Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Glen Waldrop via Af
Don't mistake soft words for a lack of conviction or naively believing the 
system works.

We run this country. We have to remind everyone of that. Those morons in office 
work for us, not the other way around. Right now they work for themselves with 
little to no oversight.

Anyway, I've spoken my piece. Not getting any further into the political rabbit 
hole.

Night everyone.




  - Original Message - 
  From: That One Guy via Af 
  To: af@afmug.com 
  Sent: Tuesday, September 30, 2014 12:30 AM
  Subject: Re: [AFMUG] Arson attack on FAA datacenter


  you honestly think that? not a chance in hell pal. The only way that would 
happen is before somebody closes the pen and phone window a single person 
writes it into law. One man with a sheep might pull out if you put him in the 
spotlight, but if you have a barn full of men each with a sheep, you might 
convince a few to pull out, but never a majority, and we arent even talking 
sheep at this point, we are talking fresh toothless calves.


  On Tue, Sep 30, 2014 at 12:08 AM, Glen Waldrop via Af  wrote:

If we push it'll happen.

Won't be easy.

We'll have to convince them to vote on killing their golden goose.


  - Original Message - 
  From: George Skorup (Cyber Broadcasting) via Af 
  To: af@afmug.com 
  Sent: Monday, September 29, 2014 9:26 PM
  Subject: Re: [AFMUG] Arson attack on FAA datacenter


  I'm pretty skeptical of partisans and career politicians. Term limits.. 
but it will never happen. Do a couple terms and then go home and work like 
everyone else. No, instead they sit there for decades milking connections to 
get rich and exempt themselves from the laws they force upon us, then collect a 
pension after some scandal and/or their party disowns them and they finally 
fade away.

  On 9/29/2014 7:27 PM, Jason McKemie via Af wrote:

To what are you referring? I'm pretty skeptical of mainstream media FYI.

On Monday, September 29, 2014, Mike Hammett via Af  wrote:

  Do you live under a bridge?




  -
  Mike Hammett
  Intelligent Computing Solutions
  http://www.ics-il.com



--

  From: "Jason McKemie via Af" 
  To: af@afmug.com
  Sent: Monday, September 29, 2014 7:23:11 PM
  Subject: Re: [AFMUG] Arson attack on FAA datacenter

  Little bit of haterism going on here, he's one of the better ones 
IMO. Does he not hang out upstate enough for you guys?

  On Monday, September 29, 2014, Mike Hammett via Af  
wrote:

+1




-
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com





From: "George Skorup (Cyber Broadcasting) via Af" 
To: af@afmug.com
Sent: Monday, September 29, 2014 5:07:43 PM
Subject: Re: [AFMUG] Arson attack on FAA datacenter


Damn, why couldn't it be Durbin that slit his own throat.

On 9/29/2014 5:04 PM, That One Guy via Af wrote:

  im going with isis on this


  On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af  
wrote:

This is only a couple miles from our office.  They had all the 
local news choppers up in the air over it on Friday.  I was surprised that it 
didn't garner more national coverage.  I guess since it wasn't the terror 
threat of the day, it didn't get any traction.  Just a disgruntled employee.  
Even the first reports said it was not a terrorist act.  



On 9/29/2014 4:36 PM, Forrest Christian (List Account) via Af 
wrote:

  Oh yeah,


  I'm in Chicago for a few days.  Flew in on thursday before 
this happened.   My wife flew in on Saturday and ended up with a nasty delay in 
MSP since there were very very few flights flying into the affected area, which 
basically includes both chicago airports, and the two airports up in wisconsin. 
 Thousands of flights cancelled over the last couple of days.


  That's the big news here.

  -forrest



  On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af 
 wrote:

Anyone see this?


http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE


http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP



On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When 
operators, controllers and airport managers saw the title, a gasp of disbelief 
was heard. The problem was simple enough to state in three words, and complex 
enough to cancel thousand of flights and cost hundred of millions of dollars: 
ZAU ATC ZERO.

ZAU is the call si

Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread That One Guy via Af
you honestly think that? not a chance in hell pal. The only way that would
happen is before somebody closes the pen and phone window a single person
writes it into law. One man with a sheep might pull out if you put him in
the spotlight, but if you have a barn full of men each with a sheep, you
might convince a few to pull out, but never a majority, and we arent even
talking sheep at this point, we are talking fresh toothless calves.

On Tue, Sep 30, 2014 at 12:08 AM, Glen Waldrop via Af  wrote:

>  If we push it'll happen.
>
> Won't be easy.
>
> We'll have to convince them to vote on killing their golden goose.
>
>
>
> - Original Message -
> *From:* George Skorup (Cyber Broadcasting) via Af 
> *To:* af@afmug.com
> *Sent:* Monday, September 29, 2014 9:26 PM
> *Subject:* Re: [AFMUG] Arson attack on FAA datacenter
>
> I'm pretty skeptical of partisans and career politicians. Term limits..
> but it will never happen. Do a couple terms and then go home and work like
> everyone else. No, instead they sit there for decades milking connections
> to get rich and exempt themselves from the laws they force upon us, then
> collect a pension after some scandal and/or their party disowns them and
> they finally fade away.
>
> On 9/29/2014 7:27 PM, Jason McKemie via Af wrote:
>
> To what are you referring? I'm pretty skeptical of mainstream media FYI.
>
> On Monday, September 29, 2014, Mike Hammett via Af  wrote:
>
>>  Do you live under a bridge?
>>
>>
>>
>> -
>> Mike Hammett
>> Intelligent Computing Solutions
>> http://www.ics-il.com
>>
>> --
>> *From: *"Jason McKemie via Af" 
>> *To: *af@afmug.com
>> *Sent: *Monday, September 29, 2014 7:23:11 PM
>> *Subject: *Re: [AFMUG] Arson attack on FAA datacenter
>>
>> Little bit of haterism going on here, he's one of the better ones IMO.
>> Does he not hang out upstate enough for you guys?
>>
>> On Monday, September 29, 2014, Mike Hammett via Af  wrote:
>>
>>>  +1
>>>
>>>
>>>
>>> -
>>> Mike Hammett
>>> Intelligent Computing Solutions
>>> http://www.ics-il.com
>>>
>>> --
>>> *From: *"George Skorup (Cyber Broadcasting) via Af" 
>>> *To: *af@afmug.com
>>> *Sent: *Monday, September 29, 2014 5:07:43 PM
>>> *Subject: *Re: [AFMUG] Arson attack on FAA datacenter
>>>
>>> Damn, why couldn't it be Durbin that slit his own throat.
>>>
>>> On 9/29/2014 5:04 PM, That One Guy via Af wrote:
>>>
>>> im going with isis on this
>>>
>>> On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af  wrote:
>>>
 This is only a couple miles from our office.  They had all the local
 news choppers up in the air over it on Friday.  I was surprised that it
 didn't garner more national coverage.  I guess since it wasn't the terror
 threat of the day, it didn't get any traction.  Just a disgruntled
 employee.  Even the first reports said it was not a terrorist act.


 On 9/29/2014 4:36 PM, Forrest Christian (List Account) via Af wrote:

  Oh yeah,

 I'm in Chicago for a few days.  Flew in on thursday before this
 happened.   My wife flew in on Saturday and ended up with a nasty delay in
 MSP since there were very very few flights flying into the affected area,
 which basically includes both chicago airports, and the two airports up in
 wisconsin.  Thousands of flights cancelled over the last couple of days.

 That's the big news here.

 -forrest

 On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af 
 wrote:

> Anyone see this?
>
>
> http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE
>
>
> http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP
>
>
>
> On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When operators,
> controllers and airport managers saw the title, a gasp of disbelief was
> heard. The problem was simple enough to state in three words, and complex
> enough to cancel thousand of flights and cost hundred of millions of
> dollars: ZAU ATC ZERO
> 
> .
>
> ZAU
> 
> is the call sign of the Chicago Air Rout Traffic Control Center (ARTCC),
> which covers 
> northern Illinois and Indiana, southern Wisconsin, western Iowa, and south
> eastern Michigan. There are two "sides" at an ARTCC. ZAU-LO handed traffic
> destined for airports in the covered area, ZAU-HI handled traffic
> overflying. Both were amongst the busiest in the country. ZAU-HI was busy
> with traffic from the east to west, as well as European traffic heading to
> Houston and Dallas-FW, ZAU-LO had to feed in traffic from airports like
> GYY 

Re: [AFMUG] SiteMonitor: Loss of sync

2014-09-29 Thread Forrest Christian (List Account) via Af
Yes that value will increment when the injector detects a loss of sync and
also when it's restored.

These are definitely good values to monitor, and I know at least one
customer which does as you suggest and monitors for a non zero value and
resets the value to zero to clear the error.
On Sep 29, 2014 7:23 PM, "Bill Prince via Af"  wrote:

>  Yeah.  Not sure why I thought the index name was where I would get the
> value.  The OID that shows in the UI for the Satellites Visible is:
>
> .1.3.6.1.4.1.32050.2.1.28.2.1
>
> The OID for the actual value is
>
> .1.3.6.1.4.1.32050.2.1.28.5.1
>
>
> So I was able to fix that part.  What I'm wondering is how to know that
> We've had a loss in sync.  There is something under Binary I/O called "1PPS
> Active".
>
> Seeing as we only poll once every 5 minutes, catching that going to zero
> seems slim to none.  However, I am intrigued by the "Events" value.  Does
> that increment every time the Syncpipe loses sync?  In which case, I can
> zero it out, and set a threshold for whenever it is non-zero (see below).
>
>
> I may try that.
>
>
> bp
>
> On 9/29/2014 1:28 PM, Forrest Christian (List Account) via Af wrote:
>
>  A little out of order:
>
>  On the OID's .. you may have the wrong OID.  There is an oid for the
> title strings, and an oid for the value.  You may want to check the oid you
> are using.   In addition, on the strings tab, there *are* strings which
> list the specific statellite and signal strength of all of the sats it is
> receiving a signal from.
>
>  One more troubleshooting item is the 'pulse received' counter on the
> analog tab.  It should increment once and exactly once per second.  I've
> had good luck comparing this value over a specific time.  I.E. at exactly
> 10 minutes, there should be exactly 600 more pulses.
>
>  As far as fixing it:  I'd move the syncpipe, then try a different one.
> If a second does the same thing, then we need to look at what else might be
> causing it.
>
>  If you want to send in screenshots to cust...@packetflux.com of the
> boolean/analog/string tabs from the sitemonitor, I might be able to see
> something.
>
> -forrest
>
>
> On Sep 29, 2014 1:40 PM, "Bill Prince via Af"  wrote:
>
>>
>> One of our many locations where we're using a Packetflux sync
>> pipe/injector seems to be losing satellite lock once every few days.
>> Typically it loses it for 2 to 4 seconds, but I've seen at least once where
>> it went 13 seconds.
>>
>> I've not been able to get useful information from the SiteMonitor because
>> the satellites tracked/Visible OIDs are returning a string with "Sats in
>> View" and "Num Sats Used" instead of the actual values. (is that a bug or
>> what? This is on F/W "Jul 29 2012").
>>
>> However, I'm getting messages like this in the AP logs:
>>
>> 09/21/2014 : 07:49:00 PDT : : Bridge Core : Loss of sync pulse from Power
>> Port! No other sync source available.
>> 09/21/2014 : 07:49:04 PDT : : Bridge Core : Acquired sync pulse from
>> Power Port.
>> 09/23/2014 : 18:49:37 PDT : : Bridge Core : Loss of sync pulse from Power
>> Port! No other sync source available.
>> 09/23/2014 : 18:49:41 PDT : : Bridge Core : Acquired sync pulse from
>> Power Port.
>> 09/23/2014 : 18:49:55 PDT : : Bridge Core : Loss of sync pulse from Power
>> Port! No other sync source available.
>> 09/23/2014 : 18:49:59 PDT : : Bridge Core : Acquired sync pulse from
>> Power Port.
>> 09/24/2014 : 18:47:15 PDT : : Bridge Core : Loss of sync pulse from Power
>> Port! No other sync source available.
>> 09/24/2014 : 18:47:28 PDT : : Bridge Core : Acquired sync pulse from
>> Power Port.
>> 09/27/2014 : 07:24:18 PDT : : Bridge Core : Loss of sync pulse from Power
>> Port! No other sync source available.
>> 09/27/2014 : 07:24:20 PDT : : Bridge Core : Acquired sync pulse from
>> Power Port.
>>
>> Not sure what I might do here.  This is with all the equipment up against
>> a concrete wall, so there is only a 180 degree view of the sky.  Maybe a
>> little bit less than that because the wall is not flat, maybe about 170
>> degree view of the sky.
>>
>> The APs are PMP450, and rarely get a GPS lock on the internal GPS.  Maybe
>> I can try moving the sync pipe away from the wall or something.
>>
>>
>> --
>> bp
>>
>>
>


Re: [AFMUG] Ptp600/650 poe schematic

2014-09-29 Thread TJ Trout via Af
go to another site and probe it with a patch cable cut and a volt meter

On Sun, Sep 28, 2014 at 6:42 AM, Gino Villarini via Af  wrote:

> I remember it was on the manual, can't find it
>
> Need to ditch the pidu
>
> Sent from Marconi's and Graham Bell's fused thoughts!!!
>
>


Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Glen Waldrop via Af
If we push it'll happen.

Won't be easy.

We'll have to convince them to vote on killing their golden goose.


  - Original Message - 
  From: George Skorup (Cyber Broadcasting) via Af 
  To: af@afmug.com 
  Sent: Monday, September 29, 2014 9:26 PM
  Subject: Re: [AFMUG] Arson attack on FAA datacenter


  I'm pretty skeptical of partisans and career politicians. Term limits.. but 
it will never happen. Do a couple terms and then go home and work like everyone 
else. No, instead they sit there for decades milking connections to get rich 
and exempt themselves from the laws they force upon us, then collect a pension 
after some scandal and/or their party disowns them and they finally fade away.

  On 9/29/2014 7:27 PM, Jason McKemie via Af wrote:

To what are you referring? I'm pretty skeptical of mainstream media FYI.

On Monday, September 29, 2014, Mike Hammett via Af  wrote:

  Do you live under a bridge?




  -
  Mike Hammett
  Intelligent Computing Solutions
  http://www.ics-il.com



--

  From: "Jason McKemie via Af" 
  To: af@afmug.com
  Sent: Monday, September 29, 2014 7:23:11 PM
  Subject: Re: [AFMUG] Arson attack on FAA datacenter

  Little bit of haterism going on here, he's one of the better ones IMO. 
Does he not hang out upstate enough for you guys?

  On Monday, September 29, 2014, Mike Hammett via Af  wrote:

+1




-
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com





From: "George Skorup (Cyber Broadcasting) via Af" 
To: af@afmug.com
Sent: Monday, September 29, 2014 5:07:43 PM
Subject: Re: [AFMUG] Arson attack on FAA datacenter


Damn, why couldn't it be Durbin that slit his own throat.

On 9/29/2014 5:04 PM, That One Guy via Af wrote:

  im going with isis on this


  On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af  
wrote:

This is only a couple miles from our office.  They had all the 
local news choppers up in the air over it on Friday.  I was surprised that it 
didn't garner more national coverage.  I guess since it wasn't the terror 
threat of the day, it didn't get any traction.  Just a disgruntled employee.  
Even the first reports said it was not a terrorist act.  



On 9/29/2014 4:36 PM, Forrest Christian (List Account) via Af wrote:

  Oh yeah,


  I'm in Chicago for a few days.  Flew in on thursday before this 
happened.   My wife flew in on Saturday and ended up with a nasty delay in MSP 
since there were very very few flights flying into the affected area, which 
basically includes both chicago airports, and the two airports up in wisconsin. 
 Thousands of flights cancelled over the last couple of days.


  That's the big news here.

  -forrest



  On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af 
 wrote:

Anyone see this?


http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE


http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP



On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When 
operators, controllers and airport managers saw the title, a gasp of disbelief 
was heard. The problem was simple enough to state in three words, and complex 
enough to cancel thousand of flights and cost hundred of millions of dollars: 
ZAU ATC ZERO.

ZAU is the call sign of the Chicago Air Rout Traffic Control 
Center (ARTCC), which covers northern Illinois and Indiana, southern Wisconsin, 
western Iowa, and south eastern Michigan. There are two "sides" at an ARTCC. 
ZAU-LO handed traffic destined for airports in the covered area, ZAU-HI handled 
traffic overflying. Both were amongst the busiest in the country. ZAU-HI was 
busy with traffic from the east to west, as well as European traffic heading to 
Houston and Dallas-FW, ZAU-LO had to feed in traffic from airports like GYY, 
MKE, RFD, PIA, and the two busiest airports in the area; Chicago Midway 
International and O'Hare International, one of the busiest airports in the 
world.

On Friday morning, Brian Howard, a contract employee of the FAA 
and holding full credentials to the ZAU datacenters, set a fire in the telecom 
room, destroying 23 of the 29 rack and disconnecting all the controller 
stations from the associated radars and radio transmitters needed to watch and 
guide traffic through the busy sector. As the consoles dropped offline, the ZAU 
duty manager had no choice -- they called ZZZ, the FAA command center and 
reported ATC ZERO -- no controllers available, control center offline. 










  -- 

  All parts s

Re: [AFMUG] DiffServ and the internet

2014-09-29 Thread George Skorup (Cyber Broadcasting) via Af
I tried all kinds of stuff tonight, none were any good. I wonder if 
there's a way on MT to snoop SIP messages and look for the SIP contact 
IPs and mark those. Seems tricky. And I R no smrt enuf.


On 9/29/2014 9:37 PM, Chris Fabien via Af wrote:

Packet size and rate is pretty consistent right? Just a thought...

On Mon, Sep 29, 2014 at 8:05 PM, George Skorup (Cyber Broadcasting) 
via Af mailto:af@afmug.com>> wrote:


Speaking of DSCP and carriers zeroing it in the middle, I have
some VoIP Innovations trunks. I know where the SIP messages are
coming from, so I can mangle a DSCP value back onto those packets
at ingress. But the RTP traffic comes from all over the freakin
place, tons of different source address, never the same. I've
asked if they could provide a list and pretty much got a no.

Anybody have any ideas? Any way for a MT to identify an RTP stream
and then dynamically add a mangle rule to change the DSCP value?
My MT script-fu is not strong.






Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread That One Guy via Af
It would be much better if instead of payroll, all employers just kicked
all revenue into the kitty and the government could hand it out based on
each persons need

On Mon, Sep 29, 2014 at 9:39 PM, Tyler Treat via Af  wrote:

>  .this.
>
> ___
> Mangled by my iPhone.
> ___
>
>  Tyler Treat
> Corn Belt Technologies, Inc.
>
>  tyler.tr...@cornbelttech.com
> ___
>
>
> On Sep 29, 2014, at 9:27 PM, George Skorup (Cyber Broadcasting) via Af <
> af@afmug.com> wrote:
>
>   I'm pretty skeptical of partisans and career politicians. Term limits..
> but it will never happen. Do a couple terms and then go home and work like
> everyone else. No, instead they sit there for decades milking connections
> to get rich and exempt themselves from the laws they force upon us, then
> collect a pension after some scandal and/or their party disowns them and
> they finally fade away.
>
> On 9/29/2014 7:27 PM, Jason McKemie via Af wrote:
>
> To what are you referring? I'm pretty skeptical of mainstream media FYI.
>
> On Monday, September 29, 2014, Mike Hammett via Af  wrote:
>
>>  Do you live under a bridge?
>>
>>
>>
>> -
>> Mike Hammett
>> Intelligent Computing Solutions
>> http://www.ics-il.com
>>
>> --
>>  *From: *"Jason McKemie via Af" 
>> *To: *af@afmug.com
>> *Sent: *Monday, September 29, 2014 7:23:11 PM
>> *Subject: *Re: [AFMUG] Arson attack on FAA datacenter
>>
>> Little bit of haterism going on here, he's one of the better ones IMO.
>> Does he not hang out upstate enough for you guys?
>>
>> On Monday, September 29, 2014, Mike Hammett via Af  wrote:
>>
>>>  +1
>>>
>>>
>>>
>>> -
>>> Mike Hammett
>>> Intelligent Computing Solutions
>>> http://www.ics-il.com
>>>
>>> --
>>>  *From: *"George Skorup (Cyber Broadcasting) via Af" 
>>> *To: *af@afmug.com
>>> *Sent: *Monday, September 29, 2014 5:07:43 PM
>>> *Subject: *Re: [AFMUG] Arson attack on FAA datacenter
>>>
>>> Damn, why couldn't it be Durbin that slit his own throat.
>>>
>>> On 9/29/2014 5:04 PM, That One Guy via Af wrote:
>>>
>>> im going with isis on this
>>>
>>> On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af  wrote:
>>>
 This is only a couple miles from our office.  They had all the local
 news choppers up in the air over it on Friday.  I was surprised that it
 didn't garner more national coverage.  I guess since it wasn't the terror
 threat of the day, it didn't get any traction.  Just a disgruntled
 employee.  Even the first reports said it was not a terrorist act.


 On 9/29/2014 4:36 PM, Forrest Christian (List Account) via Af wrote:

  Oh yeah,

  I'm in Chicago for a few days.  Flew in on thursday before this
 happened.   My wife flew in on Saturday and ended up with a nasty delay in
 MSP since there were very very few flights flying into the affected area,
 which basically includes both chicago airports, and the two airports up in
 wisconsin.  Thousands of flights cancelled over the last couple of days.

  That's the big news here.

 -forrest

 On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af 
 wrote:

> Anyone see this?
>
>
> http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE
>
>
> http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP
>
>
>
> On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When operators,
> controllers and airport managers saw the title, a gasp of disbelief was
> heard. The problem was simple enough to state in three words, and complex
> enough to cancel thousand of flights and cost hundred of millions of
> dollars: ZAU ATC ZERO
> 
> .
>
> ZAU
> 
> is the call sign of the Chicago Air Rout Traffic Control Center (ARTCC),
> which covers 
> northern Illinois and Indiana, southern Wisconsin, western Iowa, and south
> eastern Michigan. There are two "sides" at an ARTCC. ZAU-LO handed traffic
> destined for airports in the covered area, ZAU-HI handled traffic
> overflying. Both were amongst the busiest in the country. ZAU-HI was busy
> with traffic from the east to west, as well as European traffic heading to
> Houston and Dallas-FW, ZAU-LO had to feed in traffic from airports like
> GYY ,
> MKE
> ,
> RFD
> ,
> PIA
> 

Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Tyler Treat via Af
.this.

___
Mangled by my iPhone.
___

Tyler Treat
Corn Belt Technologies, Inc.

tyler.tr...@cornbelttech.com
___


On Sep 29, 2014, at 9:27 PM, George Skorup (Cyber Broadcasting) via Af 
mailto:af@afmug.com>> wrote:

I'm pretty skeptical of partisans and career politicians. Term limits.. but it 
will never happen. Do a couple terms and then go home and work like everyone 
else. No, instead they sit there for decades milking connections to get rich 
and exempt themselves from the laws they force upon us, then collect a pension 
after some scandal and/or their party disowns them and they finally fade away.

On 9/29/2014 7:27 PM, Jason McKemie via Af wrote:
To what are you referring? I'm pretty skeptical of mainstream media FYI.

On Monday, September 29, 2014, Mike Hammett via Af 
mailto:af@afmug.com>> wrote:
Do you live under a bridge?



-
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com


From: "Jason McKemie via Af" 
>
To: af@afmug.com
Sent: Monday, September 29, 2014 7:23:11 PM
Subject: Re: [AFMUG] Arson attack on FAA datacenter

Little bit of haterism going on here, he's one of the better ones IMO. Does he 
not hang out upstate enough for you guys?

On Monday, September 29, 2014, Mike Hammett via Af 
> wrote:
+1



-
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com


From: "George Skorup (Cyber Broadcasting) via Af" 
To: af@afmug.com
Sent: Monday, September 29, 2014 5:07:43 PM
Subject: Re: [AFMUG] Arson attack on FAA datacenter

Damn, why couldn't it be Durbin that slit his own throat.

On 9/29/2014 5:04 PM, That One Guy via Af wrote:
im going with isis on this

On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af  wrote:
This is only a couple miles from our office.  They had all the local news 
choppers up in the air over it on Friday.  I was surprised that it didn't 
garner more national coverage.  I guess since it wasn't the terror threat of 
the day, it didn't get any traction.  Just a disgruntled employee.  Even the 
first reports said it was not a terrorist act.


On 9/29/2014 4:36 PM, Forrest Christian (List Account) via Af wrote:
Oh yeah,

I'm in Chicago for a few days.  Flew in on thursday before this happened.   My 
wife flew in on Saturday and ended up with a nasty delay in MSP since there 
were very very few flights flying into the affected area, which basically 
includes both chicago airports, and the two airports up in wisconsin.  
Thousands of flights cancelled over the last couple of days.

That's the big news here.

-forrest

On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af  wrote:
Anyone see this?

http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE

http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP



On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When operators, 
controllers and airport managers saw the title, a gasp of disbelief was heard. 
The problem was simple enough to state in three words, and complex enough to 
cancel thousand of flights and cost hundred of millions of dollars: ZAU ATC 
ZERO.

ZAU is 
the call sign of the Chicago Air Rout Traffic Control Center (ARTCC), which 
covers northern Illinois 
and Indiana, southern Wisconsin, western Iowa, and south eastern Michigan. 
There are two "sides" at an ARTCC. ZAU-LO handed traffic destined for airports 
in the covered area, ZAU-HI handled traffic overflying. Both were amongst the 
busiest in the country. ZAU-HI was busy with traffic from the east to west, as 
well as European traffic heading to Houston and Dallas-FW, ZAU-LO had to feed 
in traffic from airports like 
GYY, 
MKE, 
RFD, 
PIA,
 and the two busiest airports in the area; Chicago Midway 
International
 and O'Hare 
International, one 
of the busiest airports in the world.

On Friday morning, Brian Howard, a contract employee of the FAA and holding 
full credentials to the ZAU datacenters, set a fire in the telecom room, 
destroying 23 of the 
29
 rack and disconnecting all the controller stations from the associated radars 
and

Re: [AFMUG] Fall colors

2014-09-29 Thread Chris Fabien via Af
Nice view of town, what are the big lumpy things on the far side of town?

Sincerely, Chris from pancake-flat-land.

On Mon, Sep 29, 2014 at 8:49 PM, Sean Heskett via Af  wrote:

> It's currently a dragonwave 18ghz that runs at about 350mbps but we are
> installing this week a new dual SAF integra link that'll run at 1gbps ;)
>
>
>
> On Monday, September 29, 2014, Josh Baird via Af  wrote:
>
>> That is a lot of AP's.  What kind of backhaul?
>>
>> On Mon, Sep 29, 2014 at 7:44 PM, Sean Heskett via Af 
>> wrote:
>>
>>> Yeah that tower is one of our busiest
>>>
>>> We have 23 APs there
>>> 6-450s
>>> 5-430s
>>> 12-fsk
>>>
>>> Around 700-800 clients :)
>>>
>>> Plus the views from the top are amazing!
>>>
>>>
>>>
>>> On Monday, September 29, 2014, Matt Jenkins via Af  wrote:
>>>
 I am having serious tower envy right now. Your coverage potential is
 astounding!

