context.
https://en.m.wikipedia.org/wiki/AS_7007_incident
He can thank me later
Stefan Fouant
JNCIE-SEC, JNCIE-SP, JNCIE-ENT, JNCI
m (703) 625-6243
Hey!
New message, please read <http://epicuregifts.com/anybody.php?bjtmi>
Stefan Fouant
Hey!
New message, please read <http://shoppingsignal.com/honest.php?r40>
Stefan Fouant
Seriously... Those cert monkeys think they know everything ;)
Stefan Fouant
JNCIE-SEC, JNCIE-SP, JNCIE-ENT, JNCI
m (703) 625-6243
On Oct 11, 2013, at 3:28 AM, Randy Bush ra...@psg.com wrote:
Please relay to your CCIE/JNCIE friends, I am giving out
name@theccie.comand n...@jncie.com email
Can you give us more information? What do you mean it is causing Layer 3 loops?
Stefan Fouant
Sent from my HTC on the Now Network from Sprint!
- Reply message -
From: Shahab Vahabzadeh sh.vahabza...@gmail.com
Date: Sat, Jul 21, 2012 10:50 am
Subject: Attack on UDP 101
To: nanog
Was waiting for a response from Eric and without fail he comes through in
record time... :-b
Stefan Fouant
JNCIE-SEC, JNCIE-SP, JNCIE-ER, JNCI
Technical Trainer, Juniper Networks
Follow us on Twitter @JuniperEducate
Sent from my iPad
On Mar 12, 2012, at 4:14 PM, Eric Brunner-Williams brun
I could be wrong, but I think OP was requesting for BGP communities. I don't
think he was asking for their SNMP community strings - I've never heard of a
situation where a provider would allow their customers to poll their routers
via SNMP.
Or did I miss something?
Stefan Fouant
JNCIE-SEC
Not sure how up to date this is, but I believe this is what you are looking for:
http://www.onesc.net/communities/as15412/
Cheers,
Stefan Fouant
JNCIE-SEC, JNCIE-SP, JNCIE-ER, JNCI
Technical Trainer, Juniper Networks
Follow us on Twitter @JuniperEducate
Sent from my iPad
On Jan 12, 2012
such inefficiencies.
Stefan Fouant
JNCIE-SEC, JNCIE-SP, JNCIE-ER, JNCI
Technical Trainer, Juniper Networks
Follow us on Twitter @JuniperEducate
to the clients,
not tp the server.
Also, IIRC, the LOIC DoS tool had this ability to create random strings in the
URL, and I believe it did so with 5 characters. Might want to do a packet
trace and identify if this is coming from LOIC.
Regards,
Stefan Fouant
Technical Trainer, Juniper Networks
GPG Key
services).
Stefan Fouant
JNCIE-SEC, JNCIE-SP, JNCIE-ER, JNCI
Technical Trainer, Juniper Networks
Follow us on Twitter @JuniperEducate
On 10/24/2011 3:53 PM, Christopher Morrow wrote:
On Mon, Oct 24, 2011 at 3:29 PM, Stefan Fouant
but... often the cost of scrubbing includes the cost of transit
to/from the remote provider, which is why 'cheapest' only counts for
an entire process, NOT for 'lookie, I bought the service
...
Let me know if you're interested in the slides...
Stefan Fouant
JNCIE-SEC, JNCIE-SP, JNCIE-ER, JNCI
Technical Trainer, Juniper Networks
Follow us on Twitter @JuniperEducate
On 10/20/2011 4:43 PM, Hank Nussbacher wrote:
At 09:13 19/10/2011 -0400, samuel.cunning...@wellsfargo.com wrote:
We
be able to handle a
750Mbps / 1.5 Mpps DoS pretty easy...
HTHs.
Stefan Fouant
JNCIE-SEC, JNCIE-SP, JNCIE-ER, JNCI
Technical Trainer, Juniper Networks
Follow us on Twitter @JuniperEducate
Sent from my iPad
On Oct 22, 2011, at 9:38 PM, Jack Bates jba...@brightok.net wrote:
Considered j-nsp
Well considering that native multicast isn't enabled end to end Internet wide,
and class E address space isn't used, it's more like half your IPv4 Internet
goes one way, and ~38% goes the other way... :-b
Stefan Fouant
JNCIE-M, JNCIE-ER, JNCIE-SEC, JNCI
Technical Trainer, Juniper Networks
, we selected IS-IS largely due to the
fact that it supported MPLS Traffic Engineering extensions before
comparable support was available in OSPF, and the main reason for this
was due to the fact that IS-IS was TLV based.
