Re: We hit half-million: The Cidr Report

2014-05-02 Thread Alain Hebert
Well,

I was just a suit drone into one of their 100 little IT firm around
the world.

The nearest I got to an actual AA associate was during a 1 month
project in Chicago (:

Wasted my time really... They billed 3 months to their clients, for
a project that took 1 month, and I was asked to fill the cubicle for 2
month doing nothing.

-
Alain Hebertaheb...@pubnix.net   
PubNIX Inc.
50 boul. St-Charles
P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
Tel: 514-990-5911  http://www.pubnix.netFax: 514-990-9443

On 05/01/14 18:43, Owen DeLong wrote:
 Care to comment on how you feel about the COI that developed between AA 
 Consulting business at Enron and AA auditing Enron?

 Not asking you to disclose anything confidential, but if you have wisdom to 
 impart about any sort of generic lessons learned, etc. that might be relevant 
 to this discussion, I think that could be useful.

 Owen

 On May 1, 2014, at 12:56 PM, Alain Hebert aheb...@pubnix.net wrote:

Hey,

I worked for them (AA) in the early 90's =D

 -
 Alain Hebertaheb...@pubnix.net   
 PubNIX Inc.
 50 boul. St-Charles
 P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
 Tel: 514-990-5911  http://www.pubnix.netFax: 514-990-9443

 On 05/01/14 14:07, John Souter wrote:
 On 01/05/14 17:41, Owen DeLong wrote:
 The problem with this theory is that if auditors can be so easily put to 
 the
 street, you run into the risk of auditors altering behavior to increase 
 customer
 satisfaction in ways that prevent them from providing the controls that 
 are the
 reason auditors exist in the first place.
 I disagree.  And the power balance is generally tilted way in favour of
 the auditors, as many people on this thread have already commented.  In
 my experience, most companies are afraid/inhibited to raise issues or
 challenge their auditors in any way.  Nobody is asking auditors to roll
 over, but if their behaviour is unprofessional/illogical, then a short
 sharp shock should do the trick.

 If you don’t believe me, examine the history of Arthur Anderson and their
 relationship with a certain Houston-based company which failed 
 spectacularly.
 Can't really comment, but it was financial auditing, and ISTR that many
 things failed in that situation - not just financial auditing.

 John




oss netflow collector/trending/analysis

2014-05-02 Thread Matthew Galgoci

Hey There,

I was just wondering, for people who are doing netflow analysis with
open source tools and who are doing at least 10k or more flows per
second, what are you using?

I know of three tool sets:

- The classic osu flow-tools and the modern continuation/fork.
- ntop
- nfdump/nfsen

Is there anything else I've missed? A few folks here really seem to like
nfsen/nfdump.

Thanks,

Matt

-- 
Matthew Galgoci
Network Operations
Red Hat, Inc
919.754.3700 x44155
--
“Whatever you do will be insignificant, but it is very important that you do 
it.”  -- Mahatma Gandhi



Re: oss netflow collector/trending/analysis

2014-05-02 Thread Dobbins, Roland

On May 2, 2014, at 9:36 PM, Matthew Galgoci mgalg...@redhat.com wrote:

 A few folks here really seem to like
 nfsen/nfdump.

The good thing about nfdump/nfsen is that you can customize it and do a lot 
with it, and it's easy to get set up and running.

This is the canonical list of open-source NetFlow tools:

http://www.switch.ch/network/projects/completed/TF-NGN/floma/software.html

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

  Luck is the residue of opportunity and design.

   -- John Milton



Re: oss netflow collector/trending/analysis

2014-05-02 Thread Jeroen Massar
On 2014-05-02 16:36, Matthew Galgoci wrote:
[..]
 Is there anything else I've missed? A few folks here really seem to like
 nfsen/nfdump.

For OSS that is pretty much it that really matters (maybe you could add
Argus if you really want though).

For a long long list, check out Simon Leinen's site:
https://www.switch.ch/network/projects/completed/TF-NGN/floma/software.html

Not all of that is OSS though. Lots of these netflow-analyzer tools are
in-house / a bunch-of-scripts-upon-scripts that are to scary to let out
in the open and/or do not scale...