 Matthew Jenkins
 SmarterBroadband
 m...@sbbinc.net
 530.272.4000

 On 09/29/2014 12:20 PM, Sean Heskett via Af wrote:

> i thought y'all might enjoy some pics from one of our towers.
>
>

>>


Re: [AFMUG] DiffServ and the internet

2014-09-29 Thread Chris Fabien via Af
Packet size and rate is pretty consistent right? Just a thought...

On Mon, Sep 29, 2014 at 8:05 PM, George Skorup (Cyber Broadcasting) via Af <
af@afmug.com> wrote:

> Speaking of DSCP and carriers zeroing it in the middle, I have some VoIP
> Innovations trunks. I know where the SIP messages are coming from, so I can
> mangle a DSCP value back onto those packets at ingress. But the RTP traffic
> comes from all over the freakin place, tons of different source address,
> never the same. I've asked if they could provide a list and pretty much got
> a no.
>
> Anybody have any ideas? Any way for a MT to identify an RTP stream and
> then dynamically add a mangle rule to change the DSCP value? My MT
> script-fu is not strong.
>


Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Jason McKemie via Af
I don't disagree about politicians, but that is more of a general thing and
isn't specific to Durbin.

On Mon, Sep 29, 2014 at 9:27 PM, George Skorup (Cyber Broadcasting) via Af <
af@afmug.com> wrote:

>  I'm pretty skeptical of partisans and career politicians. Term limits..
> but it will never happen. Do a couple terms and then go home and work like
> everyone else. No, instead they sit there for decades milking connections
> to get rich and exempt themselves from the laws they force upon us, then
> collect a pension after some scandal and/or their party disowns them and
> they finally fade away.
>
> On 9/29/2014 7:27 PM, Jason McKemie via Af wrote:
>
> To what are you referring? I'm pretty skeptical of mainstream media FYI.
>
> On Monday, September 29, 2014, Mike Hammett via Af  wrote:
>
>>  Do you live under a bridge?
>>
>>
>>
>> -
>> Mike Hammett
>> Intelligent Computing Solutions
>> http://www.ics-il.com
>>
>> --
>> *From: *"Jason McKemie via Af" 
>> *To: *af@afmug.com
>> *Sent: *Monday, September 29, 2014 7:23:11 PM
>> *Subject: *Re: [AFMUG] Arson attack on FAA datacenter
>>
>> Little bit of haterism going on here, he's one of the better ones IMO.
>> Does he not hang out upstate enough for you guys?
>>
>> On Monday, September 29, 2014, Mike Hammett via Af  wrote:
>>
>>>  +1
>>>
>>>
>>>
>>> -
>>> Mike Hammett
>>> Intelligent Computing Solutions
>>> http://www.ics-il.com
>>>
>>> --
>>> *From: *"George Skorup (Cyber Broadcasting) via Af" 
>>> *To: *af@afmug.com
>>> *Sent: *Monday, September 29, 2014 5:07:43 PM
>>> *Subject: *Re: [AFMUG] Arson attack on FAA datacenter
>>>
>>> Damn, why couldn't it be Durbin that slit his own throat.
>>>
>>> On 9/29/2014 5:04 PM, That One Guy via Af wrote:
>>>
>>> im going with isis on this
>>>
>>> On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af  wrote:
>>>
  This is only a couple miles from our office.  They had all the local
 news choppers up in the air over it on Friday.  I was surprised that it
 didn't garner more national coverage.  I guess since it wasn't the terror
 threat of the day, it didn't get any traction.  Just a disgruntled
 employee.  Even the first reports said it was not a terrorist act.


 On 9/29/2014 4:36 PM, Forrest Christian (List Account) via Af wrote:

  Oh yeah,

  I'm in Chicago for a few days.  Flew in on thursday before this
 happened.   My wife flew in on Saturday and ended up with a nasty delay in
 MSP since there were very very few flights flying into the affected area,
 which basically includes both chicago airports, and the two airports up in
 wisconsin.  Thousands of flights cancelled over the last couple of days.

  That's the big news here.

 -forrest

 On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af 
 wrote:

> Anyone see this?
>
>
> http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE
>
>
> http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP
>
>
>
> On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When operators,
> controllers and airport managers saw the title, a gasp of disbelief was
> heard. The problem was simple enough to state in three words, and complex
> enough to cancel thousand of flights and cost hundred of millions of
> dollars: ZAU ATC ZERO
> 
> .
>
> ZAU
> 
> is the call sign of the Chicago Air Rout Traffic Control Center (ARTCC),
> which covers 
> northern Illinois and Indiana, southern Wisconsin, western Iowa, and south
> eastern Michigan. There are two "sides" at an ARTCC. ZAU-LO handed traffic
> destined for airports in the covered area, ZAU-HI handled traffic
> overflying. Both were amongst the busiest in the country. ZAU-HI was busy
> with traffic from the east to west, as well as European traffic heading to
> Houston and Dallas-FW, ZAU-LO had to feed in traffic from airports like
> GYY ,
> MKE
> ,
> RFD
> ,
> PIA
> ,
> and the two busiest airports in the area; Chicago Midway International
> 
> and O'Hare International
> , one of
> the busiest airports in th

Re: [AFMUG] AFMUG list option being considered

2014-09-29 Thread Jason McKemie via Af
Sounds good, will this show the sender of each email in the "from" line, or
is that a separate matter entirely?

On Mon, Sep 29, 2014 at 8:20 PM, Paul McCall via Af  wrote:

>  Guys,
>
>
>
> As some of you are aware, PDMNet’s behind the scenes management of the
> AFMUG list as a service to Chuck McCown and his companies, involves hosting
> on an Amazon server.  Some very good things have come from that decision so
> far… no mail delivery issues (no server issues, no blacklisting or
> greylisting issues etc. to our knowledge).  The EC2 / SES platform is very
> robust, though overly complex at first blush.  A lot more time went to
> getting this setup that we anticipated, but that’s life.   It costs a
> little more to use this platform, (I know.. I know) but long term, I think
> we will be happy with it.
>
>
>
> One of the differences is the way the headers are handled.  Out of the
> box, Amazon required us to “munge” the headers in such a way that we could
> customize them to meet Amazon’s strict mass-emailing rules.  This causes
> some differences in the way the mail is delivered, causing a few of you who
> use a different type of threading than most of us, some grief.  We are way
> PAST the discussion about what is “right” etc.  Respectfully, lets move on
> from that “debate”.
>
>
>
> The only way that Amazon provides to do things in a more conventional
> email header fashion is to use their API.  We knew this was an option when
> we brought the list live, but also anticipated a bit of a learning curve.
> And, indeed it was!
>
>
>
> We have gotten comfortable with the API and have been running it on our
> test Mailman list internally.  Basically the API allows us / requires us to
> process each AFMUG subscriber as an authenticated / confirmed email
> address.  S…. In order to use the API, we need to authenticate all the
> current users of the list.   We can send a batch through the API to
> generate the confirmation email to everyone, but before I did it, I wanted
> to give you a heads up.  NEW subscribers will first join the mailman AFMUG
> group and once confirmed, will then get an Amazon confirmation immediately
> thereafter.  Unsubscribing will also remove you from an authenticated user
> for the list.
>
>
>
> Assuming that we haven’t overlooked something (and, I am sure you guys
> will let me know that, LOL ) I would like to give a 48 hour notice that we
> will make the change, and you will get the Amazon email after that window.
>
>
>
> All in favor ?   All opposed?
>
>
>
> Paul McCall, Pres.
>
> PDMNet / Florida Broadband
>
> 658 Old Dixie Highway
>
> Vero Beach, FL 32962
>
> 772-564-6800 office
>
> 772-473-0352 cell
>
> www.pdmnet.com
>
> pa...@pdmnet.net
>
>
>


Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread George Skorup (Cyber Broadcasting) via Af
I'm pretty skeptical of partisans and career politicians. Term limits.. 
but it will never happen. Do a couple terms and then go home and work 
like everyone else. No, instead they sit there for decades milking 
connections to get rich and exempt themselves from the laws they force 
upon us, then collect a pension after some scandal and/or their party 
disowns them and they finally fade away.


On 9/29/2014 7:27 PM, Jason McKemie via Af wrote:

To what are you referring? I'm pretty skeptical of mainstream media FYI.

On Monday, September 29, 2014, Mike Hammett via Af > wrote:


Do you live under a bridge?



-
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com


*From: *"Jason McKemie via Af" >
*To: *af@afmug.com 
*Sent: *Monday, September 29, 2014 7:23:11 PM
*Subject: *Re: [AFMUG] Arson attack on FAA datacenter

Little bit of haterism going on here, he's one of the better ones
IMO. Does he not hang out upstate enough for you guys?

On Monday, September 29, 2014, Mike Hammett via Af > wrote:

+1



-
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com


*From: *"George Skorup (Cyber Broadcasting) via Af" 
*To: *af@afmug.com
*Sent: *Monday, September 29, 2014 5:07:43 PM
*Subject: *Re: [AFMUG] Arson attack on FAA datacenter

Damn, why couldn't it be Durbin that slit his own throat.

On 9/29/2014 5:04 PM, That One Guy via Af wrote:

im going with isis on this

On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af
 wrote:

This is only a couple miles from our office.  They had
all the local news choppers up in the air over it on
Friday.  I was surprised that it didn't garner more
national coverage.  I guess since it wasn't the terror
threat of the day, it didn't get any traction.  Just a
disgruntled employee.  Even the first reports said it
was not a terrorist act.


On 9/29/2014 4:36 PM, Forrest Christian (List Account)
via Af wrote:

Oh yeah,

I'm in Chicago for a few days.  Flew in on
thursday before this happened.   My wife flew in
on Saturday and ended up with a nasty delay in MSP
since there were very very few flights flying into
the affected area, which basically includes both
chicago airports, and the two airports up in
wisconsin. Thousands of flights cancelled over the
last couple of days.

That's the big news here.

-forrest

On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via
Af  wrote:

Anyone see this?


http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE


http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP



On Friday, ATCSCC Advisory 20 of 26-Sep-2014
went out. When operators, controllers and
airport managers saw the title, a gasp of
disbelief was heard. The problem was simple
enough to state in three words, and complex
enough to cancel thousand of flights and cost
hundred of millions of dollars: ZAU ATC ZERO

.

ZAU


is the call sign of the Chicago Air Rout
Traffic Control Center (ARTCC), which covers

northern Illinois and Indiana, southern
Wisconsin, western Iowa, and south eastern
Michigan. There are two "sides" at an ARTCC.
ZAU-LO handed traffic destined for airports in
the covered area, ZAU-HI handled traffic
overflying. Both were amongst the busiest in
the country. ZAU-HI was busy with traffic from
the east to west, as well as European traffic
heading to Houston and Dallas-FW, ZAU-LO had

Re: [AFMUG] AFMUG list option being considered

2014-09-29 Thread Paul McCall via Af
Only if you’re doing it right !  ☺

From: Af [mailto:af-boun...@afmug.com] On Behalf Of That One Guy via Af
Sent: Monday, September 29, 2014 9:41 PM
To: af@afmug.com
Subject: Re: [AFMUG] AFMUG list option being considered

will my leg hurt when its over

On Mon, Sep 29, 2014 at 8:37 PM, Paul McCall via Af 
mailto:af@afmug.com>> wrote:
Of course, your mail client, SPAM filter, may put the request in a folder… 
Gmail seems to pick some random other folder to put the request in… 
indiscriminately

From: Af [mailto:af-boun...@afmug.com] On Behalf 
Of Bill Prince via Af
Sent: Monday, September 29, 2014 9:34 PM
To: af@afmug.com
Subject: Re: [AFMUG] AFMUG list option being considered

What will we need to do? Unsubscribe/resubscribe or just reply to the 
authentication(s)?


bp
On 9/29/2014 6:20 PM, Paul McCall via Af wrote:
Guys,

As some of you are aware, PDMNet’s behind the scenes management of the AFMUG 
list as a service to Chuck McCown and his companies, involves hosting on an 
Amazon server.  Some very good things have come from that decision so far… no 
mail delivery issues (no server issues, no blacklisting or greylisting issues 
etc. to our knowledge).  The EC2 / SES platform is very robust, though overly 
complex at first blush.  A lot more time went to getting this setup that we 
anticipated, but that’s life.   It costs a little more to use this platform, (I 
know.. I know) but long term, I think we will be happy with it.

One of the differences is the way the headers are handled.  Out of the box, 
Amazon required us to “munge” the headers in such a way that we could customize 
them to meet Amazon’s strict mass-emailing rules.  This causes some differences 
in the way the mail is delivered, causing a few of you who use a different type 
of threading than most of us, some grief.  We are way PAST the discussion about 
what is “right” etc.  Respectfully, lets move on from that “debate”.

The only way that Amazon provides to do things in a more conventional email 
header fashion is to use their API.  We knew this was an option when we brought 
the list live, but also anticipated a bit of a learning curve.  And, indeed it 
was!

We have gotten comfortable with the API and have been running it on our test 
Mailman list internally.  Basically the API allows us / requires us to process 
each AFMUG subscriber as an authenticated / confirmed email address.  S…. 
In order to use the API, we need to authenticate all the current users of the 
list.   We can send a batch through the API to generate the confirmation email 
to everyone, but before I did it, I wanted to give you a heads up.  NEW 
subscribers will first join the mailman AFMUG group and once confirmed, will 
then get an Amazon confirmation immediately thereafter.  Unsubscribing will 
also remove you from an authenticated user for the list.

Assuming that we haven’t overlooked something (and, I am sure you guys will let 
me know that, LOL ) I would like to give a 48 hour notice that we will make the 
change, and you will get the Amazon email after that window.

All in favor ?   All opposed?

Paul McCall, Pres.
PDMNet / Florida Broadband
658 Old Dixie Highway
Vero Beach, FL 32962
772-564-6800 office
772-473-0352 cell
www.pdmnet.com
pa...@pdmnet.net





--
All parts should go together without forcing. You must remember that the parts 
you are reassembling were disassembled by you. Therefore, if you can't get them 
together again, there must be a reason. By all means, do not use a hammer. -- 
IBM maintenance manual, 1925


Re: [AFMUG] AFMUG list option being considered

2014-09-29 Thread Mike Hammett via Af
If you want it to, just find a rock and hit your leg with it. Problem solved. 




- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 

- Original Message -

From: "That One Guy via Af"  
To: af@afmug.com 
Sent: Monday, September 29, 2014 8:40:57 PM 
Subject: Re: [AFMUG] AFMUG list option being considered 


will my leg hurt when its over 


On Mon, Sep 29, 2014 at 8:37 PM, Paul McCall via Af < af@afmug.com > wrote: 





Of course, your mail client, SPAM filter, may put the request in a folder… 
Gmail seems to pick some random other folder to put the request in… 
indiscriminately 





From: Af [mailto: af-boun...@afmug.com ] On Behalf Of Bill Prince via Af 
Sent: Monday, September 29, 2014 9:34 PM 
To: af@afmug.com 
Subject: Re: [AFMUG] AFMUG list option being considered 


What will we need to do? Unsubscribe/resubscribe or just reply to the 
authentication(s)? 


bp 
On 9/29/2014 6:20 PM, Paul McCall via Af wrote: 


Guys, 

As some of you are aware, PDMNet’s behind the scenes management of the AFMUG 
list as a service to Chuck McCown and his companies, involves hosting on an 
Amazon server. Some very good things have come from that decision so far… no 
mail delivery issues (no server issues, no blacklisting or greylisting issues 
etc. to our knowledge). The EC2 / SES platform is very robust, though overly 
complex at first blush. A lot more time went to getting this setup that we 
anticipated, but that’s life. It costs a little more to use this platform, (I 
know.. I know) but long term, I think we will be happy with it. 

One of the differences is the way the headers are handled. Out of the box, 
Amazon required us to “munge” the headers in such a way that we could customize 
them to meet Amazon’s strict mass-emailing rules. This causes some differences 
in the way the mail is delivered, causing a few of you who use a different type 
of threading than most of us, some grief. We are way PAST the discussion about 
what is “right” etc. Respectfully, lets move on from that “debate”. 

The only way that Amazon provides to do things in a more conventional email 
header fashion is to use their API. We knew this was an option when we brought 
the list live, but also anticipated a bit of a learning curve. And, indeed it 
was! 

We have gotten comfortable with the API and have been running it on our test 
Mailman list internally. Basically the API allows us / requires us to process 
each AFMUG subscriber as an authenticated / confirmed email address. S…. In 
order to use the API, we need to authenticate all the current users of the 
list. We can send a batch through the API to generate the confirmation email to 
everyone, but before I did it, I wanted to give you a heads up. NEW subscribers 
will first join the mailman AFMUG group and once confirmed, will then get an 
Amazon confirmation immediately thereafter. Unsubscribing will also remove you 
from an authenticated user for the list. 

Assuming that we haven’t overlooked something (and, I am sure you guys will let 
me know that, LOL ) I would like to give a 48 hour notice that we will make the 
change, and you will get the Amazon email after that window. 

All in favor ? All opposed? 

Paul McCall, Pres. 
PDMNet / Florida Broadband 
658 Old Dixie Highway 
Vero Beach, FL 32962 
772-564-6800 office 
772-473-0352 cell 
www.pdmnet.com 
pa...@pdmnet.net 









-- 

All parts should go together without forcing. You must remember that the parts 
you are reassembling were disassembled by you. Therefore, if you can't get them 
together again, there must be a reason. By all means, do not use a hammer. -- 
IBM maintenance manual, 1925 



Re: [AFMUG] AFMUG list option being considered

2014-09-29 Thread That One Guy via Af
will my leg hurt when its over

On Mon, Sep 29, 2014 at 8:37 PM, Paul McCall via Af  wrote:

>  Of course, your mail client, SPAM filter, may put the request in a
> folder… Gmail seems to pick some random other folder to put the request in…
> indiscriminately
>
>
>
> *From:* Af [mailto:af-boun...@afmug.com] *On Behalf Of *Bill Prince via Af
> *Sent:* Monday, September 29, 2014 9:34 PM
> *To:* af@afmug.com
> *Subject:* Re: [AFMUG] AFMUG list option being considered
>
>
>
> What will we need to do? Unsubscribe/resubscribe or just reply to the
> authentication(s)?
>
>
>  bp
>
> On 9/29/2014 6:20 PM, Paul McCall via Af wrote:
>
> Guys,
>
>
>
> As some of you are aware, PDMNet’s behind the scenes management of the
> AFMUG list as a service to Chuck McCown and his companies, involves hosting
> on an Amazon server.  Some very good things have come from that decision so
> far… no mail delivery issues (no server issues, no blacklisting or
> greylisting issues etc. to our knowledge).  The EC2 / SES platform is very
> robust, though overly complex at first blush.  A lot more time went to
> getting this setup that we anticipated, but that’s life.   It costs a
> little more to use this platform, (I know.. I know) but long term, I think
> we will be happy with it.
>
>
>
> One of the differences is the way the headers are handled.  Out of the
> box, Amazon required us to “munge” the headers in such a way that we could
> customize them to meet Amazon’s strict mass-emailing rules.  This causes
> some differences in the way the mail is delivered, causing a few of you who
> use a different type of threading than most of us, some grief.  We are way
> PAST the discussion about what is “right” etc.  Respectfully, lets move on
> from that “debate”.
>
>
>
> The only way that Amazon provides to do things in a more conventional
> email header fashion is to use their API.  We knew this was an option when
> we brought the list live, but also anticipated a bit of a learning curve.
> And, indeed it was!
>
>
>
> We have gotten comfortable with the API and have been running it on our
> test Mailman list internally.  Basically the API allows us / requires us to
> process each AFMUG subscriber as an authenticated / confirmed email
> address.  S…. In order to use the API, we need to authenticate all the
> current users of the list.   We can send a batch through the API to
> generate the confirmation email to everyone, but before I did it, I wanted
> to give you a heads up.  NEW subscribers will first join the mailman AFMUG
> group and once confirmed, will then get an Amazon confirmation immediately
> thereafter.  Unsubscribing will also remove you from an authenticated user
> for the list.
>
>
>
> Assuming that we haven’t overlooked something (and, I am sure you guys
> will let me know that, LOL ) I would like to give a 48 hour notice that we
> will make the change, and you will get the Amazon email after that window.
>
>
>
> All in favor ?   All opposed?
>
>
>
> Paul McCall, Pres.
>
> PDMNet / Florida Broadband
>
> 658 Old Dixie Highway
>
> Vero Beach, FL 32962
>
> 772-564-6800 office
>
> 772-473-0352 cell
>
> www.pdmnet.com
>
> pa...@pdmnet.net
>
>
>
>
>



-- 
All parts should go together without forcing. You must remember that the
parts you are reassembling were disassembled by you. Therefore, if you
can't get them together again, there must be a reason. By all means, do not
use a hammer. -- IBM maintenance manual, 1925


Re: [AFMUG] AFMUG list option being considered

2014-09-29 Thread Paul McCall via Af
Of course, your mail client, SPAM filter, may put the request in a folder... 
Gmail seems to pick some random other folder to put the request in... 
indiscriminately

From: Af [mailto:af-boun...@afmug.com] On Behalf Of Bill Prince via Af
Sent: Monday, September 29, 2014 9:34 PM
To: af@afmug.com
Subject: Re: [AFMUG] AFMUG list option being considered

What will we need to do? Unsubscribe/resubscribe or just reply to the 
authentication(s)?



bp
On 9/29/2014 6:20 PM, Paul McCall via Af wrote:
Guys,

As some of you are aware, PDMNet's behind the scenes management of the AFMUG 
list as a service to Chuck McCown and his companies, involves hosting on an 
Amazon server.  Some very good things have come from that decision so far... no 
mail delivery issues (no server issues, no blacklisting or greylisting issues 
etc. to our knowledge).  The EC2 / SES platform is very robust, though overly 
complex at first blush.  A lot more time went to getting this setup that we 
anticipated, but that's life.   It costs a little more to use this platform, (I 
know.. I know) but long term, I think we will be happy with it.

One of the differences is the way the headers are handled.  Out of the box, 
Amazon required us to "munge" the headers in such a way that we could customize 
them to meet Amazon's strict mass-emailing rules.  This causes some differences 
in the way the mail is delivered, causing a few of you who use a different type 
of threading than most of us, some grief.  We are way PAST the discussion about 
what is "right" etc.  Respectfully, lets move on from that "debate".

The only way that Amazon provides to do things in a more conventional email 
header fashion is to use their API.  We knew this was an option when we brought 
the list live, but also anticipated a bit of a learning curve.  And, indeed it 
was!

We have gotten comfortable with the API and have been running it on our test 
Mailman list internally.  Basically the API allows us / requires us to process 
each AFMUG subscriber as an authenticated / confirmed email address.  S 
In order to use the API, we need to authenticate all the current users of the 
list.   We can send a batch through the API to generate the confirmation email 
to everyone, but before I did it, I wanted to give you a heads up.  NEW 
subscribers will first join the mailman AFMUG group and once confirmed, will 
then get an Amazon confirmation immediately thereafter.  Unsubscribing will 
also remove you from an authenticated user for the list.

Assuming that we haven't overlooked something (and, I am sure you guys will let 
me know that, LOL ) I would like to give a 48 hour notice that we will make the 
change, and you will get the Amazon email after that window.

All in favor ?   All opposed?

Paul McCall, Pres.
PDMNet / Florida Broadband
658 Old Dixie Highway
Vero Beach, FL 32962
772-564-6800 office
772-473-0352 cell
www.pdmnet.com
pa...@pdmnet.net




Re: [AFMUG] AFMUG list option being considered

2014-09-29 Thread Paul McCall via Af
Just reply to the authentication request...   that's all

From: Af [mailto:af-boun...@afmug.com] On Behalf Of Bill Prince via Af
Sent: Monday, September 29, 2014 9:34 PM
To: af@afmug.com
Subject: Re: [AFMUG] AFMUG list option being considered

What will we need to do? Unsubscribe/resubscribe or just reply to the 
authentication(s)?



bp
On 9/29/2014 6:20 PM, Paul McCall via Af wrote:
Guys,

As some of you are aware, PDMNet's behind the scenes management of the AFMUG 
list as a service to Chuck McCown and his companies, involves hosting on an 
Amazon server.  Some very good things have come from that decision so far... no 
mail delivery issues (no server issues, no blacklisting or greylisting issues 
etc. to our knowledge).  The EC2 / SES platform is very robust, though overly 
complex at first blush.  A lot more time went to getting this setup that we 
anticipated, but that's life.   It costs a little more to use this platform, (I 
know.. I know) but long term, I think we will be happy with it.

One of the differences is the way the headers are handled.  Out of the box, 
Amazon required us to "munge" the headers in such a way that we could customize 
them to meet Amazon's strict mass-emailing rules.  This causes some differences 
in the way the mail is delivered, causing a few of you who use a different type 
of threading than most of us, some grief.  We are way PAST the discussion about 
what is "right" etc.  Respectfully, lets move on from that "debate".

The only way that Amazon provides to do things in a more conventional email 
header fashion is to use their API.  We knew this was an option when we brought 
the list live, but also anticipated a bit of a learning curve.  And, indeed it 
was!

We have gotten comfortable with the API and have been running it on our test 
Mailman list internally.  Basically the API allows us / requires us to process 
each AFMUG subscriber as an authenticated / confirmed email address.  S 
In order to use the API, we need to authenticate all the current users of the 
list.   We can send a batch through the API to generate the confirmation email 
to everyone, but before I did it, I wanted to give you a heads up.  NEW 
subscribers will first join the mailman AFMUG group and once confirmed, will 
then get an Amazon confirmation immediately thereafter.  Unsubscribing will 
also remove you from an authenticated user for the list.

Assuming that we haven't overlooked something (and, I am sure you guys will let 
me know that, LOL ) I would like to give a 48 hour notice that we will make the 
change, and you will get the Amazon email after that window.

All in favor ?   All opposed?

