Re: ipv6 address management - documentation

2023-11-18 Thread JASON BOTHE via NANOG
Netbox for the win! You can not only use it for IPAM but for circuit inventory, 
designs, cross connects, rack layouts and automate from there. It serves as a 
true source of truth. I think you will be pleased.  

> On Nov 16, 2023, at 15:03, Aaron Gould  wrote:
> 
> For years I've used an MS Excel spreadsheet to manage my IPv4 addresses.  
> IPv6 is going to be maddening to manage in a spreadsheet.  What does everyone 
> use for their IPv6 address prefix management and documentation?  Are there 
> open source tools/apps for this?
> 
> --
> -Aaron
> 


Re: Acceptance of RPKI unknown in ROV

2023-10-19 Thread JASON BOTHE via NANOG
Assuming unknown encompasses no roa at all, im inclined to say most probably 
haven’t because that would break a lot of things because a lot of folks don’t 
have ROAs at all and some don’t seem to even have a plan around implementing 
them. 

J~

> On Oct 19, 2023, at 11:47, Owen DeLong via NANOG  wrote:
> 
> A question for network operators out there that implement ROV…
> 
> Is anyone rejecting RPKI unknown routes at this time?
> 
> I know that it’s popular to reject RPKI invalid (a ROA exists, but doesn’t 
> match the route), but I’m wondering if anyone  is currently or has any plans 
> to start rejecting routes which don’t have a matching ROA at all?
> 
> Thanks,
> 
> Owen
> 


Zayo woes

2023-09-18 Thread JASON BOTHE via NANOG
Does anyone know what’s happening at Zayo? Tickets are taking weeks and months 
to get resolved, much less get a tech assigned to them. 

The folks answering the noc phone are mere order takers and are only reading 
from a script, manager on duty/escalation lines go to voicemail. 

If anyone can help get to a human in the transport group, that would be great. 
I’ve given up all hope at this point. 

Appreciated. 

Jason 

Google peering assistance

2023-03-28 Thread JASON BOTHE via NANOG
Hello

If someone from Google peering is on, would you kindly contact me?

Thanks

Jason 


Re: Rogers Outage Canada

2022-07-09 Thread JASON BOTHE via NANOG
I see the point you’re trying to make but using the word retarded in this 
context is not only dumb in itself but offense. Please be more respectful on 
this list. 

Thanks



> On Jul 9, 2022, at 10:48, Keith Medcalf  wrote:
> 
> 
>> I can't either, but the reality right now seems to be that 911 calls are
>> failing for anyone on a Rogers cellphone.
> 
> This is par for the course.  These people chose to deal with Rogers despite 
> knowing the consequences.  It is like if you bought a Rogers Snowblower and 
> it did not work.  That would mean that people who bought the Rogers 
> Snowblower will not be using it to get rid of the snow that is preventing 
> them from leaving their house.
> 
> Mutatis mutandis when Rogers is down things that are Rogers dependent will 
> not work.
> 
> Some people are so retarded it is astonishing!
> 
> -- 
> (CAUTION) You are advised that if you attack my person or property, you will 
> be put down in accordance with the provisions of section 34 & 35 of the 
> Criminal Code respectively.  If you are brandishing (or in possession) of a 
> weapon then lethal force will be applied to your person in accordance with 
> the law.  This means that your misadventures may end in your death.  Consider 
> yourself cautioned and govern your actions appropriately.
> 
>> -Original Message-
>> From: NANOG  On Behalf Of
>> Eric Kuhnke
>> Sent: Friday, 8 July, 2022 13:34
>> To: jim deleskie 
>> Cc: NANOG list 
>> Subject: Re: Rogers Outage Canada
>> 
>> 
>> I have seen anecdotal reports that the mobile network is in a half broken
>> state that phones remain registered to, so a 911 call will attempt and
>> then fail.
>> 
>> 
>> This is unlike what would happen if you had a US/Canada cellphone with
>> battery power but no SIM card in it that would search for any available
>> network in RF range for a 911 call if needed.
>> 
>> 
>> On Fri, 8 Jul 2022 at 12:31, jim deleskie >  > wrote:
>> 
>> 
>>i cant see BGP taking out SS7.
>> 
>>-jim
>> 
>>On Fri, Jul 8, 2022 at 2:45 PM Snowmobile2004
>> mailto:greenjosh6...@gmail.com> > wrote:
>> 
>> 
>>According to Cloudflare Radar
>>  , Rogers
>> BGP announcements spiked massively to levels 536,777% higher than normal
>> (343,601 vs 64 normally) just minutes before the outage. I would not be
>> surprised if this happened to be the culprit.
>> 
>>Regards,
>>Josh Green
>> 
>>On Fri, Jul 8, 2022 at 2:19 PM Andrew Paolucci via NANOG
>> mailto:nanog@nanog.org> > wrote:
>> 
>> 
>>In the early hours of the morning around 2-3am my modem
>> got hit with a configuration update that caused a DHCP release that
>> wasn't renewed for about two hours, after rollback the connection was
>> fine for 3 hours before this network wide outage.
>> 
>> 
>>Maybe a failed night time update was attempted again
>> during office hours, I've heard daytime guys are still WFH and night
>> shift is in building.
>> 
>> 
>>I expect we'll never get a real explanation. Rogers is
>> notorious for withholding any type of helpful or technical information.
>> 
>> 
>>Sent from my inoperable Rogers Mobile via emergency eSIM.
>> 
>> 
>>Regards,
>> 
>>Andrew Paolucci
>> Original Message 
>>On Jul. 8, 2022, 1:48 p.m., Jay Hennigan < j...@west.net
>>  > wrote:
>> 
>> 
>>On 7/8/22 07:44, Robert DeVita wrote: > Does anyone
>> have information on a widespread Rogers outage in Canada. I > have
>> customers with multiple sites down. There's discussion on the Outages
>> mailing list. Seems widespread, affecting all services, mobile, voice,
>> Internet. No cause or ETR posted yet. -- Jay Hennigan - j...@west.net
>>   Network Engineering - CCIE #7880 503 897-8550 -
>> WB6RDV
>> 
>> 
>> 
>>--
>> 
>>Josh Green.
> 
> 
> 
> 


Re: Serious Juniper Hardware EoL Announcements

2022-06-14 Thread JASON BOTHE via NANOG
Saw this coming a mile away. With chips and technology progressing despite 
ability to manufacture, I’m certain many are going to do this. 

> On Jun 14, 2022, at 11:53, Raymond Burkholder  wrote:
> 
> On 2022-06-14 09:46, Saku Ytti wrote:
>> These EOLd are HMC devices, Micron EOLd HMC back in 2018, no one else made 
>> them.
>> MX304 is a very different device than MX80, MX104, MX204. Previously
>> these were single chip very BOM optimised devices. MX304 has YT on
>> each card, which also means half of the YT capacity is spent on
>> fabric. Whereas MX80, MX104 connect ports on fabric and wan side,
>> getting 200% bps compared to fabric model.
>> Of course BOM isn't a meaningful contributor to what customers generally pay.
> Holy acronym soup batman!
> 
> Could you help me with HMC, BOM, YT?
> 
> BOM means to me BillOfMaterials, but I'm not sure I have that correct.


