Feeds

Vyatta does open source networking with a mean streak

Tell Cisco what you really think

Top 5 reasons to deploy VMware with Tegile

So much of the Web 2.0/Participation Age garbage arrives with false pretenses of goodwill. Give everyone a MySpace page and our collective spirit will fill the world with creativity and freshness. Gwana-gwana.

Thanks heavens then that we have companies such as Vyatta willing to use the web and its bloginess for proper, fist in your face business. The networking company has set up a charming web page where customers can post their goodbye letters to Cisco CEO John Chambers. "Write your Dear John letter and tell Cisco why you're leaving them. Whatever your reason....inflated pricing...tech support issues...expensive upgrades...not enough cuddling."

Vyatta seems more willing than most upstarts to mount a head-on attack against the big boy on the block. Part of this sense of entitlement may come from Vyatta's claims as an open source software maker. It has written router/firewall/VPN code and put that software on appliances (Dell's PowerEdge 860 server), hoping to undercut companies such as Cisco on price and ethos.

This week the Belmont, California-based company dished out Version 3 of its flagship Vyatta Community Edition software.

Vyatta has highlighted the following addition to its free software.

  • IPSec VPN – Vyatta now supports dedicated site-to-site (branch-to-branch or branch-to-HQ) virtual private networking and supports the most widely used cryptographic algorithms, including 3DES, AES (128 and 256-bit), MD5, and SHA1. In addition, IPsec VPN can now be configured in a cluster of multiple Vyatta units with failover mechanisms providing high availability for mission-critical services.
  • Multi-link PPP (MLPPP) – MLPPP allows customers to increase WAN bandwidth by using multiple low-speed circuits, typically T1 links, in parallel, enabling a pay-as-you-grow strategy instead of paying the high cost of a T3 upgrade.
  • BGP scaling and security enhancements – Improved BGP scaling provides faster routing convergence with many peers. MD5-based neighbor authentication delivers improved routing security. Per-BGP peer policy support makes it easier than ever to control route propagation. New monitoring and troubleshooting commands make Vyatta easier to use.

Interested folks can find the code here.

Going after Cisco is hardly an original attack. That said, it's only natural for a number of open source players to ride Linux's success and try and expand their piece of the data center management pie.

It's nice to see that Vyatta isn't relying on open source's alleged good name along as it tries to carve out a prominent place in the networking realm. More young companies should have the guts to kick their rivals where it counts. ®

Register hack Ashlee Vance has just pumped out a new book that's a guide to Silicon Valley. The book starts with the electronics pioneers present in the Bay Area in the early 20th century and marches up to today's heavies. Want to know where Gordon Moore eats Chinese food, how unions affected the rise of microprocessors or how Fairchild Semiconductor got its start? This is the book for you - available at Amazon US here or in the UK here.

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.