Vagrant – Part III – Networking and Multimachine

This is the third part of the Vagrant series where I will cover some of the networking and multimachine features options. The first part and the second part provide some background information. Networking options cover port forwarding, connection to public network and private network. Private network allows you to access the VM using an IPv(4|6)… Keep reading »

Vagrant – Part II – Synced Folders, Provisioning

In this second part of the series covering, I will cover synced folders and provisioning and other small features like VirtualBox Guest plugin installation and box update. In the first part, we saw how to initialize Vagrant, how to spin a VM, how to connect to it and how to shut it down/reload/destroy. In case… Keep reading »

Vagrant – Basics

This post will be the first one from a series covering Vagrant. I recently started to play with it and thought it would be great to document what I learned so that others can benefit from my notes. Vagrant is a tool for building and managing virtual machine environments. Vagrant provides easy to configure, reproducible,… Keep reading »

GRE tunnel between Juniper and Linux

This is a short howto about how you can bring up a GRE tunnel between Juniper devices and Linux, Ubuntu in this case. Just to provide some basics about GRE tunnels: Each endpoint has to have reachability to the other endpoint One endpoint must use the GRE tunnel to reach the destination of the tunnel(recursive… Keep reading »

Link aggregation between Juniper and Linux

I had recently to configure link aggregation between a Linux host and a Juniper device. On Linux this is called bonding and the logical interface is usually called bondX. On Juniper this is called link aggregation and the logical interface is called aggregated ethernet, aeX. For this example I used Ubuntu and based on the… Keep reading »

MACsec on Linux

Starting with kernel 4.6, support for MACsec has been added in Linux so it won’t be needed to use a release candidate to test this feature. There are two ways to implement MACsec: manually configure secure channel(SC), security association(SA) and the keys(this is what we are going to see) use dot1x with MACsec extensions that… Keep reading »