Re: Ukraine request yikes

2022-03-01 Thread JASON BOTHE via NANOG
Not sure how I feel about this. My thoughts have always been to leave 
government out of Internet operations or otherwise they get comfortable and 
will want to make decisions that we may not be comfortable with. 

During wartime, I would think the desire would be to have them connected in 
order to have access to information and knowledge as necessary. If the idea is 
suppress Russia from performing bad actions, disconnecting their tld(s) will 
not solve this and is just a bad approach all around. 

J~

> On Mar 1, 2022, at 16:22, George Herbert  wrote:
> 
> I don’t hear anyone in the networks field supporting doing it.
> 
> It was a yikes that the request was made, but not looking at all likely to 
> happen IMHO.
> 
> -george  
> 
> Sent from my iPhone
> 
>>> On Mar 1, 2022, at 2:12 PM, Brian R  wrote:
>>> 
>> 
>> The problem with all this talk, especially with trusted international 
>> neutral organizations, is that once they bend they will never be trusted 
>> again.  Shutting off the routes, removing TLDs (or keeping them because of 
>> politics), etc will cause irreparable damage to these organizations.  Bowing 
>> to governments, politics, etc does not have a path back from future control.
>> This is a recommendation that will only hurt people (China, North Korea, 
>> [even the USA], etc all do this to control their people).  Governments will 
>> get around whatever the limitations are, it may take them time and resources 
>> but they will get around it.  Freedom of information is the only way to help 
>> people understand the reality of what is going on in the world (galaxy, 
>> universe, etc).
>> 
>> Brian
>> Technological solutions for Sociological problems 
>> 
>> From: NANOG  on behalf of 
>> Bryan Fields 
>> Sent: Tuesday, March 1, 2022 1:23 PM
>> To: nanog@nanog.org 
>> Subject: Re: Ukraine request yikes
>>  
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA256
>> 
>> 
>> On 3/1/22 4:08 PM, David Conrad wrote:
>> > See .SU.
>> >
>> > (SU was moved from allocated to "transitionally reserved” back when the
>> > USSR broke up. My recollection is that an agreement was reached by which
>> > .SU users would be migrated out to appropriate new ccTLDs, that is, the
>> > ccTLDs based on ISO codes created for former Soviet republics, and no new
>> > entries would be added to .SU. However, when ICANN tried to propose a plan
>> > to finalize removing .SU from the root (around 2006 or so), the operators
>> > of .SU reopened registrations and complained to the US Dept. of Commerce,
>> > who were overseeing ICANN performance of the IANA Functions contract.
>> > Eventually, the Russian government was able to convince ISO-3166/MA to move
>> > SU to “exceptionally reserved” (like UK, EU, and a number of others) and
>> > forward motion on removing .SU from the root essentially ceased.)
>> 
>> I know someone (non-Russian) using .su for a funny name ending in .su.  This
>> is non-political and caters only to an English speaking audience.  These were
>> registered in the last few years, so they are still open and taking the
>> registrations.
>> 
>> I would ask what of .ly used for various URL shorteners, and .kp or .cn?  All
>> these are representing evil countries too, why do they get a pass.  I'm
>> certain they would argue .us should be revoked for the same.
>> 
>> This would break connectivity, and that's a bad thing.
>> - -- 
>> Bryan Fields
>> 
>> 727-409-1194 - Voice
>> http://bryanfields.net
>> -BEGIN PGP SIGNATURE-
>> 
>> iQIzBAEBCAAdFiEEaESdNosUjpjcN/JhYTmgYVLGkUAFAmIejrUACgkQYTmgYVLG
>> kUA+QQ//Z9ovTSFqVEunql2guHAN3xWaNpCpuNJCGM68dJTBSWrPEY0zFXlmZG1k
>> 0TWrSrRSoWogiJmRvaOuFx6KxkaADqZaZq6OFaCw3jvyFGULw+auyuATGlhnUL8p
>> CV0AbovPUnoAef1qJdglFkqnfrGBxeBGsgRIM8tx2l/G+zq5MdMnCx9cM+JmmN1y
>> b+jrV4oekgXRZLAMI/sA9clMAXUmlgReRvit8YBccunkmMP8naQ92vj9dvVGZld0
>> hGguK2a7vFXpDiW5o0nFe5GRdGIqM0aWUz6p0qkB9JudkZkAyEqSpCePZky4LdAt
>> ebh9544PZu/vllQjv3L6vENlCURcifTIRSevcwfKZtos7UG4mJI1UQ51OLTRjB7a
>> nqYkVNJSQJ+dXZFLPoRHNUOu4+1MAyozpDeMJzMsr4a7Ru2lh0AOTiXxDaSRhOd+
>> 2s3rQigh/l6cP/x9iM7+f+rInHzPihHfjbwcxhyqd12EFxgTe3hvi9JlRSe18RYw
>> bnDKQg3xKp1eIk0sZMeLyIWDERjsMxIuEP9MuKHp+oTCrLq6MFSgUiFan7M5Pk2t
>> mwB3sbFuwkVzfmDbbnbelll30ukXQM3d7KVp2AHbsvI6hNs6zHZgRb7ZgGrR9Ep5
>> 6UlYqVqQOWtYNujNxYRgzemFI6lgJj8GHyDeh0wLRCP0aw/ATPg=
>> =KK8e
>> -END PGP SIGNATURE-


Re: Carrier Options in Hong Kong

2021-12-17 Thread JASON BOTHE via NANOG
PCCW / HKT are the main networks for eyeball  HKT ASs feed into AS3491 which is 
the international arm, PCCW global if you will. 

> On Dec 17, 2021, at 14:05, nanoguser99 via NANOG  wrote:
> 
> 
> Looking glass pings from Lumen to my gear behind PCCW = 1ms, immediate 
> handoff.   Looking glass pings from Lumen -> Google (216.239.38.120), 
> immediate handoff.  Some CDNs\cloud are 30 ms away, like you said Tokyo or 
> Singapore.
> 
> My main concern is the eyeball networks.  Is PCCW the main carrier for the 
> eyeball networks there or do they all peer in country for the most part. 
> 
> Sent with ProtonMail Secure Email.
> 
> ‐‐‐ Original Message ‐‐‐
>> On Friday, December 17th, 2021 at 7:12 PM, Eric Dugas 
>>  wrote:
>> I am in no way an expert in APAC but all of the IP carriers I have in NA are 
>> present in HK: Cogent, Tata, Telia, Zayo.
>> 
>> My guess is a good portion of the interconnections with other IP carriers, 
>> CDNs and such will be either in Singapore or Tokyo.
>> 
>>> On Fri, Dec 17, 2021 at 1:56 PM nanoguser99 via NANOG  
>>> wrote:
>>> Nanog,
>>> 
>>> Currently my organization uses PCCW which we pay through the nose for and 
>>> I'm looking to cut them. This was put in place before me. I was informed 
>>> that PCCW is "the carrier" in Hong Kong but based on my analysis I'm not 
>>> sure that's the case. My analysis of carriers such as Lumen and Cogent put 
>>> them on par with PCCW. Pings to random IPs in HK are reasonable fast on all 
>>> of them, same with pings to cloud providers. Access to mainland is not a 
>>> hard requirement but just to check they all had 300+ ms latency to known 
>>> IPs in Shanghai and Tanjin.
>>> 
>>> I know some regions such as Korea or Dubai are monopolized where the wrong 
>>> carrier takes you on a far away path to get a few blocks down the street. 
>>> 
>>> I don't need anything special, just general DIA and good access to eyeballs 
>>> and internet. I just wanted to see people's opinions here as APAC 
>>> connectivity can be tricky.
>>> 
>>> - Nanoguser99
>>> 
>>> Sent with ProtonMail Secure Email.
>>> 
> 


Re: Carrier Options in Hong Kong

2021-12-17 Thread JASON BOTHE via NANOG
Colt is a good option if you’re seeking wavelengths. For transit we use a mix 
of the other carriers, pccw included but we go through the wholesale side and 
not hkt which is the domestic arm of pccw and they are ridiculously expensive.  

