Iproute2 Cheat Sheet by TME520 (TME520) Via Cheatography.Com/20978/Cs/4067

Total Page:16

File Type:pdf, Size:1020Kb

Iproute2 Cheat Sheet by TME520 (TME520) Via Cheatography.Com/20978/Cs/4067 iproute2 Cheat Sheet by TME520 (TME520) via cheatography.com/20978/cs/4067/ Address management In this section ${address} value should be a host address in dotted decimal format, and ${mask} can be either a dotted decimal subnet mask or a prefix length. That is, both 192.0.2.10/24 and 192.0.2.10​ /25​ 5.25​ 5.255.0 are equally accepta​ ble. Show all addres‐​ ip address show All "s​ how​ " commands can be used with "-​ 4" or "-​ 6" options to show only IPv4 or ses IPv6 addresses. Show addresses ip address show ${inter​ face name} ip address show eth0 for a single interf‐​ ace Show addresses ip address show up only for running interfa​ ces Show only ip address show [dev ${inter​ face}] permanent statically configured address​ es Show only ip address show [dev ${inter​ face}] dynamic addresses learnt via autocon​ fig​ ur‐​ ation Add an address to ip address add ${addre​ ss}​ /${​ mask} ip address add ip address add 2001:db​ 8:1​ ::/48 dev tun10 an interfa​ ce dev ${inter​ face name} 192.0.2.10/27 dev eth0 You can add as many addresses as you want. The first address will be primary and will be used as source address by default. Add an address ip address add ${addre​ ss}​ /${​ mask} ip address add Interface name with a colon before label is required, with human-r​ ea‐​ dev ${inter​ face name} label ${inte‐​ 192.0.2.1/24 dev eth0 some backwards compati​ bility issue. dable descrip​ tion rface name}:$​ {de​ scr​ ipt​ ion} label eth0:my​ _wa​ n_a​ dd‐​ ress Delete an address ip address delete ${addre​ ss}​ /${​ pre​ fix} ip address delete Interface name argument is required. Linux does dev ${inter​ face name} 192.0.2.1/24 dev eth0 allow to use the same address on multiple interfaces and it has valid use cases. Remove all ip address flush dev ${inter​ face ip address flush dev eth1 addresses from an name} interfa​ ce Metasyn​ tactic variables are written in shell-s​ tyle syntax, ${somet​ hing}. Optional command parts are in square brackets. Note that there is no way to rearrange addresses and replace the primary address. Make sure you set the primary address first. Route management View all routes ip route ip route show View IPv6 routes ip -6 route View routes to a network and all its subnets ip route show to root ${addre​ ss}​ /${​ mask} ip route show to root 192.168​ .0.0/24 View routes to a network and all superne​ ts ip route show to match ${addre​ ss}​ /${​ mask} ip route show to match 192.168​ .0.0/24 View routes to exact subnet ip route show to exact ${addre​ ss}​ /${​ mask} ip route show to exact 192.168​ .0.0/24 By TME520 (TME520) Published 10th May, 2015. Sponsored by Readable.com cheatography.com/tme520/ Last updated 7th May, 2016. Measure your website readability! tme520.com Page 1 of 11. https://readable.com iproute2 Cheat Sheet by TME520 (TME520) via cheatography.com/20978/cs/4067/ Route management (cont) View only the route ip route get ${addr‐​ ip route get Note that in complex routing scenarios like multipath routing, the result actually used by the ess}​ /${​ mask} 192.168​ .0.0/24 may be "c​ orrect but not complet​ e", as it always shows one route that kernel will be used first. View route cache ip route show cached Until the version 3.6, Linux used route caching. In older kernels, this command displays the (pre 3.6 kernels contents of the route cache. It can be used with modifiers described above. In newer kernels only) it does nothing. Add a route via ip route add ${addr‐​ ip route add ip route add 2001:db​ 8:1​ ::/48 via 2001:db​ 8:1​ ::1 gateway ess}​ /${​ mask} via ${next 192.0.2.12​ 8/25 hop} via 192.0.2.1 Add a route via ip route add ${addr‐​ ip route add Interface routes are commonly used with point-t​ o-p​ oint interfaces like interfa​ ce ess}​ /${​ mask} dev 192.0.2.0/25 dev PPP tunnels where next hop address is not required. ${inter​ face name} ppp0 Change or replace a ip route change ip route replace 192.0.2.1/27 dev tun0 route 192.168​ .2.0/24 via 10.0.0.1 Delete a route ip route delete ${rest of ip route delete ip