Hi
anyone know a company in Bonn in Germany capable of working on a
customer site to connect a cisco router?
Thnkas
Olivier
How about Cisco?
BR
Philipp
-Ursprüngliche Nachricht-
Von: Olivier CALVANO [mailto:o.calv...@gmail.com]
Gesendet: Donnerstag, 30. August 2012 11:23
An: NANOG list (nanog@nanog.org)
Betreff: Help Request on Bonn/Germany
Hi
anyone know a company in Bonn in Germany capable of working on a
On Wed, Aug 29, 2012 at 09:33:18PM -0400, William Herrin wrote:
The message from Curtis' mailer implies that it's not a blanket
challenge. Maybe you just discovered a problem with your mail server
that he can help you identify and fix.
Perhaps there is or isn't a problem with the sender's mail
Hello everyone!
I tried looking on net but couldn't found direct answer, so thought to ask
here for some advise.
Is using /24 a must to protect (a bit) against route hijacking? We all
remember case of YouTube 2008 and hijacking in Pakistan. At that time
YouTube was using /22 and thus /24 (more
You might find your /24 routes filtered out at a lot of places that do
have sensible route filtering
But then yes, it'd protect you against the idiots who dont know bgp
from a hole in the ground anyway and let whatever hijacking happen
But I'd suggest do whatever such announcement if and only if
On Thu, 30 Aug 2012, Anurag Bhatia wrote:
I tried looking on net but couldn't found direct answer, so thought to ask
here for some advise.
Is using /24 a must to protect (a bit) against route hijacking? We all
remember case of YouTube 2008 and hijacking in Pakistan. At that time
YouTube was
On Thu, Aug 30, 2012 at 6:24 AM, Rich Kulawiec r...@gsp.org wrote:
On Wed, Aug 29, 2012 at 09:33:18PM -0400, William Herrin wrote:
The message from Curtis' mailer implies that it's not a blanket
challenge. Maybe you just discovered a problem with your mail server
that he can help you identify
I'm wondering what would be the sane default MAC limit per VPLS domain as
well as per port assuming the RSP can hold up to 512K MAC addresses please?
I believe the answer would partly depend on the business model (like I can
start with 2 MACs per port and 50 per domain and have customers to pay
Hi Adam,
I think you're correct -- it depends on the business model.
If your customers CE devices will be routers you can make the maximum number of
macs correspondingly small, and if they will be switches, you'll have to
determine what
makes sense for each interface and domain.
I think it
Or better.
Sign your prefixes and create ROAs to monitor any suspicious activity.
There is an app for that:
http://bgpmon.net
Besides the normal service you can use also RPKI data to trigger alarms of
possible hijacks
Hi guys,
Trying to generate graphs for ipv6 traffic going through an exchange point.
Anyone got ideas?
Thanks
Sent from my iPad
On Thu, Aug 30, 2012 at 7:54 AM, Anurag Bhatia m...@anuragbhatia.com wrote:
Is using /24 a must to protect (a bit) against route hijacking?
Hi Anurag,
Not only is it _not_ a must, it doesn't work and it impairs your
ability to detect the fault.
In a route hijacking scenario, traffic for a
Hello Joseph,
If you have sFlow capable devices, you can generate ipv6 graphs.
Take a Look at this:
http://www.jasinska.de/talks/0610_sf...@euroix9.pdf
Regards,
Pablo
Em 30-08-2012 08:41, Joseph Muga escreveu:
Hi guys,
Trying to generate graphs for ipv6 traffic going through an exchange
On 30/08/12 12:54, Anurag Bhatia wrote:
Is using /24 a must to protect (a bit) against route hijacking?
Announcing your, say /19 as 32 /24s does not prevent someone from trying
to hijack you, you will still get some disruption if someone tries, but
you might limit the scope of their success or
Hi Joseph,
There was a presentation on exactly this topic at AfPIF3 last week by
Martin Levy of Hurricane Electric.
See
http://www.youtube.com/watch?v=UpuXcQpfrisfeature=sharelist=PLA8857C20BB1E1F83
and slides
Matt Addison wrote the following on 8/29/2012 6:08 PM:
Sent from my mobile device, so please excuse any horrible misspellings.
On Aug 29, 2012, at 18:30, james machado hvgeekwt...@gmail.com wrote:
On Wed, Aug 29, 2012 at 1:55 PM, STARNES, CURTIS
curtis.star...@granburyisd.org wrote:
Sorry
On Thu, Aug 30, 2012 at 11:50 AM, Blake Hudson bl...@ispn.net wrote:
Matt Addison wrote the following on 8/29/2012 6:08 PM:
Sent from my mobile device, so please excuse any horrible misspellings.
On Aug 29, 2012, at 18:30, james machado hvgeekwt...@gmail.com wrote:
On Wed, Aug 29, 2012 at
I remember it too... I had a ticket get escalated from our support group in
about 2003 of a customer who could not get any internet access... they had XP
and had been assigned a .0 IP out of a /23 we were using for a specific pop.
That /23 came out of 64.0.0.0/8 so it was clearly a bit
On Thu, 30 Aug 2012, Blake Hudson wrote:
these OS's simply enforce classful boundaries regardless of the subnet mask
you have set. As the KB states, this bug affects supernets only. I'm not
trying to defend MS (they can do that themselves), but your statement was
misleading.
Just for kicks,
Anyone heard anything about an XO fiber cut in northeast? We have had a
bunch of issues with some DID's in NJ today and one of our carriers
forwarded a a vague statement from XO:
*XO Communications is currently experiencing a fiber-cut which is causing a
service interruption for some markets in
I suggest subscribing to outages. They are chatting about such a fiber cut,
and are generally the place to look for major outage level events like the
below.
-Blake
On Thu, Aug 30, 2012 at 3:10 PM, chris tknch...@gmail.com wrote:
Anyone heard anything about an XO fiber cut in northeast? We
For anyone not already familiar, go sign up at:
https://puck.nether.net/mailman/listinfo/outages
On Thu, Aug 30, 2012 at 1:13 PM, Blake Dunlap iki...@gmail.com wrote:
I suggest subscribing to outages. They are chatting about such a fiber cut,
and are generally the place to look for major
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 08/30/2012 01:10 PM, chris wrote:
Anyone heard anything about an XO fiber cut in northeast? We have
had a bunch of issues with some DID's in NJ today and one of our
carriers forwarded a a vague statement from XO:
*XO Communications is
On Thu, Aug 30, 2012 at 8:41 AM, William Herrin b...@herrin.us wrote:
On Thu, Aug 30, 2012 at 7:54 AM, Anurag Bhatia m...@anuragbhatia.com wrote:
Is using /24 a must to protect (a bit) against route hijacking?
Hi Anurag,
Not only is it _not_ a must, it doesn't work and it impairs your
24 matches
Mail list logo