IMHO your best bet is to use nfsen/nfdump as that is the best thing
publicly available.

Greets,
 Jeroen



Re: oss netflow collector/trending/analysis

2014-05-02 Thread Avi Freedman

There's also SiLK from CMU.  It's powerful but has a learning curve.

I also see pmacct being used both by some end networks and by 
some vendors as part of systems.

Avi

 Hey There,
 
 I was just wondering, for people who are doing netflow analysis with
 open source tools and who are doing at least 10k or more flows per
 second, what are you using?
 
 I know of three tool sets:
 
 - The classic osu flow-tools and the modern continuation/fork.
 - ntop
 - nfdump/nfsen
 
 Is there anything else I've missed? A few folks here really seem to like
 nfsen/nfdump.
 
 Thanks,
 
 Matt



Re: oss netflow collector/trending/analysis

2014-05-02 Thread Leslie
pmacct (http://www.pmacct.net/) is another pretty awesome open source tool.

Leslie

On Fri, May 2, 2014 at 8:00 AM, Avi Freedman freed...@freedman.net wrote:

 There's also SiLK from CMU.  It's powerful but has a learning curve.

 I also see pmacct being used both by some end networks and by
 some vendors as part of systems.

 Avi

 Hey There,

 I was just wondering, for people who are doing netflow analysis with
 open source tools and who are doing at least 10k or more flows per
 second, what are you using?

 I know of three tool sets:

 - The classic osu flow-tools and the modern continuation/fork.
 - ntop
 - nfdump/nfsen

 Is there anything else I've missed? A few folks here really seem to like
 nfsen/nfdump.

 Thanks,

 Matt



Re: oss netflow collector/trending/analysis

2014-05-02 Thread Joe Loiacono
NANOG nanog-bounces+jloiacon=csc@nanog.org wrote on 05/02/2014 
11:00:15 AM:

 From: freed...@freedman.net (Avi Freedman)
 
 There's also SiLK from CMU.  It's powerful but has a learning curve.
 

SiLK is very good. See FlowViewer for a powerful front-end to the tool.

http://sourceforge.net/projects/flowviewer/

Also supports flow-tools.

Joe


Weekly Routing Table Report

2014-05-02 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.

The posting is sent to APOPS, NANOG, AfNOG, AusNOG, SANOG, PacNOG, LacNOG,
TRNOG, CaribNOG and the RIPE Routing Working Group.

Daily listings are sent to bgp-st...@lists.apnic.net

For historical data, please see http://thyme.rand.apnic.net.

If you have any comments please contact Philip Smith pfsi...@gmail.com.

Routing Table Report   04:00 +10GMT Sat 03 May, 2014

Report Website: http://thyme.rand.apnic.net
Detailed Analysis:  http://thyme.rand.apnic.net/current/

Analysis Summary


BGP routing table entries examined:  493507
Prefixes after maximum aggregation:  193714
Deaggregation factor:  2.55
Unique aggregates announced to Internet: 244007
Total ASes present in the Internet Routing Table: 46734
Prefixes per ASN: 10.56
Origin-only ASes present in the Internet Routing Table:   35795
Origin ASes announcing only one prefix:   16388
Transit ASes present in the Internet Routing Table:6056
Transit-only ASes present in the Internet Routing Table:170
Average AS path length visible in the Internet Routing Table:   4.6
Max AS path length visible:  53
Max AS path prepend of ASN ( 50404)  51
Prefixes from unregistered ASNs in the Routing Table:  1837
Unregistered ASNs in the Routing Table: 459
Number of 32-bit ASNs allocated by the RIRs:   6508
Number of 32-bit ASNs visible in the Routing Table:4883
Prefixes from 32-bit ASNs in the Routing Table:   16259
Number of bogon 32-bit ASNs visible in the Routing Table:   133
Special use prefixes present in the Routing Table:0
Prefixes being announced from unallocated address space:441
Number of addresses announced to Internet:   2678216965
Equivalent to 159 /8s, 162 /16s and 89 /24s
Percentage of available address space announced:   72.3
Percentage of allocated address space announced:   72.3
Percentage of available address space allocated:  100.0
Percentage of address space in use by end-sites:   96.3
Total number of prefixes smaller than registry allocations:  171214