route delete default dev ppp0 the route stateme​ nt} 10.0.1.0/25 via 10.0.0.1 Default route ip route add default via ip route add ip -6 route add default via 2001:db​ 8::1 ${addre​ ss}​ /${​ mask} default dev ${inter​ face name} Black​ hole routes ip route add blackhole ip route add Traffic to destina​ tions that match a blackhole route is silently discarded. ${addre​ ss}​ /${​ mask} blackhole 192.0.2.1/32 Other special routes ip route add unreac‐​ Sends ICMP "host unreach​ abl​ e". These routes make the system : unreach​ able hable ${addre​ ss}​ /$‐​ discard packets and reply with an ICMP error message to the sender. {mask} Other special routes ip route add prohibit Sends ICMP "a​ dmi​ nis​ tra​ tively prohibi​ ted​ ". : prohibit ${addre​ ss}​ /${​ mask} By TME520 (TME520) Published 10th May, 2015. Sponsored by Readable.com cheatography.com/tme520/ Last updated 7th May, 2016. Measure your website readability! tme520.com Page 2 of 11. https://readable.com iproute2 Cheat Sheet by TME520 (TME520) via cheatography.com/20978/cs/4067/ Route management (cont) Other special ip route add throw ${addre​ ss}​ /${​ mask} Sends "net unreach​ ab‐​ routes : throw le". Routes with ip route add ${addre​ ss}​ /${​ mask} via ${gateway} metric ${number} ip route add 192.16‐​ ip route add 192.16‐​ different 8.2.0/24 via 10.0.1.1 8.2.0 dev ppp0 metric metric metric 5 10 Multi​ path ip route add ${addre​ sss​ }/$​ {mask} nexthop via ${gateway 1} weight ip route add default nexthop via 192.168​ .1.1 weight 1 routing ${number} nexthop via ${gateway 2} weight ${number} nexthop dev ppp0 weight 10 As per the section below, if you set up a static route, and it becomes useless because the interface goes down, it will be removed and never get back on its own. You may not have noticed this behaviour because in many cases additional software (e.g. Network​ Man​ ager or rp-pppoe) takes care of restoring routes associated with interfa​ ces. Link management Show informa​ tion about all ip link show ip link list links Show informa​ tion about ip link show dev ${inter​ face name} ip link show ip link show dev tun10 specific link dev eth0 Bring a link up or down ip link set dev ${inter​ face name} [up | ip link set dev ip link set dev br0 up down] eth0 down Set human-r​ ead​ able link ip link set dev ${inter​ face name} ip link set dev eth0 alias "LAN interfa​ ce"​ descrip​ tion alias "$​ {de​ scr​ ipt​ ion​ }" Rename an interfa​ ce ip link set dev ${old interface name} ip link set dev Note that you can't rename an active interface. You name ${new interface name} eth0 name lan need to bring it down before doing it. Change link layer address ip link set dev ${inter​ face name} ip link set dev eth0 address 22:ce:e​ 0:9​ 9:6​ 3:6f (usually MAC address) address ${addre​ ss} Change link MTU ip link set dev ${inter​ face name} mtu ip link set dev tun0 mtu 1480 ${MTU value} Delete a link ip link delete dev ${inter​ face name} Enable or disable multicast ip link set ${inter​ face name} multicast ip link set ${inter​ face name} multicast off on an interfa​ ce on Enable or disable ARP on ip link set ${inter​ face name} arp on ip link set ${inter​ face name} arp off an interfa​ ce By TME520 (TME520) Published 10th May, 2015. Sponsored by Readable.com cheatography.com/tme520/ Last updated 7th May, 2016. Measure your website readability! tme520.com Page 3 of 11. https://readable.com iproute2 Cheat Sheet by TME520 (TME520) via cheatography.com/20978/cs/4067/ Link management (cont) Create a VLAN ip link add name ${VLAN interface ip link add name The only type of VLAN supported in Linux is IEEE 802.1q interfa​ ce name} link ${parent interface eth0.110 link eth0 VLAN, legacy impleme​ nta​ tions like ISL are not supported. name} type vlan id ${tag} type vlan id 110 Create a QinQ ip link add name ${service interface} link ${physical interface} type vlan proto 802.1ad id ${service tag} interface (VLAN stackin​ g) ip link add name ${client interface} link ${service interface} type vlan proto 802.1q id ${client tag} ip link add name eth0.100 link eth0 Create service tag interface type vlan proto 802.1ad id 100 ip link add name eth0.10​ 0.200 link Create client tag interface eth0.100 type