Stefan Fouant
JNCIE-ER, JNCIE-M, JNCIE-SEC, JNCI
Technical Trainer
that IS-IS is decoupled from IP making it less vulnerable to attacks.
Stefan Fouant
JNCIE-M, JNCIE-ER, JNCIE-SEC, JNCI
Technical Trainer, Juniper Networks
http://www.shortestpathfirst.net
http://www.twitter.com/sfouant
Sent from my iPad
On Aug 11, 2011, at 8:57 AM, CJ cjinfant...@gmail.com wrote:
Hey
of an issue
over the last few years however...
Nonetheless, if I was building a greenfield network today, I would personally
go with IS-IS, but that is largely because of my many years working with the
protocol...
Stefan Fouant
JNCIE-M, JNCIE-ER, JNCIE-SEC, JNCI
Technical Trainer, Juniper
and IS-IS: Choosing an IGP for Large-Scale
Networks by Jeff Doyle. I can't speak highly enough of this book...
Stefan Fouant
JNCIE-ER, JNCIE-M, JNCIE-SEC, JNCI
Technical Trainer, Juniper Networks
http://www.shortestpathfirst.net
http://www.twitter.com/sfouant
Is there an acronym for RTFM when there are a volume of manuals that need to be
read?
Stefan Fouant
JNCIE-M, JNCIE-ER, JNCIE-SEC, JNCI
Technical Trainer, Juniper Networks
http://www.shortestpathfirst.net
http://www.twitter.com/sfouant
Sent from my iPad
On Aug 10, 2011, at 5:35 PM, Deric Kwok
Sorry, couldnt help it... that was my Asperger's kicking in...
Stefan Fouant
JNCIE-M, JNCIE-ER, JNCIE-SEC, JNCI
Technical Trainer, Juniper Networks
http://www.shortestpathfirst.net
http://www.twitter.com/sfouant
Sent from my iPad
On Aug 10, 2011, at 9:22 PM, Christopher Morrow morrowc.li
Everything from checksums, keys, and sequence numbers is optional. The only
required fields IIRC amount to 2 bytes of overhead. Sounds like they both
interpret what should be included in the GRE header slightly differently.
Stefan Fouant
GPG Key ID: 0xB4C956EC
Sent from my HTC EVO
be a sure sign this
is related to what others have seen...
Sorry for the top post, I'm on my iPad.
Stefan Fouant
JNCIE-M, JNCIE-ER, JNCIE-SEC, JNCI
Technical Trainer, Juniper Networks
http://www.shortestpathfirst.net
http://www.twitter.com/sfouant
Sent from my iPad
On Jul 29, 2011, at 2:51 PM
attack, but not desired under normal
circumstances.
Stefan Fouant
JNCIE-M #513, JNCIE-ER #70, JNCI
GPG Key ID: 0xB4C956EC
front-end IP that can restore service instantly [faster than getting
someone on the phone to coordinate the change, etc].
Heck, if it's good enough for fast-flux, it's good enough for me ;)
Stefan Fouant
JNCIE-M #513, JNCIE-ER #70, JNCI
GPG Key ID: 0xB4C956EC
the marketing folks to do just
that...
Agreed though, it is super-easy to use and competitively priced.
Stefan Fouant
JNCIE-M #513, JNCIE-ER #70, JNCI
GPG Key ID: 0xB4C956EC
with each provider, having to deal with typical response times, etc. In my
experience, reducing the number of cogs usually results in dramatically
lower mitigation times, which is certainly the end goal in dealing with
these types of attacks.
Stefan Fouant
JNCIE-M #513, JNCIE-ER #70, JNCI
GPG Key ID
/Products_Sub_Category_Home.html
Stefan Fouant
to be suspicious about here. Move along. These aren't the droids
you are looking for.
Stefan Fouant
such a device.