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:   117313
Total APNIC prefixes after maximum aggregation:   34942
APNIC Deaggregation factor:3.36
Prefixes being announced from the APNIC address blocks:  120226
Unique aggregates announced from the APNIC address blocks:50108
APNIC Region origin ASes present in the Internet Routing Table:4923
APNIC Prefixes per ASN:   24.42
APNIC Region origin ASes announcing only one prefix:   1231
APNIC Region transit ASes present in the Internet Routing Table:860
Average APNIC Region AS path length visible:4.6
Max APNIC Region AS path length visible: 30
Number of APNIC region 32-bit ASNs visible in the Routing Table:931
Number of APNIC addresses announced to Internet:  732419201
Equivalent to 43 /8s, 167 /16s and 212 /24s
Percentage of available APNIC address space announced: 85.6

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911, 45056-46079, 55296-56319,
   58368-59391, 63488-63999, 131072-133631
APNIC Address Blocks 1/8,  14/8,  27/8,  36/8,  39/8,  42/8,  43/8,
49/8,  58/8,  59/8,  60/8,  61/8, 101/8, 103/8,
   106/8, 110/8, 111/8, 112/8, 113/8, 114/8, 115/8,
   116/8, 117/8, 118/8, 119/8, 120/8, 121/8, 122/8,
   123/8, 124/8, 125/8, 126/8, 133/8, 150/8, 153/8,
   163/8, 171/8, 175/8, 180/8, 182/8, 183/8, 202/8,
   203/8, 210/8, 211/8, 218/8, 219/8, 220/8, 221/8,
   222/8, 223/8,

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:168115
Total ARIN prefixes after maximum aggregation:83465
ARIN Deaggregation factor: 2.01
Prefixes being announced from the ARIN address blocks:   169561
Unique aggregates announced from the ARIN address blocks: 79577
ARIN Region origin ASes present in the Internet Routing Table:16243
ARIN 

Best practices IPv4/IPv6 BGP (dual stack)

2014-05-02 Thread Deepak Jain

Between peering routers on a dual-stacked network, is it considered best 
practices to have two BGP sessions (one for v4 and one for v6) between them? Or 
is it better to put v4 in the v6 session or v6 in the v4 session?

According to docs, obviously all of these are supported and if both sides are 
dual stacked, even the next-hops don't need to be overwritten.

Is there any community-approach to best practices here? Any FIB weirdness (e.g. 
IPv4 routes suddenly start sucking up IPv6 TCAM space, etc)  that results with 
one solution over the other?

Thanks in advance,

DJ


Re: Best practices IPv4/IPv6 BGP (dual stack)

2014-05-02 Thread Jared Mauch

On May 2, 2014, at 3:44 PM, Deepak Jain dee...@ai.net wrote:

 
 Between peering routers on a dual-stacked network, is it considered best 
 practices to have two BGP sessions (one for v4 and one for v6) between them? 
 Or is it better to put v4 in the v6 session or v6 in the v4 session?

We use v4 transport for v4 routes and v6 transport for v6 routes only.

This way if one plane is unstable the other is unaffected.

- Jared

Re: Best practices IPv4/IPv6 BGP (dual stack)

2014-05-02 Thread Laszlo Hanyecz
Two different sessions using two different transport protocols.  The v4 BGP 
session should have address family v6 disabled and vice versa.  Exchange v4 
routes over a v4 TCP connection, exchange v6 routes over a v6 TCP connection.  
Just treat them as independent protocols. 

-Laszlo


On May 2, 2014, at 7:44 PM, Deepak Jain dee...@ai.net wrote:

 
 Between peering routers on a dual-stacked network, is it considered best 
 practices to have two BGP sessions (one for v4 and one for v6) between them? 
 Or is it better to put v4 in the v6 session or v6 in the v4 session?
 