vlan proto 802.1q id 200 Create pseudo-​ et‐​ ip link add name ${macvlan ip link add name peth0 link eth0 type macvlan hernet (aka interface name} link ${parent macvlan) interf‐​ interface} type macvlan ace Create a dummy ip link add name ${dummy ip link add name dummy0 type dummy interfa​ ce interface name} type dummy Create a bridge ip link add name ${bridge name} ip link add name br0 type bridge interfa​ ce type bridge Add an interface ip link set dev ${inter​ face name} ip link set dev eth0 master br0 to bridge master ${bridge name} Remove interface ip link set dev ${inter​ face name} ip link set dev eth0 nomaster from bridge nomaster Create a bonding ip link add name ${name} type ip link add name This is not enough to configure bonding (link aggrega​ tion) in interfa​ ce bond bond1 type bond any meaningful way.
Recommended publications
  • Improving Route Scalability: Nexthops As Separate Objects
    Improving Route Scalability: Nexthops as Separate Objects September 2019 David Ahern | Cumulus Networks !1 Agenda Executive Summary ▪ If you remember nothing else about this talk … Driving use case Review legacy route API Dive into Nexthop API Benefits of the new API Cumulus Networks !2 Performance with the Legacy Route API route route route prefix/lenroute prefix/lendev prefix/lendev gatewayprefix/len gatewaydev gatewaydev gateway Cumulus Networks !3 Splitting Next Hops from Routes Routes with separate Nexthop objects Legacy Route API route route prefix/len nexthop route nexthop id dev route gateway prefix/lenroute prefix/lendev prefix/lendev gatewayprefix/len gatewaydev gatewaydev gateway route prefix/len nexthop nexthop nexthop id group nexthopdev nexthop[N] gatewaydev gateway Cumulus Networks !4 Dramatically Improves Route Scalability … Cumulus Networks !5 … with the Potential for Constant Insert Times Cumulus Networks !6 Networking Operating System Using Linux APIs Routing daemon or utility manages switchd ip FRR entries in kernel FIBs via rtnetlink APIs SDK userspace ▪ Enables other control plane software to use Linux networking APIs rtnetlink Data path connections, stats, troubleshooting, … FIB notifications FIB Management of hardware offload is separate kernel upper devices tunnels ▪ Keeps hardware in sync with kernel ... eth0 swp1 swp2 swpN Userspace driver with SDK leveraging driver driver driver kernel notifications NIC switch ASIC H / W Cumulus Networks !7 NOS with switchdev Driver In-kernel switchdev driver ip FRR Leverages
    [Show full text]
  • Mist Teleworker ME
    MIST TELEWORKER GUIDE ​ ​ ​ ​ ​ Experience the corporate network @ home DOCUMENT OWNERS: ​ ​ ​ ​ Robert Young – [email protected] ​ Slava Dementyev – [email protected] ​ Jan Van de Laer – [email protected] ​ 1 Table of Contents Solution Overview 3 How it works 5 Configuration Steps 6 Setup Mist Edge 6 Configure and prepare the SSID 15 Enable Wired client connection via ETH1 / Module port of the AP 16 Enable Split Tunneling for the Corp SSID 17 Create a Site for Remote Office Workers 18 Claim an AP and ship it to Employee’s location 18 Troubleshooting 20 Packet Captures on the Mist Edge 23 2 Solution Overview Mist Teleworker solution leverages Mist Edge for extending a corporate network to remote office workers using an IPSEC secured L2TPv3 tunnel from a remote Mist AP. In addition, MistEdge provides an additional RadSec service to securely proxy authentication requests from remote APs to provide the same user experience as inside the office. WIth Mist Teleworker solution customers can extend their corporate WLAN to employee homes whenever they need to work remotely, providing the same level of security and access to corporate resources, while extending visibility into user network experience and streamlining IT operations even when employees are not in the office. What are the benefits of the Mist Teleworker solution with Mist Edge compared to all the other alternatives? Agility: ● Zero Touch Provisioning - no AP pre-staging required, support for flexible all home coverage with secure Mesh ● Exceptional support with minimal support - leverage Mist SLEs and Marvis Actions Security: ● Traffic Isolation - same level of traffic control as in the office.
