Re: CEOlink

2002-03-13 Thread Iljitsch van Beijnum


On 14 Mar 2002, Eric Brandwine wrote:

> Actually, NANOG does great.  Especially during Sept 11, information
> was disseminated, help was offered and accepted, and except for a
> couple of idiotic flames, the SNR was high.

If NANOG fulfills such an important role, it's probably a good idea to
make sure the list still works when there are wide spread outages.

There is only a single MX for merit.edu, and as far as I can tell it's not
even multihomed. Also, since this is email, it depends on the DNS.

In theory, news would be more rebust than mail, because of its distributed
nature and it should be possible to make news work without relying on the
DNS.




Purpose of the Internet

2002-03-13 Thread Alan Hannan


> Actually, NANOG does great.  Especially during Sept 11, information
> was disseminated, help was offered and accepted, and except for a
> couple of idiotic flames, the SNR was high.  ARPA designed the thing
> to withstand nuclear blasts, and while this was not nuclear, it stood
> up well.

  I read through nanog around september 11th a few days ago and I
  concur that painful as it was to re-read, it is apparent that
  nanog served well as a useful communications medium.

  With regards to the purpose of the internet, I recall reading
  in the Prologue to _Where Wizards Stay Up Late_, by Katie Hafner
  and Matthew Lyon, a true anecdote about Bob Taylor. The authors
  quote Mr. Taylor as refuting that the purpose of the arpanet was 
  to provide communications in spite of a nuclear attack.

  Rather, it is asserted, the purpose of the arpanet was to 
  interconnect computers at various research/education facilities 
  so as to allow researchers to share resources.

  We all heard that story too, but popular media tended to focus
  on the sensationalist nuclear story.

  Useful info from history.

  -alan

  ps -> thanks jeff for the book back in 1996 :-)




Re: CEOlink

2002-03-13 Thread Eric Brandwine


> "b" == batz  <[EMAIL PROTECTED]> writes:

b> This is a complicated issue. Maybe I'm off base, but Nanog is actually
b> really good. Combined with Bugtraq, Incidents, and a virus alert service, 
b> Nanog plays a vital role. Their only limitation is that they are on the
b> Internet. :)

Exactly!  That's why we need control plane separation.

Run SNMP, SSH, telnet, and SNTP (Simple NANOG Transport Protocol)
across the management network, so we're sure we have them when we need
them.

Actually, NANOG does great.  Especially during Sept 11, information
was disseminated, help was offered and accepted, and except for a
couple of idiotic flames, the SNR was high.  ARPA designed the thing
to withstand nuclear blasts, and while this was not nuclear, it stood
up well.

ericb
-- 
Eric Brandwine |  Apart from hydrogen, the most common thing in the
UUNetwork Security |  universe is stupidity.
[EMAIL PROTECTED]   |
+1 703 886 6038|  - Harlan Ellison
Key fingerprint = 3A39 2C2F D5A0 FC7C  5F60 4118 A84A BD5D  59D7 4E3E



Re: CEOlink

2002-03-13 Thread Jeff Mcadams


Also sprach Sean Donelan
>On Wed, 13 Mar 2002, Steve Feldman wrote:
>> On Wed, Mar 13, 2002 at 03:55:26PM -0500, William Allen Simpson
>> wrote:
>> > Once upon a time, kc had a MOO -- we used to hang out there and
>> > discuss things in real time

>> It's still there, but doesn't see much activity these days.

>Yep, IPNMOO is still around, and some people use it.  NANOG is the
>closest thing we have to a "all-hands" channel, but lots of people
>don't like the signal to noise ratio.  I have my nocwire list, but its
>mostly just interesting things sean saw on the net.  Individual
>engineers use IRC, AIM, etc to communicate with people they know.

>Its informal, but so far it has served us well.

It might be worthwhile to post a pointer to this MOO.  There have been
several posts about it, but no pointers on how to access it.

I only have very limited experience with MUD's/MOO's/whatever, but I'm
certainly willing to give it a shot if it helps inter-provider
communication.
-- 
Jeff McAdamsEmail: [EMAIL PROTECTED]
Head Network Administrator  Voice: (502) 966-3848
IgLou Internet Services(800) 436-4456



Re: CEOlink

2002-03-13 Thread Sean Donelan



On Wed, 13 Mar 2002, Steve Feldman wrote:
> On Wed, Mar 13, 2002 at 03:55:26PM -0500, William Allen Simpson wrote:
> > Once upon a time, kc had a MOO -- we used to hang out there and discuss
> > things in real time
>
> It's still there, but doesn't see much activity these days.
>   Steve

Yep, IPNMOO is still around, and some people use it.  NANOG is
the closest thing we have to a "all-hands" channel, but lots of
people don't like the signal to noise ratio.  I have my nocwire
list, but its mostly just interesting things sean saw on the net.
Individual engineers use IRC, AIM, etc to communicate with people
they know.