Stefan Fouant
and DIPs (used for NAT), and other user defined objects such
as address book entries, etc. that each VSYS can avail. This was one of the
primary drivers behind our decision to utilize the NS-5400 for Verizon's
NBFW (you remember that place right Chris, heh')
Stefan Fouant
it isolates after all I guess ;)
primary drivers behind our decision to utilize the NS-5400 for
Verizon's
NBFW (you remember that place right Chris, heh')
i do, occasionally via the twitching :)
Hehe...
Stefan Fouant
calculators show a return
after as little as just a few months.
Stefan Fouant
-Original Message-
From: Stefan Fouant [mailto:sfou...@shortestpathfirst.net]
Sent: Thursday, April 21, 2011 2:58 PM
To: 'harbor235'; 'NANOG list'
Subject: RE: riverbed steelhead
I've had generally good experiences w/ Riverbed's Steelhead as well as
Juniper's WX Series product
be able to answer most of your questions.
Stefan Fouant
or study of multiple providers, or are
you deriving these numbers likewise you're your own personal observations?
Thanks,
Stefan Fouant
who want QoS are actually
suffering from buffer bloat. :(
Concur 100%. In my experience, I've gotten much better performance w/
VoIP/Video Conferencing and other delay-intolerant applications when setting
buffer sizes to a temporal value rather than based on a _fixed_ number of
packets.
Stefan
Hi Bogdan,
If you are on Cisco, you can accomplish this using the attribute-map argument
to the as-set statement. On Juniper, this is fairly easy to accomplish with
routing policy (learning RegEx will make your life easier).
HTHs.
Stefan
(sorry for the top post, I'm on my mobile...)
-
time the person formerly known as Owen walked into the
room at ARIN meetings. :D
+1 | That, or The evangelist formerly known as Owen... :p
Stefan Fouant
this was snake oil 15 years ago, and it is
even
more snake oil now.
And I'm afraid we'll be seeing a whole heckuva lot more of this snake oil
once ICANN finalizes the Generic TLD process in June:
http://www.pcmag.com/article2/0,2817,2382233,00.asp
Stefan Fouant
to more regulation.
I can't seem to find anyone that would benefit from this, with the exception
of Stuart and ICM's shareholders.
Stefan Fouant
pre-registrations at $75 each, generating over $20M in
revenue...
Stefan Fouant
are amongst us as we've now given would-be
registrars the right to print money and companies are forced to purchase
useless domain names in order to protect their trademarks, prevent
squatting, etc. When will sanity prevail?
Stefan Fouant
opinion.
Makes a good change from a 5 octet IP number I remember them using in
one episode revolving around an adult webcam website.
I remember seeing that show. I think they had Jim Fleming on as a
consultant. ;
Stefan Fouant
incur the overhead of managing credentials with something
that can so easily circumvented.
Leave things wide open on a sandboxed subnet with the usual protections
(rate limits, blocked ports), IMO is the easiest approach...
Stefan Fouant
GUI.
They we have access lists to control what they can do while on the
wireless.
James,
Just out of curiosity, how does this solution prevent unauthorized users
from gaining access to the system by the aforementioned MAC spoofing
technique?
Stefan Fouant
back:
http://www.shortestpathfirst.net/2009/11/30/book-review-mpls-aplications/
This book is awesome. You won't regret buying it.
Stefan Fouant
-Original Message-
From: Michael Helmeste [mailto:mhelm...@uvic.ca]
Sent: Thursday, December 23, 2010 5:49 PM
To: nanog@nanog.org
Subject
-Original Message-
From: mikea [mailto:mi...@mikea.ath.cx]
Sent: Wednesday, December 15, 2010 8:28 AM
To: nanog@nanog.org
Subject: Re: Alleged backdoor in OpenBSD's IPSEC implementation.
Someone is confusing FBI with NSA, methinks. And yes, if this is
the kind of thing not
-Original Message-
From: Mike. [mailto:the.li...@mgm51.com]
Sent: Wednesday, December 15, 2010 3:29 PM
To: nanog@nanog.org
Subject: Re: Alleged backdoor in OpenBSD's IPSEC implementation.