    [Show full text]
  • Mesalock Linux: Towards a Memory-Safe Linux Distribution
    MesaLock Linux Towards a memory-safe Linux distribution Mingshen Sun MesaLock Linux Maintainer | Baidu X-Lab, USA Shanghai Jiao Tong University, 2018 whoami • Senior Security Research in Baidu X-Lab, Baidu USA • PhD, The Chinese University of Hong Kong • System security, mobile security, IoT security, and car hacking • MesaLock Linux, TaintART, Pass for iOS, etc. • mssun @ GitHub | https://mssun.me !2 MesaLock Linux • Why • What • How !3 Why • Memory corruption occurs in a computer program when the contents of a memory location are unintentionally modified; this is termed violating memory safety. • Memory safety is the state of being protected from various software bugs and security vulnerabilities when dealing with memory access, such as buffer overflows and dangling pointers. !4 Stack Buffer Overflow • https://youtu.be/T03idxny9jE !5 Types of memory errors • Access errors • Buffer overflow • Race condition • Use after free • Uninitialized variables • Memory leak • Double free !6 Memory-safety in user space • CVE-2017-13089 wget: Stack-based buffer overflow in HTTP protocol handling • A stack-based buffer overflow when processing chunked, encoded HTTP responses was found in wget. By tricking an unsuspecting user into connecting to a malicious HTTP server, an attacker could exploit this flaw to potentially execute arbitrary code. • https://bugzilla.redhat.com/show_bug.cgi?id=1505444 • POC: https://github.com/r1b/CVE-2017-13089 !7 What • Linux distribution • Memory-safe user space !8 Linux Distribution • A Linux distribution (often abbreviated as distro) is an operating system made from a software collection, which is based upon the Linux kernel and, often, a package management system. !9 Linux Distros • Server: CentOS, Federa, RedHat, Debian • Desktop: Ubuntu • Mobile: Android • Embedded: OpenWRT, Yocto • Hard-core: Arch Linux, Gentoo • Misc: ChromeOS, Alpine Linux !10 Security and Safety? • Gentoo Hardened: enables several risk-mitigating options in the toolchain, supports PaX, grSecurity, SELinux, TPE and more.
    [Show full text]
  • Spirent Testcenter™
    DATASHEET Spirent TestCenter™ L2TPv2 / L2TPv3 Base Packages Convergence is creating a new generation of integrated network Layer 2 Tunneling Protocol (L2TP) is used to support Virtual Private Networks (VPNs) devices and services that are or as part of the delivery of services by ISPs. Spirent TestCenter L2TP Base Package much more complex than ever enables Service Providers and network equipment manufacturers to quickly validate before. Service Providers need subscriber scalability. While L2TPv2 is all about PPPoE subscriber sessions being the ability to deploy networks tunneled to domains, L2TPv3 is more about multi-protocol tunneling. L2TPv3 Base quickly that get Quality of Package provides additional security features, improved encapsulation, and the Experience (QoE) right the first ability to carry data links other than simply Point-to-Point Protocol (PPP) over an time. IP network. L2TPv3 is emerging as a core tunneling and VPN technology for next- generation networks. L2TPv3 provides the flexibility and scalability of IP with the Benefits privacy of Frame Relay and ATM. L2TPv3 will allow network services to be delivered over routed IP networks. Stability and performance of L2TP is critical to many Service • L2TP Tunnel capacity testing Providers and data services. • Session per tunnel testing Spirent can help you address this challenge with Spirent TestCenter with its innovative design. Now you can create and execute more complex test cases in less time with the • Data forwarding across all L2TP same resources—and scale tests higher while debugging problems faster. The results: tunnels lower CAPEX and OPEX, faster time to market, greater market share and higher • L2TP Tunnel stability test profitability, the ability to tunnel thousands of subscribers to thousands of tunnels with authentication and verify data forwarding and receive rates per subscriber.