Paul McCall, Pres.
PDMNet / Florida Broadband
658 Old Dixie Highway
Vero Beach, FL 32962
772-564-6800 office
772-473-0352 cell
www.pdmnet.com
pa...@pdmnet.net




Re: [AFMUG] AFMUG list option being considered

2014-09-29 Thread Bill Prince via Af
What will we need to do? Unsubscribe/resubscribe or just reply to the 
authentication(s)?


bp

On 9/29/2014 6:20 PM, Paul McCall via Af wrote:


Guys,

As some of you are aware, PDMNet's behind the scenes management of the 
AFMUG list as a service to Chuck McCown and his companies, involves 
hosting on an Amazon server.  Some very good things have come from 
that decision so far... no mail delivery issues (no server issues, no 
blacklisting or greylisting issues etc. to our knowledge). The EC2 / 
SES platform is very robust, though overly complex at first blush.  A 
lot more time went to getting this setup that we anticipated, but 
that's life.   It costs a little more to use this platform, (I know.. 
I know) but long term, I think we will be happy with it.


One of the differences is the way the headers are handled.  Out of the 
box, Amazon required us to "munge" the headers in such a way that we 
could customize them to meet Amazon's strict mass-emailing rules.  
This causes some differences in the way the mail is delivered, causing 
a few of you who use a different type of threading than most of us, 
some grief.  We are way PAST the discussion about what is "right" 
etc.  Respectfully, lets move on from that "debate".


The only way that Amazon provides to do things in a more conventional 
email header fashion is to use their API.  We knew this was an option 
when we brought the list live, but also anticipated a bit of a 
learning curve. And, indeed it was!


We have gotten comfortable with the API and have been running it on 
our test Mailman list internally. Basically the API allows us / 
requires us to process each AFMUG subscriber as an authenticated / 
confirmed email address.  S In order to use the API, we need 
to authenticate all the current users of the list.   We can send a 
batch through the API to generate the confirmation email to everyone, 
but before I did it, I wanted to give you a heads up.  NEW subscribers 
will first join the mailman AFMUG group and once confirmed, will then 
get an Amazon confirmation immediately thereafter.  Unsubscribing will 
also remove you from an authenticated user for the list.


Assuming that we haven't overlooked something (and, I am sure you guys 
will let me know that, LOL ) I would like to give a 48 hour notice 
that we will make the change, and you will get the Amazon email after 
that window.


All in favor ?   All opposed?

Paul McCall, Pres.

PDMNet / Florida Broadband

658 Old Dixie Highway

Vero Beach, FL 32962

772-564-6800 office

772-473-0352 cell

www.pdmnet.com 

pa...@pdmnet.net 





Re: [AFMUG] AFMUG list option being considered

2014-09-29 Thread CBB - Jay Fuller via Af

Yay 

Sent from my Verizon Wireless 4G LTE Smartphone

- Reply message -
From: "Paul McCall via Af" 
To: "af@afmug.com" 
Subject: [AFMUG] AFMUG list option being considered
Date: Mon, Sep 29, 2014 8:20 PM
Guys,

As some of you are aware, PDMNet’s behind the scenes management of the AFMUG 
list as a service to Chuck McCown and his companies, involves hosting on an 
Amazon server.  Some very good things have come from that decision so far… no 
mail
delivery issues (no server issues, no blacklisting or greylisting issues etc. 
to our knowledge).  The EC2 / SES platform is very robust, though overly 
complex at first blush.  A lot more time went to getting this setup that we 
anticipated, but that’s life. 
It costs a little more to use this platform, (I know.. I know) but long term, I 
think we will be happy with it.

One of the differences is the way the headers are handled.  Out of the box, 
Amazon required us to “munge” the headers in such a way that we could customize 
them to meet Amazon’s strict mass-emailing rules.  This causes some differences
in the way the mail is delivered, causing a few of you who use a different type 
of threading than most of us, some grief.  We are way PAST the discussion about 
what is “right” etc.  Respectfully, lets move on from that “debate”.

The only way that Amazon provides to do things in a more conventional email 
header fashion is to use their API.  We knew this was an option when we brought 
the list live, but also anticipated a bit of a learning curve.  And, indeed it 
was!

We have gotten comfortable with the API and have been running it on our test 
Mailman list internally.  Basically the API allows us / requires us to process 
each AFMUG subscriber as an authenticated / confirmed email address.  S…. In
order to use the API, we need to authenticate all the current users of the 
list.   We can send a batch through the API to generate the confirmation email 
to everyone, but before I did it, I wanted to give you a heads up.  NEW 
subscribers will first join the
mailman AFMUG group and once confirmed, will then get an Amazon confirmation 
immediately thereafter.  Unsubscribing will also remove you from an 
authenticated user for the list.

Assuming that we haven’t overlooked something (and, I am sure you guys will let 
me know that, LOL ) I would like to give a 48 hour notice that we will make the 
change, and you will get the Amazon email after that window.

All in favor ?   All opposed?   

Paul McCall, Pres.
PDMNet / Florida Broadband 
658 Old Dixie Highway
Vero Beach, FL 32962
772-564-6800 office
772-473-0352 cell
www.pdmnet.com
pa...@pdmnet.net

[AFMUG] AFMUG list option being considered

2014-09-29 Thread Paul McCall via Af
Guys,

As some of you are aware, PDMNet's behind the scenes management of the AFMUG 
list as a service to Chuck McCown and his companies, involves hosting on an 
Amazon server.  Some very good things have come from that decision so far... no 
mail delivery issues (no server issues, no blacklisting or greylisting issues 
etc. to our knowledge).  The EC2 / SES platform is very robust, though overly 
complex at first blush.  A lot more time went to getting this setup that we 
anticipated, but that's life.   It costs a little more to use this platform, (I 
know.. I know) but long term, I think we will be happy with it.

One of the differences is the way the headers are handled.  Out of the box, 
Amazon required us to "munge" the headers in such a way that we could customize 
them to meet Amazon's strict mass-emailing rules.  This causes some differences 
in the way the mail is delivered, causing a few of you who use a different type 
of threading than most of us, some grief.  We are way PAST the discussion about 
what is "right" etc.  Respectfully, lets move on from that "debate".

The only way that Amazon provides to do things in a more conventional email 
header fashion is to use their API.  We knew this was an option when we brought 
the list live, but also anticipated a bit of a learning curve.  And, indeed it 
was!

We have gotten comfortable with the API and have been running it on our test 
Mailman list internally.  Basically the API allows us / requires us to process 
each AFMUG subscriber as an authenticated / confirmed email address.  S 
In order to use the API, we need to authenticate all the current users of the 
list.   We can send a batch through the API to generate the confirmation email 
to everyone, but before I did it, I wanted to give you a heads up.  NEW 
subscribers will first join the mailman AFMUG group and once confirmed, will 
then get an Amazon confirmation immediately thereafter.  Unsubscribing will 
also remove you from an authenticated user for the list.

Assuming that we haven't overlooked something (and, I am sure you guys will let 
me know that, LOL ) I would like to give a 48 hour notice that we will make the 
change, and you will get the Amazon email after that window.

All in favor ?   All opposed?

Paul McCall, Pres.
PDMNet / Florida Broadband
658 Old Dixie Highway
Vero Beach, FL 32962
772-564-6800 office
772-473-0352 cell
www.pdmnet.com
pa...@pdmnet.net



Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Josh Reynolds via Af

count me in for one trolling please

Josh Reynolds, Chief Information Officer
SPITwSPOTS, www.spitwspots.com 

On 09/29/2014 05:02 PM, That One Guy via Af wrote:

i want in on the trolling

On Mon, Sep 29, 2014 at 7:40 PM, Jason McKemie via Af > wrote:


Well, if that's the case, then it was a troll of a troll :-)


On Monday, September 29, 2014, Mike Hammett via Af mailto:af@afmug.com>> wrote:

Trolling two people that clearly do not think highly of our
senior senator.



-
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com


*From: *"Jason McKemie via Af" 
*To: *af@afmug.com
*Sent: *Monday, September 29, 2014 7:27:31 PM
*Subject: *Re: [AFMUG] Arson attack on FAA datacenter

To what are you referring? I'm pretty skeptical of mainstream
media FYI.

On Monday, September 29, 2014, Mike Hammett via Af
 wrote:

Do you live under a bridge?



-
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com



*From: *"Jason McKemie via Af" 
*To: *af@afmug.com
*Sent: *Monday, September 29, 2014 7:23:11 PM
*Subject: *Re: [AFMUG] Arson attack on FAA datacenter

Little bit of haterism going on here, he's one of the
better ones IMO. Does he not hang out upstate enough for
you guys?

On Monday, September 29, 2014, Mike Hammett via Af
 wrote:

+1



-
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com



*From: *"George Skorup (Cyber Broadcasting) via Af"

*To: *af@afmug.com
*Sent: *Monday, September 29, 2014 5:07:43 PM
*Subject: *Re: [AFMUG] Arson attack on FAA datacenter

Damn, why couldn't it be Durbin that slit his own throat.

On 9/29/2014 5:04 PM, That One Guy via Af wrote:

im going with isis on this

On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af
 wrote:

This is only a couple miles from our office. 
They had all the local news choppers up in the

air over it on Friday.  I was surprised that
it didn't garner more national coverage.  I
guess since it wasn't the terror threat of the
day, it didn't get any traction.  Just a
disgruntled employee. Even the first reports
said it was not a terrorist act.


On 9/29/2014 4:36 PM, Forrest Christian (List
Account) via Af wrote:

Oh yeah,

I'm in Chicago for a few days. Flew in on
thursday before this happened.   My wife
flew in on Saturday and ended up with a
nasty delay in MSP since there were very
very few flights flying into the affected
area, which basically includes both
chicago airports, and the two airports up
in wisconsin. Thousands of flights
cancelled over the last couple of days.

That's the big news here.

-forrest

On Mon, Sep 29, 2014 at 3:24 PM, Eric
Kuhnke via Af  wrote:

Anyone see this?


http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE


http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP



On Friday, ATCSCC Advisory 20 of
26-Sep-2014 went out. When operators,
controllers and airport managers saw
the title, a gasp of disbelief was
heard. The problem was simple enough
to state in three words, and complex
enough to cancel thousand of flights
and cost hundred of millions of
dollars: ZAU ATC ZERO
  

Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread That One Guy via Af
i want in on the trolling

On Mon, Sep 29, 2014 at 7:40 PM, Jason McKemie via Af  wrote:

> Well, if that's the case, then it was a troll of a troll :-)
>
>
> On Monday, September 29, 2014, Mike Hammett via Af  wrote:
>
>> Trolling two people that clearly do not think highly of our senior
>> senator.
>>
>>
>>
>> -
>> Mike Hammett
>> Intelligent Computing Solutions
>> http://www.ics-il.com
>>
>> --
>> *From: *"Jason McKemie via Af" 
>> *To: *af@afmug.com
>> *Sent: *Monday, September 29, 2014 7:27:31 PM
>> *Subject: *Re: [AFMUG] Arson attack on FAA datacenter
>>
>> To what are you referring? I'm pretty skeptical of mainstream media FYI.
>>
>> On Monday, September 29, 2014, Mike Hammett via Af  wrote:
>>
>>> Do you live under a bridge?
>>>
>>>
>>>
>>> -
>>> Mike Hammett
>>> Intelligent Computing Solutions
>>> http://www.ics-il.com
>>>
>>> --
>>> *From: *"Jason McKemie via Af" 
>>> *To: *af@afmug.com
>>> *Sent: *Monday, September 29, 2014 7:23:11 PM
>>> *Subject: *Re: [AFMUG] Arson attack on FAA datacenter
>>>
>>> Little bit of haterism going on here, he's one of the better ones IMO.
>>> Does he not hang out upstate enough for you guys?
>>>
>>> On Monday, September 29, 2014, Mike Hammett via Af  wrote:
>>>
 +1



 -
 Mike Hammett
 Intelligent Computing Solutions
 http://www.ics-il.com

 --
 *From: *"George Skorup (Cyber Broadcasting) via Af" 
 *To: *af@afmug.com
 *Sent: *Monday, September 29, 2014 5:07:43 PM
 *Subject: *Re: [AFMUG] Arson attack on FAA datacenter

 Damn, why couldn't it be Durbin that slit his own throat.

 On 9/29/2014 5:04 PM, That One Guy via Af wrote:

 im going with isis on this

 On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af 
 wrote:

>  This is only a couple miles from our office.  They had all the local
> news choppers up in the air over it on Friday.  I was surprised that it
> didn't garner more national coverage.  I guess since it wasn't the terror
> threat of the day, it didn't get any traction.  Just a disgruntled
> employee.  Even the first reports said it was not a terrorist act.
>
>
> On 9/29/2014 4:36 PM, Forrest Christian (List Account) via Af wrote:
>
>  Oh yeah,
>
>  I'm in Chicago for a few days.  Flew in on thursday before this
> happened.   My wife flew in on Saturday and ended up with a nasty delay in
> MSP since there were very very few flights flying into the affected area,
> which basically includes both chicago airports, and the two airports up in
> wisconsin.  Thousands of flights cancelled over the last couple of days.
>
>  That's the big news here.
>
> -forrest
>
> On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af 
> wrote:
>
>> Anyone see this?
>>
>>
>> http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE
>>
>>
>> http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP
>>
>>
>>
>> On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When
>> operators, controllers and airport managers saw the title, a gasp of
>> disbelief was heard. The problem was simple enough to state in three 
>> words,
>> and complex enough to cancel thousand of flights and cost hundred of
>> millions of dollars: ZAU ATC ZERO
>> 
>> .
>>
>> ZAU
>> 
>> is the call sign of the Chicago Air Rout Traffic Control Center (ARTCC),
>> which covers 
>> northern Illinois and Indiana, southern Wisconsin, western Iowa, and 
>> south
>> eastern Michigan. There are two "sides" at an ARTCC. ZAU-LO handed 
>> traffic
>> destined for airports in the covered area, ZAU-HI handled traffic
>> overflying. Both were amongst the busiest in the country. ZAU-HI was busy
>> with traffic from the east to west, as well as European traffic heading 
>> to
>> Houston and Dallas-FW, ZAU-LO had to feed in traffic from airports like
>> GYY ,
>> MKE
>> ,
>> RFD
>> ,
>> PIA
>> ,
>> and the two busiest airports in the area; Chicago Midway
>> International
>> 
>> and O'Hare International
>> 

Re: [AFMUG] Powering a PTP250

2014-09-29 Thread Sean Heskett via Af
Wbmfg gigE-poe-apc??



On Monday, September 29, 2014, Paul McCall via Af  wrote:

>  Is there an easy way to power up (and run) a PTP250 other than the built
> in power supply ?   I don’t mind getting creative if need be.
>
>
>
> Paul
>
>
>
> Paul McCall, Pres.
>
> PDMNet / Florida Broadband
>
> 658 Old Dixie Highway
>
> Vero Beach, FL 32962
>
> 772-564-6800 office
>
> 772-473-0352 cell
>
> www.pdmnet.com
>
> pa...@pdmnet.net 
>
>
>


Re: [AFMUG] Fall colors

2014-09-29 Thread Sean Heskett via Af
It's currently a dragonwave 18ghz that runs at about 350mbps but we are
installing this week a new dual SAF integra link that'll run at 1gbps ;)



On Monday, September 29, 2014, Josh Baird via Af  wrote:

> That is a lot of AP's.  What kind of backhaul?
>
> On Mon, Sep 29, 2014 at 7:44 PM, Sean Heskett via Af  > wrote:
>
>> Yeah that tower is one of our busiest
>>
>> We have 23 APs there
>> 6-450s
>> 5-430s
>> 12-fsk
>>
>> Around 700-800 clients :)
>>
>> Plus the views from the top are amazing!
>>
>>
>>
>> On Monday, September 29, 2014, Matt Jenkins via Af > > wrote:
>>
>>> I am having serious tower envy right now. Your coverage potential is
>>> astounding!
>>>
>>> Matthew Jenkins
>>> SmarterBroadband
>>> m...@sbbinc.net
>>> 530.272.4000
>>>
>>> On 09/29/2014 12:20 PM, Sean Heskett via Af wrote:
>>>
 i thought y'all might enjoy some pics from one of our towers.


>>>
>


Re: [AFMUG] Powering a PTP250

2014-09-29 Thread Bill Prince via Af

I believe that the PTP250 is 802.3af.

In places where we have 24VDC plant, we have used a Tycon 
TP-DCDC-2448GD-HP.  They make other versions/voltages depending on what 
you need.



bp

On 9/29/2014 2:15 PM, Paul McCall via Af wrote:


Is there an easy way to power up (and run) a PTP250 other than the 
built in power supply ?   I don't mind getting creative if need be.


Paul

Paul McCall, Pres.

PDMNet / Florida Broadband

658 Old Dixie Highway

Vero Beach, FL 32962

772-564-6800 office

772-473-0352 cell

www.pdmnet.com 

pa...@pdmnet.net 





Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Jason McKemie via Af
Well, if that's the case, then it was a troll of a troll :-)

On Monday, September 29, 2014, Mike Hammett via Af  wrote:

> Trolling two people that clearly do not think highly of our senior senator.
>
>
>
> -
> Mike Hammett
> Intelligent Computing Solutions
> http://www.ics-il.com
>
> --
> *From: *"Jason McKemie via Af"  >
> *To: *af@afmug.com 
> *Sent: *Monday, September 29, 2014 7:27:31 PM
> *Subject: *Re: [AFMUG] Arson attack on FAA datacenter
>
> To what are you referring? I'm pretty skeptical of mainstream media FYI.
>
> On Monday, September 29, 2014, Mike Hammett via Af  > wrote:
>
>> Do you live under a bridge?
>>
>>
>>
>> -
>> Mike Hammett
>> Intelligent Computing Solutions
>> http://www.ics-il.com
>>
>> --
>> *From: *"Jason McKemie via Af" 
>> *To: *af@afmug.com
>> *Sent: *Monday, September 29, 2014 7:23:11 PM
>> *Subject: *Re: [AFMUG] Arson attack on FAA datacenter
>>
>> Little bit of haterism going on here, he's one of the better ones IMO.
>> Does he not hang out upstate enough for you guys?
>>
>> On Monday, September 29, 2014, Mike Hammett via Af  wrote:
>>
>>> +1
>>>
>>>
>>>
>>> -
>>> Mike Hammett
>>> Intelligent Computing Solutions
>>> http://www.ics-il.com
>>>
>>> --
>>> *From: *"George Skorup (Cyber Broadcasting) via Af" 
>>> *To: *af@afmug.com
>>> *Sent: *Monday, September 29, 2014 5:07:43 PM
>>> *Subject: *Re: [AFMUG] Arson attack on FAA datacenter
>>>
>>> Damn, why couldn't it be Durbin that slit his own throat.
>>>
>>> On 9/29/2014 5:04 PM, That One Guy via Af wrote:
>>>
>>> im going with isis on this
>>>
>>> On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af  wrote:
>>>
  This is only a couple miles from our office.  They had all the local
 news choppers up in the air over it on Friday.  I was surprised that it
 didn't garner more national coverage.  I guess since it wasn't the terror
 threat of the day, it didn't get any traction.  Just a disgruntled
 employee.  Even the first reports said it was not a terrorist act.


 On 9/29/2014 4:36 PM, Forrest Christian (List Account) via Af wrote:

  Oh yeah,

  I'm in Chicago for a few days.  Flew in on thursday before this
 happened.   My wife flew in on Saturday and ended up with a nasty delay in
 MSP since there were very very few flights flying into the affected area,
 which basically includes both chicago airports, and the two airports up in
 wisconsin.  Thousands of flights cancelled over the last couple of days.

  That's the big news here.

 -forrest

 On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af 
 wrote:

> Anyone see this?
>
>
> http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE
>
>
> http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP
>
>
>
> On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When operators,
> controllers and airport managers saw the title, a gasp of disbelief was
> heard. The problem was simple enough to state in three words, and complex
> enough to cancel thousand of flights and cost hundred of millions of
> dollars: ZAU ATC ZERO
> 
> .
>
> ZAU
> 
> is the call sign of the Chicago Air Rout Traffic Control Center (ARTCC),
> which covers 
> northern Illinois and Indiana, southern Wisconsin, western Iowa, and south
> eastern Michigan. There are two "sides" at an ARTCC. ZAU-LO handed traffic
> destined for airports in the covered area, ZAU-HI handled traffic
> overflying. Both were amongst the busiest in the country. ZAU-HI was busy
> with traffic from the east to west, as well as European traffic heading to
> Houston and Dallas-FW, ZAU-LO had to feed in traffic from airports like
> GYY ,
> MKE
> ,
> RFD
> ,
> PIA
> ,
> and the two busiest airports in the area; Chicago Midway International
> 
> and O'Hare International
> , one of
> the busiest airports in the world.
>
> On Friday morning, Brian Howard, a contract employee of the FAA and
> holding full credentials to the ZAU datacenters, set a fire in the telecom
> 

Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Mike Hammett via Af
Trolling two people that clearly do not think highly of our senior senator. 




- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 

- Original Message -

From: "Jason McKemie via Af"  
To: af@afmug.com 
Sent: Monday, September 29, 2014 7:27:31 PM 
Subject: Re: [AFMUG] Arson attack on FAA datacenter 

To what are you referring? I'm pretty skeptical of mainstream media FYI. 

On Monday, September 29, 2014, Mike Hammett via Af < af@afmug.com > wrote: 




Do you live under a bridge? 




- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 



From: "Jason McKemie via Af" < af@afmug.com > 
To: af@afmug.com 
Sent: Monday, September 29, 2014 7:23:11 PM 
Subject: Re: [AFMUG] Arson attack on FAA datacenter 

Little bit of haterism going on here, he's one of the better ones IMO. Does he 
not hang out upstate enough for you guys? 

On Monday, September 29, 2014, Mike Hammett via Af < af@afmug.com > wrote: 




+1 




- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 



From: "George Skorup (Cyber Broadcasting) via Af" < af@afmug.com > 
To: af@afmug.com 
Sent: Monday, September 29, 2014 5:07:43 PM 
Subject: Re: [AFMUG] Arson attack on FAA datacenter 


Damn, why couldn't it be Durbin that slit his own throat. 

On 9/29/2014 5:04 PM, That One Guy via Af wrote: 



im going with isis on this 


On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af < af@afmug.com > wrote: 



This is only a couple miles from our office. They had all the local news 
choppers up in the air over it on Friday. I was surprised that it didn't garner 
more national coverage. I guess since it wasn't the terror threat of the day, 
it didn't get any traction. Just a disgruntled employee. Even the first reports 
said it was not a terrorist act. 



On 9/29/2014 4:36 PM, Forrest Christian (List Account) via Af wrote: 




Oh yeah, 


I'm in Chicago for a few days. Flew in on thursday before this happened. My 
wife flew in on Saturday and ended up with a nasty delay in MSP since there 
were very very few flights flying into the affected area, which basically 
includes both chicago airports, and the two airports up in wisconsin. Thousands 
of flights cancelled over the last couple of days. 


That's the big news here. 

-forrest 



On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af < af@afmug.com > wrote: 



Anyone see this? 

http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE
 

http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP
 



On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When operators, 
controllers and airport managers saw the title, a gasp of disbelief was heard. 
The problem was simple enough to state in three words, and complex enough to 
cancel thousand of flights and cost hundred of millions of dollars: ZAU ATC 
ZERO . 

ZAU is the call sign of the Chicago Air Rout Traffic Control Center (ARTCC), 
which covers northern Illinois and Indiana, southern Wisconsin, western Iowa, 
and south eastern Michigan. There are two "sides" at an ARTCC. ZAU-LO handed 
traffic destined for airports in the covered area, ZAU-HI handled traffic 
overflying. Both were amongst the busiest in the country. ZAU-HI was busy with 
traffic from the east to west, as well as European traffic heading to Houston 
and Dallas-FW, ZAU-LO had to feed in traffic from airports like GYY , MKE , RFD 
, PIA , and the two busiest airports in the area; Chicago Midway International 
and O'Hare International , one of the busiest airports in the world. 

On Friday morning, Brian Howard, a contract employee of the FAA and holding 
full credentials to the ZAU datacenters, set a fire in the telecom room, 
destroying 23 of the 29 rack and disconnecting all the controller stations from 
the associated radars and radio transmitters needed to watch and guide traffic 
through the busy sector. As the consoles dropped offline, the ZAU duty manager 
had no choice -- they called ZZZ, the FAA command center and reported ATC ZERO 
-- no controllers available, control center offline. 












-- 

All parts should go together without forcing. You must remember that the parts 
you are reassembling were disassembled by you. Therefore, if you can't get them 
together again, there must be a reason. By all means, do not use a hammer. -- 
IBM maintenance manual, 1925 












Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Jason McKemie via Af
To what are you referring? I'm pretty skeptical of mainstream media FYI.

On Monday, September 29, 2014, Mike Hammett via Af  wrote:

> Do you live under a bridge?
>
>
>
> -
> Mike Hammett
> Intelligent Computing Solutions
> http://www.ics-il.com
>
> --
> *From: *"Jason McKemie via Af"  >
> *To: *af@afmug.com 
> *Sent: *Monday, September 29, 2014 7:23:11 PM
> *Subject: *Re: [AFMUG] Arson attack on FAA datacenter
>
> Little bit of haterism going on here, he's one of the better ones IMO.
> Does he not hang out upstate enough for you guys?
>
> On Monday, September 29, 2014, Mike Hammett via Af  > wrote:
>
>> +1
>>
>>
>>
>> -
>> Mike Hammett
>> Intelligent Computing Solutions
>> http://www.ics-il.com
>>
>> --
>> *From: *"George Skorup (Cyber Broadcasting) via Af" 
>> *To: *af@afmug.com
>> *Sent: *Monday, September 29, 2014 5:07:43 PM
>> *Subject: *Re: [AFMUG] Arson attack on FAA datacenter
>>
>> Damn, why couldn't it be Durbin that slit his own throat.
>>
>> On 9/29/2014 5:04 PM, That One Guy via Af wrote:
>>
>> im going with isis on this
>>
>> On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af  wrote:
>>
>>>  This is only a couple miles from our office.  They had all the local
>>> news choppers up in the air over it on Friday.  I was surprised that it
>>> didn't garner more national coverage.  I guess since it wasn't the terror
>>> threat of the day, it didn't get any traction.  Just a disgruntled
>>> employee.  Even the first reports said it was not a terrorist act.
>>>
>>>
>>> On 9/29/2014 4:36 PM, Forrest Christian (List Account) via Af wrote:
>>>
>>>  Oh yeah,
>>>
>>>  I'm in Chicago for a few days.  Flew in on thursday before this
>>> happened.   My wife flew in on Saturday and ended up with a nasty delay in
>>> MSP since there were very very few flights flying into the affected area,
>>> which basically includes both chicago airports, and the two airports up in
>>> wisconsin.  Thousands of flights cancelled over the last couple of days.
>>>
>>>  That's the big news here.
>>>
>>> -forrest
>>>
>>> On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af 
>>> wrote:
>>>
 Anyone see this?


 http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE


 http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP



 On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When operators,
 controllers and airport managers saw the title, a gasp of disbelief was
 heard. The problem was simple enough to state in three words, and complex
 enough to cancel thousand of flights and cost hundred of millions of
 dollars: ZAU ATC ZERO
 
 .

