J.D. Falk wrote:
Hi, Luke! MAAWG recently published a document to help ISPs deal with
infected machines in their networks. It's not the same kind of
pressure, but (as we learned with open relays at MAPS) pressure isn't
very effective unless there are tools available to deal with the problem.
I surprised that nobody has mentioned the work of shadowserver.org, they are
able to send reports of malware infections on your networks (see
http://www.shadowserver.org/wiki/pmwiki.php/Services/Reports). The service
has proved to a brilliant tool in mitigating various forms of malware such
as
I am pulling my hair out trying to do this. According to the spec
sheets on c9networks website, the device is capable of SNMP management,
only I can not find anywhere in the interface to set up the community
strings. Does anyone have any resources on how this would be done. Thanks
--
I need to talk to someone at earthlink who is a mail administrator?
Good morning,
Could someone from Level3 who manages IPv6 Peering please contact me
offlist? I am have tried to call Customer services numerous times and
every time they attempt to transfer me to the appropriate person, the
call is dropped.
Thanks!
Ken
You can reach their IPv6 group via email at dl-ipv6-supp...@level3.com.
On 11/08/09 10:17 -0600, Ken Gilmour wrote:
Good morning,
Could someone from Level3 who manages IPv6 Peering please contact me
offlist? I am have tried to call Customer services numerous times and
every time they attempt
Jack Bates wrote:
J.D. Falk wrote:
Hi, Luke! MAAWG recently published a document to help ISPs deal with
infected machines in their networks. It's not the same kind of
pressure, but (as we learned with open relays at MAPS) pressure isn't
very effective unless there are tools available to deal
-Original Message-
From: Bradley Freeman [mailto:bradley.free...@csirt.ja.net]
Sent: Tuesday, August 11, 2009 6:37 AM
To: 'NANOG'
Subject: RE: Botnet hunting resources
I surprised that nobody has mentioned the work of shadowserver.org,
they
are
able to send reports of malware infections
I am trying to perform some capacity planning for some of our
residential pops, but the old calcs I used to use seem useless -- as
they were adapted from the dialup days and relied upon a percentage of
users online (~50%) and a percentage of concurrent transmission (~19%).
My present scenario
We have calculated our customers peak b/w usage between 20 and 60 kbps/user,
spread across a wide variety of users and wide range of speeds (128/128 up
to 15000/1000 kbps). You only need a few heavy users to skew things. But
400 at 4 Mbps would make me think that 20 to 30 Mbps would be
I had a very educational experience with an ISP that provides two
choices to their customers: a) pay as you go (per GB charge with a
token monthly fee for keeping the port active) and b) 150GB per month
unlimited package
Both packages were priced with the intent to have the same cost for
11 matches
Mail list logo