Its informal, but so far it has served us well.





Re: CEOlink

2002-03-13 Thread batz


On Wed, 13 Mar 2002, Sean Donelan wrote:

:http://www.newsbytes.com/news/02/175172.html
:  Leaders of the nation's largest corporations are designing a new
:  communications network that would alert them immediately to a terrorist
:  attack and enable them to instantly talk with one another and government
:  officials about how to respond.

I get threat updates a few times a day from various sources as a part of 
my job, and what I have noticed is that the most valuble updates are the
ones where someone has put a few hours worth of analysis into them. 

>From this article, the value of this service is a central point of 
co-ordination, not unlike CERT, FIRST or (I think) the NIPC at the FBI. 

Nanog is actually a pretty effective forum for these issues as, it
is an ongoing way of maintaining connections between decision makers
and subject matter experts.  

:Interesting idea.  It would be nice if ISPs also had a way to
:instantly talk with one another.
:http://www.ntia.doc.gov/ntiahome/infrastructure/comments/Donelan.htm

What if someone were to offer one of those CNN satellite video terminals
at a reasonable rate with a package including a sat/cell phone, conference
bridge numbers, with alternates and backups etc..? 

The service would have to be offered by someone with the credibility to 
assess threats, and be able to co-ordinate response once subscribers
started calling in.  It is one thing to get people on the phone, it
is another to co-ordinate emergency management strategy with people 
who are busy, don't have security expertise, and may not have been
briefed on the complexity of the situation.  

Personally, I think the NIPC is probably the only group with the mandate
and access to expertise neccesary for something like this for the ISP
and telcom world, outside the industries themselves.  

Could a service like this could sustain itself profitably? 

Could a private industry consortium have broad enough influence to 
be effective? 

This is a complicated issue. Maybe I'm off base, but Nanog is actually
really good. Combined with Bugtraq, Incidents, and a virus alert service, 
Nanog plays a vital role. Their only limitation is that they are on the
Internet. :)

--
batz





Re: CEOlink

2002-03-13 Thread Steve Feldman


On Wed, Mar 13, 2002 at 03:55:26PM -0500, William Allen Simpson wrote:
> 
> Once upon a time, kc had a MOO -- we used to hang out there and discuss 
> things in real time

It's still there, but doesn't see much activity these days.
Steve



Re: CEOlink

2002-03-13 Thread Jeffrey Meltzer


> > Once upon a time, kc had a MOO -- we used to hang out there and discuss 
> > things in real time
> 
> Indeed. Once upon a time... one wonders why that is no longer the case. It
> isn't as if a MOO (or any other flavor of favorite server) takes up much.
> Is nobody offering, or is nobody using what's offered?
> 
> If it's just a matter of nobody offering, after all, even I can fix that...

I've actually had the MOO software compiled installed for a while, just 
haven't gotten around to had the time to play with it...If anyone wants 
to tell me how to set it up/secure it, i'll be glad to leave it there...

Jeff



Re: CEOlink

2002-03-13 Thread Richard A Steenbergen


On Wed, Mar 13, 2002 at 06:06:54PM -0700, Joel Baker wrote:
> 
> On Wed, Mar 13, 2002 at 03:55:26PM -0500, William Allen Simpson wrote:
> > 
> > Sean Donelan wrote:
> > > Interesting idea.  It would be nice if ISPs also had a way to
> > > instantly talk with one another.
> > > http://www.ntia.doc.gov/ntiahome/infrastructure/comments/Donelan.htm
> > 
> > Once upon a time, kc had a MOO -- we used to hang out there and discuss 
> > things in real time
> 
> Indeed. Once upon a time... one wonders why that is no longer the case. It
> isn't as if a MOO (or any other flavor of favorite server) takes up much.
> Is nobody offering, or is nobody using what's offered?
> 
> If it's just a matter of nobody offering, after all, even I can fix that...

Or just put up an IRC server, as long as you don't link it to EFNet noone 
will packet it. :)

If thats too much trouble, try an AIM chat room. I don't think its worth 
making a whole mud over (no offense to MOO :P).