 According to docs, obviously all of these are supported and if both sides are 
 dual stacked, even the next-hops don't need to be overwritten.
 
 Is there any community-approach to best practices here? Any FIB weirdness 
 (e.g. IPv4 routes suddenly start sucking up IPv6 TCAM space, etc)  that 
 results with one solution over the other?
 
 Thanks in advance,
 
 DJ



Re: Best practices IPv4/IPv6 BGP (dual stack)

2014-05-02 Thread Ryan Wilkins


 
 Between peering routers on a dual-stacked network, is it considered best 
 practices to have two BGP sessions (one for v4 and one for v6) between them? 
 Or is it better to put v4 in the v6 session or v6 in the v4 session?
 
 According to docs, obviously all of these are supported and if both sides are 
 dual stacked, even the next-hops don't need to be overwritten.
 
 Is there any community-approach to best practices here? Any FIB weirdness 
 (e.g. IPv4 routes suddenly start sucking up IPv6 TCAM space, etc)  that 
 results with one solution over the other?
 
 Thanks in advance,
 
 DJ


For what it’s worth, my AboveNet and Cogent BGP peerings are v4 for v4 routes 
and v6 for v6 routes.  Two separate sessions to each carrier.

While I don’t have any BGP speaking IPv6 customers yet, I would set up this 
same way to keep the two protocols apart from each other.

Best,
Ryan Wilkins



Re: Best practices IPv4/IPv6 BGP (dual stack)

2014-05-02 Thread Måns Nilsson
Subject: Best practices IPv4/IPv6 BGP (dual stack) Date: Fri, May 02, 2014 at 
07:44:33PM + Quoting Deepak Jain (dee...@ai.net):
 
 Between peering routers on a dual-stacked network, is it considered best 
 practices to have two BGP sessions (one for v4 and one for v6) between them? 
 Or is it better to put v4 in the v6 session or v6 in the v4 session?

Like others, yes, two sessions, v6 over v6 and v4 over v4. only the native AF 
is active. 
 
 According to docs, obviously all of these are supported and if both sides are 
 dual stacked, even the next-hops don't need to be overwritten.

It works, but might produce interesting side effects. I've had to resort
to it when peering between different IOS versions; but that might have
been the result of fat-fingering as well.

 Is there any community-approach to best practices here? Any FIB weirdness 
 (e.g. IPv4 routes suddenly start sucking up IPv6 TCAM space, etc)  that 
 results with one solution over the other?

If having MPLS bgp peers over v6 carrying vpnv4 routes all sorts of
strange things can happen. There is no standard for it; so one should
not expect it to work. But the failure modes are interesting; I've had
the next-hop for a v6-carried vpnv4 peering be the first 32 bits of the
v6 next-hop, interpreted as a v4 address.. It only works if there is a
v4 route to that made-up address.

This is a field where v4 next-hops are essential to make things
work. rantIn that context, allocating 100.64.0.0/10 to CGN was
especially un-clever... /rant

-- 
Måns Nilsson primary/secondary/besserwisser/machina
MN-1334-RIPE +46 705 989668
Xerox your lunch and file it under sex offenders!


signature.asc
Description: Digital signature


Shared Transition Space VS. BGP Next Hop [was: Re: Best practices IPv4/IPv6 BGP (dual stack)]

2014-05-02 Thread Chris Grundemann
Hi Mans,

On Fri, May 2, 2014 at 2:35 PM, Måns Nilsson mansa...@besserwisser.orgwrote:

 This is a field where v4 next-hops are essential to make things
 work. rantIn that context, allocating 100.64.0.0/10 to CGN was
 especially un-clever... /rant


Would you expound a bit on what you mean here? I don't quite follow but I
am very interested to understand the issue.