> On Dec 17, 2021, at 13:13, Eric Dugas via NANOG  wrote:
> 
> 
> I am in no way an expert in APAC but all of the IP carriers I have in NA are 
> present in HK: Cogent, Tata, Telia, Zayo.
> 
> My guess is a good portion of the interconnections with other IP carriers, 
> CDNs and such will be either in Singapore or Tokyo.
> 
>> On Fri, Dec 17, 2021 at 1:56 PM nanoguser99 via NANOG  
>> wrote:
>> Nanog,
>> 
>> Currently my organization uses PCCW which we pay through the nose for and 
>> I'm looking to cut them.  This was put in place before me.  I was informed 
>> that PCCW is "the carrier" in Hong Kong but based on my analysis I'm not 
>> sure that's the case.  My analysis of carriers such as Lumen and Cogent put 
>> them on par with PCCW.  Pings to random IPs in HK are reasonable fast on all 
>> of them, same with pings to cloud providers.   Access to mainland is not a 
>> hard requirement but just to check they all had 300+ ms latency to known IPs 
>> in Shanghai and Tanjin.
>> 
>> I know some regions such as Korea or Dubai are monopolized where the wrong 
>> carrier takes you on a far away path to get a few blocks down the street.  
>> 
>> I don't need anything special, just general DIA and good access to eyeballs 
>> and internet.  I just wanted to see people's opinions here as APAC 
>> connectivity can be tricky.
>> 
>> - Nanoguser99
>> 
>> Sent with ProtonMail Secure Email.
>> 


Re: Main electric transmission towers collapsed--New Orleans at 11% Internet connectivity

2021-08-30 Thread JASON BOTHE via NANOG
My concern is what will happen with ILA sites that traverse through the Orleans 
parish and others that are going to be without electricity for many weeks to 
come. Eight transmission circuits went into cascading failure last eve. While 
not all physically damaged, it will time to assess and begin a controlled 
restoration to balance. In the meantime, fuel will deplete at remote sites 
causing them to fail. A lot of capacity that serves the south central and 
southwestern US traverses through Louisiana. 

J~

> On Aug 30, 2021, at 10:13, Sean Donelan  wrote:
> 
> Unlike other utilities, I have not seen any outage reports directly from the 
> major telecommunications companies serving Louisiana and New Orleans.
> 
> 
> 9-1-1 out of service in three parishes (Orleans, Jefferson, St. Tammany).
> 
> 100% of power is out in 4 parishes, over 80% power out in 14 parishes.
> 
> Many anedoctal reports of cell and telecommunications outages in southeastern 
> Louisiana.
> 
> Netblocks reports 89% network connectivity outage in New Orleans. 
> IODA.CADA.ORG reports 66% network connectivity outage in Louisiana.
> BGP route annoucements is stable, which likely indicates major backbones are 
> not damaged (or they don't have backbone infrastructure in the region).
> 
> 
> The major wireless providers have announced they are waiving the usual 
> overage and billing charges for zip codes affected by Hurricane Ida.  No 
> direct outage details from telecommunications and cable providers yet.
> 
> FCC activated DIRS over the weekend, so we should be seeing the initial FCC 
> report late Monday afternoon.


juniper qfx5120-ym - curvature - infinera optic issues

2021-05-10 Thread JASON BOTHE via NANOG
NANOG Fam

This is a rather interesting issue to see if anyone has ran across this with a 
Curvature branded 10 or 100G LR optic in a Juniper QFX facing an Infinera wave. 

What we’ve noticed is migrating from MX 204 to a new QFX 5120-YM that has an 
Infinera as the handoff, the circuit just bounces constantly. Disabling ALS 
will steady the light but the interface will continue to bounce. 

What does work is migrating an interface that happens to hang off an ADVA R7; 
no problem. Circuit even works in a hybrid mode where one side is adva and the 
other is Infinera, as long as the Infinera side is connected to an MX :-) 

Anyhow, curious to know if anyone else has experienced anything similar. Our 
next step is to test tomorrow with OEM optics and see if the trouble follows. 

J~ 




Re: ASE - 100 Gig Wave

2021-03-18 Thread JASON BOTHE via NANOG
I doubt that. You’ve been at it for months with requests all over the world. It 
was only a matter of time before someone said something. 

> On Mar 18, 2021, at 10:34, Rod Beck  wrote:
> 
> 
> And by the way, it would not be making these requests if there was not a 
> severe capacity shortage in the Pacific. I don't like telegraph what I am 
> doing, Shane. 
> 
> From: NANOG  on 
> behalf of Rod Beck 
> Sent: Thursday, March 18, 2021 4:27 PM
> To: sro...@ronan-online.com ; NANOG Operators' Group 
> 
> Cc: Shane Ronan 
> Subject: Re: ASE - 100 Gig Wave
>  
> Actually, that language was intended to prohibit soliciting business and not 
> asking for help. I have some hard words to describe like Shane Ronan, but I 
> will forbear. 
> 
> I suggest you cease and desist before this gets ugly. Obviously you are 
> underemployed. 
> 
> Get some work to do. 
> 
> Best, 
> 
> -R. 
> 
> 
> 
> From: sro...@ronan-online.com 
> Sent: Thursday, March 18, 2021 4:24 PM
> To: Rod Beck ; NANOG Operators' Group 
> 
> Cc: Shane Ronan 
> Subject: Re: ASE - 100 Gig Wave
>  
> Please review the Mailing List policies which specifically prohibit 
> commercial discussions on the list. I would ask the list moderators to chime 
> in here please
> 
> Shane
> 
>>> On Mar 18, 2021, at 11:14 AM, Rod Beck  
>>> wrote:
>>> 
>> 
>> People post requests all the time. You are free to block me. And I know the 
>> majority of uses disagree with you. 
>> 
>> From: Shane Ronan 
>> Sent: Thursday, March 18, 2021 4:11 PM
>> To: Rod Beck 
>> Cc: nanog@nanog.org 
>> Subject: Re: ASE - 100 Gig Wave
>>  
>> NANOG is not a service for receiving details on cable paths for commercial 
>> purposes. Please find somewhere else to collect this information.
>> 
>> On Thu, Mar 18, 2021 at 10:54 AM Rod Beck  
>> wrote:
>> This cable is tapped out and I need a 100 gig wave from Hong Kong to 
>> Singapore. 3 year term. 
>> 
>> Roderick Beck
>> Global Network Capacity Procurement
>> United Cable Company
>> www.unitedcablecompany.com
>> https://unitedcablecompany.com/video/
>> New York City & Budapest
>> rod.b...@unitedcablecompany.com
>> Budapest: 36-70-605-5144
>> NJ: 908-452-8183 
>> 
>> 
>> 


Re: Cross country latency on 3356?