 ZAU
 
 is the call sign of the Chicago Air Rout Traffic Control Center (ARTCC),
 which covers 
 northern Illinois and Indiana, southern Wisconsin, western Iowa, and south
 eastern Michigan. There are two "sides" at an ARTCC. ZAU-LO handed traffic
 destined for airports in the covered area, ZAU-HI handled traffic
 overflying. Both were amongst the busiest in the country. ZAU-HI was busy
 with traffic from the east to west, as well as European traffic heading to
 Houston and Dallas-FW, ZAU-LO had to feed in traffic from airports like
 GYY ,
 MKE
 ,
 RFD
 ,
 PIA
 ,
 and the two busiest airports in the area; Chicago Midway International
 
 and O'Hare International
 , one of
 the busiest airports in the world.

 On Friday morning, Brian Howard, a contract employee of the FAA and
 holding full credentials to the ZAU datacenters, set a fire in the telecom
 room, destroying 23 of the 29
 
 rack and disconnecting all the controller stations from the associated
 radars and radio transmitters needed to watch and guide traffic through the
 busy sector. As the consoles dropped offline, the ZAU duty manager had no
 choice -- they called ZZZ, the FAA command center
  and reported ATC ZERO -- no
 controllers available, control center offline.

>>>
>>>
>>>
>>
>>
>>  --
>> All parts should go togethe

Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Mike Hammett via Af
Do you live under a bridge? 




- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 

- Original Message -

From: "Jason McKemie via Af"  
To: af@afmug.com 
Sent: Monday, September 29, 2014 7:23:11 PM 
Subject: Re: [AFMUG] Arson attack on FAA datacenter 

Little bit of haterism going on here, he's one of the better ones IMO. Does he 
not hang out upstate enough for you guys? 

On Monday, September 29, 2014, Mike Hammett via Af < af@afmug.com > wrote: 




+1 




- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 



From: "George Skorup (Cyber Broadcasting) via Af" < af@afmug.com > 
To: af@afmug.com 
Sent: Monday, September 29, 2014 5:07:43 PM 
Subject: Re: [AFMUG] Arson attack on FAA datacenter 


Damn, why couldn't it be Durbin that slit his own throat. 

On 9/29/2014 5:04 PM, That One Guy via Af wrote: 



im going with isis on this 


On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af < af@afmug.com > wrote: 



This is only a couple miles from our office. They had all the local news 
choppers up in the air over it on Friday. I was surprised that it didn't garner 
more national coverage. I guess since it wasn't the terror threat of the day, 
it didn't get any traction. Just a disgruntled employee. Even the first reports 
said it was not a terrorist act. 



On 9/29/2014 4:36 PM, Forrest Christian (List Account) via Af wrote: 




Oh yeah, 


I'm in Chicago for a few days. Flew in on thursday before this happened. My 
wife flew in on Saturday and ended up with a nasty delay in MSP since there 
were very very few flights flying into the affected area, which basically 
includes both chicago airports, and the two airports up in wisconsin. Thousands 
of flights cancelled over the last couple of days. 


That's the big news here. 

-forrest 



On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af < af@afmug.com > wrote: 



Anyone see this? 

http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE
 

http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP
 



On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When operators, 
controllers and airport managers saw the title, a gasp of disbelief was heard. 
The problem was simple enough to state in three words, and complex enough to 
cancel thousand of flights and cost hundred of millions of dollars: ZAU ATC 
ZERO . 

ZAU is the call sign of the Chicago Air Rout Traffic Control Center (ARTCC), 
which covers northern Illinois and Indiana, southern Wisconsin, western Iowa, 
and south eastern Michigan. There are two "sides" at an ARTCC. ZAU-LO handed 
traffic destined for airports in the covered area, ZAU-HI handled traffic 
overflying. Both were amongst the busiest in the country. ZAU-HI was busy with 
traffic from the east to west, as well as European traffic heading to Houston 
and Dallas-FW, ZAU-LO had to feed in traffic from airports like GYY , MKE , RFD 
, PIA , and the two busiest airports in the area; Chicago Midway International 
and O'Hare International , one of the busiest airports in the world. 

On Friday morning, Brian Howard, a contract employee of the FAA and holding 
full credentials to the ZAU datacenters, set a fire in the telecom room, 
destroying 23 of the 29 rack and disconnecting all the controller stations from 
the associated radars and radio transmitters needed to watch and guide traffic 
through the busy sector. As the consoles dropped offline, the ZAU duty manager 
had no choice -- they called ZZZ, the FAA command center and reported ATC ZERO 
-- no controllers available, control center offline. 












-- 

All parts should go together without forcing. You must remember that the parts 
you are reassembling were disassembled by you. Therefore, if you can't get them 
together again, there must be a reason. By all means, do not use a hammer. -- 
IBM maintenance manual, 1925 









Re: [AFMUG] SiteMonitor: Loss of sync

2014-09-29 Thread Bill Prince via Af
Yeah.  Not sure why I thought the index name was where I would get the 
value.  The OID that shows in the UI for the Satellites Visible is:


   .1.3.6.1.4.1.32050.2.1.28.2.1

The OID for the actual value is

   .1.3.6.1.4.1.32050.2.1.28.5.1


So I was able to fix that part.  What I'm wondering is how to know that 
We've had a loss in sync.  There is something under Binary I/O called 
"1PPS Active".


Seeing as we only poll once every 5 minutes, catching that going to zero 
seems slim to none.  However, I am intrigued by the "Events" value.  
Does that increment every time the Syncpipe loses sync?  In which case, 
I can zero it out, and set a threshold for whenever it is non-zero (see 
below).



I may try that.


bp

On 9/29/2014 1:28 PM, Forrest Christian (List Account) via Af wrote:

A little out of order:

On the OID's .. you may have the wrong OID.  There is an oid for the 
title strings, and an oid for the value.  You may want to check the 
oid you are using.   In addition, on the strings tab, there *are* 
strings which list the specific statellite and signal strength of all 
of the sats it is receiving a signal from.


One more troubleshooting item is the 'pulse received' counter on the 
analog tab.  It should increment once and exactly once per second.  
I've had good luck comparing this value over a specific time.  I.E. at 
exactly 10 minutes, there should be exactly 600 more pulses.


As far as fixing it:  I'd move the syncpipe, then try a different 
one.   If a second does the same thing, then we need to look at what 
else might be causing it.


If you want to send in screenshots to cust...@packetflux.com 
 of the boolean/analog/string tabs from 
the sitemonitor, I might be able to see something.


-forrest


On Sep 29, 2014 1:40 PM, "Bill Prince via Af" > wrote:



One of our many locations where we're using a Packetflux sync
pipe/injector seems to be losing satellite lock once every few
days. Typically it loses it for 2 to 4 seconds, but I've seen at
least once where it went 13 seconds.

I've not been able to get useful information from the SiteMonitor
because the satellites tracked/Visible OIDs are returning a string
with "Sats in View" and "Num Sats Used" instead of the actual
values. (is that a bug or what? This is on F/W "Jul 29 2012").

However, I'm getting messages like this in the AP logs:

09/21/2014 : 07:49:00 PDT : : Bridge Core : Loss of sync pulse
from Power Port! No other sync source available.
09/21/2014 : 07:49:04 PDT : : Bridge Core : Acquired sync
pulse from Power Port.
09/23/2014 : 18:49:37 PDT : : Bridge Core : Loss of sync pulse
from Power Port! No other sync source available.
09/23/2014 : 18:49:41 PDT : : Bridge Core : Acquired sync
pulse from Power Port.
09/23/2014 : 18:49:55 PDT : : Bridge Core : Loss of sync pulse
from Power Port! No other sync source available.
09/23/2014 : 18:49:59 PDT : : Bridge Core : Acquired sync
pulse from Power Port.
09/24/2014 : 18:47:15 PDT : : Bridge Core : Loss of sync pulse
from Power Port! No other sync source available.
09/24/2014 : 18:47:28 PDT : : Bridge Core : Acquired sync
pulse from Power Port.
09/27/2014 : 07:24:18 PDT : : Bridge Core : Loss of sync pulse
from Power Port! No other sync source available.
09/27/2014 : 07:24:20 PDT : : Bridge Core : Acquired sync
pulse from Power Port.

Not sure what I might do here.  This is with all the equipment up
against a concrete wall, so there is only a 180 degree view of the
sky.  Maybe a little bit less than that because the wall is not
flat, maybe about 170 degree view of the sky.

The APs are PMP450, and rarely get a GPS lock on the internal
GPS.  Maybe I can try moving the sync pipe away from the wall or
something.


-- 
bp






Re: [AFMUG] Fall colors

2014-09-29 Thread Jaime Solorza via Af
Thank you. Very nice

Jaime Solorza
On Sep 29, 2014 1:20 PM, "Sean Heskett via Af"  wrote:

> i thought y'all might enjoy some pics from one of our towers.
>
>


Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Jason McKemie via Af
Little bit of haterism going on here, he's one of the better ones IMO. Does
he not hang out upstate enough for you guys?

On Monday, September 29, 2014, Mike Hammett via Af  wrote:

> +1
>
>
>
> -
> Mike Hammett
> Intelligent Computing Solutions
> http://www.ics-il.com
>
> --
> *From: *"George Skorup (Cyber Broadcasting) via Af"  >
> *To: *af@afmug.com 
> *Sent: *Monday, September 29, 2014 5:07:43 PM
> *Subject: *Re: [AFMUG] Arson attack on FAA datacenter
>
> Damn, why couldn't it be Durbin that slit his own throat.
>
> On 9/29/2014 5:04 PM, That One Guy via Af wrote:
>
> im going with isis on this
>
> On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af  > wrote:
>
>>  This is only a couple miles from our office.  They had all the local
>> news choppers up in the air over it on Friday.  I was surprised that it
>> didn't garner more national coverage.  I guess since it wasn't the terror
>> threat of the day, it didn't get any traction.  Just a disgruntled
>> employee.  Even the first reports said it was not a terrorist act.
>>
>>
>> On 9/29/2014 4:36 PM, Forrest Christian (List Account) via Af wrote:
>>
>>  Oh yeah,
>>
>>  I'm in Chicago for a few days.  Flew in on thursday before this
>> happened.   My wife flew in on Saturday and ended up with a nasty delay in
>> MSP since there were very very few flights flying into the affected area,
>> which basically includes both chicago airports, and the two airports up in
>> wisconsin.  Thousands of flights cancelled over the last couple of days.
>>
>>  That's the big news here.
>>
>> -forrest
>>
>> On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af > > wrote:
>>
>>> Anyone see this?
>>>
>>>
>>> http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE
>>>
>>>
>>> http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP
>>>
>>>
>>>
>>> On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When operators,
>>> controllers and airport managers saw the title, a gasp of disbelief was
>>> heard. The problem was simple enough to state in three words, and complex
>>> enough to cancel thousand of flights and cost hundred of millions of
>>> dollars: ZAU ATC ZERO
>>> 
>>> .
>>>
>>> ZAU
>>> 
>>> is the call sign of the Chicago Air Rout Traffic Control Center (ARTCC),
>>> which covers 
>>> northern Illinois and Indiana, southern Wisconsin, western Iowa, and south
>>> eastern Michigan. There are two "sides" at an ARTCC. ZAU-LO handed traffic
>>> destined for airports in the covered area, ZAU-HI handled traffic
>>> overflying. Both were amongst the busiest in the country. ZAU-HI was busy
>>> with traffic from the east to west, as well as European traffic heading to
>>> Houston and Dallas-FW, ZAU-LO had to feed in traffic from airports like
>>> GYY ,
>>> MKE
>>> ,
>>> RFD
>>> ,
>>> PIA
>>> ,
>>> and the two busiest airports in the area; Chicago Midway International
>>>  and 
>>> O'Hare
>>> International
>>> , one of
>>> the busiest airports in the world.
>>>
>>> On Friday morning, Brian Howard, a contract employee of the FAA and
>>> holding full credentials to the ZAU datacenters, set a fire in the telecom
>>> room, destroying 23 of the 29
>>> 
>>> rack and disconnecting all the controller stations from the associated
>>> radars and radio transmitters needed to watch and guide traffic through the
>>> busy sector. As the consoles dropped offline, the ZAU duty manager had no
>>> choice -- they called ZZZ, the FAA command center
>>>  and reported ATC ZERO -- no
>>> controllers available, control center offline.
>>>
>>
>>
>>
>
>
>  --
> All parts should go together without forcing. You must remember that the
> parts you are reassembling were disassembled by you. Therefore, if you
> can't get them together again, there must be a reason. By all means, do not
> use a hammer. -- IBM maintenance manual, 1925
>
>
>
>


Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Mike Hammett via Af
+1 




- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 

- Original Message -

From: "George Skorup (Cyber Broadcasting) via Af"  
To: af@afmug.com 
Sent: Monday, September 29, 2014 5:07:43 PM 
Subject: Re: [AFMUG] Arson attack on FAA datacenter 


Damn, why couldn't it be Durbin that slit his own throat. 

On 9/29/2014 5:04 PM, That One Guy via Af wrote: 



im going with isis on this 


On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af < af@afmug.com > wrote: 



This is only a couple miles from our office. They had all the local news 
choppers up in the air over it on Friday. I was surprised that it didn't garner 
more national coverage. I guess since it wasn't the terror threat of the day, 
it didn't get any traction. Just a disgruntled employee. Even the first reports 
said it was not a terrorist act. 



On 9/29/2014 4:36 PM, Forrest Christian (List Account) via Af wrote: 




Oh yeah, 


I'm in Chicago for a few days. Flew in on thursday before this happened. My 
wife flew in on Saturday and ended up with a nasty delay in MSP since there 
were very very few flights flying into the affected area, which basically 
includes both chicago airports, and the two airports up in wisconsin. Thousands 
of flights cancelled over the last couple of days. 


That's the big news here. 

-forrest 



On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af < af@afmug.com > wrote: 



Anyone see this? 

http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE
 

http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP
 



On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When operators, 
controllers and airport managers saw the title, a gasp of disbelief was heard. 
The problem was simple enough to state in three words, and complex enough to 
cancel thousand of flights and cost hundred of millions of dollars: ZAU ATC 
ZERO . 

ZAU is the call sign of the Chicago Air Rout Traffic Control Center (ARTCC), 
which covers northern Illinois and Indiana, southern Wisconsin, western Iowa, 
and south eastern Michigan. There are two "sides" at an ARTCC. ZAU-LO handed 
traffic destined for airports in the covered area, ZAU-HI handled traffic 
overflying. Both were amongst the busiest in the country. ZAU-HI was busy with 
traffic from the east to west, as well as European traffic heading to Houston 
and Dallas-FW, ZAU-LO had to feed in traffic from airports like GYY , MKE , RFD 
, PIA , and the two busiest airports in the area; Chicago Midway International 
and O'Hare International , one of the busiest airports in the world. 

On Friday morning, Brian Howard, a contract employee of the FAA and holding 
full credentials to the ZAU datacenters, set a fire in the telecom room, 
destroying 23 of the 29 rack and disconnecting all the controller stations from 
the associated radars and radio transmitters needed to watch and guide traffic 
through the busy sector. As the consoles dropped offline, the ZAU duty manager 
had no choice -- they called ZZZ, the FAA command center and reported ATC ZERO 
-- no controllers available, control center offline. 












-- 

All parts should go together without forcing. You must remember that the parts 
you are reassembling were disassembled by you. Therefore, if you can't get them 
together again, there must be a reason. By all means, do not use a hammer. -- 
IBM maintenance manual, 1925 






Re: [AFMUG] Fall colors

2014-09-29 Thread Jay Weekley via Af

That's what I was thinking.

Matt Jenkins via Af wrote:
I am having serious tower envy right now. Your coverage potential is 
astounding!


Matthew Jenkins
SmarterBroadband
m...@sbbinc.net
530.272.4000

On 09/29/2014 12:20 PM, Sean Heskett via Af wrote:

i thought y'all might enjoy some pics from one of our towers.









[AFMUG] DiffServ and the internet

2014-09-29 Thread George Skorup (Cyber Broadcasting) via Af
Speaking of DSCP and carriers zeroing it in the middle, I have some VoIP 
Innovations trunks. I know where the SIP messages are coming from, so I 
can mangle a DSCP value back onto those packets at ingress. But the RTP 
traffic comes from all over the freakin place, tons of different source 
address, never the same. I've asked if they could provide a list and 
pretty much got a no.


Anybody have any ideas? Any way for a MT to identify an RTP stream and 
then dynamically add a mangle rule to change the DSCP value? My MT 
script-fu is not strong.


Re: [AFMUG] Tower Top Switch Surge Protection Question

2014-09-29 Thread Nate Burke via Af
You just think that's an LED on his SS board.  Really, it makes the 
entire Cat5 an antenna that transmits statistics back to Beehive 
Manufacturing Central.



On 9/29/2014 6:23 PM, Ken Hohhof via Af wrote:

It's in the cloud!
No, wait, that's where the surges come from.
*From:* Shayne Lebrun via Af 
*Sent:* Monday, September 29, 2014 6:12 PM
*To:* af@afmug.com 
*Subject:* Re: [AFMUG] Tower Top Switch Surge Protection Question

SSaaS: Surge Supression as a Service.

*From:*Af [mailto:af-boun...@afmug.com] *On Behalf Of *Paul Conlin via Af
*Sent:* Monday, September 29, 2014 4:59 PM
*To:* af@afmug.com
*Subject:* Re: [AFMUG] Tower Top Switch Surge Protection Question

If you don't have a surge suppressor then you need a tower climber to 
change the switch.  Either way, a climb is required.


Remember surge  suppressors are not like fuses.  In the sense that 
they don't "blow" with every suppression event. They can shunt some 
spikes to ground, save the switch port, and live to fight another 
day.  If they do give their lives to save the switch then you need a 
climb. But would have likely have needed that climb anyway to replace 
that switch or change ports.  So suppressors at the top will reduce 
the number of climbs although you will never know how many times the 
surge suppressor saved you.


Maybe Chuck should put a strike counter circuit in the suppressor and 
change to a subscription model.  You have to pay for each strike that 
he saved you from.


PC

Blaze Broadband

*From:*Af [mailto:af-boun...@afmug.com] *On Behalf Of *Gino Villarini 
via Af

*Sent:* Monday, September 29, 2014 4:16 PM
*To:* af@afmug.com 
*Subject:* Re: [AFMUG] Tower Top Switch Surge Protection Question

That was my first thought, but then it requieres a tower climb to 
change blown supressors..


Gino A. Villarini

President

Aeronet Wireless Broadband Corp.

www.aeronetpr.com 

@aeronetpr

*From: *"af@afmug.com " >
*Reply-To: *"af@afmug.com " >

*Date: *Monday, September 29, 2014 at 4:13 PM
*To: *"af@afmug.com " >

*Subject: *Re: [AFMUG] Tower Top Switch Surge Protection Question

We do the Beehive APC surges.


Gerard

On Mon, Sep 29, 2014 at 4:03 PM, Gino Villarini via Af > wrote:


Those putting Switches at the tower top, what kind of protection are 
you using for the Ethernet ports?


Are you using surge suppressors?

I was thinking of using Industrial POE switches at the top, feed DC 
and fiber, then short runs to the radios (epmp and 450 are poe compliant)


Should I go straigt to the radios?

Gino A. Villarini

President

Aeronet Wireless Broadband Corp.

www.aeronetpr.com 

@aeronetpr





Re: [AFMUG] Fall colors

2014-09-29 Thread Josh Baird via Af
That is a lot of AP's.  What kind of backhaul?

On Mon, Sep 29, 2014 at 7:44 PM, Sean Heskett via Af  wrote:

> Yeah that tower is one of our busiest
>
> We have 23 APs there
> 6-450s
> 5-430s
> 12-fsk
>
> Around 700-800 clients :)
>
> Plus the views from the top are amazing!
>
>
>
> On Monday, September 29, 2014, Matt Jenkins via Af  wrote:
>
>> I am having serious tower envy right now. Your coverage potential is
>> astounding!
>>
>> Matthew Jenkins
>> SmarterBroadband
>> m...@sbbinc.net
>> 530.272.4000
>>
>> On 09/29/2014 12:20 PM, Sean Heskett via Af wrote:
>>
>>> i thought y'all might enjoy some pics from one of our towers.
>>>
>>>
>>


Re: [AFMUG] Fall colors

2014-09-29 Thread Sean Heskett via Af
Yeah that tower is one of our busiest

We have 23 APs there
6-450s
5-430s
12-fsk

Around 700-800 clients :)

Plus the views from the top are amazing!



On Monday, September 29, 2014, Matt Jenkins via Af  wrote:

> I am having serious tower envy right now. Your coverage potential is
> astounding!
>
> Matthew Jenkins
> SmarterBroadband
> m...@sbbinc.net
> 530.272.4000
>
> On 09/29/2014 12:20 PM, Sean Heskett via Af wrote:
>
>> i thought y'all might enjoy some pics from one of our towers.
>>
>>
>


Re: [AFMUG] Fall colors

2014-09-29 Thread Matt Jenkins via Af
I am having serious tower envy right now. Your coverage potential is 
astounding!


Matthew Jenkins
SmarterBroadband
m...@sbbinc.net
530.272.4000

On 09/29/2014 12:20 PM, Sean Heskett via Af wrote:

i thought y'all might enjoy some pics from one of our towers.





Re: [AFMUG] Tower Top Switch Surge Protection Question

2014-09-29 Thread Ken Hohhof via Af
It’s in the cloud!

No, wait, that’s where the surges come from.


From: Shayne Lebrun via Af 
Sent: Monday, September 29, 2014 6:12 PM
To: af@afmug.com 
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

SSaaS: Surge Supression as a Service.

 

From: Af [mailto:af-boun...@afmug.com] On Behalf Of Paul Conlin via Af
Sent: Monday, September 29, 2014 4:59 PM
To: af@afmug.com
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

 

If you don’t have a surge suppressor then you need a tower climber to change 
the switch.  Either way, a climb is required.

 

Remember surge  suppressors are not like fuses.  In the sense that they don’t 
“blow” with every suppression event.  They can shunt some spikes to ground, 
save the switch port, and live to fight another day.  If they do give their 
lives to save the switch then you need a climb.  But would have likely have 
needed that climb anyway to replace that switch or change ports.  So 
suppressors at the top will reduce the number of climbs although you will never 
know how many times the surge suppressor saved you.

 

Maybe Chuck should put a strike counter circuit in the suppressor and change to 
a subscription model.  You have to pay for each strike that he saved you from.

 

PC

Blaze Broadband

  

 

 

From: Af [mailto:af-boun...@afmug.com] On Behalf Of Gino Villarini via Af
Sent: Monday, September 29, 2014 4:16 PM
To: af@afmug.com
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

 

That was my first thought, but then it requieres a tower climb to change blown 
supressors.. 

 

 

 

Gino A. Villarini

President

Aeronet Wireless Broadband Corp.

www.aeronetpr.com   

@aeronetpr

 

 

 

From: "af@afmug.com" 
Reply-To: "af@afmug.com" 
Date: Monday, September 29, 2014 at 4:13 PM
To: "af@afmug.com" 
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

 

We do the Beehive APC surges.




 

Gerard

 

On Mon, Sep 29, 2014 at 4:03 PM, Gino Villarini via Af  wrote:

Those putting Switches at the tower top, what kind of protection are you using 
for the Ethernet ports?

 

Are you using surge suppressors? 

 

I was thinking of using Industrial POE switches at the top, feed DC and fiber, 
then short runs to the radios (epmp and 450 are poe compliant) 

 

Should I go straigt to the radios? 

 

 

 

Gino A. Villarini

President

Aeronet Wireless Broadband Corp.

www.aeronetpr.com   

@aeronetpr

 

 

 


Re: [AFMUG] Tower Top Switch Surge Protection Question

2014-09-29 Thread Shayne Lebrun via Af
SSaaS: Surge Supression as a Service.

 

From: Af [mailto:af-boun...@afmug.com] On Behalf Of Paul Conlin via Af
Sent: Monday, September 29, 2014 4:59 PM
To: af@afmug.com
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

 

If you don't have a surge suppressor then you need a tower climber to change
the switch.  Either way, a climb is required.

 

Remember surge  suppressors are not like fuses.  In the sense that they
don't "blow" with every suppression event.  They can shunt some spikes to
ground, save the switch port, and live to fight another day.  If they do
give their lives to save the switch then you need a climb.  But would have
likely have needed that climb anyway to replace that switch or change ports.
So suppressors at the top will reduce the number of climbs although you will
never know how many times the surge suppressor saved you.

 

Maybe Chuck should put a strike counter circuit in the suppressor and change
to a subscription model.  You have to pay for each strike that he saved you
from.

 

PC

Blaze Broadband

  

 

 

From: Af [mailto:af-boun...@afmug.com] On Behalf Of Gino Villarini via Af
Sent: Monday, September 29, 2014 4:16 PM
To: af@afmug.com
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

 

That was my first thought, but then it requieres a tower climb to change
blown supressors.. 

 

 

 

Gino A. Villarini

President

Aeronet Wireless Broadband Corp.

www.aeronetpr.com   

@aeronetpr

 

 

 

From: "af@afmug.com" 
Reply-To: "af@afmug.com" 
Date: Monday, September 29, 2014 at 4:13 PM
To: "af@afmug.com" 
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

 

We do the Beehive APC surges.




 

Gerard

 

On Mon, Sep 29, 2014 at 4:03 PM, Gino Villarini via Af  wrote:

Those putting Switches at the tower top, what kind of protection are you
using for the Ethernet ports?

 

Are you using surge suppressors? 

 

I was thinking of using Industrial POE switches at the top, feed DC and
fiber, then short runs to the radios (epmp and 450 are poe compliant) 

 

Should I go straigt to the radios? 

 

 

 

Gino A. Villarini

President

Aeronet Wireless Broadband Corp.

www.aeronetpr.com   

@aeronetpr

 

 

 



Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Ken Hohhof via Af
I heard he was being transferred to Hawaii, not fired.
The transfer is probably off now.


From: Eric Kuhnke via Af 
Sent: Monday, September 29, 2014 4:43 PM
To: af@afmug.com 
Subject: Re: [AFMUG] Arson attack on FAA datacenter

considering they found him underneath a table with a knife in hand actively 
trying to cut his own throat, i think being fired is the least of that guy's 
problems right now.


On Mon, Sep 29, 2014 at 2:41 PM, Jaime Solorza via Af  wrote:

  Harris employee.  Fired now

  Jaime Solorza

  On Sep 29, 2014 3:36 PM, "Forrest Christian (List Account) via Af" 
 wrote:

Oh yeah,


I'm in Chicago for a few days.  Flew in on thursday before this happened.   
My wife flew in on Saturday and ended up with a nasty delay in MSP since there 
were very very few flights flying into the affected area, which basically 
includes both chicago airports, and the two airports up in wisconsin.  
Thousands of flights cancelled over the last couple of days.