Thanks!
~Chris

-- 
@ChrisGrundemann
http://chrisgrundemann.com


The Cidr Report

2014-05-02 Thread cidr-report
This report has been generated at Fri May  2 21:13:55 2014 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org/2.0 for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
25-04-14500177  282897
26-04-14500200  282955
27-04-14500300  283004
28-04-14500709  283246
29-04-14501078  282694
30-04-14501121  282538
01-05-14500741  282901
02-05-14500388  283120


AS Summary
 46968  Number of ASes in routing system
 19152  Number of ASes announcing only one prefix
  3690  Largest number of prefixes announced by an AS
AS28573: NET Serviços de Comunicação S.A.,BR
  119976960  Largest address span announced by an AS (/32s)
AS4134 : CHINANET-BACKBONE No.31,Jin-rong Street,CN


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 02May14 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 500620   283088   21753243.5%   All ASes

AS28573 3690  174 351695.3%   NET Serviços de Comunicação
   S.A.,BR
AS6389  2970   56 291498.1%   BELLSOUTH-NET-BLK -
   BellSouth.net Inc.,US
AS17974 2800  252 254891.0%   TELKOMNET-AS2-AP PT
   Telekomunikasi Indonesia,ID
AS4766  2947  931 201668.4%   KIXS-AS-KR Korea Telecom,KR
AS18881 1967   37 193098.1%   Global Village Telecom,BR
AS1785  2201  494 170777.6%   AS-PAETEC-NET - PaeTec
   Communications, Inc.,US
AS10620 2850 1352 149852.6%   Telmex Colombia S.A.,CO
AS18566 2047  565 148272.4%   MEGAPATH5-US - MegaPath
   Corporation,US
AS4323  2934 1512 142248.5%   TWTC - tw telecom holdings,
   inc.,US
AS7303  1758  457 130174.0%   Telecom Argentina S.A.,AR
AS4755  1852  582 127068.6%   TATACOMM-AS TATA
   Communications formerly VSNL
   is Leading ISP,IN
AS7545  2232 1070 116252.1%   TPG-INTERNET-AP TPG Telecom
   Limited,AU
AS7552  1243  142 110188.6%   VIETEL-AS-AP Viettel
   Corporation,VN
AS22561 1302  241 106181.5%   AS22561 - CenturyTel Internet
   Holdings, Inc.,US
AS6983  1327  314 101376.3%   ITCDELTA - Earthlink, Inc.,US
AS36998 1114  161  95385.5%   SDN-MOBITEL,SD
AS9829  1622  726  89655.2%   BSNL-NIB National Internet
   Backbone,IN
AS22773 2411 1564  84735.1%   ASN-CXA-ALL-CCI-22773-RDC -
   Cox Communications Inc.,US
AS24560 1126  295  83173.8%   AIRTELBROADBAND-AS-AP Bharti
   Airtel Ltd., Telemedia
   Services,IN
AS4808  1214  394  82067.5%   CHINA169-BJ CNCGROUP IP
   network China169 Beijing
   Province Network,CN
AS4788  1036  251  78575.8%   TMNET-AS-AP TM Net, Internet
   Service Provider,MY
AS18101  944  186  75880.3%   RELIANCE-COMMUNICATIONS-IN
   Reliance Communications
   Ltd.DAKC MUMBAI,IN
AS8151  1410  655  75553.5%   Uninet S.A. de C.V.,MX
AS701   1482  751  73149.3%   UUNET - MCI Communications
   Services, Inc. d/b/a Verizon
   Business,US
AS7738   914  184  73079.9%   Telemar Norte Leste S.A.,BR
AS26615  842  113  72986.6%   Tim Celular S.A.,BR
AS855760   57  70392.5%   CANET-ASN-4 - Bell Aliant
   Regional Communications,
   Inc.,CA
AS6147   785  113  67285.6%   Telefonica del Peru S.A.A.,PE
AS4780  1038  370  

BGP Update Report

2014-05-02 Thread cidr-report
BGP Update Report
Interval: 24-Apr-14 -to- 01-May-14 (7 days)
Observation Point: BGP Peering with AS131072