2021-02-16 Thread JASON BOTHE via NANOG
Lots of amp sites down here currently and with travel impossible and severely 
limited, they’re struggling to restore. It’s not a good situation currently. 

> On Feb 16, 2021, at 14:18, David Hubbard  
> wrote:
> 
> 
> Curious if anyone is seeing issues with 3356 cross country, particularly 
> Orlando-LA?  I have to assume they’re having issues in Texas, so perhaps too 
> much capacity has been lost and it’s overloading what is functioning?
>  
> David


Re: Texas internet connectivity declining due to blackouts

2021-02-16 Thread JASON BOTHE via NANOG
The professor has it right. Before the state privatized the grid and made 
ERCOT, we never had these problems. Every few years, these private companies 
complain they need a rate hike because they need a grant to ‘beef up’ the 
infrastructure and it’s granted although we seem to keep having this issue. I’m 
certain history will continue to repeat itself. 

> On Feb 16, 2021, at 06:32, John Sage  wrote:
> 
> On 2/16/21 4:22 AM, John Sage wrote:
>>> On 2/15/21 10:02 PM, Mark Tinka wrote:
>>> 
>>> 
 On 2/16/21 07:49, Matthew Petach wrote:
>>> 
 
 Isn't that a result of ERCOT stubbornly refusing to interconnect with the 
 rest of the national grid, out of an irrational fear of coming under 
 federal regulation?
>> Yes. This has been widely documented in numerous articles, both very 
>> recently and previously.
> 
> As one example only, of many:
> 
> "What went wrong with the Texas power grid?"
> 
> Marcy de Luna, Amanda Drane, Houston Chronicle
> 
> Feb. 15, 2021
> Updated: Feb. 15, 2021 9:23 p.m.
> 
> "Dan Woodfin, ERCOT’s senior director of system operations, said the rolling 
> blackouts are taking more power offline for longer periods than ever before. 
> An estimated 34,000 megawatts of power generation — more than a third of the 
> system’s total generating capacity — had been knocked offline by the extreme 
> winter weather amid soaring demand as residents crank up heating systems."
> 
> . . .
> 
> "Ed Hirs, an energy fellow in the Department of Economics at the University 
> of Houston, blamed the failures on the state’s deregulated power system, 
> which doesn’t provide power generators with the returns needed to invest in 
> maintaining and improving power plants.
> 
> “The ERCOT grid has collapsed in exactly the same manner as the old Soviet 
> Union,” said Hirs. “It limped along on underinvestment and neglect until it 
> finally broke under predictable circumstances."
> 
> https://www.houstonchronicle.com/business/energy/article/Wholesale-power-prices-spiking-across-Texas-15951684.php
>  
> 
> 
> - John
> __


Re: Amazon peering

2021-01-11 Thread JASON BOTHE via NANOG
Yes sir. I’ve now had a couple of fine folks respond and have got it sorted. 
Thanks to everyone for the quick responses. 

J~

> On Jan 11, 2021, at 13:10, Rob Duffy  wrote:
> 
> 
> We submitted a request recently and received a response a week later, stating 
> the request was being processed by their automated system.  The automated 
> system takes 10 - 12 days to set up the session. 
> 
>> On Mon, 11 Jan 2021 at 18:14, JASON BOTHE via NANOG  wrote:
>> Hi all
>> 
>> Just curious if anyone has recently requested Amazon peering and if they’ve 
>> gotten a timely response. I know historically it was months and months but I 
>> thought I had read where they had turned over a new leaf and were responding 
>> promptly. I have a pending request but it was done over the holidays so 
>> hoping it’s just in a small backlog :-) 
>> 
>> Thanks 
>> 
>> J~


Amazon peering

2021-01-11 Thread JASON BOTHE via NANOG
Hi all

Just curious if anyone has recently requested Amazon peering and if they’ve 
gotten a timely response. I know historically it was months and months but I 
thought I had read where they had turned over a new leaf and were responding 
promptly. I have a pending request but it was done over the holidays so hoping 
it’s just in a small backlog :-) 

Thanks 

J~

Re: Centurylink having a bad morning?

2020-08-30 Thread JASON BOTHE via NANOG
If you have to have connectivity to them, you could always just instruct them 
not to announce your routes beyond their AS; paid peering, and announce through 
more reliable ASs such as 2914 and 1299. Many people do this. Otherwise, cut 
ties with them and save yourself the headaches. 


> On Aug 30, 2020, at 12:09, Baldur Norddahl  wrote:
> 
> 
> An outage is what it is. I am not worried about outages. We have multiple 
> transits to deal with that.
> 
> It is the keep announcing prefixes after withdrawal from peers and customers 
> that is the huge problem here. That is killing all the effort and money I put 
> into having redundancy. It is sabotage of my network after I cut the ties. I 
> do not want to be a customer at an outlet who has a system that will do that. 
> Luckily we do not currently have a contract and now they will have to 
> convince me it is safe for me to make a contract with them. If that is 
> impossible I guess I won't be getting a contract with them.
> 
> But I disagree in that it would be impossible. They need to make a good 
> report telling exactly what went wrong and how they changed the design, so 
> something like this can not happen again. The basic design of BGP is such 
> that this should not happen easily if at all. They did something unwise. Did 
> they make a route reflector based on a database or something?
> 
> Regards,
> 
> Baldur
> 
>> On Sun, Aug 30, 2020 at 5:13 PM Mike Bolitho  wrote:
>> Exactly. And asking that they somehow prove this won't happen again is 
>> impossible.
>> 
>> - Mike Bolitho
>> 
>>> On Sun, Aug 30, 2020, 8:10 AM Drew Weaver  wrote:
>>> I’m not defending them but I am sure it isn’t intentional.
>>> 
>>>  
>>> 
>>> From: NANOG  On Behalf Of 
>>> Baldur Norddahl
>>> Sent: Sunday, August 30, 2020 9:28 AM
>>> To: nanog@nanog.org
>>> Subject: Re: Centurylink having a bad morning?
>>> 
>>>  
>>> 
>>> How is that acceptable behaviour? I shall remember never to make a contract 
>>> with these guys until they can prove that they won't advertise my prefixes 
>>> after I pull them. Under any circumstances. 
>>> 
>>>  
>>> 
>>> søn. 30. aug. 2020 15.14 skrev Joseph Jenkins :
>>> 
>>> Finally got through on their support line and spoke to level1. The only 
>>> thing the tech could say was it was an issue with BGP route reflectors and 
>>> it started about 3am(pacific). They were still trying to isolate the issue. 
>>> I've tried failing over my circuits and no go, the traffic just dies as L3 
>>> won't stop advertising my routes.
>>> 
>>>  
>>> 
>>> On Sun, Aug 30, 2020 at 5:21 AM Drew Weaver via NANOG  
>>> wrote:
>>> 
>>> Hello,
>>> 
>>>  
>>> 
>>> Woke up this morning to a bunch of reports of issues with connectivity had 
>>> to shut down some Level3/CTL connections to get it to return to normal.
>>> 
>>>  
>>> 
>>> As of right now their support portal won’t load: 
>>> https://www.centurylink.com/business/login/
>>> 
>>>  
>>> 
>>> Just wondering what others are seeing.
>>> 
>>>  


Corero

2020-08-10 Thread JASON BOTHE via NANOG
Folks

Anyone on using Corero?  Thoughts around it? 