    [Show full text]
  • Brocade Vyatta Network OS Data Sheet
    DATA SHEET Brocade Vyatta Network OS HIGHLIGHTS A Network Operating System for the Way Forward • Offers a proven, modern network The Brocade® Vyatta® Network OS lays the foundation for a flexible, easy- operating system that accelerates the adoption of next-generation to-use, and high-performance network services architecture capable of architectures meeting current and future network demands. The operating system was • Creates an open, programmable built from the ground up to deliver robust network functionality that can environment to enhance be deployed virtually or as an appliance, and in concert with solutions differentiation, service quality, and from a large ecosystem of vendors, to address various Software-Defined competitiveness Networking (SDN) and Network Functions Virtualization (NFV) use cases. • Supports a broad ecosystem for With the Brocade Vyatta Network OS, organizations can bridge the gap optimal customization and service between traditional and new architectures, as well as leverage existing monetization investments and maximize operational efficiencies. Moreover, they can • Simplifies and automates network compose and deploy unique, new services that will drive differentiation functions to improve time to service, increase operational efficiency, and and strengthen competitiveness. reduce costs • Delivers breakthrough performance flexibility, performance, and operational and scale to meet the needs of any A Proven, Modern Operating efficiency, helping organizations create deployment System The Brocade Vyatta Network OS new service offerings and value. Since • Provides flexible deployment options separates the control and data planes in 2012, the benefits of this operating to support a wide variety of use cases software to fit seamlessly within modern system have been proven by the Brocade SDN and NFV environments.
    [Show full text]
  • Adecuándose a La Norma ISO/IEC 1799 Mediante Software Libre
    Adecu´andose a la norma ISO/IEC 1799 mediante software libre * Jose Fernando Carvajal Vi´on Grupo de Inter´esen Seguridad de ATI (ATI-GISI) <[email protected]> Javier Fern´andez-Sanguino Pe˜na Grupo de Inter´esen Seguridad de ATI (ATI-GISI) <[email protected]> 28 de octubre de 2002 Resumen Este art´ıculo muestra la forma de adecuar a la norma ISO/IEC 17999 un sistema de informaci´onimplementado en un servidor cuyo software de sistema operativo se basa en alguna alternativa de software Libre y c´odigo abierto. La utilizaci´onde una distribuci´onDebian GNU/Linux sirve como base a la que a˜nadir las utilidades y paquetes necesarios para conseguir el objetivo. ´Indice 1. Introducci´on 1 2. Objetivo y Asunciones 2 3. Cumplimiento de la Norma ISO/IEC 17799 en GNU/Linux 4 4. Conclusiones 4 5. Referencias 5 6. Referencias de herramientas 7 7. Referencias Generales 11 *Copyright (c) 2002 Jose Fernando Carvajal y Javier Fern´andez-Sanguino. Se otorga permiso para copiar, distribuir y/o modificar este documento bajo los t´erminos de la Licencia de Documen- taci´onLibre GNU, Versi´on1.1 o cualquier otra versi´onposterior publicada por la Free Software Foundation. Puede consultar una copia de la licencia en: http://www.gnu.org/copyleft/fdl.html 1 1. Introducci´on De forma general para mantener la seguridad de los activos de informaci´on se deben preservar las caracter´ısticas siguientes [1]. 1. Confidencialidad: s´oloel personal o equipos autorizados pueden acceder a la informaci´on. 2. Integridad: la informaci´on y sus m´etodos de proceso son exactos y completos.
    [Show full text]
  • Brocade Vyatta Network OS LAN Interfaces Configuration Guide, 5.2R1
    CONFIGURATION GUIDE Brocade Vyatta Network OS LAN Interfaces Configuration Guide, 5.2R1 Supporting Brocade 5600 vRouter, VNF Platform, and Distributed Services Platform 53-1004724-01 24 October 2016 © 2016, Brocade Communications Systems, Inc. All Rights Reserved. Brocade, the B-wing symbol, and MyBrocade are registered trademarks of Brocade Communications Systems, Inc., in the United States and in other countries. Other brands, product names, or service names mentioned of Brocade Communications Systems, Inc. are listed at www.brocade.com/en/legal/ brocade-Legal-intellectual-property/brocade-legal-trademarks.html. Other marks may belong to third parties. Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the United States government. The authors and Brocade Communications Systems, Inc. assume no liability or responsibility to any person or entity with respect to the accuracy of this document or any loss, cost, liability, or damages arising from the information contained herein or the computer programs that accompany it. The product described by this document may contain open source software covered by the GNU General Public License or other open source license agreements. To find out which open source software is included in Brocade products, view the licensing terms applicable to the open source software, and obtain a copy of the programming source code, please visit http://www.brocade.com/support/oscd.