On 12/15/2010 at 10:25 AM Bryan Irvine wrote:
|
|Anyone know the trustworthy-ness of
-Original Message-
From: Marshall Eubanks [mailto:t...@multicasttech.com]
Sent: Saturday, December 11, 2010 10:20 AM
To: North American Network Operators Group
Subject: LOIC tool used in the Anonymous attacks
Interesting analysis of the 3 LOIC tool variants used in the
Anonymous
The one thing I found interesting was the InfoSecIsland poll where the majority
of Security Practitioners polled actually supported the Jester's methods...
Stefan Fouant
Sorry for the top post. Sent from my iPad
On Nov 28, 2010, at 9:29 PM, andrew.wallace andrew.wall...@rocketmail.com
wrote
Webmetrics provides such a service (full disclosure I used to work for these
guys)...
http://www.webmetrics.com/
Stefan Fouant
Sent from my iPad
On Nov 26, 2010, at 12:14 PM, Michael Ruiz mr...@lstfinancial.com wrote:
Hey folks,
I had a situation recently that our
Go to the following URL -http://mailman.nanog.org/mailman/listinfo/nanog
At the bottom of the page you should see a section for subscription management.
You should be able to change your settings there.
Sorry for the top post. Sent from my iPad
Stefan Fouant
On Nov 11, 2010, at 9:07 AM
with AS Path prepending on the secondary link is the best approach, and
seems to accommodate both steady state as well as failure scenarios
properly.
Stefan Fouant
buffer overflow issues, but at the time there
were no such protections. The very next day we received a patched IOS from
Cisco which contained the maxas-limit commands.
Stefan Fouant
, and the AS Path prepending is used to influence the
secondary providers.
Stefan Fouant
My apologies for the top post. Sent from my iPad
On Nov 10, 2010, at 4:12 PM, Joe Maimon jmai...@ttec.com wrote:
Stefan Fouant wrote:
-Original Message-
IMO, a combination of both community tagging
For you Juniper and Arbor wonks out there, you can find some decent podcasts
on iTunes... I can't remember the name of the Juniper Podcast but you
should be able to find it on iTunes without much effort... I believe the
Arbor one is called Security to the Core.
Stefan Fouant
-Original
of topics like High Availability,
Multicast VPNs, and VPLS to name a few with the likes of Pedro Marques,
Lenny Giuliano, and some other Juniper notables. See the URL below for the
iTunes links...
http://itunes.apple.com/us/podcast/j-net-perspectives/id279754930
Stefan Fouant
will
eventually emulate.
Cheers,
Stefan Fouant, CISSP, JNCIEx2
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
Fortaine? :)
At least Jim is being nice and sourcing from the same email consistently.
Should be easy to filter his address from the list.
But just to be safe, should probably filter anything with a reference to
ipv3, ipv5, ipv7, ipv8, and any other cockamamie address schemes... ;)
Stefan Fouant
-205
Naperville, IL 60563
United States
Stefan Fouant, CISSP, JNCIEx2
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
Sounds like this guy could benefit from some carpeting and a few Roombas in his
Data Center ;)
Stefan Fouant
--Original Message--
From: Randy Bush
To: IPv3.com
Cc: nanog@nanog.org
Subject: Re: Tidbits the NANOG Community
Sent: Apr 4, 2010 6:23 AM
plonk
Sent from my Verizon Wireless
based GUI, which will cause the
end-user considerable frustration when you have to continually reopen the
application due to hangs, etc.
This is just a small sample of the issues I've encountered. All I'm saying
is don't say I didn't warn you. This is *NOT* the box for DDoS testing.
Stefan Fouant
a previous attack, you could also use
something like Bit-Twist which will allow you to manipulate things like the
destination IP and also the transmission rate, etc. Pretty useful tool to
include in the DDoS simulation toolbox.
http://bittwist.sourceforge.net/
Stefan Fouant, CISSP, JNCIE-M/T
but the support for IPsec is
absolutely there.
HTHs.
Stefan Fouant
--Original Message--
From: Voll, Toivo
To: Chris Campbell
To: Dawood Iqbal
Cc: nanog@nanog.org
Subject: RE: Best VPN Appliance
Sent: Mar 8, 2010 11:56 AM
We're generally happy with our Juniper SA6500s, but they, and a lot
is a little too nefarious for my taste.
