Networking technology in modern Virtual Private Clouds (RUS, RootConf++ 2018)Vadim Ponomarev
油
The network is the lifeblood of any modern private cloud, and it is also one of the hardest parts to understand, configure, and administer in the cloud. The rapid development of cloud technologies has spurred the emergence of special network equipment, new protocols, new technologies, and cloud IT professionals need to understand how it all works, interacts, and is managed. The main purpose of the report is to tell in detail how the network works in modern private clouds, what technologies are used, how they develop, identify problems, and give recommendations for solving them.
Abstract: https://rootconf.ru/moscow-rit/2018/abstracts/3402
Video: https://www.youtube.com/watch?v=jrPdkdS5Vcc
Networking technology in modern Virtual Private Clouds (RUS, RootConf++ 2018)Vadim Ponomarev
油
The network is the lifeblood of any modern private cloud, and it is also one of the hardest parts to understand, configure, and administer in the cloud. The rapid development of cloud technologies has spurred the emergence of special network equipment, new protocols, new technologies, and cloud IT professionals need to understand how it all works, interacts, and is managed. The main purpose of the report is to tell in detail how the network works in modern private clouds, what technologies are used, how they develop, identify problems, and give recommendations for solving them.
Abstract: https://rootconf.ru/moscow-rit/2018/abstracts/3402
Video: https://www.youtube.com/watch?v=jrPdkdS5Vcc
This document discusses programmable packet processing using P4. It begins with an agenda and overview of bringing the data plane back under programmatic control. It then discusses the benefits of a programmable pipeline and P4. The document introduces the Protocol Independent Switch Architecture (PISA) model and how P4 programs can define parsers, headers, metadata, tables, actions and controls to process packets. It provides examples of P4 code definitions and capabilities like counters and virtual routing/forwarding tables.
This document discusses programmable networking and the future of networking. It provides an overview of programmable switches and how they differ from traditional fixed-function switches. Programmable switches use a domain-specific compiler called P4 to program the forwarding plane and define protocols, packet parsing, and processing pipelines. This allows the behavior of the switch to be defined through software rather than being fixed in hardware. The document demonstrates how P4 programs map to the Programmable Switch Architecture (PISA) and provides examples of simple and complex data plane programs. It also previews some demonstrations of in-band network telemetry and traffic monitoring capabilities enabled by programmable switches.
This document provides an overview of various cybersecurity topics including the Shadow Brokers, next generation firewalls from Sourcefire/Cisco, security information and event management (SIEM) systems, Microsoft Active Threat Analytics (MS ATA), and security operations centers (SOCs). It discusses specific products like FirePower, Firepower Threat Defense, and features of SIEM architecture like routing and replaying event trails. The document also outlines attack timelines and methods used by MS ATA like brute force and pass-the-ticket attacks as well as remote code execution.
The document discusses Unified Networking Lab (UNetLab), a network emulation platform that allows for multi-hypervisor support within a single virtual machine. UNetLab can be run on VMware Workstation, ESXi, or Linux and supports emulation of routers, switches, firewalls, and other network devices from vendors like Cisco, Juniper, F5, Checkpoint and more. It provides web-based lab design and management, active topology diagrams, remote access to nodes, and other benefits for network simulation and training. Future plans include additional configuration and design capabilities.
18. TCP
130.* *
80 80
亠亳从仆仂亠 亟亠亠于仂
18
Drop Accept
Protocol
Dest IP
Dest Port
Action
Proto Dest IP Dest
Port
Action
1 TCP 130.* 80 Drop
2 TCP * 80 Accept
3 UDP * 3030 Accept
4 * * * Drop
19. UDPTCP
130.* *
80 80 3030
*
亠亳从仆仂亠 亟亠亠于仂
19
Drop Accept Accept
Protocol
Dest IP
Dest Port
Action
Proto Dest IP Dest
Port
Action
1 TCP 130.* 80 Drop
2 TCP * 80 Accept
3 UDP * 3030 Accept
4 * * * Drop
20. *UDPTCP
130.* *
80 80 3030 *
* *
亠亳从仆仂亠 亟亠亠于仂
20
DropDrop Accept Accept
Protocol
Dest IP
Dest Port
Action丐亠仄亳仆舒仍仆亠
亟亠亶于亳
Proto Dest IP Dest
Port
Action
1 TCP 130.* 80 Drop
2 TCP * 80 Accept
3 UDP * 3030 Accept
4 * * * Drop