-- 
Richard A Steenbergen <[EMAIL PROTECTED]>   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



Re: CEOlink

2002-03-13 Thread Joel Baker


On Wed, Mar 13, 2002 at 03:55:26PM -0500, William Allen Simpson wrote:
> 
> Sean Donelan wrote:
> > Interesting idea.  It would be nice if ISPs also had a way to
> > instantly talk with one another.
> > http://www.ntia.doc.gov/ntiahome/infrastructure/comments/Donelan.htm
> 
> Once upon a time, kc had a MOO -- we used to hang out there and discuss 
> things in real time

Indeed. Once upon a time... one wonders why that is no longer the case. It
isn't as if a MOO (or any other flavor of favorite server) takes up much.
Is nobody offering, or is nobody using what's offered?

If it's just a matter of nobody offering, after all, even I can fix that...
-- 
***
Joel Baker   System Administrator - lightbearer.com
[EMAIL PROTECTED]  http://users.lightbearer.com/lucifer/



Anyone here at Sprint?

2002-03-13 Thread Christopher K. Neitzert



Looking for a Nevada Sprint NOC worker.
please email me off list.

thanks

christopher


Christopher K. Neitzert / 0xC10D222F / [EMAIL PROTECTED]





[Fwd: 10 years and no ubiquitous security]

2002-03-13 Thread William Allen Simpson


In remembrance:

 Original Message 
Subject: 10 years and no ubiquitous security
Date: Wed, 13 Mar 2002 18:49:35 -0500
From: William Allen Simpson <[EMAIL PROTECTED]>
Organization: DayDreamer
To: [EMAIL PROTECTED]
CC: [EMAIL PROTECTED]

10 years ago this week, we had an IETF meeting in San Diego.

10 years ago on Tuesday, Phil Karn sprawled out across my hotel room bed 
and drew the packet header that became ESP.  (Remember when we were 
small enough to have hotel room BOFs?)  

10 years today, at a lunch meeting, Phil Karn gathered a group of us, 
and we agreed to pursue IP Security, as "the most important thing 
missing from the Internet".  (Most real work was still done in lunch and 
dinner BOFs last time I attended IETF, and presumably that tradition 
continues now.)

10 years ago tomorrow, Brian Lloyd and I had a "rubber hose" lunch 
meeting with Steve Kent, who as a member of the IAB had refused to allow 
the PPP WG to publish CHAP in our RFC as an official authentication 
protocol.  (He had previously mandated that we remove all security 
protocol negotiation.)  He backed down, but we had to change the name 
from "cryptographic" to "challenge".

Steve Kent refused to charter the IPSec WG.  We had to reform the 
structure of the IAB (removing Steve Kent) -- which was good for many 
other reasons, although its efficacy was short-lived.

After all these years, ESP itself is remarkably unchanged.  (The 
sequence field is 32 bits instead of 16 bits, but we did that in 1993.)  
Remember, by 1995 we had multiple interoperable implementations.

Roughly 5 years ago, IPSec was supposed to be disbanded, because its 
work was complete.  Instead, somebody named Steve Kent secretly took 
over the WG editorship (with no consensus, or even WG discussion), and 
his "appointment" was enforced upon the new "reform" WG Chairs. 

For 5 more years, IPSec WG has slowly turned out unworkable documents, 
generating endless and fruitless discussion.

Today, IPSec has insignificant deployment, and the WG goeth on forever.

...

Should I remind folks that at that same San Diego IETF, JI and Phil and 
Steve Deering and others of us had a lunch BOF on Mobile-IP?
-- 
William Allen Simpson
Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32



Re: Need Verio Contact

2002-03-13 Thread measl



On Wed, 13 Mar 2002, Majdi S. Abbas wrote:

> On Wed, Mar 13, 2002 at 10:37:37AM -0600, [EMAIL PROTECTED] wrote:
> > Does anyone have current contact info for VERIO NOC or Engineering?
> > "puck" data is completely out of date, as is my internal lists.
> 
>   [EMAIL PROTECTED] is out of date?

To all of you who responded as above, I was [obviously] unclear: I needed
telephone contact - the entry has been updated on puck.

Thanks!

>   --msa
> 

-- 
Yours, 
J.A. Terranson
[EMAIL PROTECTED]





Re: Need Verio Contact

2002-03-13 Thread Majdi S. Abbas


On Wed, Mar 13, 2002 at 10:37:37AM -0600, [EMAIL PROTECTED] wrote:
> Does anyone have current contact info for VERIO NOC or Engineering?
> "puck" data is completely out of date, as is my internal lists.