TOP 20 Unstable Origin AS
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS7029   179743  8.1% 788.3 -- WINDSTREAM - Windstream 
Communications Inc,US
 2 - AS982991957  4.1%  69.3 -- BSNL-NIB National Internet 
Backbone,IN
 3 - AS453834300  1.5%  90.5 -- ERX-CERNET-BKB China Education 
and Research Network Center,CN
 4 - AS840229550  1.3%  41.9 -- CORBINA-AS OJSC Vimpelcom,RU
 5 - AS29571   24924  1.1% 102.1 -- CITelecom-AS,CI
 6 - AS41691   21703  1.0%1085.2 -- SUMTEL-AS-RIPE Summa Telecom 
LLC,RU
 7 - AS23752   21375  1.0% 164.4 -- NPTELECOM-NP-AS Nepal 
Telecommunications Corporation, Internet Services,NP
 8 - AS381620610  0.9%  36.3 -- COLOMBIA TELECOMUNICACIONES 
S.A. ESP,CO
 9 - AS17557   19397  0.9% 323.3 -- PKTELECOM-AS-PK Pakistan 
Telecommunication Company Limited,PK
10 - AS14259   15209  0.7% 760.5 -- Gtd Internet S.A.,CL
11 - AS28573   14291  0.6%   9.1 -- NET Serviços de Comunicação 
S.A.,BR
12 - AS477514187  0.6% 262.7 -- GLOBE-TELECOM-AS Globe 
Telecoms,PH
13 - AS671313895  0.6%  25.6 -- IAM-AS,MA
14 - AS10620   12372  0.6%   7.2 -- Telmex Colombia S.A.,CO
15 - AS35567   11996  0.5%  81.1 -- DASTO-BOSNIA-AS DASTO semtel 
d.o.o.,BA
16 - AS347511732  0.5% 120.9 -- DNIC-AS-03475 - Navy Network 
Information Center (NNIC),US
17 - AS48159   10346  0.5%  46.2 -- TIC-AS Telecommunication 
Infrastructure Company,IR
18 - AS662910142  0.5%   10142.0 -- NOAA-AS - NOAA,US
19 - AS647  8725  0.4%  74.6 -- DNIC-ASBLK-00616-00665 - DoD 
Network Information Center,US
20 - AS525928708  0.4%1741.6 -- CELINO RIBEIRO SERVICOS DE 
TELECOMUNICACOES LTDA -,BR


TOP 20 Unstable Origin AS (Updates per announced prefix)
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS662910142  0.5%   10142.0 -- NOAA-AS - NOAA,US
 2 - AS181358062  0.4%8062.0 -- BTV BTV Cable television,JP
 3 - AS46846  0.3% 824.0 -- ISI-AS - University of Southern 
California,US
 4 - AS346353997  0.2%3997.0 -- LIBERTY-AS Liberty Poland 
S.A.,PL
 5 - AS8039 2532  0.1%2532.0 -- CCC-ASN-1 - Cinergy 
Communications,US
 6 - AS544657083  0.3%2361.0 -- QPM-AS-1 - QuickPlay Media 
Inc.,US
 7 - AS525928708  0.4%1741.6 -- CELINO RIBEIRO SERVICOS DE 
TELECOMUNICACOES LTDA -,BR
 8 - AS31494  0.1%1213.0 -- MIT-GATEWAYS - Massachusetts 
Institute of Technology,US
 9 - AS31477  0.1%1987.0 -- MIT-GATEWAYS - Massachusetts 
Institute of Technology,US
10 - AS336431388  0.1%1388.0 -- JELLYBELLY - Jelly Belly Candy 
Company,US
11 - AS455901349  0.1%1349.0 -- HGCINTNET-AS-AP Hutch Connect,HK
12 - AS7453 2595  0.1%1297.5 -- ACCELERATION - ACCELERATED DATA 
WORKS, INC.,US
13 - AS603451282  0.1%1282.0 -- NBITI-AS Nahjol Balagheh 
International Research Institution,IR
14 - AS41691   21703  1.0%1085.2 -- SUMTEL-AS-RIPE Summa Telecom 
LLC,RU
15 - AS37681 972  0.0% 972.0 -- Sunmail-AS,NG
16 - AS350931884  0.1% 942.0 -- RO-HTPASSPORT HighTech Passport 
Ltd SUA California San Jose SUCURSALA BUCURESTI ROMANIA,RO
17 - AS1358  874  0.0% 874.0 -- HNSNET-AS - Hughes Network 
Systems, Inc.,US
18 - AS7029   179743  8.1% 788.3 -- WINDSTREAM - Windstream 
Communications Inc,US
19 - AS591371553  0.1% 776.5 -- IDNIC-KEMHAN-AS-ID PUSDATIN 
KEMHAN RI,ID
20 - AS14259   15209  0.7% 760.5 -- Gtd Internet S.A.,CL


