IPv6 and security. This will be followed by presentations from a technology provider who will focus on the security issues related to IPv6. The last presentation will be done by an organisation that has implemented IPv6 and it will share its experiences with the focus on security. At the end of the session, there is a Q&A.
http://ipv6-ghent.fi-week.eu/ipv6-security/
Scaling OpenStack Networking Beyond 4000 Nodes with Dragonflow - Eshed Gal-Or...Cloud Native Day Tel Aviv
As OpenStack matures, more users move from “dipping a toe” to deploying at large scale, with 1000's of nodes.
OpenStack networking has long been a limiting factor in scaling beyond a few hundreds of nodes, forcing users to turn to cell splitting, or to complete offloading of the networking to the underlay systems and forfeit the overlay network altogether.
Dragonflow is a fully distributed, open source, SDN implementation of Neutron, that handles large scale deployments without splitting to cells.
In testing we've conducted, we were able to scale to 4000+ controllers (each controller is typically deployed on a compute node), while maintaining the same performance we had on a small 30 node environment.
Presentation of a few mechanisms that can help to automate the bootstrap process in IoT environment.
This is the summary of my work done during an 8 weeks internship at red hat
Similar to Ubuntu server wireless access point (eng) (20)
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ubuntu server wireless access point (eng)
1. Ubuntu Server based WAP
(Wireless Access Point)
What is WAP? Security
Why bother? Firewall
Router setup DHCP
Setting up NIC DNS
Setting up Resources
bridge
2. What is WAP?
In computer networking, a wireless access point (WAP
or AP) is a device that connects wireless comm.
devices together to form a wireless network. The
WAP usually connects to a wired network, and can
relay data between wireless devices and wired
devices. Several WAPs can link together to form a
larger network that allows "roaming". (In contrast, a
network where the client devices manage
themselves - without the need for any access points
- becomes an ad-hoc network.)
3. Why bother?
Cheap consumer WAPs under $100 as a rule has a
slow CPU about 150 MHz and low RAM – about 8-
16Mb, this causes low performance on huge traff c i
and peer-to-peer traff c, possible glitches, etc.
i
With a custom-build Linux based WAP we are getting
carrier grade device that could cost up to $1500 retail
for under $400 only. It is flexible and
customizable. Want a firewall? No problem.
Custom routing? NAT? Bridges? VLAN? All
easily managed. Custom Web-based
configuration, etc. and finally it's fun :)
4. Router setup
We have a box with two wired interfaces eth0 and eth1
and one wireless ath0. eth0 is WAN, eth1 and ath0 - LAN
5. Setting up wireless NIC
There are three main operation modes for wireless NICs
- Managed, when a NIC is bind to WAP that manages it
- Ad-hoc, when a NIC is one level peer-to-peer network
- Master, when a NIC acts as WAP to manage others
#Wireless Setup at /etc/network/interfaces
auto ath0
iface ath0 inet manual
wireless-mode master
wireless-essid pivotpoint
wireless-key s:tolik
6. Setting up bridge
Network bridge connects multiple network segments at
the data link layer (layer 2) of the OSI model, and the
term layer 2 switch is very often used
interchangeably with bridges.
#Bridge interface at /etc/network/interfaces
auto br0
iface br0 inet static
address 10.1.1.1
network 10.1.1.0
netmask 255.255.255.0
broadcast 10.1.1.255
bridge-ports eth1 ath0
7. Security
There is a number of security algorithms for WAP:
WEP-40 and WEP-104 (deprecated), WEP2,
WEPplus, Dynamic WEP, LEAP and f nally WPA and
i
WPA2 (IEEE 802.11i standard). WEPs are very weak
and WPA is crackable. To secure wireless network
you should use WPA2 in combination with other
security approaches like static DHCP(forbidding
unknown clients), ACLs, etc.
For our simple proof-of-concept project we had used
WEP-40 algorithm with the key given as passphrase:
#Wireless Setup at /etc/network/interfaces
wireless-key s:tolik
8. Firewall
We need to set up masquerading and forwarding on
the WAN interface for our bridged network to allow
Internet or Intranet access:
iptables -t nat -A POSTROUTING -s 10.1.1.0/24 -o eth0 -j MASQUERADE
iptables -A FORWARD -s 10.1.1.0/24 -o eth0 -j ACCEPT
iptables -A FORWARD -d 10.1.1.0/24 -m state --state
ESTABLISHED,RELATED -i eth0 -j ACCEPT
Save and restore our frewall rules over reboot:
#Gateway interface config /etc/network/interfaces
auto eth0
iface eth0 inet dhcp
pre-up iptables-restore < /etc/iptables.rules
post-down iptables-save > /etc/iptables.rules
9. Firewall: Packet forwarding
Enable packet forwarding in the kernel (over reboot):
# set it in /etc/sysctl.conf
net.ipv4.ip_forward = 1
Immediately allow the forwarding of packets:
echo 1 > /proc/sys/net/ipv4/ip_forward
11. DNS
Domain Name Service (DNS) is an Internet service that
maps IP addresses and fully qualifed domain names
(FQDN) to one another:
zone "home.tolik" {
type master;
file "/etc/bind/home.tolik.db";
notify no;
};
zone "1.1.10.in-addr.arpa" {
type master;
file "/etc/bind/rev.1.1.10.in-addr.arpa";
};
12. DNS:Forward
Setting up the forward zone tolik.home:
$TTL 3D
@ IN SOA ns.tolik.home.
acidumirae.gmail.com. (
200903231 ; serial, today + #
2H ; refresh, seconds
1H ; retry, seconds
4H ; expire, seconds
1H ) ; minimum, seconds
NS ns ; name server
MX 10 mail ; Mail Exchanger
ns A 10.1.1.1
gw A 10.1.1.1
TXT "Network gateway"
mail A 10.1.1.1
13. DNS:Reverse
Setting up the reverse zone to resolve 10.1.1.*:
$TTL 24h
; 10.1.1.rev
@ IN SOA home.tolik
acidumirae@gmail.com (
2007052500
10800
3600
604800
86400 )
IN NS ns.home.tolik.
1 IN PTR gw.home.tolik.