Thanks

J~


Re: NTT IP Transit

2020-06-27 Thread JASON BOTHE via NANOG
Contact Jane Divis in NTT GIN
425-753-9318

> On Jun 27, 2020, at 07:40, James Braunegg  wrote:
> 
> 
> Dear Nanog
>  
> I am looking for some NTT IP transit delivered in LA for our network AS38880, 
> if you know a NTT sales rep could you please either pass on this email to 
> them, and or provide me their contact details !
>  
> Thanks in advance
>  
> Kindest Regards
>  
> James Braunegg
> 
> 1300 769 972 / 0488 997 207
> ja...@micron21.com
> www.micron21.com/
> 
> 
> 
> Follow us on Twitter for important service and system updates.
> This message is intended for the addressee named above. It may contain 
> privileged or confidential information. If you are not the intended recipient 
> of this message you must not use, copy, distribute or disclose it to anyone 
> other than the addressee. If you have received this message in error please 
> return the message to the sender by replying to it and then delete the 
> message from your computer.
>  
>  


ACX5448

2020-06-05 Thread JASON BOTHE via NANOG
Hi all

Just curious if anyone on is using the ACX5448 and what their thoughts are on 
it. 

Thanks

J~



IS-IS IPAM platform

2020-04-13 Thread JASON BOTHE via NANOG
Does anyone have any recommendations for a database or IPAM platform that can 
house IS-IS addressing?  Can’t seem to find anything out there. 

Thanks

J~

Re: FCC and FTC Demand Cut-Off Robercallers of Coronavirus Scams

2020-04-03 Thread JASON BOTHE via NANOG
I just need my phone to have a warm transfer button with or without supervision 
to Lenny https://toao.net/595-lenny

> On Apr 3, 2020, at 18:40, Grimes, Greg  wrote:
> 
> 
> I was thinking the EXACT same thing!!
> 
> --
> Greg Grimes
> Senior Network Analyst 
> Information Technology Services 
> Mississippi State University 
> 662-325-9311(w)
> 
> From: NANOG  on behalf of Clayton Zekelman 
> 
> Sent: Friday, April 3, 2020 6:21:43 PM
> To: Sean Donelan ; nanog@nanog.org 
> Subject: Re: FCC and FTC Demand Cut-Off Robercallers of Coronavirus Scams
>  
> 
> Finally, but why did it take a pandemic to get them to do this?
> 
> At 07:14 PM 03/04/2020, Sean Donelan wrote:
> 
> >A sternly worded, finger-wagging press release.
> >
> >
> >https://secure-web.cisco.com/1LWeqrXLGvJdEBzB1uFe8kj9AI4aQYKo58pr0a7HHabjzZjlUFhbYW9sw_3phNW8RRZcfh4T01zhFWJzwlT5koYKFBC0X9DhlUbUeWJCpcaJDWoGiw4jEvVGWiHMyWhb-DgXaHwKqs4DEaqsgXzJvXllUvcmj0hqGdV7dPWOJjhFPMUEnjT8Grl3W7MQ7A5v1nC1W9_K01pTSV8PsbPRjlTzYrA20dcqjx74JJSmlZDRnMsoPxJoZcH2jQ00PAsRaeGGdnA4EE5KwbCYlUu4M0UhYHkKmOkfjSJjZyBfAALCJQveH8qYnTfkSoI5OzVKm1aapZq23qJsbv8OReeHk8w/https%3A%2F%2Fwww.fcc.gov%2Fdocument%2Ffcc-ftc-demand-gateway-providers-cut-covid-19-robocall-scammers
> >
> >[...]
> >The FCC¢s Enforcement Bureau and FTC¢s Bureau of 
> >Consumer Protection wrote to three gateway 
> >providers that are facilitating these scam 
> >COVID-19-related robocalls: SIPJoin of Suffolk, 
> >Virginia; Connexum of Orange, California; and 
> >VoIP Terminator/BLMarketing of Lake Mary, 
> >Florida. The companies have been identified by 
> >the Traceback Group, a consortium of phone 
> >companies that help officials track down suspect 
> >calls, managed by the trade association 
> >USTelecom. The Commissions also wrote to 
> >USTelecom to ask its members to begin blocking
> >calls from these providers if the flood of 
> >robocalls is  not cut off within 48 hours.
> 
> -- 
> 
> Clayton Zekelman
> Managed Network Systems Inc. (MNSi)
> 3363 Tecumseh Rd. E
> Windsor, Ontario
> N8W 1H4
> 
> tel. 519-985-8410
> fax. 519-985-8409
> 
> 


Re: NTT/AS2914 enabled RPKI OV 'invalid = reject' EBGP policies

2020-03-25 Thread JASON BOTHE via NANOG
Excellent work. I’m curious to know how many of the big ASs are participating 
to date. If you or anyone on the list knows if this is published please let me 
know. 

Thanks

J~

> On Mar 25, 2020, at 21:03, Michel Py  wrote:
> 
> Hi Job,
> 
>> Job Snijders wrote :
>> Exciting news! Today NTT's Global IP Network (AS 2914) enabled RPKI based 
>> BGP Origin Validation on virtually all
>> EBGP sessions, both customer and peering edge. This change positively 
>> impacts the Internet routing system.
> 
> Great, and thanks !
> I do have a question, the same one everyone has on their mind :
> How much whining / angry customers / calls / etc came out of it ?
> 
> 
> Why did you say anything instead of eventually blaming it on the coronavirus 
> ?  :P
> 
> 
> Michel.


Re: DNS Recursive Operators: Please enable QNAME minimization (RFC7816) for the enhanced privacy of your users

2020-03-11 Thread JASON BOTHE via NANOG
The enterprise as well. I’m certain many are blindly unaware as this could have 
negative impacts beyond traditional control. 

J~

> On Mar 11, 2020, at 20:43, Owen DeLong  wrote:
> 
> 
> 
>> On Mar 11, 2020, at 18:31 , Rubens Kuhl  wrote:
>> 
>> 
>> 
>>> On Tue, Mar 10, 2020 at 5:30 PM Owen DeLong  wrote:
>>> For anyone considering enabling DOH, I seriously recommend reviewing Paul 
>>> Vixie’s keynote at SCaLE 18x Saturday morning.
>>> 
>>> https://www.youtube.com/watch?v=artLJOwToVY
>>> 
>>> It contains a great deal of food for thought on a variety of forms of 
>>> giving control over to corporations over things you probably don’t really 
>>> want corporations controlling in your life.
>>> 
>> 
>> Depends on your threat model: ISPs, Big Tech companies, State-level actors, 
>> random hacker at the same Wi-Fi network. The problem with DoH is that 
>> software developer picks the threat model he or she thinks is most relevant, 
>> and applies to all use cases. 
>> 
>> Solution is to ask user what is the user threat model and apply it. DoH/DoT 
>> are not harmful per se, their indiscriminate usage is. 
>> 
>> 
>> Rubens
>> 
> 
> Yes and no…
> 
> DOH isn’t inherently bad, but every implementation of DOH that I am aware of 
> involves depriving the user of choice and/or control and also depriving 
> network operators of the ability to enforce the “my network, my rules” 
> concept.
> 
> While I realize some may argue that this is desirable in some instances, 
> understand that I’m not talking about the ISP level, but even within the 
> home. Parents should be able to enforce DNS policy on their children, for 
> example. DOH allows the average child to generally bypass any such 
> limitations. Worse, most parents are unlikely to even realize that this is 
> the case.
> 
> Owen
> 


NCS-55A1

2020-02-09 Thread Jason Bothe via NANOG
Hi All, Happy NANOG78!