That's the big news here.

-forrest


On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af  wrote:

  Anyone see this?

  
http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE

  
http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP



  On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When operators, 
controllers and airport managers saw the title, a gasp of disbelief was heard. 
The problem was simple enough to state in three words, and complex enough to 
cancel thousand of flights and cost hundred of millions of dollars: ZAU ATC 
ZERO.

  ZAU is the call sign of the Chicago Air Rout Traffic Control Center 
(ARTCC), which covers northern Illinois and Indiana, southern Wisconsin, 
western Iowa, and south eastern Michigan. There are two "sides" at an ARTCC. 
ZAU-LO handed traffic destined for airports in the covered area, ZAU-HI handled 
traffic overflying. Both were amongst the busiest in the country. ZAU-HI was 
busy with traffic from the east to west, as well as European traffic heading to 
Houston and Dallas-FW, ZAU-LO had to feed in traffic from airports like GYY, 
MKE, RFD, PIA, and the two busiest airports in the area; Chicago Midway 
International and O'Hare International, one of the busiest airports in the 
world.

  On Friday morning, Brian Howard, a contract employee of the FAA and 
holding full credentials to the ZAU datacenters, set a fire in the telecom 
room, destroying 23 of the 29 rack and disconnecting all the controller 
stations from the associated radars and radio transmitters needed to watch and 
guide traffic through the busy sector. As the consoles dropped offline, the ZAU 
duty manager had no choice -- they called ZZZ, the FAA command center and 
reported ATC ZERO -- no controllers available, control center offline. 




Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread George Skorup (Cyber Broadcasting) via Af

Damn, why couldn't it be Durbin that slit his own throat.

On 9/29/2014 5:04 PM, That One Guy via Af wrote:

im going with isis on this

On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af > wrote:


This is only a couple miles from our office.  They had all the
local news choppers up in the air over it on Friday.  I was
surprised that it didn't garner more national coverage.  I guess
since it wasn't the terror threat of the day, it didn't get any
traction.  Just a disgruntled employee.  Even the first reports
said it was not a terrorist act.


On 9/29/2014 4:36 PM, Forrest Christian (List Account) via Af wrote:

Oh yeah,

I'm in Chicago for a few days.  Flew in on thursday before this
happened.   My wife flew in on Saturday and ended up with a nasty
delay in MSP since there were very very few flights flying into
the affected area, which basically includes both chicago
airports, and the two airports up in wisconsin.  Thousands of
flights cancelled over the last couple of days.

That's the big news here.

-forrest

On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af mailto:af@afmug.com>> wrote:

Anyone see this?


http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE


http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP



On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When
operators, controllers and airport managers saw the title, a
gasp of disbelief was heard. The problem was simple enough to
state in three words, and complex enough to cancel thousand
of flights and cost hundred of millions of dollars: ZAU ATC
ZERO

.

ZAU

is the call sign of the Chicago Air Rout Traffic Control
Center (ARTCC), which covers

northern Illinois and Indiana, southern Wisconsin, western
Iowa, and south eastern Michigan. There are two "sides" at an
ARTCC. ZAU-LO handed traffic destined for airports in the
covered area, ZAU-HI handled traffic overflying. Both were
amongst the busiest in the country. ZAU-HI was busy with
traffic from the east to west, as well as European traffic
heading to Houston and Dallas-FW, ZAU-LO had to feed in
traffic from airports like GYY
,
MKE
,
RFD
,
PIA

,
and the two busiest airports in the area; Chicago Midway
International

and O'Hare International
, one
of the busiest airports in the world.

On Friday morning, Brian Howard, a contract employee of the
FAA and holding full credentials to the ZAU datacenters, set
a fire in the telecom room, destroying 23 of the 29


rack and disconnecting all the controller stations from the
associated radars and radio transmitters needed to watch and
guide traffic through the busy sector. As the consoles
dropped offline, the ZAU duty manager had no choice -- they
called ZZZ, the FAA command center
 and reported ATC
ZERO -- no controllers available, control center offline.







--
All parts should go together without forcing. You must remember that 
the parts you are reassembling were disassembled by you. Therefore, if 
you can't get them together again, there must be a reason. By all 
means, do not use a hammer. -- IBM maintenance manual, 1925




Re: [AFMUG] Tower Top Switch Surge Protection Question

2014-09-29 Thread Jaime Solorza via Af
Industrial switch is a good option

Jaime Solorza
On Sep 29, 2014 3:03 PM, "Gino Villarini via Af"  wrote:

>   I was thinking more in the lines of putting a ctm1 on top with the SW,
> the remote resettable surge suppressors of the CTM would save lots of
> downtime and climbs
>
>
>
>  Gino A. Villarini
> President
> Aeronet Wireless Broadband Corp.
> www.aeronetpr.com
> @aeronetpr
>
>
>
>   From: "af@afmug.com" 
> Organization: Blaze Broadband
> Reply-To: "af@afmug.com" 
> Date: Monday, September 29, 2014 at 4:59 PM
> To: "af@afmug.com" 
> Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question
>
>   If you don’t have a surge suppressor then you need a tower climber to
> change the switch.  Either way, a climb is required.
>
>
>
> Remember surge  suppressors are not like fuses.  In the sense that they
> don’t “blow” with every suppression event.  They can shunt some spikes to
> ground, save the switch port, and live to fight another day.  If they do
> give their lives to save the switch then you need a climb.  But would have
> likely have needed that climb anyway to replace that switch or change
> ports.  So suppressors at the top will reduce the number of climbs although
> you will never know how many times the surge suppressor saved you.
>
>
>
> Maybe Chuck should put a strike counter circuit in the suppressor and
> change to a subscription model.  You have to pay for each strike that he
> saved you from.
>
>
>
> PC
>
> Blaze Broadband
>
>
>
>
>
>
>
> *From:* Af [mailto:af-boun...@afmug.com ] *On
> Behalf Of *Gino Villarini via Af
> *Sent:* Monday, September 29, 2014 4:16 PM
> *To:* af@afmug.com
> *Subject:* Re: [AFMUG] Tower Top Switch Surge Protection Question
>
>
>
> That was my first thought, but then it requieres a tower climb to change
> blown supressors..
>
>
>
>
>
>
>
> Gino A. Villarini
>
> President
>
> Aeronet Wireless Broadband Corp.
>
> www.aeronetpr.com
>
> @aeronetpr
>
>
>
>
>
>
>
> *From: *"af@afmug.com" 
> *Reply-To: *"af@afmug.com" 
> *Date: *Monday, September 29, 2014 at 4:13 PM
> *To: *"af@afmug.com" 
> *Subject: *Re: [AFMUG] Tower Top Switch Surge Protection Question
>
>
>
> We do the Beehive APC surges.
>
>
>
>
> Gerard
>
>
>
> On Mon, Sep 29, 2014 at 4:03 PM, Gino Villarini via Af 
> wrote:
>
> Those putting Switches at the tower top, what kind of protection are you
> using for the Ethernet ports?
>
>
>
> Are you using surge suppressors?
>
>
>
> I was thinking of using Industrial POE switches at the top, feed DC and
> fiber, then short runs to the radios (epmp and 450 are poe compliant)
>
>
>
> Should I go straigt to the radios?
>
>
>
>
>
>
>
> Gino A. Villarini
>
> President
>
> Aeronet Wireless Broadband Corp.
>
> www.aeronetpr.com
>
> @aeronetpr
>
>
>
>
>
>
>


Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread That One Guy via Af
im going with isis on this

On Mon, Sep 29, 2014 at 4:44 PM, Nate Burke via Af  wrote:

>  This is only a couple miles from our office.  They had all the local news
> choppers up in the air over it on Friday.  I was surprised that it didn't
> garner more national coverage.  I guess since it wasn't the terror threat
> of the day, it didn't get any traction.  Just a disgruntled employee.  Even
> the first reports said it was not a terrorist act.
>
>
> On 9/29/2014 4:36 PM, Forrest Christian (List Account) via Af wrote:
>
>  Oh yeah,
>
>  I'm in Chicago for a few days.  Flew in on thursday before this
> happened.   My wife flew in on Saturday and ended up with a nasty delay in
> MSP since there were very very few flights flying into the affected area,
> which basically includes both chicago airports, and the two airports up in
> wisconsin.  Thousands of flights cancelled over the last couple of days.
>
>  That's the big news here.
>
> -forrest
>
> On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af  wrote:
>
>> Anyone see this?
>>
>>
>> http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE
>>
>>
>> http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP
>>
>>
>>
>> On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When operators,
>> controllers and airport managers saw the title, a gasp of disbelief was
>> heard. The problem was simple enough to state in three words, and complex
>> enough to cancel thousand of flights and cost hundred of millions of
>> dollars: ZAU ATC ZERO
>> 
>> .
>>
>> ZAU
>> 
>> is the call sign of the Chicago Air Rout Traffic Control Center (ARTCC),
>> which covers 
>> northern Illinois and Indiana, southern Wisconsin, western Iowa, and south
>> eastern Michigan. There are two "sides" at an ARTCC. ZAU-LO handed traffic
>> destined for airports in the covered area, ZAU-HI handled traffic
>> overflying. Both were amongst the busiest in the country. ZAU-HI was busy
>> with traffic from the east to west, as well as European traffic heading to
>> Houston and Dallas-FW, ZAU-LO had to feed in traffic from airports like
>> GYY ,
>> MKE ,
>> RFD ,
>> PIA
>> ,
>> and the two busiest airports in the area; Chicago Midway International
>>  and 
>> O'Hare
>> International
>> , one of
>> the busiest airports in the world.
>>
>> On Friday morning, Brian Howard, a contract employee of the FAA and
>> holding full credentials to the ZAU datacenters, set a fire in the telecom
>> room, destroying 23 of the 29
>> 
>> rack and disconnecting all the controller stations from the associated
>> radars and radio transmitters needed to watch and guide traffic through the
>> busy sector. As the consoles dropped offline, the ZAU duty manager had no
>> choice -- they called ZZZ, the FAA command center
>>  and reported ATC ZERO -- no
>> controllers available, control center offline.
>>
>
>
>


-- 
All parts should go together without forcing. You must remember that the
parts you are reassembling were disassembled by you. Therefore, if you
can't get them together again, there must be a reason. By all means, do not
use a hammer. -- IBM maintenance manual, 1925


Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Nate Burke via Af
This is only a couple miles from our office.  They had all the local 
news choppers up in the air over it on Friday.  I was surprised that it 
didn't garner more national coverage.  I guess since it wasn't the 
terror threat of the day, it didn't get any traction.  Just a 
disgruntled employee.  Even the first reports said it was not a 
terrorist act.



On 9/29/2014 4:36 PM, Forrest Christian (List Account) via Af wrote:

Oh yeah,

I'm in Chicago for a few days.  Flew in on thursday before this 
happened.   My wife flew in on Saturday and ended up with a nasty 
delay in MSP since there were very very few flights flying into the 
affected area, which basically includes both chicago airports, and the 
two airports up in wisconsin. Thousands of flights cancelled over the 
last couple of days.


That's the big news here.

-forrest

On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af > wrote:


Anyone see this?


http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE


http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP



On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When
operators, controllers and airport managers saw the title, a gasp
of disbelief was heard. The problem was simple enough to state in
three words, and complex enough to cancel thousand of flights and
cost hundred of millions of dollars: ZAU ATC ZERO

.

ZAU

is the call sign of the Chicago Air Rout Traffic Control Center
(ARTCC), which covers
 northern
Illinois and Indiana, southern Wisconsin, western Iowa, and south
eastern Michigan. There are two "sides" at an ARTCC. ZAU-LO handed
traffic destined for airports in the covered area, ZAU-HI handled
traffic overflying. Both were amongst the busiest in the country.
ZAU-HI was busy with traffic from the east to west, as well as
European traffic heading to Houston and Dallas-FW, ZAU-LO had to
feed in traffic from airports like GYY
,
MKE
,
RFD
,
PIA

,
and the two busiest airports in the area; Chicago Midway
International
 and
O'Hare International
, one
of the busiest airports in the world.

On Friday morning, Brian Howard, a contract employee of the FAA
and holding full credentials to the ZAU datacenters, set a fire in
the telecom room, destroying 23 of the 29


rack and disconnecting all the controller stations from the
associated radars and radio transmitters needed to watch and guide
traffic through the busy sector. As the consoles dropped offline,
the ZAU duty manager had no choice -- they called ZZZ, the FAA
command center  and
reported ATC ZERO -- no controllers available, control center
offline.






Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Eric Kuhnke via Af
considering they found him underneath a table with a knife in hand actively
trying to cut his own throat, i think being fired is the least of that
guy's problems right now.

On Mon, Sep 29, 2014 at 2:41 PM, Jaime Solorza via Af  wrote:

> Harris employee.  Fired now
>
> Jaime Solorza
> On Sep 29, 2014 3:36 PM, "Forrest Christian (List Account) via Af" <
> af@afmug.com> wrote:
>
>> Oh yeah,
>>
>> I'm in Chicago for a few days.  Flew in on thursday before this
>> happened.   My wife flew in on Saturday and ended up with a nasty delay in
>> MSP since there were very very few flights flying into the affected area,
>> which basically includes both chicago airports, and the two airports up in
>> wisconsin.  Thousands of flights cancelled over the last couple of days.
>>
>> That's the big news here.
>>
>> -forrest
>>
>> On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af  wrote:
>>
>>> Anyone see this?
>>>
>>>
>>> http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE
>>>
>>>
>>> http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP
>>>
>>>
>>>
>>> On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When operators,
>>> controllers and airport managers saw the title, a gasp of disbelief was
>>> heard. The problem was simple enough to state in three words, and complex
>>> enough to cancel thousand of flights and cost hundred of millions of
>>> dollars: ZAU ATC ZERO
>>> 
>>> .
>>>
>>> ZAU
>>> 
>>> is the call sign of the Chicago Air Rout Traffic Control Center (ARTCC),
>>> which covers 
>>> northern Illinois and Indiana, southern Wisconsin, western Iowa, and south
>>> eastern Michigan. There are two "sides" at an ARTCC. ZAU-LO handed traffic
>>> destined for airports in the covered area, ZAU-HI handled traffic
>>> overflying. Both were amongst the busiest in the country. ZAU-HI was busy
>>> with traffic from the east to west, as well as European traffic heading to
>>> Houston and Dallas-FW, ZAU-LO had to feed in traffic from airports like
>>> GYY ,
>>> MKE
>>> ,
>>> RFD
>>> ,
>>> PIA
>>> ,
>>> and the two busiest airports in the area; Chicago Midway International
>>>  and 
>>> O'Hare
>>> International
>>> , one of
>>> the busiest airports in the world.
>>>
>>> On Friday morning, Brian Howard, a contract employee of the FAA and
>>> holding full credentials to the ZAU datacenters, set a fire in the telecom
>>> room, destroying 23 of the 29
>>> 
>>> rack and disconnecting all the controller stations from the associated
>>> radars and radio transmitters needed to watch and guide traffic through the
>>> busy sector. As the consoles dropped offline, the ZAU duty manager had no
>>> choice -- they called ZZZ, the FAA command center
>>>  and reported ATC ZERO -- no
>>> controllers available, control center offline.
>>>
>>
>>


Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Jaime Solorza via Af
Harris employee.  Fired now

Jaime Solorza
On Sep 29, 2014 3:36 PM, "Forrest Christian (List Account) via Af" <
af@afmug.com> wrote:

> Oh yeah,
>
> I'm in Chicago for a few days.  Flew in on thursday before this
> happened.   My wife flew in on Saturday and ended up with a nasty delay in
> MSP since there were very very few flights flying into the affected area,
> which basically includes both chicago airports, and the two airports up in
> wisconsin.  Thousands of flights cancelled over the last couple of days.
>
> That's the big news here.
>
> -forrest
>
> On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af  wrote:
>
>> Anyone see this?
>>
>>
>> http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE
>>
>>
>> http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP
>>
>>
>>
>> On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When operators,
>> controllers and airport managers saw the title, a gasp of disbelief was
>> heard. The problem was simple enough to state in three words, and complex
>> enough to cancel thousand of flights and cost hundred of millions of
>> dollars: ZAU ATC ZERO
>> 
>> .
>>
>> ZAU
>> 
>> is the call sign of the Chicago Air Rout Traffic Control Center (ARTCC),
>> which covers 
>> northern Illinois and Indiana, southern Wisconsin, western Iowa, and south
>> eastern Michigan. There are two "sides" at an ARTCC. ZAU-LO handed traffic
>> destined for airports in the covered area, ZAU-HI handled traffic
>> overflying. Both were amongst the busiest in the country. ZAU-HI was busy
>> with traffic from the east to west, as well as European traffic heading to
>> Houston and Dallas-FW, ZAU-LO had to feed in traffic from airports like
>> GYY ,
>> MKE ,
>> RFD ,
>> PIA
>> ,
>> and the two busiest airports in the area; Chicago Midway International
>>  and 
>> O'Hare
>> International
>> , one of
>> the busiest airports in the world.
>>
>> On Friday morning, Brian Howard, a contract employee of the FAA and
>> holding full credentials to the ZAU datacenters, set a fire in the telecom
>> room, destroying 23 of the 29
>> 
>> rack and disconnecting all the controller stations from the associated
>> radars and radio transmitters needed to watch and guide traffic through the
>> busy sector. As the consoles dropped offline, the ZAU duty manager had no
>> choice -- they called ZZZ, the FAA command center
>>  and reported ATC ZERO -- no
>> controllers available, control center offline.
>>
>
>


Re: [AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Forrest Christian (List Account) via Af
Oh yeah,

I'm in Chicago for a few days.  Flew in on thursday before this happened.
My wife flew in on Saturday and ended up with a nasty delay in MSP since
there were very very few flights flying into the affected area, which
basically includes both chicago airports, and the two airports up in
wisconsin.  Thousands of flights cancelled over the last couple of days.

That's the big news here.

-forrest

On Mon, Sep 29, 2014 at 3:24 PM, Eric Kuhnke via Af  wrote:

> Anyone see this?
>
>
> http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE
>
>
> http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP
>
>
>
> On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When operators,
> controllers and airport managers saw the title, a gasp of disbelief was
> heard. The problem was simple enough to state in three words, and complex
> enough to cancel thousand of flights and cost hundred of millions of
> dollars: ZAU ATC ZERO
> 
> .
>
> ZAU
> 
> is the call sign of the Chicago Air Rout Traffic Control Center (ARTCC),
> which covers 
> northern Illinois and Indiana, southern Wisconsin, western Iowa, and south
> eastern Michigan. There are two "sides" at an ARTCC. ZAU-LO handed traffic
> destined for airports in the covered area, ZAU-HI handled traffic
> overflying. Both were amongst the busiest in the country. ZAU-HI was busy
> with traffic from the east to west, as well as European traffic heading to
> Houston and Dallas-FW, ZAU-LO had to feed in traffic from airports like
> GYY , MKE
> , RFD
> , PIA
> ,
> and the two busiest airports in the area; Chicago Midway International
>  and O'Hare
> International
> , one of the
> busiest airports in the world.
>
> On Friday morning, Brian Howard, a contract employee of the FAA and
> holding full credentials to the ZAU datacenters, set a fire in the telecom
> room, destroying 23 of the 29
> 
> rack and disconnecting all the controller stations from the associated
> radars and radio transmitters needed to watch and guide traffic through the
> busy sector. As the consoles dropped offline, the ZAU duty manager had no
> choice -- they called ZZZ, the FAA command center
>  and reported ATC ZERO -- no
> controllers available, control center offline.
>


[AFMUG] Arson attack on FAA datacenter

2014-09-29 Thread Eric Kuhnke via Af
Anyone see this?

http://posttrib.suntimes.com/30167722-537/flight-delays-to-continue-after-arson.html#.VCnNuOeXtGE

http://www.metafilter.com/143174/ATCSCC-ADVZY-020-DCC-ZAU-09-26-2014-ZAU-GROUND-STOP



On Friday, ATCSCC Advisory 20 of 26-Sep-2014 went out. When operators,
controllers and airport managers saw the title, a gasp of disbelief was
heard. The problem was simple enough to state in three words, and complex
enough to cancel thousand of flights and cost hundred of millions of
dollars: ZAU ATC ZERO

.

ZAU 
is the call sign of the Chicago Air Rout Traffic Control Center (ARTCC),
which covers  northern
Illinois and Indiana, southern Wisconsin, western Iowa, and south eastern
Michigan. There are two "sides" at an ARTCC. ZAU-LO handed traffic destined
for airports in the covered area, ZAU-HI handled traffic overflying. Both
were amongst the busiest in the country. ZAU-HI was busy with traffic from
the east to west, as well as European traffic heading to Houston and
Dallas-FW, ZAU-LO had to feed in traffic from airports like GYY
, MKE
, RFD
, PIA
,
and the two busiest airports in the area; Chicago Midway International
 and O'Hare
International ,
one of the busiest airports in the world.

On Friday morning, Brian Howard, a contract employee of the FAA and holding
full credentials to the ZAU datacenters, set a fire in the telecom room,
destroying 23 of the 29

rack and disconnecting all the controller stations from the associated
radars and radio transmitters needed to watch and guide traffic through the
busy sector. As the consoles dropped offline, the ZAU duty manager had no
choice -- they called ZZZ, the FAA command center
 and reported ATC ZERO -- no
controllers available, control center offline.


[AFMUG] Powering a PTP250

2014-09-29 Thread Paul McCall via Af
Is there an easy way to power up (and run) a PTP250 other than the built in 
power supply ?   I don't mind getting creative if need be.

Paul

Paul McCall, Pres.
PDMNet / Florida Broadband
658 Old Dixie Highway
Vero Beach, FL 32962
772-564-6800 office
772-473-0352 cell
www.pdmnet.com
pa...@pdmnet.net



Re: [AFMUG] Tower Top Switch Surge Protection Question

2014-09-29 Thread Gino Villarini via Af
I was thinking more in the lines of putting a ctm1 on top with the SW, the 
remote resettable surge suppressors of the CTM would save lots of downtime and 
climbs



Gino A. Villarini
President
Aeronet Wireless Broadband Corp.
www.aeronetpr.com
@aeronetpr



From: "af@afmug.com" mailto:af@afmug.com>>
Organization: Blaze Broadband
Reply-To: "af@afmug.com" 
mailto:af@afmug.com>>
Date: Monday, September 29, 2014 at 4:59 PM
To: "af@afmug.com" mailto:af@afmug.com>>
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

If you don’t have a surge suppressor then you need a tower climber to change 
the switch.  Either way, a climb is required.

Remember surge  suppressors are not like fuses.  In the sense that they don’t 
“blow” with every suppression event.  They can shunt some spikes to ground, 
save the switch port, and live to fight another day.  If they do give their 
lives to save the switch then you need a climb.  But would have likely have 
needed that climb anyway to replace that switch or change ports.  So 
suppressors at the top will reduce the number of climbs although you will never 
know how many times the surge suppressor saved you.

Maybe Chuck should put a strike counter circuit in the suppressor and change to 
a subscription model.  You have to pay for each strike that he saved you from.

PC
Blaze Broadband



From: Af [mailto:af-boun...@afmug.com] On Behalf Of Gino Villarini via Af
Sent: Monday, September 29, 2014 4:16 PM
To: af@afmug.com
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

That was my first thought, but then it requieres a tower climb to change blown 
supressors..



Gino A. Villarini
President
Aeronet Wireless Broadband Corp.
www.aeronetpr.com
@aeronetpr



From: "af@afmug.com" mailto:af@afmug.com>>
Reply-To: "af@afmug.com" 
mailto:af@afmug.com>>
Date: Monday, September 29, 2014 at 4:13 PM
To: "af@afmug.com" mailto:af@afmug.com>>
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

We do the Beehive APC surges.


Gerard

On Mon, Sep 29, 2014 at 4:03 PM, Gino Villarini via Af 
mailto:af@afmug.com>> wrote:
Those putting Switches at the tower top, what kind of protection are you using 
for the Ethernet ports?

Are you using surge suppressors?

I was thinking of using Industrial POE switches at the top, feed DC and fiber, 
then short runs to the radios (epmp and 450 are poe compliant)

Should I go straigt to the radios?



Gino A. Villarini
President
Aeronet Wireless Broadband Corp.
www.aeronetpr.com
@aeronetpr





Re: [AFMUG] Tower Top Switch Surge Protection Question

2014-09-29 Thread Chuck McCown via Af
Ohhh.  Yeah...  

Or perhaps just a subscription service.  You buy blocks of spikes.  When it is 
used up the surge suppressor goes into a failure mode.  

Send the unit back to me to get reloaded with fresh spike protection.  $10 
shipping and handling.  3 cents per spike protection, purchased in blocks of 
1000.  

From: Paul Conlin via Af 
Sent: Monday, September 29, 2014 2:59 PM
To: af@afmug.com 
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

If you don’t have a surge suppressor then you need a tower climber to change 
the switch.  Either way, a climb is required.

 

Remember surge  suppressors are not like fuses.  In the sense that they don’t 
“blow” with every suppression event.  They can shunt some spikes to ground, 
save the switch port, and live to fight another day.  If they do give their 
lives to save the switch then you need a climb.  But would have likely have 
needed that climb anyway to replace that switch or change ports.  So 
suppressors at the top will reduce the number of climbs although you will never 
know how many times the surge suppressor saved you.

 

Maybe Chuck should put a strike counter circuit in the suppressor and change to 
a subscription model.  You have to pay for each strike that he saved you from.

 

PC

Blaze Broadband

  

 

 

From: Af [mailto:af-boun...@afmug.com] On Behalf Of Gino Villarini via Af
Sent: Monday, September 29, 2014 4:16 PM
To: af@afmug.com
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

 

That was my first thought, but then it requieres a tower climb to change blown 
supressors.. 

 

 

 

Gino A. Villarini

President

Aeronet Wireless Broadband Corp.

www.aeronetpr.com   

@aeronetpr

 

 

 

From: "af@afmug.com" 
Reply-To: "af@afmug.com" 
Date: Monday, September 29, 2014 at 4:13 PM
To: "af@afmug.com" 
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

 

We do the Beehive APC surges.




 

Gerard

 

On Mon, Sep 29, 2014 at 4:03 PM, Gino Villarini via Af  wrote:

Those putting Switches at the tower top, what kind of protection are you using 
for the Ethernet ports?

 

Are you using surge suppressors? 

 

I was thinking of using Industrial POE switches at the top, feed DC and fiber, 
then short runs to the radios (epmp and 450 are poe compliant) 

 

Should I go straigt to the radios? 