[EMAIL PROTECTED] is out of date?

--msa



Re: CEOlink

2002-03-13 Thread William Allen Simpson


Sean Donelan wrote:
> Interesting idea.  It would be nice if ISPs also had a way to
> instantly talk with one another.
> http://www.ntia.doc.gov/ntiahome/infrastructure/comments/Donelan.htm

Once upon a time, kc had a MOO -- we used to hang out there and discuss 
things in real time

-- 
William Allen Simpson
Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32



Re: The view from the other side of the fence

2002-03-13 Thread batz


On Wed, 13 Mar 2002, Sean Donelan wrote:

:With convergence, do you think we will get the best security practices
:from both worlds, or the worst?

Most organizations security policies have grown organically, or by 
precedent, as opposed to being 'architected'. 

When convergence occurs, the company with the most existing security 
infrastructure 'wins'. By this I mean their practices are adopted 
by the less organized one. 

Also, I have seen some very elaborate, enterprise wide free software security
solutions that were technically elegant, and very robust, but they were 
swept aside because the owners of these systems could not adequately
communicate their business value.   

It has been my observation that convergence doesn't relate so much to the 
integration of technologies to provide new services, as it does the 
rationaliztion of differing business models into new ones. 

>From a big picture security perspective, the security challenges of 
a convergence between a telco and a satellite tv company aren't as much 
about integrating the various networking technologies and exposing 
ground station computers to the Internet, as they would be about 
DRM, fraud mitigation, subscriber privacy and infrastructure protection. 

The reason I'm mentioning this is because I have heard some security people
talking about the problems with IP gateways to the PSTN, which is 
legitimately frightening to many, but the issue isn't about what will
happen when some PBX manufacturer puts an IP stack and an ethernet card
in their product without doing security QA testing. 

It is about whether the traditional telcom security models that look alot 
like corporate IT, where network people don't touch servers, and vice versa, 
will work when the line blurs between the network and the application. 

In corporate IT, I am one of those "Internet guys" that thinks he
can manage systems _and_ networks, which is like saying to me that I 
play both kinds of music, country _and_ western. 

Worst case scenario, we get kafka'esque bureacracy with no standards or 
procedures. Best case, we get a hybrid of strong, auditable and enforcable
policy, with an understanding of the systems and networks as a single
service as presented to the customer.  

So, as for whether we will see better or worse security policy, 
I can garuntee we will see the most cost effective solutions, 
meeting the minimum legal requirements, which serve customers needs, 
and improve overall ROI for stakeholders. 

In other words, not much will change by virtue of convergence alone. 
It will take education, possibly regulation, and market incentives to
create better security policy, and I think these things are independant 
of the features of new technologies. 

Cheers, 


--
batz




Re: CEOlink

2002-03-13 Thread Robert A. Hayden


On Wed, 13 Mar 2002, Sean Donelan wrote:



> Interesting idea.  It would be nice if ISPs also had a way to
> instantly talk with one another.

I thought that was NANOG ;-)




Re: Telco's write best practices for packet switching networks

2002-03-13 Thread Gwendolynn ferch Elydyr


On Wed, 13 Mar 2002, Sean Donelan wrote:
> Although many of the principles are the same, there are differences
> between running a corporate network and a public network.  You can
> have the same people doing both.  In small ISPs its likely the same
> people will be doing both.  A larger company will have seperate groups
> because they serve different masters and have different measures of
> success.  A company may not want to pay for the same levels of
> reliablity and survivability for their corporate network as their
> public IP network.

The goals of the corporate network and the public IP network are often
different, at best. The corporate network is inevitably focused around
the needs of the business, including such irritations as file sharing,
printing, calender services, video conferencing, and other notoriously
secure (heh!) services.

The public IP network is focused by and large on providing a limited
number of services, and flinging packets around as fast as possible.

The clue behind the public IP network is almost always focused on the
network (often to the point of considering any systems involved to be
second class citizens "Why should I care if there's a system down? It
only matters if the network's down"[1])

The clue on the corporate network often doesn't care at all about the
network (beyond "is it running") - but really cares that their services
are deployed and accessible.

I think that Sean's right about the goals being different - but it's
more than just "reliability and survivability". The network and
enterprise markets are notably different, with different goals and
requirements.

Most vendors seem to have a very clear grasp on that - and I suspect
that it'll be another 5-10 years before we see any form of true
convergance (if not longer).