Just curious if anyone knows how the MACSec behaves on the Cisco NCS-55A1, 
specifically the 24Q6H-S variant. I’m curious if you can still use MACSec 
individually on the 6xQSFP+/QSFP28 ports if I break them out as 10G.

Thanks!

J~




Re: China Network Diversity

2020-01-16 Thread JASON BOTHE via NANOG
I’ve had good luck with PCCW operating as my China liaison since we terminate a 
lot of circuits in Hong Kong and Singapore. It’s not cheap I’ll tell ya but 
they can get the info and deliver. 

J~

> On Jan 16, 2020, at 10:21, Gabe Cole  wrote:
> 
> 
> We are trying to design a physically diverse network in China and have been 
> challenged.  All of the major carriers say that they cannot provide us KMZs 
> or similar detailed route information.  Has anyone been able to crack this 
> code?
> 
> G. Gabriel Cole
> RTE Group, Inc.
> Strategic Consulting for Mission Critical Infrastructure
> 56 Woodridge Rd
> Wellesley, MA 02482
> US +1-617-303-8707
> fax +1-781-209-5577
> www.rtegroup.com
> g...@rtegroup.com
> skype:  ggabrielcole
> Twitter:  @DataCenterGuru
> Linked In:  http://www.linkedin.com/in/gabecole
> Blog:  http://datacenterguru.blogspot.com/
> 
> The information contained herein is confidential and proprietary to RTE 
> Group, Inc. It is intended for presentation to and permitted use solely by 
> those person(s) to whom it has been transmitted by RTE Group, Inc. and it is 
> transmitted to such person(s) solely for, conditional upon, and only to the 
> extent necessary for use by such person(s) as part of their business 
> relationship with RTE Group, Inc. or to further their respective 
> evaluation(s) of a potential business relationship with RTE Group, Inc., and 
> no other use, release, or reproduction of this information is permitted.
> 
> Sent via Superhuman
> 


Re: Geo locate change for IP ?

2020-01-08 Thread JASON BOTHE via NANOG
Thanks Patrick for the link. I like that all of them are together for ease of 
reference. Just did a quick scan and all looks well. I guess I’ll dig a little 
further internally. 

Thank you again. 

J~

> On Jan 8, 2020, at 13:00, Patrick Schultz  wrote:
> 
> Hey Jason,
> try the geo database providers first: 
> http://thebrotherswisp.com/index.php/geo-and-vpn/
> 
> -- 
> Patrick
> 
>> Am 08.01.2020 um 18:53 schrieb JASON BOTHE via NANOG:
>> Hi guys
>> 
>> Something odd has happened and I’m not sure how to sort. One of our public 
>> prefixes, 205.174.3.0/24 issued from ARIN has suddenly had its geo changed 
>> and now everyone accessing the internet from it is showing up as a UK IP, 
>> London specifically. We announce this and every other prefix we have out all 
>> of our peers globally and are pretty mystified on how this happened and how 
>> to resolve. Any help is appreciated. 
>> 
>> Thanks
>> 
>> Jason 



Geo locate change for IP ?

2020-01-08 Thread JASON BOTHE via NANOG
Hi guys

Something odd has happened and I’m not sure how to sort. One of our public 
prefixes, 205.174.3.0/24 issued from ARIN has suddenly had its geo changed and 
now everyone accessing the internet from it is showing up as a UK IP, London 
specifically. We announce this and every other prefix we have out all of our 
peers globally and are pretty mystified on how this happened and how to 
resolve. Any help is appreciated. 

Thanks

Jason 


Re: Dallas Dark Fiber

2019-12-17 Thread JASON BOTHE via NANOG
Zayo, Consolidated and Crown Castle are my go-tos. They have the biggest 
footprints in the DFW market. 

J~

> On Dec 17, 2019, at 14:20, Rod Beck  wrote:
> 
> 
> Hi, 
> 
> I want to understand the Dallas dark fiber market. Who are the major players? 
> Who has done recent builds (2010 onward)? Who has 864 strand cables for sale? 
> Who has dense coverage with good manhole access to buildings and utility 
> structures?
> 
> Thanks in advance. 
> 
> Regards, 
> 
> Roderick. 
> 
> Roderick Beck
> VP of Business Development
> United Cable Company
> www.unitedcablecompany.com
> New York City & Budapest
> rod.b...@unitedcablecompany.com
> 36-70-605-5144
> 
> 


Verizon help

2019-10-29 Thread JASON BOTHE via NANOG
Hi all 

Is there anyone on from Verizon that could contact me off list in regards to 
provisioning for 701? Being here at NANOG77 and sorting face to face is a 
bonus. 

Thanks

Jason 





NimbusDDOS

2019-10-18 Thread JASON BOTHE via NANOG
Hi folks

Does anyone have any experience with NimbusDDOS mitigation testing? If so, what 
are your thoughts?

Thanks!

J~


Re: Chicago Equinix IX LAN oddity

2019-10-08 Thread JASON BOTHE via NANOG
Got it, thanks for that. I’ll have to give the big E a call and see how to sort 
this one out.  

J~

> On Oct 8, 2019, at 13:55, James Cornman  wrote:
> 
> 
> There was a subnet expansion/migration there earlier this year (maybe late 
> last year?)
> 
> We have an old and new address on our interface.. The 208.x is the new range 
> (aka bigger)
> 
>  ip address 206.223.119.124/24
>  ip address 208.115.136.124/23
> 
> -James
> 
>> On Tue, Oct 8, 2019 at 2:47 PM JASON BOTHE via NANOG  wrote:
>> Hi all
>> 
>> I realize this might not be the right list but I have a request to peer on 
>> the Chicago Equinix IX to a 206.223.119 IP but we and many others are on the 
>> 208.115.137 network. While I await a response from the peering partner, I’d 
>> curious to know if this is an error, perhaps there was a renumber at one 
>> time or I’m flat out just missing something. 
>> 
>> Cheers!
>> 
>> J~
> 
> 
> -- 
> James Cornman
> jcorn...@atlanticmetro.net
> 212.792.9950
> 
> Atlantic Metro Communications
> 4 Century Drive, Parsippany NJ  07054
> 
> Cloud Hosting • Colocation • Network Connectivity • Managed Services
> Follow us on Twitter: @atlanticmetro • Like us on Facebook
> www.atlanticmetro.net


Chicago Equinix IX LAN oddity

2019-10-08 Thread JASON BOTHE via NANOG
Hi all

I realize this might not be the right list but I have a request to peer on the 
Chicago Equinix IX to a 206.223.119 IP but we and many others are on the 
208.115.137 network. While I await a response from the peering partner, I’d 
curious to know if this is an error, perhaps there was a renumber at one time 
or I’m flat out just missing something. 