 

 

 

Gino A. Villarini

President

Aeronet Wireless Broadband Corp.

www.aeronetpr.com   

@aeronetpr

 

 

 


Re: [AFMUG] Tower Top Switch Surge Protection Question

2014-09-29 Thread Paul Conlin via Af
If you don't have a surge suppressor then you need a tower climber to change
the switch.  Either way, a climb is required.

 

Remember surge  suppressors are not like fuses.  In the sense that they
don't "blow" with every suppression event.  They can shunt some spikes to
ground, save the switch port, and live to fight another day.  If they do
give their lives to save the switch then you need a climb.  But would have
likely have needed that climb anyway to replace that switch or change ports.
So suppressors at the top will reduce the number of climbs although you will
never know how many times the surge suppressor saved you.

 

Maybe Chuck should put a strike counter circuit in the suppressor and change
to a subscription model.  You have to pay for each strike that he saved you
from.

 

PC

Blaze Broadband

  

 

 

From: Af [mailto:af-boun...@afmug.com] On Behalf Of Gino Villarini via Af
Sent: Monday, September 29, 2014 4:16 PM
To: af@afmug.com
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

 

That was my first thought, but then it requieres a tower climb to change
blown supressors.. 

 

 

 

Gino A. Villarini

President

Aeronet Wireless Broadband Corp.

www.aeronetpr.com   

@aeronetpr

 

 

 

From: "af@afmug.com" 
Reply-To: "af@afmug.com" 
Date: Monday, September 29, 2014 at 4:13 PM
To: "af@afmug.com" 
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

 

We do the Beehive APC surges.




 

Gerard

 

On Mon, Sep 29, 2014 at 4:03 PM, Gino Villarini via Af  wrote:

Those putting Switches at the tower top, what kind of protection are you
using for the Ethernet ports?

 

Are you using surge suppressors? 

 

I was thinking of using Industrial POE switches at the top, feed DC and
fiber, then short runs to the radios (epmp and 450 are poe compliant) 

 

Should I go straigt to the radios? 

 

 

 

Gino A. Villarini

President

Aeronet Wireless Broadband Corp.

www.aeronetpr.com   

@aeronetpr

 

 

 



Re: [AFMUG] Tower Top Switch Surge Protection Question

2014-09-29 Thread George Skorup (Cyber Broadcasting) via Af

The 450 is PoE compliant how?

On 9/29/2014 3:03 PM, Gino Villarini via Af wrote:
Those putting Switches at the tower top, what kind of protection are 
you using for the Ethernet ports?


Are you using surge suppressors?

I was thinking of using Industrial POE switches at the top, feed DC 
and fiber, then short runs to the radios (epmp and 450 are poe compliant)


Should I go straigt to the radios?



Gino A. Villarini
President
Aeronet Wireless Broadband Corp.
www.aeronetpr.com
@aeronetpr






Re: [AFMUG] Tower Top Switch Surge Protection Question

2014-09-29 Thread Gino Villarini via Af
How do you feed poe?



Gino A. Villarini
President
Aeronet Wireless Broadband Corp.
www.aeronetpr.com
@aeronetpr



From: "af@afmug.com" mailto:af@afmug.com>>
Reply-To: "af@afmug.com" 
mailto:af@afmug.com>>
Date: Monday, September 29, 2014 at 4:20 PM
To: "af@afmug.com" mailto:af@afmug.com>>
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

We use Cisco 2955T and a fiber converter.  We don’t use surge suppression, but 
we also ground the shielding as it enters the metal box (don’t use plastic up 
top).

Eric Rogers
Precision Data Solutions, LLC
(317) 831-3000 x200


From: Af [mailto:af-boun...@afmug.com] On Behalf Of Gino Villarini via Af
Sent: Monday, September 29, 2014 4:04 PM
To: af@afmug.com
Subject: [AFMUG] Tower Top Switch Surge Protection Question

Those putting Switches at the tower top, what kind of protection are you using 
for the Ethernet ports?

Are you using surge suppressors?

I was thinking of using Industrial POE switches at the top, feed DC and fiber, 
then short runs to the radios (epmp and 450 are poe compliant)

Should I go straigt to the radios?



Gino A. Villarini
President
Aeronet Wireless Broadband Corp.
www.aeronetpr.com
@aeronetpr




Re: [AFMUG] SiteMonitor: Loss of sync

2014-09-29 Thread Forrest Christian (List Account) via Af
A little out of order:

On the OID's .. you may have the wrong OID.  There is an oid for the title
strings, and an oid for the value.  You may want to check the oid you are
using.   In addition, on the strings tab, there *are* strings which list
the specific statellite and signal strength of all of the sats it is
receiving a signal from.

One more troubleshooting item is the 'pulse received' counter on the analog
tab.  It should increment once and exactly once per second.  I've had good
luck comparing this value over a specific time.  I.E. at exactly 10
minutes, there should be exactly 600 more pulses.

As far as fixing it:  I'd move the syncpipe, then try a different one.   If
a second does the same thing, then we need to look at what else might be
causing it.

If you want to send in screenshots to cust...@packetflux.com of the
boolean/analog/string tabs from the sitemonitor, I might be able to see
something.

-forrest


On Sep 29, 2014 1:40 PM, "Bill Prince via Af"  wrote:

>
> One of our many locations where we're using a Packetflux sync
> pipe/injector seems to be losing satellite lock once every few days.
> Typically it loses it for 2 to 4 seconds, but I've seen at least once where
> it went 13 seconds.
>
> I've not been able to get useful information from the SiteMonitor because
> the satellites tracked/Visible OIDs are returning a string with "Sats in
> View" and "Num Sats Used" instead of the actual values. (is that a bug or
> what? This is on F/W "Jul 29 2012").
>
> However, I'm getting messages like this in the AP logs:
>
> 09/21/2014 : 07:49:00 PDT : : Bridge Core : Loss of sync pulse from Power
> Port! No other sync source available.
> 09/21/2014 : 07:49:04 PDT : : Bridge Core : Acquired sync pulse from Power
> Port.
> 09/23/2014 : 18:49:37 PDT : : Bridge Core : Loss of sync pulse from Power
> Port! No other sync source available.
> 09/23/2014 : 18:49:41 PDT : : Bridge Core : Acquired sync pulse from Power
> Port.
> 09/23/2014 : 18:49:55 PDT : : Bridge Core : Loss of sync pulse from Power
> Port! No other sync source available.
> 09/23/2014 : 18:49:59 PDT : : Bridge Core : Acquired sync pulse from Power
> Port.
> 09/24/2014 : 18:47:15 PDT : : Bridge Core : Loss of sync pulse from Power
> Port! No other sync source available.
> 09/24/2014 : 18:47:28 PDT : : Bridge Core : Acquired sync pulse from Power
> Port.
> 09/27/2014 : 07:24:18 PDT : : Bridge Core : Loss of sync pulse from Power
> Port! No other sync source available.
> 09/27/2014 : 07:24:20 PDT : : Bridge Core : Acquired sync pulse from Power
> Port.
>
> Not sure what I might do here.  This is with all the equipment up against
> a concrete wall, so there is only a 180 degree view of the sky.  Maybe a
> little bit less than that because the wall is not flat, maybe about 170
> degree view of the sky.
>
> The APs are PMP450, and rarely get a GPS lock on the internal GPS.  Maybe
> I can try moving the sync pipe away from the wall or something.
>
>
> --
> bp
>
>


Re: [AFMUG] Power up the tower?

2014-09-29 Thread Gerard Dupont III via Af
Our Top boxes usually contain the following.

1x Sitemonitor
2x GigabitSyncInjectors
1x Citel DS210-48DC
2x Traco TCL 060-124 DC Down Convertors -
http://www.tracopower.com/products/tcl-dc.pdf
1x RB2011
2x APC PRM4 Surge Chasis
8x GigEAPC-HV



Gerard

On Sun, Sep 28, 2014 at 10:57 AM, Chuck Hogg via Af  wrote:

> We use this, and solder two legs together.  We send 48v DC up to the top
> and downconvert.  I think we've gone about 450' with this configuration
> (including up the tower and along the cable raceway to the inside of a
> building)  However, that's primarily why we send 48v up and downconvert,
> because of the voltage loss.  Gives very clean 24v power to the equipment.
>
> http://www.amazon.com/Cable-Portable-Power-Gauge-Conductor/dp/B0076ZT4C2
>
> It would probably be better for me to take a picture of one of our boxes.
> We are continually building them as we continue our wireless upgrades.
>
> I don't remember if Gerard resub'd to this list after it moved, but he's
> the engineer behind the box.  He can give you parts.
>
> Regards,
> Chuck
>
> On Sun, Sep 28, 2014 at 10:07 AM, Tyson Burris @ Internet Comm. Inc via Af
>  wrote:
>
>> Chuck,
>>
>> Are you doing any 8-10 gauge runs exceeding 500' ?
>>
>> I can't seem to find what I need
>>
>> Sent from my iPhone
>>
>> On Sep 28, 2014, at 9:50 AM, Chuck Hogg via Af  wrote:
>>
>> We do power and fiber up the tower as our standard...ever since that
>> standard has been used, I don't think we've lost a site yet.
>>
>> Regards,
>> Chuck
>>
>> On Sat, Sep 27, 2014 at 4:32 PM, Matt via Af  wrote:
>>
>>> This is what we have used for all our CMM units for years.
>>>
>>> http://www.outdoorspeakerdepot.com/14ga2inspca5.html
>>>
>>> Outdoor, UV resistant, etc.
>>>
>>>
>>>
>>> On Sat, Sep 27, 2014 at 1:16 PM, Gino Villarini via Af 
>>> wrote:
>>> > Planning on hanging a DC box on the tower
>>> >
>>> > 30-40w total power
>>> >
>>> > Cat5 using multiple pairs or 2 conductor cable?
>>> >
>>> > We are inclined on cat 5 for standardization purposes...
>>> >
>>> > Sent from Marconi's and Graham Bell's fused thoughts!!!
>>> >
>>>
>>
>>
>


Re: [AFMUG] Tower Top Switch Surge Protection Question

2014-09-29 Thread Eric Rogers via Af
We use Cisco 2955T and a fiber converter.  We don't use surge
suppression, but we also ground the shielding as it enters the metal box
(don't use plastic up top).

 

Eric Rogers

Precision Data Solutions, LLC

(317) 831-3000 x200

 

 

From: Af [mailto:af-boun...@afmug.com] On Behalf Of Gino Villarini via
Af
Sent: Monday, September 29, 2014 4:04 PM
To: af@afmug.com
Subject: [AFMUG] Tower Top Switch Surge Protection Question

 

Those putting Switches at the tower top, what kind of protection are you
using for the Ethernet ports?

 

Are you using surge suppressors? 

 

I was thinking of using Industrial POE switches at the top, feed DC and
fiber, then short runs to the radios (epmp and 450 are poe compliant) 

 

Should I go straigt to the radios? 

 

 

 

Gino A. Villarini

President

Aeronet Wireless Broadband Corp.

www.aeronetpr.com   

@aeronetpr

 

 



Re: [AFMUG] Tower Top Switch Surge Protection Question

2014-09-29 Thread Ty Featherling via Af
That is why we haven't used surge protection for tower-top switches. If I
were using more expensive switches up there I might reconsider.

-Ty

On Mon, Sep 29, 2014 at 3:15 PM, Gino Villarini via Af  wrote:

>   That was my first thought, but then it requieres a tower climb to
> change blown supressors..
>
>
>
>  Gino A. Villarini
> President
> Aeronet Wireless Broadband Corp.
> www.aeronetpr.com
> @aeronetpr
>
>
>
>   From: "af@afmug.com" 
> Reply-To: "af@afmug.com" 
> Date: Monday, September 29, 2014 at 4:13 PM
> To: "af@afmug.com" 
> Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question
>
>   We do the Beehive APC surges.
>
>
>  Gerard
>
> On Mon, Sep 29, 2014 at 4:03 PM, Gino Villarini via Af 
> wrote:
>
>>  Those putting Switches at the tower top, what kind of protection are
>> you using for the Ethernet ports?
>>
>>  Are you using surge suppressors?
>>
>>  I was thinking of using Industrial POE switches at the top, feed DC and
>> fiber, then short runs to the radios (epmp and 450 are poe compliant)
>>
>>  Should I go straigt to the radios?
>>
>>
>>
>>  Gino A. Villarini
>> President
>> Aeronet Wireless Broadband Corp.
>> www.aeronetpr.com
>> @aeronetpr
>>
>>
>>
>


Re: [AFMUG] Tower Top Switch Surge Protection Question

2014-09-29 Thread Gino Villarini via Af
That was my first thought, but then it requieres a tower climb to change blown 
supressors..



Gino A. Villarini
President
Aeronet Wireless Broadband Corp.
www.aeronetpr.com
@aeronetpr



From: "af@afmug.com" mailto:af@afmug.com>>
Reply-To: "af@afmug.com" 
mailto:af@afmug.com>>
Date: Monday, September 29, 2014 at 4:13 PM
To: "af@afmug.com" mailto:af@afmug.com>>
Subject: Re: [AFMUG] Tower Top Switch Surge Protection Question

We do the Beehive APC surges.


Gerard

On Mon, Sep 29, 2014 at 4:03 PM, Gino Villarini via Af 
mailto:af@afmug.com>> wrote:
Those putting Switches at the tower top, what kind of protection are you using 
for the Ethernet ports?

Are you using surge suppressors?

I was thinking of using Industrial POE switches at the top, feed DC and fiber, 
then short runs to the radios (epmp and 450 are poe compliant)

Should I go straigt to the radios?



Gino A. Villarini
President
Aeronet Wireless Broadband Corp.
www.aeronetpr.com
@aeronetpr





Re: [AFMUG] Tower Top Switch Surge Protection Question

2014-09-29 Thread Gerard Dupont III via Af
We do the Beehive APC surges.


Gerard

On Mon, Sep 29, 2014 at 4:03 PM, Gino Villarini via Af  wrote:

>  Those putting Switches at the tower top, what kind of protection are you
> using for the Ethernet ports?
>
>  Are you using surge suppressors?
>
>  I was thinking of using Industrial POE switches at the top, feed DC and
> fiber, then short runs to the radios (epmp and 450 are poe compliant)
>
>  Should I go straigt to the radios?
>
>
>
>  Gino A. Villarini
> President
> Aeronet Wireless Broadband Corp.
> www.aeronetpr.com
> @aeronetpr
>
>
>


[AFMUG] Tower Top Switch Surge Protection Question

2014-09-29 Thread Gino Villarini via Af
Those putting Switches at the tower top, what kind of protection are you using 
for the Ethernet ports?

Are you using surge suppressors?

I was thinking of using Industrial POE switches at the top, feed DC and fiber, 
then short runs to the radios (epmp and 450 are poe compliant)

Should I go straigt to the radios?



Gino A. Villarini
President
Aeronet Wireless Broadband Corp.
www.aeronetpr.com
@aeronetpr




Re: [AFMUG] Bash specially-craftedenvironment variablescodeinjection attack

2014-09-29 Thread Shayne Lebrun via Af
If you’re a bad guy, and you found it, you wouldn’t advertise it.  If you’re a 
good guy, well, somebody found it by poking at it.  But yes, it’s 22 years old. 
 There’s a 25 year old X11 bug that came out a few months back.  The Heartbleed 
bug had been there a while, too, and was, in part, due to legacy cruft, IIRC.

 

Many eyes don’t make for shallow bugs.  Many *motivated* eyes make for shallow 
bugs.  Microsoft has their SDL wherein they look for this sort of thing, 
because they’ve been spanked.  OSS just assumes that somebody will get bored 
and find it, yes.

 

From: Af [mailto:af-boun...@afmug.com] On Behalf Of Ken Hohhof via Af
Sent: Monday, September 29, 2014 3:07 PM
To: af@afmug.com
Subject: Re: [AFMUG] Bash specially-craftedenvironment variablescodeinjection 
attack

 

Supposedly bash has been vulnerable since around 1992.  That’s 22 years.  You 
want to tell me no one, absolutely no one (not even the NSA) has found and 
exploited this previously?  And not shared it publicly?

 

 

 

From: Josh Reynolds via Af   

Sent: Monday, September 29, 2014 1:56 PM

To: af@afmug.com 

Subject: Re: [AFMUG] Bash specially-craftedenvironment variablescodeinjection 
attack

 

FWIW, there is a *new* bash CVE out today.

Time to upgrade again :)

Josh Reynolds, Chief Information Officer
SPITwSPOTS, www.spitwspots.com

On 09/29/2014 10:08 AM, Ken Hohhof via Af wrote:

Scary, looking at my bookshelf I see boxes for RHL 8.0 and RHEL 2, 3 and 4.  
RHEL 4 came out in 2005 and went on extended support in 2012.  Needless to say, 
I’m not paying for an extended support contract.  So this is ancient stuff.  
But you’re not exactly going to build a new server for legacy customers of a 
service you stopped offering 5 years ago.  At some point you move them to a 
reseller service, or just tell them it’s time to move on.

 

The newer CentOS distributions have I think about 10 years of updates, that’s 
the main difference for RHEL and CentOS from other Linux distributions, they 
tend to have longer life cycles since they are aimed at enterprise.  The 
downside is they are typically several steps back from the latest versions of 
packages.  For example, don’t try using the version of BIND that comes with 
even the newest distribution.  It’s like Windows, you still find a lot of Win7 
in the enterprise market, Microsoft pretty much had to force them off XP.

 

 

From: Timothy D. McNabb via Af   

Sent: Monday, September 29, 2014 12:33 PM

To: af@afmug.com 

Subject: Re: [AFMUG] Bash specially-craftedenvironment variablescodeinjection 
attack

 

TBH there is one thing I love most about a CentOS distro over Windows. 
IPTables. Windows firewall is pretty lame in comparison, with open ports you 
will “possibly” use. At least IP tables initially comes with a “block all” 
setup and you just go in and poke the tiny holes you need. Obviously a 
security-conscious person is going to shutdown system services you don’t need, 
but for the initial setup IPtables is pretty badass (and far more simple).

 

@Ken, I am in the same boat as you. We applied updates Thursday and again 
Friday for bash on our CentOS 5/6 boxes. So far so good though, I’ve been 
monitoring the logs of our boxes running httpd and so far nothing out of the 
ordinary has appeared.

 

-Tim

 

From: Af [mailto:af-bounces+tim=velociter@afmug.com] On Behalf Of Shayne 
Lebrun via Af
Sent: Monday, September 29, 2014 4:51 AM
To: af@afmug.com
Subject: Re: [AFMUG] Bash specially-crafted environment variablescodeinjection 
attack

 

Originally, I responded to this:

Ø  “I think the articles have maybe overstated the risk a bit, since you would 
need to either authenticate (at least as a regular user) to get to a shell, or 
find a publicly exposed script that will pass an environment variable to bash 
for you.

And asked you not to think about security in those terms.  Don’t assume you 
understand all the possible attack vectors, don’t assume that because certain 
other things need to happen, you’re invulnerable, etc etc.  When you get right 
down to it, though, UNIX really wants to land you at a shell, and bash is the 
default shell in a lot of places.

 

You’re certainly listed a whole bunch of issues in the software world at large, 
dedicated applicances, etc etc and I certainly sympathize with a lot of the 
issues you’ve raised.

 

Of course, the slightly less empathetic sysadmin in me says ‘too bad; you put 
public-facing server on the Internet, you have an obligation, and a 
responsibility to maintain it properly.’  I argue in my head with him A LOT.

 

Yes, absolutely, you can mitigate the issues you raised in your last email to a 
very reasonable degree with proper firewalling, internal processes, etc etc.  
And it sounds like you’re cognizant of the need to do that, so that’s great too.

 

 

From: Af [mailto:af-bounces+slebrun=muskoka@afmug.com] On Behalf Of Ken 
Hohhof via Af
Sent: Sunday, September 28

Re: [AFMUG] 477 filing - delayed?

2014-09-29 Thread Glen Waldrop via Af
signatureSure they will.

They'll probably fine you more than you'll make in ten years while they accept 
it.


  - Original Message - 
  From: Randy Cosby via Af 
  To: af@afmug.com 
  Sent: Monday, September 29, 2014 2:29 PM
  Subject: Re: [AFMUG] 477 filing - delayed?


  http://www.fcc.gov/encyclopedia/form-477-resources-filers

  The deadline for the submission of data as of June 30, 2014 has been extended 
beyond October 1. Once the site reopens, we will announce the new filing 
deadline.

  If I'm ever late on my 477, do you think they'll accept "temporarily 
unavailable due to technical issues" from me?



  On 9/29/2014 11:45 AM, Jay Weekley via Af wrote:

And still down. 

Patrick Wheeland via Af wrote: 

  I have one last form to submit and it's still down.  :-/ 


  On Fri, Sep 26, 2014 at 2:54 PM, Randy Cosby via Af mailto:af@afmug.com>> wrote: 


  "The Form 477 filing interface is temporarily unavailable. We have 
  identified an issue that developed on September 25, 2014 and are 
  working to fix the problem and reopen the site as soon as 
  possible. We apologize for the inconvenience" 

  https://apps2.fcc.gov/ 



  -- 
   Randy Cosby 
  InfoWest, Inc 
  435-674-0165 x 2010  
  infowest.com  


  This e-mail message contains information from InfoWest, Inc 
  and is for the sole use of the intended recipient(s) and may 
  contain privileged, proprietary or confidential information. 

  Unauthorized use, distribution, review or disclosure is 
  prohibited. If you are not the intended recipient, please 
  contactrco...@infowest.com    by reply 
email and destroy 
  the original message, all attachments and copies. 







  -- 


   Randy Cosby
InfoWest, Inc
435-674-0165 x 2010
infowest.com
   


This e-mail message contains information from InfoWest, Inc 
and is for the sole use of the intended recipient(s) and may 
contain privileged, proprietary or confidential information.  

Unauthorized use, distribution, review or disclosure is 
prohibited. If you are not the intended recipient, please 
contact rco...@infowest.com by reply email and destroy 
the original message, all attachments and copies.



Re: [AFMUG] Fall colors

2014-09-29 Thread Tyler Treat via Af
?I am beyond jealous.


From: Af  on behalf of Sean Heskett via Af 
Sent: Monday, September 29, 2014 2:20 PM
To: af@afmug.com
Subject: [AFMUG] Fall colors

i thought y'all might enjoy some pics from one of our towers.



Re: [AFMUG] 477 filing - delayed?

2014-09-29 Thread Randy Cosby via Af

*http://www.fcc.gov/encyclopedia/form-477-resources-filers
*
The deadline for the submission of data as of June 30, 2014 has been 
extended 
 beyond 
October 1. Once the site reopens, we will announce the new filing deadline.


*If I'm ever late on my 477, do you think they'll accept "temporarily 
unavailable due to technical issues" from me?



*
On 9/29/2014 11:45 AM, Jay Weekley via Af wrote:

And still down.

Patrick Wheeland via Af wrote:

I have one last form to submit and it's still down.  :-/


On Fri, Sep 26, 2014 at 2:54 PM, Randy Cosby via Af > wrote:



"The Form 477 filing interface is temporarily unavailable. We have
identified an issue that developed on September 25, 2014 and are
working to fix the problem and reopen the site as soon as
possible. We apologize for the inconvenience"

https://apps2.fcc.gov/



--
 Randy Cosby
InfoWest, Inc
435-674-0165 x 2010 
infowest.com 


This e-mail message contains information from InfoWest, Inc
and is for the sole use of the intended recipient(s) and may
contain privileged, proprietary or confidential information.

Unauthorized use, distribution, review or disclosure is
prohibited. If you are not the intended recipient, please
contactrco...@infowest.com   by reply 
email and destroy

the original message, all attachments and copies.






--
signature
Randy Cosby
InfoWest, Inc
435-674-0165 x 2010
infowest.com 


This e-mail message contains information from InfoWest, Inc
and is for the sole use of the intended recipient(s) and may
contain privileged, proprietary or confidential information.

Unauthorized use, distribution, review or disclosure is
prohibited. If you are not the intended recipient, please
contactrco...@infowest.com  by reply email and destroy
the original message, all attachments and copies.



Re: [AFMUG] Bash specially-craftedenvironment variablescodeinjection attack

2014-09-29 Thread Ken Hohhof via Af
Supposedly bash has been vulnerable since around 1992.  That’s 22 years.  You 
want to tell me no one, absolutely no one (not even the NSA) has found and 
exploited this previously?  And not shared it publicly?



From: Josh Reynolds via Af 
Sent: Monday, September 29, 2014 1:56 PM
To: af@afmug.com 
Subject: Re: [AFMUG] Bash specially-craftedenvironment variablescodeinjection 
attack

FWIW, there is a *new* bash CVE out today.

Time to upgrade again :)

Josh Reynolds, Chief Information Officer
SPITwSPOTS, www.spitwspots.com

On 09/29/2014 10:08 AM, Ken Hohhof via Af wrote:

  Scary, looking at my bookshelf I see boxes for RHL 8.0 and RHEL 2, 3 and 4.  
RHEL 4 came out in 2005 and went on extended support in 2012.  Needless to say, 
I’m not paying for an extended support contract.  So this is ancient stuff.  
But you’re not exactly going to build a new server for legacy customers of a 
service you stopped offering 5 years ago.  At some point you move them to a 
reseller service, or just tell them it’s time to move on.

  The newer CentOS distributions have I think about 10 years of updates, that’s 
the main difference for RHEL and CentOS from other Linux distributions, they 
tend to have longer life cycles since they are aimed at enterprise.  The 
downside is they are typically several steps back from the latest versions of 
packages.  For example, don’t try using the version of BIND that comes with 
even the newest distribution.  It’s like Windows, you still find a lot of Win7 
in the enterprise market, Microsoft pretty much had to force them off XP.


  From: Timothy D. McNabb via Af 
  Sent: Monday, September 29, 2014 12:33 PM
  To: af@afmug.com 
  Subject: Re: [AFMUG] Bash specially-craftedenvironment variablescodeinjection 
attack

  TBH there is one thing I love most about a CentOS distro over Windows. 
IPTables. Windows firewall is pretty lame in comparison, with open ports you 
will “possibly” use. At least IP tables initially comes with a “block all” 
setup and you just go in and poke the tiny holes you need. Obviously a 
security-conscious person is going to shutdown system services you don’t need, 
but for the initial setup IPtables is pretty badass (and far more simple).

   

  @Ken, I am in the same boat as you. We applied updates Thursday and again 
Friday for bash on our CentOS 5/6 boxes. So far so good though, I’ve been 
monitoring the logs of our boxes running httpd and so far nothing out of the 
ordinary has appeared.

   

  -Tim

   

  From: Af [mailto:af-bounces+tim=velociter@afmug.com] On Behalf Of Shayne 
Lebrun via Af
  Sent: Monday, September 29, 2014 4:51 AM
  To: af@afmug.com
  Subject: Re: [AFMUG] Bash specially-crafted environment 
variablescodeinjection attack

   

  Originally, I responded to this:

  Ø  “I think the articles have maybe overstated the risk a bit, since you 
would need to either authenticate (at least as a regular user) to get to a 
shell, or find a publicly exposed script that will pass an environment variable 
to bash for you.