TOP 20 Unstable Prefixes
Rank Prefix Upds % Origin AS -- AS Name
 1 - 89.221.206.0/24   21563  0.9%   AS41691 -- SUMTEL-AS-RIPE Summa Telecom 
LLC,RU
 2 - 121.52.144.0/24   19623  0.8%   AS17557 -- PKTELECOM-AS-PK Pakistan 
Telecommunication Company Limited,PK
 AS45773 -- HECPERN-AS-PK PERN AS Content 
Servie Provider, Islamabad, Pakistan,PK
 3 - 87.250.97.0/2411199  0.5%   AS35567 -- DASTO-BOSNIA-AS DASTO semtel 
d.o.o.,BA
 4 - 192.58.232.0/24   10142  0.4%   AS6629  -- NOAA-AS - NOAA,US
 5 - 50.96.132.0/24 9207  0.4%   AS7029  -- WINDSTREAM - Windstream 
Communications Inc,US
 6 - 205.247.12.0/248276  0.3%   AS6459  -- TRANSBEAM - I-2000, Inc.,US
 7 - 42.83.48.0/20  8062  0.3%   AS18135 -- BTV BTV Cable television,JP
 8 - 120.28.62.0/24 7348  0.3%   AS4775  -- GLOBE-TELECOM-AS Globe 
Telecoms,PH
 9 - 206.152.15.0/247081  0.3%   AS54465 -- QPM-AS-1 - QuickPlay Media 
Inc.,US
10 - 186.237.56.0/226846  0.3%   AS4 -- ISI-AS - University of Southern 
California,US
11 - 222.127.0.0/24 6355  

Re: Best practices IPv4/IPv6 BGP (dual stack)

2014-05-02 Thread Chris Grundemann
On Fri, May 2, 2014 at 1:47 PM, Jared Mauch ja...@puck.nether.net wrote:


 On May 2, 2014, at 3:44 PM, Deepak Jain dee...@ai.net wrote:

 
  Between peering routers on a dual-stacked network, is it considered best 
  practices to have two BGP sessions (one for v4 and one for v6) between 
  them? Or is it better to put v4 in the v6 session or v6 in the v4 session?

 We use v4 transport for v4 routes and v6 transport for v6 routes only.

+1

 This way if one plane is unstable the other is unaffected.

This is the key point I believe: No protocol fate sharing!

From the draft BCOP on this topic[1]:
8
Establish new, IPv6-Only peering sessions parallel to existing IPv4
peering. Individual IPv4 and IPv6 BGP peering sessions should be
established between all BGP neighbors, particularly eBGP peers. While
it is possible to use Multiprotocol BGP (MP-BGP)[2] to carry IPv6
Network Layer Reachability Information (NLRI) over existing (or new)
IPv4 BGP peering sessions, this is not recommended. Both BGP sessions
MAY use the same logical circuit, or, a new port MAY be used for IPv6
(separate physical or logical connections is NOT a requirement).
   [removed image]
This maintains independent IPv6 and IPv4 topologies, rather than tying
the two together unnecessarily. It prevents black holing of IPv6
traffic in the event of a protocol outage because the IPv6 session
goes down when IPv6 reachability is lost. When an IPv4 BGP session
carries IPv6 NLRI, IPv6 routes are only withdrawn if IPv4 connectivity
is lost. Independent BGP sessions also facilitate protocol specific
maintenance because the IPv4 and IPv6 sessions don’t affect each other
(e.g. IPv6 can be “bounced” without effecting IPv4 and vice verse).
Finally, establishing new, IPv6-only peering creates better
operational clarity. It allows IPv4 and IPv6 configuration stanzas to
be independent and easily recognizable.
8

