Contrail Archives | Juniper Networks (2024)

SUMMARYArchives of the EOL/EOS releases for the Contrail products documentation

The following Contrail products releases have reached end-of-support (EOS).

To download the archived Contrail documentation, select one of the zip files from the sections below.

Contrail Networking

Title Published ZIP

Contrail Networking release 4.0

May 2019

[51.2 MB]

Contrail Networking release 3.2

July 2018

[25.6 MB]

Contrail Networking release 3.1

July 2018

[19.7 MB]

Contrail Networking release 3.0

July 2017

[26.3 MB]

Contrail Service Orchestration (CSO)

Title Published ZIP

CSO 6.1.0

February 2022

[26.9 MB]

CSO 6.0.0

February 2022

[32 MB]

CSO 5.4.0

June 2021

[30 MB]

CSO 5.3.0

October 2020

[29.1 MB]

CSO 5.1.2

August 2020

[24 MB]

CSO 5.2.0

July 2020

[18.6 MB]

CSO 5.1.0

April 2020

[19.4 MB]

CSO 5.0.0

August 2019

[19.2 MB]

CSO 4.1.0

April 2019

[16.1 MB]

CSO 4.0.0

January 2019

[16.1 MB]

CSO 3.3.0

September 2018

[10.5 MB]

CSO 3.2.0

October 2018

[16 MB]

Contrail Cloud Archives

Contrail Cloud release 10 has reached end-of-support (EOS).

Contrail Archives | Juniper Networks (2024)

FAQs

Which two tunneling protocols are supported by contrail for creating overlay networks? ›

The Contrail vRouter supports both MPLSoUDP (Multiprotocol Label Switching over User Datagram Protocol) and VXLAN (Virtual Extensible LAN) as the overlay tunneling protocols. These protocols are used to encapsulate and transport network traffic between virtual machines and containers across the cloud infrastructure.

Which protocol is used by contrail controller to communicate with other control nodes? ›

It uses multiple protocols to provide SDN to these orchestrators, as shown in Figure 1 where Extensible Messaging and Presence Protocol (XMPP) is an open XML technology for real-time communication, defined in RFC 6120.

Which tunneling protocol is the most secure and why? ›

OpenVPN is the most secure VPN protocol and the safest choice thanks to its near-unbreakable encryption, which keeps users' data private even when using public Wi-Fi. Because it's open source, users can check the source code for vulnerabilities and reassure themselves that there are no weaknesses in its security.

What are the 2 types of tunneling in VPNs? ›

Types of VPN tunneling protocols

There are many types of VPN protocols that offer varying levels of security and other features. The most commonly used tunneling protocols in the VPN industry are PPTP, L2TP/IPSec, SSTP, and OpenVPN - and the world's best VPN services should offer most or all of them.

What is the layer 2 tunneling protocol? ›

The Layer 2 Tunneling Protocol (L2TP) is a virtual private network (VPN) protocol that creates a connection between your device and a VPN server without encrypting your content. Due to its lack of encryption and authentication, L2TP is usually paired with Internet Protocol Security (IPsec) protocol.

What is Layer 2 tunneling protocol usually used to support? ›

In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs.

Which are the two main types of VPN tunnels? ›

Remote access VPN connects individual users to a remote network, while site-to-site VPN connects two entire networks together.

Top Articles
Latest Posts
Article information

Author: Clemencia Bogisich Ret

Last Updated:

Views: 6352

Rating: 5 / 5 (80 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Clemencia Bogisich Ret

Birthday: 2001-07-17

Address: Suite 794 53887 Geri Spring, West Cristentown, KY 54855

Phone: +5934435460663

Job: Central Hospitality Director

Hobby: Yoga, Electronics, Rafting, Lockpicking, Inline skating, Puzzles, scrapbook

Introduction: My name is Clemencia Bogisich Ret, I am a super, outstanding, graceful, friendly, vast, comfortable, agreeable person who loves writing and wants to share my knowledge and understanding with you.