Cheers!

J~


Re: Spam due to new ARIN allocation

2019-09-05 Thread JASON BOTHE via NANOG
Oddly enough, I created a Z Org for legacy resources and got hit up on 
linked-in by IPv4 brokers as well as some spam from Cogent. 

Annoying. 

> On Aug 4, 2019, at 09:29, Tim Burke  wrote:
> 
> Done, Sir. Thanks.
> 
> Tim Burke
> t...@burke.us
> 
>> On Sat, Aug 3, 2019, at 10:42 PM, John Curran wrote:
>> Tim -  
>> 
>> When you have moment, could you forward both of those Whois spam messages to 
>> complia...@arin.net ?
>> 
>> Thanks!
>> /John
>> 
>> John Curran
>> President and CEO
>> American Registry for Internet Numbers]
>> 
>> 
>>> On 2 Aug 2019, at 7:32 PM, Tim Burke  wrote:
>>> 
>>> We recently received a new ASN from ARIN - you know what that means... the 
>>> sales vultures come out to play!
>>> 
>>> So far, it has resulted in spam from Cogent (which is, of course, to be 
>>> expected), and now another company called "CapCon Networks" - 
>>> http://www.capconnetworks.com. As far as I am aware, this practice is 
>>> against ARIN's Terms of Use. Is it worth reporting to ARIN, or perhaps it's 
>>> worth creating a List of People To Never Do Business With™, complete with 
>>> these jokers, and other vultures that engage in similar tactics? 
>>> 
>>> Regards,
>>> Tim Burke
>>> t...@burke.us
> 


Re: UK, NL, & Asia LTE Providers for Opengear Console Servers

2019-07-31 Thread JASON BOTHE via NANOG
Are the Opengear boxes good gear? We currently have some boxes with a high 
failure rate and I’ve been on the hunt for something we can leverage globally 
that support LTE. 

J~ 

> On Jul 31, 2019, at 21:19, Mehmet Akcin  wrote:
> 
> Google Fi
> 
>> On Wed, Jul 31, 2019 at 18:35 Ryan Gelobter  wrote:
>> Anyone have recommendations for providers who I can use for LTE on Opengear 
>> console servers in the UK, Netherlands, and Singapore? 1 provider for all 3 
>> countries would be great but I'll take what I can get. Oddly when talking to 
>> Opengear they don't really have any great advice. We use Verizon SIM cards 
>> in the US with static IPs.
>> 
>> Thanks,
>> Ryan
> -- 
> Mehmet
> +1-424-298-1903


Re: Fiber providers - Englewood / Centennial Colorado

2019-07-18 Thread JASON BOTHE via NANOG
Thanks Mike

I hit up crown and they have some segments, just not quite enough. I’ll try 
Windstream and see what I can find. 

Thanks

J~

> On Jul 18, 2019, at 08:57, Mike Hammett  wrote:
> 
> Depending on what you're trying to do, you might find some bits and pieces 
> from Windstream, Crown Castle, UPN, and XO. They're all in that Englewood - 
> Centennial area in different ways with different capabilities.
> 
> 
> 
> -
> Mike Hammett
> Intelligent Computing Solutions
> 
> Midwest Internet Exchange
> 
> The Brothers WISP
> 
> From: "JASON BOTHE via NANOG" 
> To: nanog@nanog.org
> Sent: Wednesday, July 17, 2019 6:10:42 PM
> Subject: Fiber providers - Englewood / Centennial Colorado 
> 
> Hi all 
> 
> Just curious if you know of any fiber providers other than CL or Zayo in the 
> Englewood/Centennial area. Having a really tough time finding routes that 
> avoid the Solarium at Quebec / E Orchard as well as 910 15th St. Seems there 
> are so many single points of failure and collapsed routes that all lead to 
> these two locations to get diverse long haul. 
> 
> Many thanks. 
> 
> J~ 
> 


Fiber providers - Englewood / Centennial Colorado

2019-07-17 Thread JASON BOTHE via NANOG
Hi all 

Just curious if you know of any fiber providers other than CL or Zayo in the 
Englewood/Centennial area. Having a really tough time finding routes that avoid 
the Solarium at Quebec / E Orchard as well as 910 15th St. Seems there are so 
many single points of failure and collapsed routes that all lead to these two 
locations to get diverse long haul. 

Many thanks. 

J~ 


Re: CenturyLink/Level3 feedback

2019-06-05 Thread JASON BOTHE via NANOG
It’s taking over a year to get waves turned up in EU. I’m currently willing to 
wager on what comes up first, them or amazon peering (that’s taking just as 
long). After the merger, we have seen Level3 slide into the CL abyss becoming a 
pain to deal with. Pricing and ordering has been outsourced we’ve been told and 
decisions are no longer at a regional level. Frustrating at best. 

> On Jun 4, 2019, at 09:30, Mehmet Akcin  wrote:
> 
> hi there,
> 
> Just a general high-level question about Centurylink/Level3 post-merger, how 
> is your overall experience with CenturyLink? if you could be sitting with the 
> CEO of the company what is one thing you would ask him to fix?
> 
> please keep it high level and general. i intend to pass these to him and his 
> team in an upcoming meeting.
> 
> Mehmet



Re: Latency between Dallas and west coast

2019-01-31 Thread JASON BOTHE via NANOG
Hi Nathan

My current rtd from DA6 to SV1 is 38ms and from DRT Houston to LA1 is 30ms

Jason 

> On Feb 1, 2019, at 04:40, Nathanael Catangay Cariaga  
> wrote:
> 
> thank you all for the responses.  i guess i would have to discuss this with 
> our provider.
> 
>> On Fri, Feb 1, 2019, 1:39 AM Tom Beecher > NYC to LA is in the high 60ms range, so no, 200ms from Dallas to US west 
>> coast is not expected. 
>> 
>> 
>> 
>> 
>>> On Thu, Jan 31, 2019 at 12:14 PM Mark Tinka  wrote:
>>> 
>>> 
>>> On 31/Jan/19 18:53, Mike Hammett wrote:
>>> 
 It's 180 ms from Dallas to Djibouti, so no, that much latency to the west 
 coast of the US is not normal.
>>> 
>>> Or from Gaborone to Frankfurt, which is some 184ms.
>>> 
>>> Short of long re-route paths or congested, high packet loss links, I'd not 
>>> expect the latency between any 2 points in the U.S. to hit 200ms.
>>> 
>>> Mark.


Re: How to choose a transport(terrestrial/subsea)

2019-01-02 Thread Jason Bothe via NANOG
Correct. Its called a grooming clause and you can most certainly ensure you 
have language in your agreements with the vendor. Restrictions being it needs 
to be for wavelength or an IRU path which is custom anyhow. Also, KMZs or no 
business. Period. 

