Feeds

Vyatta does open source networking with a mean streak

Tell Cisco what you really think

The Essential Guide to IT Transformation

So much of the Web 2.0/Participation Age garbage arrives with false pretenses of goodwill. Give everyone a MySpace page and our collective spirit will fill the world with creativity and freshness. Gwana-gwana.

Thanks heavens then that we have companies such as Vyatta willing to use the web and its bloginess for proper, fist in your face business. The networking company has set up a charming web page where customers can post their goodbye letters to Cisco CEO John Chambers. "Write your Dear John letter and tell Cisco why you're leaving them. Whatever your reason....inflated pricing...tech support issues...expensive upgrades...not enough cuddling."

Vyatta seems more willing than most upstarts to mount a head-on attack against the big boy on the block. Part of this sense of entitlement may come from Vyatta's claims as an open source software maker. It has written router/firewall/VPN code and put that software on appliances (Dell's PowerEdge 860 server), hoping to undercut companies such as Cisco on price and ethos.

This week the Belmont, California-based company dished out Version 3 of its flagship Vyatta Community Edition software.

Vyatta has highlighted the following addition to its free software.

  • IPSec VPN – Vyatta now supports dedicated site-to-site (branch-to-branch or branch-to-HQ) virtual private networking and supports the most widely used cryptographic algorithms, including 3DES, AES (128 and 256-bit), MD5, and SHA1. In addition, IPsec VPN can now be configured in a cluster of multiple Vyatta units with failover mechanisms providing high availability for mission-critical services.
  • Multi-link PPP (MLPPP) – MLPPP allows customers to increase WAN bandwidth by using multiple low-speed circuits, typically T1 links, in parallel, enabling a pay-as-you-grow strategy instead of paying the high cost of a T3 upgrade.
  • BGP scaling and security enhancements – Improved BGP scaling provides faster routing convergence with many peers. MD5-based neighbor authentication delivers improved routing security. Per-BGP peer policy support makes it easier than ever to control route propagation. New monitoring and troubleshooting commands make Vyatta easier to use.

Interested folks can find the code here.

Going after Cisco is hardly an original attack. That said, it's only natural for a number of open source players to ride Linux's success and try and expand their piece of the data center management pie.

It's nice to see that Vyatta isn't relying on open source's alleged good name along as it tries to carve out a prominent place in the networking realm. More young companies should have the guts to kick their rivals where it counts. ®

Register hack Ashlee Vance has just pumped out a new book that's a guide to Silicon Valley. The book starts with the electronics pioneers present in the Bay Area in the early 20th century and marches up to today's heavies. Want to know where Gordon Moore eats Chinese food, how unions affected the rise of microprocessors or how Fairchild Semiconductor got its start? This is the book for you - available at Amazon US here or in the UK here.

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
10Gbps over crumbling COPPER: Boffins cram bits down telco wire
XG-FAST tech could finesse fiber connections
THE GERMANS ARE CLOUDING: New AWS cloud region spotted
eu-central-1.amazonaws.com, aka, your new Amazon Frankfurt bitbarn
Airbus to send 1,200 TFlops of HPC goodness down the runway
HP scores deal to provide plane-maker with new fleet of data-crunching 'PODs'
Tegile boots Dell array out of chemical biz. Dell responds: Tegile, who?
Upstart says it's up, up and away ... but not on the giants' radar – yet
Dimension Data cloud goes TITSUP down under... after EMC storage fail
Replacement hardware needed as Australian cloud flops for 48-plus hours
IDC busts out new converged systems charts, crowns Oracle as Platform King
Nutanix/Simplivity not shown - but they're there. Oh yes
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Eight steps to building an HP BladeSystem
Building your ideal BladeSystem infrastructure solution begins with eight simple steps, outlined in this whitepaper.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.
Build a Business Case: Developing Custom Apps
In this whitepaper learn how to maximize the value of custom applications by accelerating and simplifying their development.