[1] This ignoring the fact that a down'd network monitoring system may
cause all sorts of interesting side effects in viewing the network...
==
"A cat spends her life conflicted between a deep, passionate and profound
desire for fish and an equally deep, passionate and profound desire to
avoid getting wet.  This is the defining metaphor of my life right now."




Need Verio Contact

2002-03-13 Thread measl



Does anyone have current contact info for VERIO NOC or Engineering?

"puck" data is completely out of date, as is my internal lists.

Thanks!

-- 
Yours, 
J.A. Terranson
[EMAIL PROTECTED]






CEOlink

2002-03-13 Thread Sean Donelan




http://www.newsbytes.com/news/02/175172.html
  Leaders of the nation's largest corporations are designing a new
  communications network that would alert them immediately to a terrorist
  attack and enable them to instantly talk with one another and government
  officials about how to respond.



Interesting idea.  It would be nice if ISPs also had a way to
instantly talk with one another.
http://www.ntia.doc.gov/ntiahome/infrastructure/comments/Donelan.htm




Re: The view from the other side of the fence

2002-03-13 Thread Jake Khuon


### On Wed, 13 Mar 2002 08:00:41 -0500 (EST), Sean Donelan
### <[EMAIL PROTECTED]> casually decided to expound upon Rajesh Talpade
### <[EMAIL PROTECTED]> the following thoughts about "Re: The view
### from the other side of the fence":

SD> On Wed, 13 Mar 2002, Rajesh Talpade wrote:
SD> > A network is only as secure as its weakest link
SD> >
SD> > sounds like a cliche, but am afraid this least-common-denominator rule
SD> > will hold as networks converge.
SD> 
SD> Is there anything we can do to improve this?  How can we make sure
SD> the people who "need-to-know" find out how to secure their weakest
SD> links instead of waiting for each company to stumble along their
SD> learning curve.

That's a good question.  Unlike the system's world where there seems to be
quite a few free as well as commercial toolkits alongside stuff that gets
distributed OEM to run security audits (many OSes are preconfigured as part
of their installation process to generate periodic audits), there doesn't
seem to be many such toolkits for auditting networks as a whole.  I think
this stems from several reasons (and I'm probably missing a few).

[1] Diversity in network designs force security folks to tailor their
auditing tools to a particular network.

[2] Exposure of homegrown auditting methods and procedures viewed as a
security breach so such things simply are kept in secrecy.  I suspect
however that no one has really developed a comprehensive generic
auditting tool or toolkit but instead relies on a combination of
handcrafted scripts and security policies to run manual audits instead
of automated ones.  Someone please prove me wrong.

[3] Networks are not really thought of hollistically like a server is in the
system's world.  Security tools are targetted more towards auditting
devices in an individual manner because modelling the entire network is
too difficult.

I suppose some of the folks doing IDS and/or distributed firewall (Oh Mr.
Bellovin? |8^) development may be able to shed better light on the subject. 
But IDS seems to be a reactive measure rather than a proactive one and
distributed firewalls may address some issues with device security but
doesn't seem to really touch on enforcing sane routing practises.


--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]==+
 | Packet Plumber, Network Engineers /| / [~ [~ |) | | --- |
 | for Effective Bandwidth Utilisation  / |/  [_ [_ |) |_| N E T W O R K S |
 +=*/



Re: The view from the other side of the fence

2002-03-13 Thread Sean Donelan



On Wed, 13 Mar 2002, Rajesh Talpade wrote:
> A network is only as secure as its weakest link
>
> sounds like a cliche, but am afraid this least-common-denominator rule
> will hold as networks converge.

Is there anything we can do to improve this?  How can we make sure
the people who "need-to-know" find out how to secure their weakest
links instead of waiting for each company to stumble along their
learning curve.

The usual answer is hire an expert (or SAIC :-).  But there aren't
enough qualified experts to go around in the best of circumstances.
The problems include divergent cultures, technologies, and even
generations.  Until the technology crash, the so-called next
generation networking companies didn't want to "converge" with
the existing companies; they wanted to wipe them out.  There wasn't
a lot of sharing between the different groups, even within the
same company.

I'm not sure one security approach is better than the other, but they
mix like oil and water when you combine traditional telephone security
and Internet security methods.