  And asked you not to think about security in those terms.  Don’t assume you 
understand all the possible attack vectors, don’t assume that because certain 
other things need to happen, you’re invulnerable, etc etc.  When you get right 
down to it, though, UNIX really wants to land you at a shell, and bash is the 
default shell in a lot of places.

   

  You’re certainly listed a whole bunch of issues in the software world at 
large, dedicated applicances, etc etc and I certainly sympathize with a lot of 
the issues you’ve raised.

   

  Of course, the slightly less empathetic sysadmin in me says ‘too bad; you put 
public-facing server on the Internet, you have an obligation, and a 
responsibility to maintain it properly.’  I argue in my head with him A LOT.

   

  Yes, absolutely, you can mitigate the issues you raised in your last email to 
a very reasonable degree with proper firewalling, internal processes, etc etc.  
And it sounds like you’re cognizant of the need to do that, so that’s great too.

   

   

  From: Af [mailto:af-bounces+slebrun=muskoka@afmug.com] On Behalf Of Ken 
Hohhof via Af
  Sent: Sunday, September 28, 2014 9:55 PM
  To: af@afmug.com
  Subject: Re: [AFMUG] Bash specially-crafted environment 
variablescodeinjection attack

   

  You are preaching rather than listening.

   

  What if it is an appliance with a distribution that is frozen in time on 
CentOS4 with no updates.  Note that RHEL4 updates are only available via paid 
extended support, and CentOS4 is EOL.  Doing a yum update on a CentOS4 box 
won’t get you anywhere, and I don’t believe RHEL4 even used yum, it used Redhat 
Network to get RPMs.  All my new stuff on CentOS5 and 6 has been updated.

   

  What I was asking for an opinion on was whether the RPM that Oracle made 
available was likely to work, or to brick the box.  Keep in mind that bricking 
your command shell could be difficult to recover from, especially on a headless 
ap

Re: [AFMUG] Bash specially-craftedenvironment variablescodeinjection attack

2014-09-29 Thread Josh Reynolds via Af

FWIW, there is a *new* bash CVE out today.

Time to upgrade again :)

Josh Reynolds, Chief Information Officer
SPITwSPOTS, www.spitwspots.com 

On 09/29/2014 10:08 AM, Ken Hohhof via Af wrote:
Scary, looking at my bookshelf I see boxes for RHL 8.0 and RHEL 2, 3 
and 4.  RHEL 4 came out in 2005 and went on extended support in 2012.  
Needless to say, I’m not paying for an extended support contract.  So 
this is ancient stuff.  But you’re not exactly going to build a new 
server for legacy customers of a service you stopped offering 5 years 
ago.  At some point you move them to a reseller service, or just tell 
them it’s time to move on.
The newer CentOS distributions have I think about 10 years of updates, 
that’s the main difference for RHEL and CentOS from other Linux 
distributions, they tend to have longer life cycles since they are 
aimed at enterprise.  The downside is they are typically several steps 
back from the latest versions of packages.  For example, don’t try 
using the version of BIND that comes with even the newest 
distribution.  It’s like Windows, you still find a lot of Win7 in the 
enterprise market, Microsoft pretty much had to force them off XP.

*From:* Timothy D. McNabb via Af 
*Sent:* Monday, September 29, 2014 12:33 PM
*To:* af@afmug.com 
*Subject:* Re: [AFMUG] Bash specially-craftedenvironment 
variablescodeinjection attack


TBH there is one thing I love most about a CentOS distro over Windows. 
IPTables. Windows firewall is pretty lame in comparison, with open 
ports you will “possibly” use. At least IP tables initially comes with 
a “block all” setup and you just go in and poke the tiny holes you 
need. Obviously a security-conscious person is going to shutdown 
system services you don’t need, but for the initial setup IPtables is 
pretty badass (and far more simple).


@Ken, I am in the same boat as you. We applied updates Thursday and 
again Friday for bash on our CentOS 5/6 boxes. So far so good though, 
I’ve been monitoring the logs of our boxes running httpd and so far 
nothing out of the ordinary has appeared.


-Tim

*From:*Af [mailto:af-bounces+tim=velociter@afmug.com] *On Behalf 
Of *Shayne Lebrun via Af

*Sent:* Monday, September 29, 2014 4:51 AM
*To:* af@afmug.com
*Subject:* Re: [AFMUG] Bash specially-crafted environment 
variablescodeinjection attack


Originally, I responded to this:

Ø“I think the articles have maybe overstated the risk a bit, since you 
would need to either authenticate (at least as a regular user) to get 
to a shell, or find a publicly exposed script that will pass an 
environment variable to bash for you.


And asked you not to think about security in those terms.  Don’t 
assume you understand all the possible attack vectors, don’t assume 
that because certain other things need to happen, you’re invulnerable, 
etc etc.  When you get right down to it, though, UNIX really wants to 
land you at a shell, and bash is the default shell in a lot of places.


You’re certainly listed a whole bunch of issues in the software world 
at large, dedicated applicances, etc etc and I certainly sympathize 
with a lot of the issues you’ve raised.


Of course, the slightly less empathetic sysadmin in me says ‘too bad; 
you put public-facing server on the Internet, you have an obligation, 
and a responsibility to maintain it properly.’  I argue in my head 
with him A LOT.


Yes, absolutely, you can mitigate the issues you raised in your last 
email to a very reasonable degree with proper firewalling, internal 
processes, etc etc.  And it sounds like you’re cognizant of the need 
to do that, so that’s great too.


*From:*Af [mailto:af-bounces+slebrun=muskoka@afmug.com] *On Behalf 
Of *Ken Hohhof via Af

*Sent:* Sunday, September 28, 2014 9:55 PM
*To:* af@afmug.com
*Subject:* Re: [AFMUG] Bash specially-crafted environment 
variablescodeinjection attack


You are preaching rather than listening.

What if it is an appliance with a distribution that is frozen in time 
on CentOS4 with no updates.  Note that RHEL4 updates are only 
available via paid extended support, and CentOS4 is EOL.  Doing a yum 
update on a CentOS4 box won’t get you anywhere, and I don’t believe 
RHEL4 even used yum, it used Redhat Network to get RPMs.  All my new 
stuff on CentOS5 and 6 has been updated.


What I was asking for an opinion on was whether the RPM that Oracle 
made available was likely to work, or to brick the box.  Keep in mind 
that bricking your command shell could be difficult to recover from, 
especially on a headless appliance at a remote site.  I’m guessing 
that creating another user with a different shell like csh or ksh 
might offer a failsafe.  I would have to see what other shells are 
available on the device.


So this is a Tyan kiosk type server with BlueQuartz installed, long 
ago defunct.  Nuonce was maintaining repositories but stopped a long 
time ago.


Other people are going to face simi

Re: [AFMUG] gige apc for all

2014-09-29 Thread Chuck McCown via Af
Everybody seems to have their own ideas on POE wiring.  
Hard to pick the DC off of GigE POE without using a transformer, and that 
drives the cost up.
Non transformer methods will interfere with the data a bit.  


From: Josh Baird via Af 
Sent: Monday, September 29, 2014 12:17 PM
To: af@afmug.com 
Subject: Re: [AFMUG] gige apc for all

Yeah, I wish the GigeAPCs had the red/green LEDs, too.

On Mon, Sep 29, 2014 at 2:13 PM, Ken Hohhof via Af  wrote:

  Maybe if you like the red and green LEDs?  I have to admit they’re useful.

  From: That One Guy via Af 
  Sent: Monday, September 29, 2014 1:09 PM
  To: af@afmug.com 
  Subject: [AFMUG] gige apc for all


  the application sheet shows gigeapc hv for everything now even the 320 ap, is 
there any major reason not to use these across the board son the numskulls dont 
have to look at the application chart to swap a card?
  -- 

  All parts should go together without forcing. You must remember that the 
parts you are reassembling were disassembled by you. Therefore, if you can't 
get them together again, there must be a reason. By all means, do not use a 
hammer. -- IBM maintenance manual, 1925



[AFMUG] SiteMonitor: Loss of sync

2014-09-29 Thread Bill Prince via Af


One of our many locations where we're using a Packetflux sync 
pipe/injector seems to be losing satellite lock once every few days.  
Typically it loses it for 2 to 4 seconds, but I've seen at least once 
where it went 13 seconds.


I've not been able to get useful information from the SiteMonitor 
because the satellites tracked/Visible OIDs are returning a string with 
"Sats in View" and "Num Sats Used" instead of the actual values. (is 
that a bug or what? This is on F/W "Jul 29 2012").


However, I'm getting messages like this in the AP logs:

   09/21/2014 : 07:49:00 PDT : : Bridge Core : Loss of sync pulse from
   Power Port! No other sync source available.
   09/21/2014 : 07:49:04 PDT : : Bridge Core : Acquired sync pulse from
   Power Port.
   09/23/2014 : 18:49:37 PDT : : Bridge Core : Loss of sync pulse from
   Power Port! No other sync source available.
   09/23/2014 : 18:49:41 PDT : : Bridge Core : Acquired sync pulse from
   Power Port.
   09/23/2014 : 18:49:55 PDT : : Bridge Core : Loss of sync pulse from
   Power Port! No other sync source available.
   09/23/2014 : 18:49:59 PDT : : Bridge Core : Acquired sync pulse from
   Power Port.
   09/24/2014 : 18:47:15 PDT : : Bridge Core : Loss of sync pulse from
   Power Port! No other sync source available.
   09/24/2014 : 18:47:28 PDT : : Bridge Core : Acquired sync pulse from
   Power Port.
   09/27/2014 : 07:24:18 PDT : : Bridge Core : Loss of sync pulse from
   Power Port! No other sync source available.
   09/27/2014 : 07:24:20 PDT : : Bridge Core : Acquired sync pulse from
   Power Port.

Not sure what I might do here.  This is with all the equipment up 
against a concrete wall, so there is only a 180 degree view of the sky.  
Maybe a little bit less than that because the wall is not flat, maybe 
about 170 degree view of the sky.


The APs are PMP450, and rarely get a GPS lock on the internal GPS. Maybe 
I can try moving the sync pipe away from the wall or something.



--
bp



Re: [AFMUG] gige apc for all

2014-09-29 Thread Josh Baird via Af
Yeah, I wish the GigeAPCs had the red/green LEDs, too.

On Mon, Sep 29, 2014 at 2:13 PM, Ken Hohhof via Af  wrote:

>   Maybe if you like the red and green LEDs?  I have to admit they’re
> useful.
>
>  *From:* That One Guy via Af 
> *Sent:* Monday, September 29, 2014 1:09 PM
> *To:* af@afmug.com
> *Subject:* [AFMUG] gige apc for all
>
>
> the application sheet shows gigeapc hv for everything now even the 320 ap,
> is there any major reason not to use these across the board son the
> numskulls dont have to look at the application chart to swap a card?
> --
> All parts should go together without forcing. You must remember that the
> parts you are reassembling were disassembled by you. Therefore, if you
> can't get them together again, there must be a reason. By all means, do not
> use a hammer. -- IBM maintenance manual, 1925
>


Re: [AFMUG] gige apc for all

2014-09-29 Thread Chuck McCown via Af
Right.  Load and current LEDs are the only things you get from the others.   
And they are restricted to specific POE configurations.  I highly recommend 
GigE SS HV /APC for everything. 
From: Ken Hohhof via Af 
Sent: Monday, September 29, 2014 12:13 PM
To: af@afmug.com 
Subject: Re: [AFMUG] gige apc for all

Maybe if you like the red and green LEDs?  I have to admit they’re useful.

From: That One Guy via Af 
Sent: Monday, September 29, 2014 1:09 PM
To: af@afmug.com 
Subject: [AFMUG] gige apc for all


the application sheet shows gigeapc hv for everything now even the 320 ap, is 
there any major reason not to use these across the board son the numskulls dont 
have to look at the application chart to swap a card?
-- 

All parts should go together without forcing. You must remember that the parts 
you are reassembling were disassembled by you. Therefore, if you can't get them 
together again, there must be a reason. By all means, do not use a hammer. -- 
IBM maintenance manual, 1925


Re: [AFMUG] gige apc for all

2014-09-29 Thread Ken Hohhof via Af
Maybe if you like the red and green LEDs?  I have to admit they’re useful.

From: That One Guy via Af 
Sent: Monday, September 29, 2014 1:09 PM
To: af@afmug.com 
Subject: [AFMUG] gige apc for all


the application sheet shows gigeapc hv for everything now even the 320 ap, is 
there any major reason not to use these across the board son the numskulls dont 
have to look at the application chart to swap a card?
-- 

All parts should go together without forcing. You must remember that the parts 
you are reassembling were disassembled by you. Therefore, if you can't get them 
together again, there must be a reason. By all means, do not use a hammer. -- 
IBM maintenance manual, 1925


[AFMUG] gige apc for all

2014-09-29 Thread That One Guy via Af
the application sheet shows gigeapc hv for everything now even the 320 ap,
is there any major reason not to use these across the board son the
numskulls dont have to look at the application chart to swap a card?
-- 
All parts should go together without forcing. You must remember that the
parts you are reassembling were disassembled by you. Therefore, if you
can't get them together again, there must be a reason. By all means, do not
use a hammer. -- IBM maintenance manual, 1925


Re: [AFMUG] Bash specially-craftedenvironment variablescodeinjection attack

2014-09-29 Thread Ken Hohhof via Af
Scary, looking at my bookshelf I see boxes for RHL 8.0 and RHEL 2, 3 and 4.  
RHEL 4 came out in 2005 and went on extended support in 2012.  Needless to say, 
I’m not paying for an extended support contract.  So this is ancient stuff.  
But you’re not exactly going to build a new server for legacy customers of a 
service you stopped offering 5 years ago.  At some point you move them to a 
reseller service, or just tell them it’s time to move on.

The newer CentOS distributions have I think about 10 years of updates, that’s 
the main difference for RHEL and CentOS from other Linux distributions, they 
tend to have longer life cycles since they are aimed at enterprise.  The 
downside is they are typically several steps back from the latest versions of 
packages.  For example, don’t try using the version of BIND that comes with 
even the newest distribution.  It’s like Windows, you still find a lot of Win7 
in the enterprise market, Microsoft pretty much had to force them off XP.


From: Timothy D. McNabb via Af 
Sent: Monday, September 29, 2014 12:33 PM
To: af@afmug.com 
Subject: Re: [AFMUG] Bash specially-craftedenvironment variablescodeinjection 
attack

TBH there is one thing I love most about a CentOS distro over Windows. 
IPTables. Windows firewall is pretty lame in comparison, with open ports you 
will “possibly” use. At least IP tables initially comes with a “block all” 
setup and you just go in and poke the tiny holes you need. Obviously a 
security-conscious person is going to shutdown system services you don’t need, 
but for the initial setup IPtables is pretty badass (and far more simple).

 

@Ken, I am in the same boat as you. We applied updates Thursday and again 
Friday for bash on our CentOS 5/6 boxes. So far so good though, I’ve been 
monitoring the logs of our boxes running httpd and so far nothing out of the 
ordinary has appeared.

 

-Tim

 

From: Af [mailto:af-bounces+tim=velociter@afmug.com] On Behalf Of Shayne 
Lebrun via Af
Sent: Monday, September 29, 2014 4:51 AM
To: af@afmug.com
Subject: Re: [AFMUG] Bash specially-crafted environment variablescodeinjection 
attack

 

Originally, I responded to this:

Ø  “I think the articles have maybe overstated the risk a bit, since you would 
need to either authenticate (at least as a regular user) to get to a shell, or 
find a publicly exposed script that will pass an environment variable to bash 
for you.

And asked you not to think about security in those terms.  Don’t assume you 
understand all the possible attack vectors, don’t assume that because certain 
other things need to happen, you’re invulnerable, etc etc.  When you get right 
down to it, though, UNIX really wants to land you at a shell, and bash is the 
default shell in a lot of places.

 

You’re certainly listed a whole bunch of issues in the software world at large, 
dedicated applicances, etc etc and I certainly sympathize with a lot of the 
issues you’ve raised.

 

Of course, the slightly less empathetic sysadmin in me says ‘too bad; you put 
public-facing server on the Internet, you have an obligation, and a 
responsibility to maintain it properly.’  I argue in my head with him A LOT.

 

Yes, absolutely, you can mitigate the issues you raised in your last email to a 
very reasonable degree with proper firewalling, internal processes, etc etc.  
And it sounds like you’re cognizant of the need to do that, so that’s great too.

 

 

From: Af [mailto:af-bounces+slebrun=muskoka@afmug.com] On Behalf Of Ken 
Hohhof via Af
Sent: Sunday, September 28, 2014 9:55 PM
To: af@afmug.com
Subject: Re: [AFMUG] Bash specially-crafted environment variablescodeinjection 
attack

 

You are preaching rather than listening.

 

What if it is an appliance with a distribution that is frozen in time on 
CentOS4 with no updates.  Note that RHEL4 updates are only available via paid 
extended support, and CentOS4 is EOL.  Doing a yum update on a CentOS4 box 
won’t get you anywhere, and I don’t believe RHEL4 even used yum, it used Redhat 
Network to get RPMs.  All my new stuff on CentOS5 and 6 has been updated.

 

What I was asking for an opinion on was whether the RPM that Oracle made 
available was likely to work, or to brick the box.  Keep in mind that bricking 
your command shell could be difficult to recover from, especially on a headless 
appliance at a remote site.  I’m guessing that creating another user with a 
different shell like csh or ksh might offer a failsafe.  I would have to see 
what other shells are available on the device.

 

So this is a Tyan kiosk type server with BlueQuartz installed, long ago 
defunct.  Nuonce was maintaining repositories but stopped a long time ago.

 

Other people are going to face similar situations.  Not every server is built 
from scratch loading the OS and then the applications.  Sometimes you use an 
all-in-one install disk, like CactiEZ or some of the Asterisk/FreePBX 
distributions.  I’m evaluating the PBX appliances from Grandstream, clear

Re: [AFMUG] Pipe clamps and tower mount suppliers

2014-09-29 Thread Bill Prince via Af
We get them from a local fence supply. They stock most gauges, all 
galvanized,  and in lengths up to 22 or 24 feet.


bp

On 9/29/2014 10:43 AM, Seth Mattinen via Af wrote:

On 9/29/14, 10:41, That One Guy via Af wrote:

get your pipes from local plumbing shop, much cheaper than distributors
we found. I realised you can do this when site pro forgot to wipe off
the printing on the pipe and it was the same thing the plumber carried.



Or fence supply shop.

~Seth





Re: [AFMUG] iOS update = Expedited Forwarding?

2014-09-29 Thread Josh Reynolds via Af
side-note: You should be stripping incoming DSCP tags at each of your 
WAN feeds.


Josh Reynolds, Chief Information Officer
SPITwSPOTS, www.spitwspots.com 

On 09/29/2014 08:11 AM, Adam Moffett via Af wrote:
Has anyone else noticed that lots of traffic from Apple 17.0.0.0/8 has 
DSCP 46 set?


Canopy users with iPhones may find that the update is interfering with 
their regular internet usage unless you take measures to de-prioritize 
that.






Re: [AFMUG] 477 filing - delayed?

2014-09-29 Thread Jay Weekley via Af

And still down.

Patrick Wheeland via Af wrote:

I have one last form to submit and it's still down.  :-/


On Fri, Sep 26, 2014 at 2:54 PM, Randy Cosby via Af > wrote:



"The Form 477 filing interface is temporarily unavailable. We have
identified an issue that developed on September 25, 2014 and are
working to fix the problem and reopen the site as soon as
possible. We apologize for the inconvenience"

https://apps2.fcc.gov/



-- 


Randy Cosby
InfoWest, Inc
435-674-0165 x 2010 
infowest.com 


This e-mail message contains information from InfoWest, Inc
and is for the sole use of the intended recipient(s) and may
contain privileged, proprietary or confidential information.

Unauthorized use, distribution, review or disclosure is
prohibited. If you are not the intended recipient, please
contactrco...@infowest.com    by reply email 
and destroy
the original message, all attachments and copies.






Re: [AFMUG] Pipe clamps and tower mount suppliers

2014-09-29 Thread Jaime Solorza via Af
http://wbmfg.com/products.cfm?PID=27

http://sitepro1.com/store/cart.php?m=product_list&c=62



Jaime Solorza
Wireless Systems Architect
915-861-1390

On Mon, Sep 29, 2014 at 11:31 AM, Darin Steffl via Af  wrote:

> Hey guys,
>
> We are looking for a reasonably priced source for pipe to pipe clamps and
> other hardware to attach our mounts to towers and railings on grain legs,
> etc. We are looking to strengthen our future tower builds and move up from
> our more amateur way of attaching pipes to our tower structures.
>
> What suppliers do you recommend for mounting gear and what kind of
> standoffs are you using the most for different types of mounting surfaces
> (tower leg, railings on grain legs, etc.)? Do you find any local suppliers
> have them to save on shipping costs and if so, what kind of suppliers
> should we be looking for?
>
> Thank you
>
> --
> Darin Steffl
> Minnesota WiFi
> www.mnwifi.com
> 507-634-WiFi
>  Like us on Facebook
> 
>


Re: [AFMUG] Pipe clamps and tower mount suppliers

2014-09-29 Thread Seth Mattinen via Af

On 9/29/14, 10:41, That One Guy via Af wrote:

get your pipes from local plumbing shop, much cheaper than distributors
we found. I realised you can do this when site pro forgot to wipe off
the printing on the pipe and it was the same thing the plumber carried.



Or fence supply shop.

~Seth


Re: [AFMUG] Pipe clamps and tower mount suppliers

2014-09-29 Thread That One Guy via Af
get your pipes from local plumbing shop, much cheaper than distributors we
found. I realised you can do this when site pro forgot to wipe off the
printing on the pipe and it was the same thing the plumber carried.

we use UPC-1 to do standoffs on all 4 corners of grain legs, the 90 degree
angle iron theyre usually made of fits in the notch to stabilize it and we
put a 40ish inch pipe inside to give something to bite too. We put 7' pipes
on the stand offs. This gives us a mount for a sector on top ahd a backhaul
on bottom on each corner. I dont think I would put more than a 2' backhaul
on each though without a stabilizer

On Mon, Sep 29, 2014 at 12:31 PM, Darin Steffl via Af  wrote:

> Hey guys,
>
> We are looking for a reasonably priced source for pipe to pipe clamps and
> other hardware to attach our mounts to towers and railings on grain legs,
> etc. We are looking to strengthen our future tower builds and move up from
> our more amateur way of attaching pipes to our tower structures.
>
> What suppliers do you recommend for mounting gear and what kind of
> standoffs are you using the most for different types of mounting surfaces
> (tower leg, railings on grain legs, etc.)? Do you find any local suppliers
> have them to save on shipping costs and if so, what kind of suppliers
> should we be looking for?
>
> Thank you
>
> --
> Darin Steffl
> Minnesota WiFi
> www.mnwifi.com
> 507-634-WiFi
>  Like us on Facebook
> 
>



-- 
All parts should go together without forcing. You must remember that the
parts you are reassembling were disassembled by you. Therefore, if you
can't get them together again, there must be a reason. By all means, do not
use a hammer. -- IBM maintenance manual, 1925


Re: [AFMUG] Pipe clamps and tower mount suppliers

2014-09-29 Thread Matt Jenkins via Af
Wireless Beehive Tower Mounts will fit 90% of your needs. Most major 
WISP suppliers carry them.


http://wbmfg.com/products.cfm?CID=3

Matthew Jenkins
SmarterBroadband
m...@sbbinc.net
530.272.4000

On 09/29/2014 10:31 AM, Darin Steffl via Af wrote:

Hey guys,

We are looking for a reasonably priced source for pipe to pipe clamps 
and other hardware to attach our mounts to towers and railings on 
grain legs, etc. We are looking to strengthen our future tower builds 
and move up from our more amateur way of attaching pipes to our tower 
structures.


What suppliers do you recommend for mounting gear and what kind of 
standoffs are you using the most for different types of mounting 
surfaces (tower leg, railings on grain legs, etc.)? Do you find any 
local suppliers have them to save on shipping costs and if so, what 
kind of suppliers should we be looking for?


Thank you

--
Darin Steffl
Minnesota WiFi
www.mnwifi.com 
507-634-WiFi
 Like us on Facebook 





Re: [AFMUG] Bash specially-crafted environment variablescodeinjection attack

2014-09-29 Thread Timothy D. McNabb via Af
TBH there is one thing I love most about a CentOS distro over Windows. 
IPTables. Windows firewall is pretty lame in comparison, with open ports you 
will “possibly” use. At least IP tables initially comes with a “block all” 
setup and you just go in and poke the tiny holes you need. Obviously a 
security-conscious person is going to shutdown system services you don’t need, 
but for the initial setup IPtables is pretty badass (and far more simple).

@Ken, I am in the same boat as you. We applied updates Thursday and again 
Friday for bash on our CentOS 5/6 boxes. So far so good though, I’ve been 
monitoring the logs of our boxes running httpd and so far nothing out of the 
ordinary has appeared.

-Tim

From: Af [mailto:af-bounces+tim=velociter@afmug.com] On Behalf Of Shayne 
Lebrun via Af
Sent: Monday, September 29, 2014 4:51 AM
To: af@afmug.com
Subject: Re: [AFMUG] Bash specially-crafted environment variablescodeinjection 
attack

Originally, I responded to this:

Ø  “I think the articles have maybe overstated the risk a bit, since you would 
need to either authenticate (at least as a regular user) to get to a shell, or 
find a publicly exposed script that will pass an environment variable to bash 
for you.
And asked you not to think about security in those terms.  Don’t assume you 
understand all the possible attack vectors, don’t assume that because certain 
other things need to happen, you’re invulnerable, etc etc.  When you get right 
down to it, though, UNIX really wants to land you at a shell, and bash is the 
default shell in a lot of places.

You’re certainly listed a whole bunch of issues in the software world at large, 
dedicated applicances, etc etc and I certainly sympathize with a lot of the 
issues you’ve raised.

Of course, the slightly less empathetic sysadmin in me says ‘too bad; you put 
public-facing server on the Internet, you have an obligation, and a 
responsibility to maintain it properly.’  I argue in my head with him A LOT.

Yes, absolutely, you can mitigate the issues you raised in your last email to a 
very reasonable degree with proper firewalling, internal processes, etc etc.  
And it sounds like you’re cognizant of the need to do that, so that’s great too.