Level 3's 4.2.2.1 and 4.2.2.2 are excellent options for tracking.
Stefan Fouant, CISSP, JNCIE-M/T
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
Can you give us a little more details around how you're trying to convert the
BGP routes received into an ACL?
While we're on the topic, I'd really love for the Team Cymru folks to turn
their bogon list into a Flowspec feed hint hint ;)
Sorry for the top post, I'm on my BB.
Stefan Fouant
://vijaygill.wordpress.com/2009/07/22/infrastructure-is-software/
That stuff is light years ahead of anything anybody is doing today (well, apart
from maybe Vijay himself ;) ... but IMO it's where we need to start heading.
Stefan Fouant, CISSP, JNCIE-M/T
www.shortestpathfirst.net
GPG Key ID
? or ?
sessions setup/second = ddos mitigation fail ;)
Stefan Fouant, CISSP, JNCIE-M/T
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
range of Managed Objects and Mitigation Templates which can be applied to
individual prefixes, etc.
Sorry for the top post, I'm on my Blackberry.
Stefan Fouant
--Original Message--
From: Korten, Sean
To: nanog@nanog.org
To: tsa...@rackspace.com
Subject: RE: DDoS mitigation recommendations
!
Stefan Fouant, CISSP, JNCIE-M/T
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
and
look at the other alternatives.
Stefan Fouant, CISSP, JNCIE-M/T
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
out their /ANGLE/. :) /cynic
http://googleblog.blogspot.com/2010/01/new-approach-to-china.html
Well played, google?
Interesting radio piece re:Google in China this evening on NPR's radio
program All Things Considered.
http://www.npr.org/templates/story/story.php?storyId=122540813
Stefan
through with it...
Stefan Fouant, CISSP, JNCIE-M/T
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
-Original Message-
From: Ken Chase [mailto:m...@sizone.org]
Sent: Wednesday, January 13, 2010 12:24 AM
To: nanog@nanog.org
Subject: more news from Google
I must say I'll have to take
of show ip route and you could replay that using the tool.
Man I wish I saved that tool somewhere, it was incredibly valuable.
You might be able find someone out there that still has this tool. And please
get me an extra copy if you do manage to find it ;)
Stefan Fouant, CISSP, JNCIE-M/T
marketplace last summer (before Verisign came out with their VIDN).
I've got some slides which outline the costs, mitigation capacity, etc. of
many different providers. The provider option isn't always the cheapest
when compared to DIY factored in over a 3-5 year lifespan.
Stefan Fouant, CISSP, JNCIE-M/T
handled more.
Do they? VerizonBusiness's solution was $3250US/month so ~$90USk over
2yrs. Arbor, I think, for a TMS + collectors was +100k.
Don't forget to factor in OpEx. This can often tilt the scales in favor of
one vs. the other.
Stefan Fouant, CISSP, JNCIE-M/T
www.shortestpathfirst.net
GPG
on behalf of the customer,
but IMO this approach is asking for trouble.
Stefan Fouant, CISSP, JNCIE-M/T
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
Precisely - I was saying that in order to add more point to your argument.
I wasn't disagreeing with you :)
Stefan Fouant, CISSP, JNCIE-M/T
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
-Original Message-
From: christopher.mor...@gmail.com
[mailto:christopher.mor...@gmail.com
Ummm... there is some proprietary information I would have to remove first.
Will NANOG accept a message to the forum with an attachment? If not I can
put it up on my site.
Stefan Fouant, CISSP, JNCIE-M/T
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
-Original Message-
From: jul
have their place in DDoS mitigation scenarios, but if used as
the ultimate solution you're asking for trouble.
Stefan Fouant, CISSP, JNCIE-M/T
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
-Original Message-
From: Dobbins, Roland [mailto:rdobb...@arbor.net]
Sent: Saturday, January 09, 2010 10:03 AM
On Jan 9, 2010, at 9:57 PM, Stefan Fouant wrote:
Firewalls do have their place in DDoS mitigation scenarios, but if
used as
the ultimate solution you're asking
if Stefan Fouant would offer some of
his experience with 'not arbor' vendor solutions to be used when other
techniques come up short?