    [Show full text]
  • Linux Networking 101
    The Gorilla ® Guide to… Linux Networking 101 Inside this Guide: • Discover how Linux continues its march toward world domination • Learn basic Linux administration tips • See how easy it can be to build your entire network on a Linux foundation • Find out how Cumulus Linux is your ticket to networking freedom David M. Davis ActualTech Media Helping You Navigate The Technology Jungle! In Partnership With www.actualtechmedia.com The Gorilla Guide To… Linux Networking 101 Author David M. Davis, ActualTech Media Editors Hilary Kirchner, Dream Write Creative, LLC Christina Guthrie, Guthrie Writing & Editorial, LLC Madison Emery, Cumulus Networks Layout and Design Scott D. Lowe, ActualTech Media Copyright © 2017 by ActualTech Media. All rights reserved. No portion of this book may be reproduced or used in any manner without the express written permission of the publisher except for the use of brief quotations. The information provided within this eBook is for general informational purposes only. While we try to keep the information up- to-date and correct, there are no representations or warranties, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the information, products, services, or related graphics contained in this book for any purpose. Any use of this information is at your own risk. ActualTech Media Okatie Village Ste 103-157 Bluffton, SC 29909 www.actualtechmedia.com Entering the Jungle Introduction: Six Reasons You Need to Learn Linux ....................................................... 7 1. Linux is the future ........................................................................ 9 2. Linux is on everything .................................................................. 9 3. Linux is adaptable ....................................................................... 10 4. Linux has a strong community and ecosystem ........................... 10 5.
    [Show full text]
  • What Is a Virtual Private Network?
    C H A P T E R 1 What Is a Virtual Private Network? A virtual private network (VPN) allows the provisioning of private network services for an organization or organizations over a public or shared infrastructure such as the Internet or service provider backbone network. The shared service provider backbone network is known as the VPN backbone and is used to transport traffic for multiple VPNs, as well as possibly non-VPN traffic. VPNs provisioned using technologies such as Frame Relay and Asynchronous Transfer Mode (ATM) virtual circuits (VC) have been available for a long time, but over the past few years IP and IP/Multiprotocol Label Switching (MPLS)-based VPNs have become more and more popular. This book focuses on describing the deployment of IP- and IP/MPLS-based VPNs. The large number of terms used to categorize and describe the functionality of VPNs has led to a great deal of confusion about what exactly VPNs are and what they can do. The sections that follow cover VPN devices, protocols, technologies, as well as VPN categories and models. VPN Devices Before describing the various VPN technologies and models, it is useful to first describe the various customer and provider network devices that are relevant to the discussion. Devices in the customer network fall into one of two categories: • Customer (C) devices—C devices are simply devices such as routers and switches located within the customer network. These devices do not have direct connectivity to the service provider network. C devices are not aware of the VPN. • Customer Edge (CE) devices—CE devices, as the name suggests, are located at the edge of the customer network and connect to the provider network (via Provider Edge [PE] devices).