NYT 3/13/02 on Worldcom and the SEC : "From Obscurity to Inquiry"

2002-03-13 Thread Fletcher E Kittredge



Well written, sobering.   Free registration required.


http://www.nytimes.com/2002/03/13/technology/13PHON.html
 
regards,
fletcher



Re: Telco's write best practices for packet switching networks

2002-03-13 Thread Sean Donelan



On Wed, 13 Mar 2002, Jake Khuon wrote:
> emloyees access their infrastrcture.  Do you seperate and outsource your
> management infrastructure to your corporate IT support?  Do you seperate but
> control it within your production network engineering groups?  If so, do you
> have a special group within network engineering concentrating specifically
> on management or do you have the same people designing the network also do
> the management design?

Although many of the principles are the same, there are differences
between running a corporate network and a public network.  You can
have the same people doing both.  In small ISPs its likely the same
people will be doing both.  A larger company will have seperate groups
because they serve different masters and have different measures of
success.  A company may not want to pay for the same levels of
reliablity and survivability for their corporate network as their
public IP network.





Re: The view from the other side of the fence

2002-03-13 Thread Rajesh Talpade


A network is only as secure as its weakest link

sounds like a cliche, but am afraid this least-common-denominator rule
will hold as networks converge.

rajesh.

"--- begin message from Sean Donelan ---"
> 
> 
> On Mon, 11 Mar 2002, Scott Madley wrote:
> > Let's face it as the industry moves towards a more converged state, we
> > haven't even really begun to consider the security implications that
> > present themselves in this new enviroment.
> 
> With convergence, do you think we will get the best security practices
> from both worlds, or the worst?
> 
> 



Re: The view from the other side of the fence

2002-03-13 Thread Jake Khuon


### On Wed, 13 Mar 2002 05:51:46 -0500 (EST), Sean Donelan
### <[EMAIL PROTECTED]> casually decided to expound upon Scott Madley
### <[EMAIL PROTECTED]> the following thoughts about "Re: The view from the
### other side of the fence":

SD> On Mon, 11 Mar 2002, Scott Madley wrote:
SD> > Let's face it as the industry moves towards a more converged state, we
SD> > haven't even really begun to consider the security implications that
SD> > present themselves in this new enviroment.
SD> 
SD> With convergence, do you think we will get the best security practices
SD> from both worlds, or the worst?

My off-the-cuff prediction is, as with any convergence process, it will be
first the latter and then the former... but then again, I'm a cynic.


--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]==+
 | Packet Plumber, Network Engineers /| / [~ [~ |) | | --- |
 | for Effective Bandwidth Utilisation  / |/  [_ [_ |) |_| N E T W O R K S |
 +=*/



Re: The view from the other side of the fence

2002-03-13 Thread Sean Donelan


On Mon, 11 Mar 2002, Scott Madley wrote:
> Let's face it as the industry moves towards a more converged state, we
> haven't even really begun to consider the security implications that
> present themselves in this new enviroment.

With convergence, do you think we will get the best security practices
from both worlds, or the worst?





Re: Telco's write best practices for packet switching networks

2002-03-13 Thread Jake Khuon


### On Tue, 12 Mar 2002 12:23:51 -0800 (PST), Ratul Mahajan
### <[EMAIL PROTECTED]> casually decided to expound upon Sean Donelan
### <[EMAIL PROTECTED]> the following thoughts about "Re: Telco's write best
### practices for packet switching networks ":

RM> On the downside -- this is yet another instance of conflict between
RM> research and operations.  Being able to address the (core) routers

This may be a repeat discussion but I also wonder if there are some other
social level conflicts derived from how one structures their management
network.  For instance, many providers have a seperate group which handles
the corporate IT which is different from the group which handles the
production provider network.  One could take the stance that the production
network should only be reachable from the corporate network and that the
management network become an extension of the corporate network.  I imagine
that many network engineers on the side of the production network might take
issue with that (I probably would).  For better or worse, many of us have
gotten used to managing our backbones under a single umbrella including
control over how we design and run our management network.  I'd be
interested in hearing about some of the practises of bigger providers
(assuming I'm not asking anyone to violate security) on how they let their
emloyees access their infrastrcture.  Do you seperate and outsource your
management infrastructure to your corporate IT support?  Do you seperate but
control it within your production network engineering groups?  If so, do you
have a special group within network engineering concentrating specifically
on management or do you have the same people designing the network also do
the management design?


--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]==+
 | Packet Plumber, Network Engineers /| / [~ [~ |) | | --- |
 | for Effective Bandwidth Utilisation  / |/  [_ [_ |) |_| N E T W O R K S |
 +=*/