Cheers,
~Chris

[1] - http://bcop.nanog.org/index.php/IPv6_Peering_Transit_BCOP_v0-6
[2] - Bates, T., Chandra, R., Katz, D., and Y. Rekhter, “Multiprotocol
Extensions for BGP-4”, RFC 4760, January 2007



 - Jared


-- 
@ChrisGrundemann
http://chrisgrundemann.com


Re: oss netflow collector/trending/analysis

2014-05-02 Thread Pierre-Yves Maunier
2014-05-02 16:36 GMT+02:00 Matthew Galgoci mgalg...@redhat.com:


 Hey There,

 I was just wondering, for people who are doing netflow analysis with
 open source tools and who are doing at least 10k or more flows per
 second, what are you using?

 I know of three tool sets:

 - The classic osu flow-tools and the modern continuation/fork.
 - ntop
 - nfdump/nfsen

 Is there anything else I've missed? A few folks here really seem to like
 nfsen/nfdump.

 Thanks,

 Matt



Hi Matt,


I've been using pmacct for quite some time now and I'm more than happy with
the results.

Being able to store all infos in a *SQL db is a killer feature for me.

Also it can speak BGP with your routers so it can grab the AS Path
information which allow us for example to make traffic graphs for a
destination AS aggregated by AS Path (one of my favorites feature I had
with the Arbor peakflow in my previous company).

Pierre-Yves


Re: Best practices IPv4/IPv6 BGP (dual stack)

2014-05-02 Thread Owen DeLong

On May 2, 2014, at 12:44 PM, Deepak Jain dee...@ai.net wrote:

 
 Between peering routers on a dual-stacked network, is it considered best 
 practices to have two BGP sessions (one for v4 and one for v6) between them? 
 Or is it better to put v4 in the v6 session or v6 in the v4 session?

Separate v4 and v6 sessions are the best practice. It is possible to have a 
single-protocol outage in which case you either take out the other protocol 
unnecessarily or you black-hole traffic.

 According to docs, obviously all of these are supported and if both sides are 
 dual stacked, even the next-hops don't need to be overwritten.

Mostly true, but implementations vary and YMMV vendor to vendor and in some 
cases, model and/or software version to model and/or software version. Two 
sessions always works and unless you are somehow resource-constrained on 
sessions is really the simplest, easiest to manage, cleanest way to do things.

 Is there any community-approach to best practices here? Any FIB weirdness 
 (e.g. IPv4 routes suddenly start sucking up IPv6 TCAM space, etc)  that 
 results with one solution over the other?

See above for BCP. As to the rest, in my experience, the answers vary (see 
above).

Owen



CLEC and FTTP H.248/Megaco

2014-05-02 Thread Jean-Francois Mezei
I need a sanity check.

An incumbent in Canada has revealed that its voice service on FTTP
deployments is based on H.248 MEGACO (Media Gateway Controller).

Are there any examples of CLEC access to such FTTP deployments ?

(for instance, an area where the copper was removed, leaving only fibre
to homes, do CLECs retain competitive access via fibre to homes, or is
it going out of business or going with pure SIP/VoIP over the regular
internet connection, instead of using the quality voice link in the
GPON with garanteed bandwidth ?

Can this protocol support the programming of one OLT/MG  connecting to
the Telco's MGC, while the OLT/MG next door connects to the CLEC's MGC ?

Or does the protocol result in MG's discovering the nearest MGC and
connecting to it (making it hard to have multiple MGCs from competing
telcos).




I have been lead to believe that most OLTs came with a SIP based ATA. It
appears that H.248 is more telco friendly and scales better. Does this
mean that H.248 is more widely deployed in FTTH ?