Interesting thread! And I'm happy to chime in - thanks Chris! I too would
have to strongly agree with Roland's comments about not front-ending your
mitigation
better when you can forward just the subset of
the traffic through as opposed to all. It just a simple matter of using
static routing / RTBH techniques / etc. to automate the offramp.
Stefan Fouant, CISSP, JNCIE-M/T
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
the mitigation.
Stefan Fouant, CISSP, JNCIE-M/T
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
-Original Message-
From: Hank Nussbacher [mailto:h...@efes.iucc.ac.il]
Sent: Tuesday, January 05, 2010 1:02 AM
On Tue, 5 Jan 2010, Stefan Fouant wrote:
Almost all of the scalable DDoS mitigation architectures deployed in
carriers or other large enterprises employ the use
.
I think OP meant that he only wants an integrity check of the control
traffic, not confidentiality, hence the statement that he does not want to
encrypt the control traffic.
Stefan Fouant
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
There have been several DNS based DDoS observed throughout the day targetting
Ultra as well as a few other companies. They were first observed earlier in
the morning on the East coast.
--Original Message--
From: Richard A Steenbergen
To: Shrdlu
Cc: Nanog
Subject: Re: UltraDNS Failure?
as the old norm... I'm surprised they didn't
try to upsell you on some type of managed DDoS solution...
Stefan Fouant
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
,
Stefan Fouant
www.shortestpathfirst.com
--Original Message--
From: jul
To: Joseph Jackson
To: nanog@nanog.org
Subject: Re: DNS query analyzer
Sent: Dec 2, 2009 12:47 AM
Joseph Jackson wrote on 01/12/09 01:06:
Anyone know of a tool that can take a pcap file from wireshark that was used
it on the NLnet Labs site -
http://www.nlnetlabs.nl/projects/dns-analyzer/
HTHs.
Stefan Fouant
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
be a problem, but that doesn't seem
to be happening anytime soon...
I'd try to identify which providers the customer is connected to and take it
from there...
Stefan Fouant
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D
-Original Message-
From: Florian Weimer [mailto:fwei...@bfk.de]
Sent: Friday, November 06, 2009 4:52 AM
To: Stefan Fouant
Cc: 'Jeffrey Lyon'; 'NANOG list'
Subject: Re: Pros and Cons of Cloud Computing in dealing with DDoS
Some companies have already suffered from this because
subject and I can understand why
some of you might not want to respond on-list (security through obscurity
eh' ;). To those of you who have taken the time to respond to me off-list,
I appreciate your feedback and promise to keep your identities confidential.
Regards,
Stefan Fouant
GPG Key ID
? More like guns for hire. I've rarely seen a test report they
came out with that wasn't commissioned by a particular vendor with the
testing done in such a way as to slant the results in their favor.
Stefan Fouant
GPG Key ID: 0xB5E3803D
-Original Message-
From: jeffrey.l...@gmail.com [mailto:jeffrey.l...@gmail.com] On Behalf
Of Jeffrey Lyon
Sent: Thursday, November 05, 2009 1:20 PM
To: Stefan Fouant
Cc: NANOG list
Subject: Re: Pros and Cons of Cloud Computing in dealing with DDoS
DDoS is a threat to the cloud
-Original Message-
From: Paul Ferguson [mailto:fergdawgs...@gmail.com]
Sent: Thursday, November 05, 2009 8:26 PM
On Thu, Nov 5, 2009 at 4:46 PM, Stefan Fouant
sfou...@shortestpathfirst.com wrote:
Actually, no - the miscreants are always going to have more
bandwidth
, what are
your experiences in replication of storage over WAN links? Are people tending
towards iSCSI or do trends indicate that FCoE or FCoIP may become the preferred
mechanism? Any experience with WAN acceleration in such environments?
Thanks in advance!
--
Stefan Fouant
and other weirdness. Besides connecting sites via
L3 VPNs, what other approaches are others using? Also, would appreciate any
comments to the synchronization items above.
Thanks,
--
Stefan Fouant
numbers?
I've seen single areas with as many as ~600 routers and as many as 6-7k LSAs
in the LSDB that functioned without any problems.
--
Stefan Fouant
100 matches
Mail list logo