    [Show full text]
  • Time-Sensitive Networks Over 5G
    Time-sensitive networks over 5G Bachelor’s thesis Häme University of Applied Sciences Information and Communications Technology Spring 2020 Kaarlo Skogberg TIIVISTELMÄ Tieto- ja viestintätekniikka Hämeen Ammattikorkeakoulu Tekijä Kaarlo Skogberg Vuosi 2020 Työn nimi Aikakriittiset verkot 5G:n yli Työn ohjaaja /t Marko Grönfors (HAMK), Toni Huusko, Juhani Kerovuori TIIVISTELMÄ Opinnäytetyön tarkoitus oli tuottaa vertailu reaaliaikaisista kommunikaa- tiokeinoista nosturin ja etäohjausaseman välille 5G-mobiiliverkon yli. Kent- täväyliä tarvitaan nosturin kanssa kommunikointiin, mutta koska nämä ovat pääosin tason 2 protokollia ja eivät reitity luontaisesti 5G-verkossa täytyy kenttäväylän verkkoliikenne tunneloida. Työssä tutkittiin erilaisia Ethernet-pohjaisia kenttäväyliä sekä tunnelointiteknologioita, jotka kyke- nevät tunneloimaan tason 2 verkkoliikennettä. Tason 2 tunnelointi mah- dollistaa suoran kommunikaation kahden paikallisverkon välillä. Kaikkien työssä tutkittujen Ethernet-pohjaisten kenttäväylien sekä tunnelointipro- tokollien täytyi olla sopivia käytettäväksi teollisessa ympäristössä valituilla verkkolaitteistolla. Työtä varten tutkitun tiedon perusteella esitetään, että käytettävä kenttä- väylä sekä tunnelointiprotokolla tulisi valita saatavilla olevan verkkolait- teiston sekä muun infrastruktuurin perusteella. Kenttäväylää valittaessa reaaliaikaiset vaatimukset olivat käyttötarkoitukseen nähden kevyet, joka avaa enemmän vaihtoehtoja kenttäväylää valittaessa. Yrityksessä käyte- tään jo Profinetia, joka soveltuu mainiosti käyttötarkoitukseen.
    [Show full text]
  • Practical Practical
    PRACTICAL PRACTICAL GPLCOMPLIANCE GPLCOMPLIANCE A GUIDE FOR STARTUPS, SMALL ABUSINESSES GUIDE FOR STARTUPS, AND ENGINEERS SMALL BUSINESSES AND ENGINEERS ARMIJN HEMEL, MSC AND SHANE COUGHLAN ARMIJN HEMEL, MSC AND SHANE COUGHLAN Copyright © 2017 Linux Foundation All rights reserved. This book or any portion thereof may not be reproduced or used in any manner whatsoever without the express written permission of the publisher except for the use of brief quotations in a book review and certain other noncommercial uses permitted by copyright law. Printed in the United States of America First Edition, 2017 ISBN: 978-0-9989078-0-2 1 Letterman Drive Building D Suite D4700 San Francisco CA 94129 Phone/Fax: +1 415 723 9709 https://linuxfoundation.org About the Authors Shane Coughlan Shane Coughlan is an expert in communi- cation, security, and business development. His professional accomplishments include spearheading the licensing team that elevated Open Invention Network into the largest patent non-aggression community in history, establishing the leading professional network of open source legal experts, and aligning stakeholders to launch both the first law journal and the first law book dedicated to open source. He currently leads the OpenChain community as Program Manager. Shane has extensive knowledge of open source governance, internal process development, supply chain management, and community building. His experience includes engagement with the enterprise, embedded, mobile, and automotive industries. Armijn Hemel Armijn Hemel is the owner of Tjaldur Software Governance Solutions. He is an active re- searcher of and internationally recognized expert in open source license compliance and supply chain management. He studied computer science at Utrecht University in The Netherlands, where he pioneered reproducible builds with NixOS.
    [Show full text]
  • Vyos Documentation Release Current
    VyOS Documentation Release current VyOS maintainers and contributors Jun 04, 2019 Contents: 1 Installation 3 1.1 Verify digital signatures.........................................5 2 Command-Line Interface 7 3 Quick Start Guide 9 3.1 Basic QoS................................................ 11 4 Configuration Overview 13 5 Network Interfaces 17 5.1 Interface Addresses........................................... 18 5.2 Dummy Interfaces............................................ 20 5.3 Ethernet Interfaces............................................ 20 5.4 L2TPv3 Interfaces............................................ 21 5.5 PPPoE.................................................. 23 5.6 Wireless Interfaces............................................ 25 5.7 Bridging................................................. 26 5.8 Bonding................................................. 27 5.9 Tunnel Interfaces............................................. 28 5.10 VLAN Sub-Interfaces (802.1Q)..................................... 31 5.11 QinQ................................................... 32 5.12 VXLAN................................................. 33 5.13 WireGuard VPN Interface........................................ 37 6 Routing 41 6.1 Static................................................... 41 6.2 RIP.................................................... 41 6.3 OSPF................................................... 42 6.4 BGP................................................... 43 6.5 ARP................................................... 45 7
    [Show full text]