From: Af [mailto:af-bounces+slebrun=muskoka@afmug.com] On Behalf Of Ken 
Hohhof via Af
Sent: Sunday, September 28, 2014 9:55 PM
To: af@afmug.com
Subject: Re: [AFMUG] Bash specially-crafted environment variablescodeinjection 
attack

You are preaching rather than listening.

What if it is an appliance with a distribution that is frozen in time on 
CentOS4 with no updates.  Note that RHEL4 updates are only available via paid 
extended support, and CentOS4 is EOL.  Doing a yum update on a CentOS4 box 
won’t get you anywhere, and I don’t believe RHEL4 even used yum, it used Redhat 
Network to get RPMs.  All my new stuff on CentOS5 and 6 has been updated.

What I was asking for an opinion on was whether the RPM that Oracle made 
available was likely to work, or to brick the box.  Keep in mind that bricking 
your command shell could be difficult to recover from, especially on a headless 
appliance at a remote site.  I’m guessing that creating another user with a 
different shell like csh or ksh might offer a failsafe.  I would have to see 
what other shells are available on the device.

So this is a Tyan kiosk type server with BlueQuartz installed, long ago 
defunct.  Nuonce was maintaining repositories but stopped a long time ago.

Other people are going to face similar situations.  Not every server is built 
from scratch loading the OS and then the applications.  Sometimes you use an 
all-in-one install disk, like CactiEZ or some of the Asterisk/FreePBX 
distributions.  I’m evaluating the PBX appliances from Grandstream, clearly 
they run Asterisk and probably Linux under the hood, but you can’t even get to 
the command line, so any software updates would have to be from the web GUI 
with updates from Grandstream.  So I’m thinking if that’s a problem, being 
totally dependent on the vendor, I guess stuff like routers are the same.  But 
you can’t just go and do a yum update on everything that has Linux inside, or 
recompile the source code with the patch and install it yourself, even assuming 
you feel comfortable doing that.


From: Shayne Lebrun via Af
Sent: Sunday, September 28, 2014 7:00 PM
To: af@afmug.com
Subject: Re: [AFMUG] Bash specially-crafted environment variablescodeinjection 
attack

Quite honestly, who cares?  There’s zero downside to closing the security hole.

Hopefully you’re closing all your other security holes too, especially for 
things like DNS or NTP that are almost public facing by default.  Why not close 
this one at the same time?

What happens in six months when you, or somebody, stick another service on that 
machine?


From: Af [mailto:af-bounces+slebrun=muskoka@afmug.com] On Behalf Of Ken 
Hohhof via Af
Sent: Sunday, September 28, 2014 10:38 

[AFMUG] Pipe clamps and tower mount suppliers

2014-09-29 Thread Darin Steffl via Af
Hey guys,

We are looking for a reasonably priced source for pipe to pipe clamps and
other hardware to attach our mounts to towers and railings on grain legs,
etc. We are looking to strengthen our future tower builds and move up from
our more amateur way of attaching pipes to our tower structures.

What suppliers do you recommend for mounting gear and what kind of
standoffs are you using the most for different types of mounting surfaces
(tower leg, railings on grain legs, etc.)? Do you find any local suppliers
have them to save on shipping costs and if so, what kind of suppliers
should we be looking for?

Thank you

-- 
Darin Steffl
Minnesota WiFi
www.mnwifi.com
507-634-WiFi
 Like us on Facebook



Re: [AFMUG] Bash specially-crafted environment variablescodeinjection attack

2014-09-29 Thread Matt via Af
Only time I have had issues with yum update is when there are third
party repositories.


On Sun, Sep 28, 2014 at 10:30 PM, Josh Reynolds via Af  wrote:
> You're right, yum updates are probably a problem for those pesky
> RedHat/Centos distros.
>
> Move to debian :P
>
> Josh Reynolds, Chief Information Officer
> SPITwSPOTS, www.spitwspots.com
>
> On 09/28/2014 05:55 PM, Ken Hohhof via Af wrote:
>
> You are preaching rather than listening.
>
> What if it is an appliance with a distribution that is frozen in time on
> CentOS4 with no updates.  Note that RHEL4 updates are only available via
> paid extended support, and CentOS4 is EOL.  Doing a yum update on a CentOS4
> box won’t get you anywhere, and I don’t believe RHEL4 even used yum, it used
> Redhat Network to get RPMs.  All my new stuff on CentOS5 and 6 has been
> updated.
>
> What I was asking for an opinion on was whether the RPM that Oracle made
> available was likely to work, or to brick the box.  Keep in mind that
> bricking your command shell could be difficult to recover from, especially
> on a headless appliance at a remote site.  I’m guessing that creating
> another user with a different shell like csh or ksh might offer a failsafe.
> I would have to see what other shells are available on the device.
>
> So this is a Tyan kiosk type server with BlueQuartz installed, long ago
> defunct.  Nuonce was maintaining repositories but stopped a long time ago.
>
> Other people are going to face similar situations.  Not every server is
> built from scratch loading the OS and then the applications.  Sometimes you
> use an all-in-one install disk, like CactiEZ or some of the Asterisk/FreePBX
> distributions.  I’m evaluating the PBX appliances from Grandstream, clearly
> they run Asterisk and probably Linux under the hood, but you can’t even get
> to the command line, so any software updates would have to be from the web
> GUI with updates from Grandstream.  So I’m thinking if that’s a problem,
> being totally dependent on the vendor, I guess stuff like routers are the
> same.  But you can’t just go and do a yum update on everything that has
> Linux inside, or recompile the source code with the patch and install it
> yourself, even assuming you feel comfortable doing that.
>
>
> From: Shayne Lebrun via Af
> Sent: Sunday, September 28, 2014 7:00 PM
> To: af@afmug.com
> Subject: Re: [AFMUG] Bash specially-crafted environment
> variablescodeinjection attack
>
>
> Quite honestly, who cares?  There’s zero downside to closing the security
> hole.
>
>
>
> Hopefully you’re closing all your other security holes too, especially for
> things like DNS or NTP that are almost public facing by default.  Why not
> close this one at the same time?
>
>
>
> What happens in six months when you, or somebody, stick another service on
> that machine?
>
>
>
>
>
> From: Af [mailto:af-bounces+slebrun=muskoka@afmug.com] On Behalf Of Ken
> Hohhof via Af
> Sent: Sunday, September 28, 2014 10:38 AM
> To: af@afmug.com
> Subject: Re: [AFMUG] Bash specially-crafted environment variables
> codeinjection attack
>
>
>
> Why?
>
>
>
> Take the case of a dedicated server that only does let’s say DHCP or DNS or
> NTP.  It only has one port open to the Internet, and there’s no way to get
> to a bash shell via that port.  How the hell is someone going to pass an
> environment variable to a bash shell on that server?
>
>
>
>
>
>
>
> From: Shayne Lebrun via Af
>
> Sent: Sunday, September 28, 2014 8:40 AM
>
> To: af@afmug.com
>
> Subject: Re: [AFMUG] Bash specially-crafted environment variables
> codeinjection attack
>
>
>
> Ø  I think the articles have maybe overstated the risk a bit, since you
> would need to either authenticate (at least as a regular user) to get to a
> shell, or find a publicly exposed script that will pass an environment
> variable to bash for you.
>
>
>
> Please don’t think like this.
>
>
>
> From: Af [mailto:af-bounces+slebrun=muskoka@afmug.com] On Behalf Of Ken
> Hohhof via Af
> Sent: Saturday, September 27, 2014 1:38 PM
> To: af@afmug.com
> Subject: Re: [AFMUG] Bash specially-crafted environment variables code
> injection attack
>
>
>
> So maybe I won’t do that.
>
>
>
> The newer servers where I could just do a yum update have been
> straightforward, as you’d expect.
>
>
>
> I think the articles have maybe overstated the risk a bit, since you would
> need to either authenticate (at least as a regular user) to get to a shell,
> or find a publicly exposed script that will pass an environment variable to
> bash for you.
>
>
>
> From: Jeremy via Af
>
> Sent: Saturday, September 27, 2014 12:13 PM
>
> To: af@afmug.com
>
> Subject: Re: [AFMUG] Bash specially-crafted environment variables code
> injection attack
>
>
>
> Our webserver was vulnerable.  Tried to fix it without backing it up
> firstyeah, I know.  Lost it all.  So I guess I will be building a new
> website from my 2013 backup this weekend.  It's a good thing I carpet bombed
> my website to prevent anyone from me

Re: [AFMUG] What is "Stuck VC", and is there anything I can do about it?

2014-09-29 Thread CBB - Jay Fuller via Af

Used to be an issue in 900 mhz sms i actually helped discover ; a stuck VC was 
a stuck virtual channel that would cause an SM to remain offline until the SM 
was rebooted.  They added code in at some point to check for that and "clear" 
the stuck vc so the SM didn't have to be rebooted anymore.  In our case, i 
think, it was control slot related (or at least increasing the control slots 
helped to slow the problem down until they added code to check for it).

I'm sure someone from Cambium can give you a more technical explanation :)


  - Original Message - 
  From: Bill Prince via Af 
  To: Motorola III 
  Sent: Monday, September 29, 2014 12:11 PM
  Subject: [AFMUG] What is "Stuck VC", and is there anything I can do about it?


  Customer's SM went off line for almost two hours, and my only clue (besides 
it appearing off line from my end too) was this in the log file on the SM:

09/26/2014 : 09:50:06 PDT : :Timezone set to PDT
09/28/2014 : 13:44:26 PDT : :Stuck VC cleared (VC38)
09/28/2014 : 13:48:24 PDT : :XO trim at min diff=-1498 c=7 cmove=-9 f=7785 
fmove=-148

   This is a PMP450 (5 GHz) on firmware 12.2.2.

-- 
bp

Re: [AFMUG] Bash specially-crafted environment variablescodeinjection attack

2014-09-29 Thread Shayne Lebrun via Af
Oh, and you mentioned a BlueQuartz server.  Looks like there are options, 
including: http://www.blueonyx.it/, which seems to include migrating from 
BlueQuartz.

 

From: Af [mailto:af-bounces+slebrun=muskoka@afmug.com] On Behalf Of Ken 
Hohhof via Af
Sent: Sunday, September 28, 2014 9:55 PM
To: af@afmug.com
Subject: Re: [AFMUG] Bash specially-crafted environment variablescodeinjection 
attack

 

You are preaching rather than listening.

 

What if it is an appliance with a distribution that is frozen in time on 
CentOS4 with no updates.  Note that RHEL4 updates are only available via paid 
extended support, and CentOS4 is EOL.  Doing a yum update on a CentOS4 box 
won’t get you anywhere, and I don’t believe RHEL4 even used yum, it used Redhat 
Network to get RPMs.  All my new stuff on CentOS5 and 6 has been updated.

 

What I was asking for an opinion on was whether the RPM that Oracle made 
available was likely to work, or to brick the box.  Keep in mind that bricking 
your command shell could be difficult to recover from, especially on a headless 
appliance at a remote site.  I’m guessing that creating another user with a 
different shell like csh or ksh might offer a failsafe.  I would have to see 
what other shells are available on the device.

 

So this is a Tyan kiosk type server with BlueQuartz installed, long ago 
defunct.  Nuonce was maintaining repositories but stopped a long time ago.

 

Other people are going to face similar situations.  Not every server is built 
from scratch loading the OS and then the applications.  Sometimes you use an 
all-in-one install disk, like CactiEZ or some of the Asterisk/FreePBX 
distributions.  I’m evaluating the PBX appliances from Grandstream, clearly 
they run Asterisk and probably Linux under the hood, but you can’t even get to 
the command line, so any software updates would have to be from the web GUI 
with updates from Grandstream.  So I’m thinking if that’s a problem, being 
totally dependent on the vendor, I guess stuff like routers are the same.  But 
you can’t just go and do a yum update on everything that has Linux inside, or 
recompile the source code with the patch and install it yourself, even assuming 
you feel comfortable doing that.

 

 

From: Shayne Lebrun via Af   

Sent: Sunday, September 28, 2014 7:00 PM

To: af@afmug.com 

Subject: Re: [AFMUG] Bash specially-crafted environment variablescodeinjection 
attack

 

Quite honestly, who cares?  There’s zero downside to closing the security hole.

 

Hopefully you’re closing all your other security holes too, especially for 
things like DNS or NTP that are almost public facing by default.  Why not close 
this one at the same time?

 

What happens in six months when you, or somebody, stick another service on that 
machine?

 

 

From: Af [mailto:af-bounces+slebrun=muskoka@afmug.com] On Behalf Of Ken 
Hohhof via Af
Sent: Sunday, September 28, 2014 10:38 AM
To: af@afmug.com
Subject: Re: [AFMUG] Bash specially-crafted environment variables codeinjection 
attack

 

Why?

 

Take the case of a dedicated server that only does let’s say DHCP or DNS or 
NTP.  It only has one port open to the Internet, and there’s no way to get to a 
bash shell via that port.  How the hell is someone going to pass an environment 
variable to a bash shell on that server?

 

 

 

From: Shayne Lebrun via Af   

Sent: Sunday, September 28, 2014 8:40 AM

To: af@afmug.com 

Subject: Re: [AFMUG] Bash specially-crafted environment variables codeinjection 
attack

 

Ø  I think the articles have maybe overstated the risk a bit, since you would 
need to either authenticate (at least as a regular user) to get to a shell, or 
find a publicly exposed script that will pass an environment variable to bash 
for you.

 

Please don’t think like this.  

 

From: Af [mailto:af-bounces+slebrun=muskoka@afmug.com] On Behalf Of Ken 
Hohhof via Af
Sent: Saturday, September 27, 2014 1:38 PM
To: af@afmug.com
Subject: Re: [AFMUG] Bash specially-crafted environment variables code 
injection attack

 

So maybe I won’t do that.

 

The newer servers where I could just do a yum update have been straightforward, 
as you’d expect.

 

I think the articles have maybe overstated the risk a bit, since you would need 
to either authenticate (at least as a regular user) to get to a shell, or find 
a publicly exposed script that will pass an environment variable to bash for 
you.

 

From: Jeremy via Af   

Sent: Saturday, September 27, 2014 12:13 PM

To: af@afmug.com 

Subject: Re: [AFMUG] Bash specially-crafted environment variables code 
injection attack

 

Our webserver was vulnerable.  Tried to fix it without backing it up 
firstyeah, I know.  Lost it all.  So I guess I will be building a new 
website from my 2013 backup this weekend.  It's a good thing I carpet bombed my 
website to prevent anyone from messing with it!

 

On Sat, Sep 27, 2014 at 10:25 AM, Ken H

[AFMUG] What is "Stuck VC", and is there anything I can do about it?

2014-09-29 Thread Bill Prince via Af
Customer's SM went off line for almost two hours, and my only clue 
(besides it appearing off line from my end too) was this in the log file 
on the SM:


   09/26/2014 : 09:50:06 PDT : :Timezone set to PDT
   09/28/2014 : 13:44:26 PDT : :Stuck VC cleared (VC38)
   09/28/2014 : 13:48:24 PDT : :XO trim at min diff=-1498 c=7 cmove=-9
   f=7785 fmove=-148

 This is a PMP450 (5 GHz) on firmware 12.2.2.

--
bp



Re: [AFMUG] iOS update = Expedited Forwarding?

2014-09-29 Thread Bill Prince via Af

Because everything that Apple does is oh so important.

bp

On 9/29/2014 9:11 AM, Adam Moffett via Af wrote:
Has anyone else noticed that lots of traffic from Apple 17.0.0.0/8 has 
DSCP 46 set?


Canopy users with iPhones may find that the update is interfering with 
their regular internet usage unless you take measures to de-prioritize 
that.







Re: [AFMUG] iOS update = Expedited Forwarding?

2014-09-29 Thread Ken Hohhof via Af
I assumed most upstreams cleared the DSCP tags for transit traffic across 
their networks.  Apparently that was an incorrect assumption.  It sure opens 
up the potential for apps, malware, and pesky customers to abuse it.  Cool, 
I can tag all my traffic high priority!



-Original Message- 
From: Adam Moffett via Af

Sent: Monday, September 29, 2014 11:43 AM
To: af@afmug.com
Subject: Re: [AFMUG] iOS update = Expedited Forwarding?

Me too.

On the one hand, VoIP from Ring Central and some others comes through
with an appropriate DSCP tag.  On the other hand, so do iOS updates for
some reason.


On 9/29/2014 12:24 PM, George Skorup (Cyber Broadcasting) via Af wrote:
You must have a carrier that doesn't zero the DSCP field. I both like and 
hate that at the same time.


On 9/29/2014 11:11 AM, Adam Moffett via Af wrote:
Has anyone else noticed that lots of traffic from Apple 17.0.0.0/8 has 
DSCP 46 set?


Canopy users with iPhones may find that the update is interfering with 
their regular internet usage unless you take measures to de-prioritize 
that.









Re: [AFMUG] iOS update = Expedited Forwarding?

2014-09-29 Thread Adam Moffett via Af

Me too.

On the one hand, VoIP from Ring Central and some others comes through 
with an appropriate DSCP tag.  On the other hand, so do iOS updates for 
some reason.



On 9/29/2014 12:24 PM, George Skorup (Cyber Broadcasting) via Af wrote:
You must have a carrier that doesn't zero the DSCP field. I both like 
and hate that at the same time.


On 9/29/2014 11:11 AM, Adam Moffett via Af wrote:
Has anyone else noticed that lots of traffic from Apple 17.0.0.0/8 
has DSCP 46 set?


Canopy users with iPhones may find that the update is interfering 
with their regular internet usage unless you take measures to 
de-prioritize that.








Re: [AFMUG] iOS update = Expedited Forwarding?

2014-09-29 Thread George Skorup (Cyber Broadcasting) via Af
You must have a carrier that doesn't zero the DSCP field. I both like 
and hate that at the same time.


On 9/29/2014 11:11 AM, Adam Moffett via Af wrote:
Has anyone else noticed that lots of traffic from Apple 17.0.0.0/8 has 
DSCP 46 set?


Canopy users with iPhones may find that the update is interfering with 
their regular internet usage unless you take measures to de-prioritize 
that.






Re: [AFMUG] standard 900 MHz Canopy channels

2014-09-29 Thread George Skorup (Cyber Broadcasting) via Af
I have several sites with KP 120's doing ABAB. A couple of the sites are 
pretty close to each other and it was necessary to have one site using 
906 and 924 and the other on 910 and 920. Non-colocated 4MHz carrier 
offset doesn't always work, for example, one SM was seeing a 924 and a 
920 sector on each site within 3dB, but we later found out that SM was 
out of alignment. Actually it was perfectly aimed between both sites 
because I think they were originally on a tower about 12 miles away in 
that direction and when we turned up the new sites, they just worked so 
nobody ever went out and aimed them properly.


The other thing with the KP 120's is, while they are nice compact 
antennas with decent forward gain for the size, they don't have the 
greatest F/B ratio. So SM Tx power control is a must. Luckily all of the 
900 radios can do it. Til-Tek sectors perform great, but there was no 
way in hell I'd ever be able to put four of them on say a 25G, too much 
load.


When you're stuck with 900 as a last resort, you find ways to make 
things work, and it's usually never pretty considering the limited 
spectrum and horrible interference.


On 9/29/2014 10:35 AM, Ken Hohhof via Af wrote:

OK, thanks.
*From:* Shayne Lebrun via Af 
*Sent:* Monday, September 29, 2014 10:22 AM
*To:* af@afmug.com 
*Subject:* Re: [AFMUG] standard 900 MHz Canopy channels

906,915,924 are the way to go.

Properly synced Canopy needs no guardband. Properly synced ePMP needs 
5mhz guardband.  Unsynced anything technically needs 
guardband=2*channelwidth.


*From:*Af [mailto:af-bounces+slebrun=muskoka@afmug.com] *On Behalf 
Of *CBB - Jay Fuller via Af

*Sent:* Sunday, September 28, 2014 3:08 PM
*To:* af@afmug.com
*Subject:* Re: [AFMUG] standard 900 MHz Canopy channels

would assume that would be doable, but that leaves no guard bands at all.

we run 906,915,924 and tell everyone else to do so as well...

- Original Message -

*From:*Ken Hohhof via Af 

*To:*af@afmug.com 

*Sent:*Sunday, September 28, 2014 12:18 PM

*Subject:*[AFMUG] standard 900 MHz Canopy channels

I have always assumed the standard channels are 906, 915 and 924.

But I keep getting competitors going on 906 and 922. I understand
they are
probably trying to avoid high power licensed stuff like paging
around 930.
But if I go on 915, I find it overlaps with 922 and bad juju ensues.
Especially when this is a newcomer and they have no subs yet and
don't match
your timing and don't care because ... they don't have subs yet
and aren't
suffering the effects of the interference.  I have found that a hot
interferer on 922 will pretty much blow you off the air if you try
to use
915, unless the timing parameters match, even though that's only 1
MHz of
overlap.

So are the default channels actually 906, 914 and 922 in the real
world?





[AFMUG] iOS update = Expedited Forwarding?

2014-09-29 Thread Adam Moffett via Af
Has anyone else noticed that lots of traffic from Apple 17.0.0.0/8 has 
DSCP 46 set?


Canopy users with iPhones may find that the update is interfering with 
their regular internet usage unless you take measures to de-prioritize that.




[AFMUG] Cambium Networks and Shellshock (CVE-2014-6271

2014-09-29 Thread Scott Imhoff via Af
All,

Cambium has posted a statement on Shellshock vulnerability on our support 
website at  http://www.cambiumnetworks.com/support/shellshock ; and copied 
below.

Scott


Cambium Networks Devices Are Not Vulnerable to Shellshock 
(CVE-2014-6271)
Since news of the virus called Shellshock 
broke,
 customers have asked if our products are secure. Our products are not 
vulnerable to this latest attack on Linux platforms, which takes advantage of a 
security flaw in bash, a specific command-line shell that we do not use:

PLATFORM STATUS
ePMP 1000 not impacted
PTP 250   not impacted
PTP 450   not impacted
PTP 500   not impacted
PTP 600   not impacted
PTP 650   not impacted
PTP 800   not impacted
PMP 100   not impacted
PMP 2xxnot impacted
PMP 320   not impacted
PMP 4xxnot impacted
CMM  not impacted
C3VoIP  not impacted

Our network managing 
tools, CNS, WM, CNUT, 
BAM and Prizm, are also not vulnerable and do not include an OS; they run on 
customers' operating systems. Customers are advised to patch their operating 
systems if they believe them to be susceptible after administering this 
diagnostic test from Red Hat.



Re: [AFMUG] ePMP Wireless Scan

2014-09-29 Thread Mike Hammett via Af
Well derrr... I just used the quick setup to get things started... and the 
default was set to 3 mile maximum and like 3 dB Tx power. 




- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 

- Original Message -

From: "Paul McCall via Af"  
To: af@afmug.com 
Sent: Monday, September 29, 2014 10:32:11 AM 
Subject: Re: [AFMUG] ePMP Wireless Scan 



Wireless, Monitor should show you that. 

Tools, eDetect will show you the signal strength of anything on the channel by 
MAC only. Might help you get close… ePMP MACs start with 00:04. 




From: Af [mailto:af-bounces+paulm=pdmnet@afmug.com] On Behalf Of Mike 
Hammett via Af 
Sent: Monday, September 29, 2014 11:29 AM 
To: Animal Farm 
Subject: [AFMUG] ePMP Wireless Scan 


Is there any way for an ePMP radio to scan the air and tell you what SSIDs it 
sees? I'm trying to align two backhauls that when pointed roughly the same 
direction... can't see each other. I don't want to just move it slightly and 
wait for the web interface to show it connected... or not. 

I want to run a scan, see it complete and tell me what it found. 



- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 


Re: [AFMUG] ePMP Wireless Scan

2014-09-29 Thread Ken Hohhof via Af
Oh, I miss the days when I had smartBridges backhauls and they couldn’t display 
all the SSIDs they saw, they’d pick up the hotspot at a Flying J 50 miles away. 
 You get 100 feet off the ground and you see everybody’s Linksys for miles 
around.  I guess if you’re in a 10 MHz channel it would narrow the list quite a 
bit, maybe try setting the radios for a narrow channel, align them, then go to 
the channel width you really want.


From: Paul McCall via Af 
Sent: Monday, September 29, 2014 10:32 AM
To: af@afmug.com 
Subject: Re: [AFMUG] ePMP Wireless Scan

Wireless, Monitor should show you that.

 

Tools, eDetect will show you the signal strength of anything on the channel by 
MAC only.  Might help you get close… ePMP MACs start with 00:04.   

 

 

From: Af [mailto:af-bounces+paulm=pdmnet@afmug.com] On Behalf Of Mike 
Hammett via Af
Sent: Monday, September 29, 2014 11:29 AM
To: Animal Farm
Subject: [AFMUG] ePMP Wireless Scan

 

Is there any way for an ePMP radio to scan the air and tell you what SSIDs it 
sees? I'm trying to align two backhauls that when pointed roughly the same 
direction...  can't see each other. I don't want to just move it slightly and 
wait for the web interface to show it connected...  or not.

I want to run a scan, see it complete and tell me what it found.



-
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com


Re: [AFMUG] standard 900 MHz Canopy channels

2014-09-29 Thread Ken Hohhof via Af
OK, thanks.

From: Shayne Lebrun via Af 
Sent: Monday, September 29, 2014 10:22 AM
To: af@afmug.com 
Subject: Re: [AFMUG] standard 900 MHz Canopy channels

906,915,924 are the way to go. 

 

Properly synced Canopy needs no guardband.  Properly synced ePMP needs 5mhz 
guardband.  Unsynced anything technically needs guardband=2*channelwidth.

 

From: Af [mailto:af-bounces+slebrun=muskoka@afmug.com] On Behalf Of CBB - 
Jay Fuller via Af
Sent: Sunday, September 28, 2014 3:08 PM
To: af@afmug.com
Subject: Re: [AFMUG] standard 900 MHz Canopy channels

 

 

would assume that would be doable, but that leaves no guard bands at all.

we run 906,915,924 and tell everyone else to do so as well...

 

  - Original Message - 

  From: Ken Hohhof via Af 

  To: af@afmug.com 

  Sent: Sunday, September 28, 2014 12:18 PM

  Subject: [AFMUG] standard 900 MHz Canopy channels

   

  I have always assumed the standard channels are 906, 915 and 924.

  But I keep getting competitors going on 906 and 922.  I understand they are 
  probably trying to avoid high power licensed stuff like paging around 930. 
  But if I go on 915, I find it overlaps with 922 and bad juju ensues. 
  Especially when this is a newcomer and they have no subs yet and don't match 
  your timing and don't care because ... they don't have subs yet and aren't 
  suffering the effects of the interference.  I have found that a hot 
  interferer on 922 will pretty much blow you off the air if you try to use 
  915, unless the timing parameters match, even though that's only 1 MHz of 
  overlap.

  So are the default channels actually 906, 914 and 922 in the real world? 


  1   2   >