J~


> On 2, Jan 2019, at 2:14 PM, Tom Beecher  wrote:
> 
> You can mitigate some of that by getting contract language in place that says 
> a carrier must maintain the circuit on the specified and agreed pathway, and 
> if it's later discovered that it has been moved, you don't pay for the 
> circuit from the time it was moved until it is restored. 
> 
> It's a nice bit of leverage to make sure they *DO* pay attention when they 
> regroom to avoid surprises. :) 
> 
> On Wed, Jan 2, 2019 at 12:53 PM Mike Hammett  > wrote:
> It's easier when you use carriers that provide usable network maps on their 
> web site. Less guess work.
> 
> When I got a Windstream wave, I got a PDF that was the device CLLI and port 
> number of each device in the path A - Z. Obviously they could change it 
> without informing me of the new path, but I at least know at order it's 
> different and can ask for details when there are outages or latency changes 
> that indicate a change in path.
> 
> 
> 
> -
> Mike Hammett
> Intelligent Computing Solutions
> http://www.ics-il.com 
> 
> Midwest-IX
> http://www.midwest-ix.com 
> 
> From: "Steve Naslund" mailto:snasl...@medline.com>>
> To: nanog@nanog.org 
> Sent: Wednesday, January 2, 2019 11:33:43 AM
> Subject: RE: How to choose a transport(terrestrial/subsea)
> 
> All true but it is becoming increasingly difficult to determine if a provider 
> is using another providers infrastructure (all are at some level).  For 
> example, in the SIP world there are several national level carriers that are 
> using Level 3s core SIP network and if you were not aware of that you could 
> buy trunks from two of the largest SIP trunk providers in the US and actually 
> be running on the same network.  Carriers are also very often reliant on the 
> ILEC for fiber and last mile access.  Especially in non-metro areas getting 
> diverse last mile access could be impossible or have huge construction costs. 
>  It is pretty complicated to ensure that your carriers are really diverse and 
> much harder to ensure that they stay that way.  I have many examples of 
> carrier grooming their own primary and backup circuits onto the same L1 path 
> and not realize they have done so. 
> 
>  
> Contractual diversity is a great idea that does not work since the carriers 
> do not actually know what each other’s network looks like.  So let’s say that 
> Sprint and CenturyLink choose the same fiber carrier between areas, do you 
> think they would notify each other of that fact?  Do you think the fiber 
> carrier would tell them what another customer’s network looks like?  You can 
> tell Sprint to not use CenturyLink but there is no way to get both of them 
> not to use the same third party.  I suppose you could contractually tell a 
> carrier to avoid xxx cable but I would have little faith that they maintain 
> that over time.  I seriously doubt they review all existing contracts when 
> re-grooming their networks.
> 
>  
> Steven Naslund
> 
> Chicago IL
> 
>  
>  
> >I'm of the opinion that, if you need resiliency, you should order explicitly 
> >diverse circuits from a primary provider and then a secondary circuit from a 
> >second vendor.
> 
> > 
> 
> >Ultimately, If you want contractually-enforced physical diversity then the 
> >best options will be single-vendor solutions: Obviously you also want to 
> >avoid an unknown single-vendor single-point-of-failure, hence the >secondary 
> >provider. Having two vendors is usually a less than optimal solution since 
> >neither has visibility into the others' network to ensure the physical 
> >diversity required for a truly resilient service: what happens if >an 
> >undersea cable is cut, etc?
> 
> > 
> 
> >The cost of such solutions is often unpleasant to justify, mind.
> 
> > 
> 
> >~a
> 
> 



Re: Amazon Peering

2018-11-24 Thread JASON BOTHE via NANOG
This is a note I received on Oct18 when checking on a peering request submitted 
on Aug7.. 

“Apologies for the delays here. We have temporarily frozen IX peering as we 
revise some of our automation processes. I’m hopeful this will be unblocked by 
early November. Thank you for your continued patience.”

> On Nov 24, 2018, at 10:59, Darin Steffl  wrote:
> 
> It seems wasteful for Amazon to connect to an IX but then ignore peering 
> requests for a year.
> 
> They have 40G of connectivity but are unresponsive. I'll try emailing all the 
> other contacts listed in peeringdb.
> 
> Thanks 
> 
>> On Sat, Nov 24, 2018, 10:38 AM Mike Hammett > I've e-mailed my contacts there a couple times on people's behalf. No 
>> response yet.
>> 
>> It seems like a lot of organizations need 1 more person in their peering 
>> departments.
>> 
>> 
>> 
>> -
>> Mike Hammett
>> Intelligent Computing Solutions
>> http://www.ics-il.com
>> 
>> Midwest-IX
>> http://www.midwest-ix.com
>> 
>> From: "Darin Steffl" 
>> To: "North American Network Operators' Group" 
>> Sent: Friday, November 23, 2018 10:21:51 PM
>> Subject: Amazon Peering
>> 
>> Hey all,
>> 
>> Does anyone have a direct contact to get a peering session established with 
>> Amazon at an IX? I sent a peering request Dec 2017 and two more times this 
>> Sept and Nov with no response.
>> 
>> I sent to peer...@amazon.com and received one automated response back so I 
>> know they received my email but nothing since.
>> 
>> 
>> 
>> -- 
>> Darin Steffl
>> Minnesota WiFi
>> www.mnwifi.com
>> 507-634-WiFi
>>  Like us on Facebook
>> 


Re: Zayo vs Coent

2018-11-09 Thread JASON BOTHE via NANOG
If you love yourself and your organization just peer with Zayo and not look 
back. 

> On Nov 9, 2018, at 14:19, Ca By  wrote:
> 
> Zayo will provide you all of the internet
> 
> Cogent will provide you with something that is not all internet, it is 
> missing HE and Google on ipv6. 
> 
>> On Fri, Nov 9, 2018 at 10:53 AM William Herrin  wrote:
>> Zayo is the former above.net. Worked well for me at previous $job.
>> Cogent is Cogent. Refer to the list archives for experiences with
>> Cogent.
>> 
>> Regards,
>> Bill Herrin
>> On Fri, Nov 9, 2018 at 10:19 AM Dovid Bender  wrote:
>> >
>> > Hi,
>> >
>> > We are in a facility where my only options are Cogent or Zayo. We plan on 
>> > getting a 10G connection for a web crawler using v4 only. Looking for 
>> > feedback on either or (keeping the politics out of it).
>> >
>> > TIA.
>> >
>> > Dovid
>> >
>> 
>> 
>> -- 
>> William Herrin  her...@dirtside.com  b...@herrin.us
>> Dirtside Systems . Web: 


Re: NANOG Security Track: Route Security

2018-09-30 Thread JASON BOTHE via NANOG
Agreed, especially if they’re an active member of the organization and doesn’t 
seem to be synonymous with NANOGs Charter.  

Jason 

On Sep 30, 2018, at 22:41, Brian Kantor  wrote:

>> To ensure unimpeded information sharing and discussion, the
>> Security Track will not be broadcast or recorded.
> 
> I fail to understand how making the presentations secret from all
> except those attending in person promotes information sharing.
> Could whoever made this seemingly contradictory decision explain
> the reasoning behind it?
>- Brian
> 


Rogers AS812 help

2018-09-26 Thread JASON BOTHE via NANOG
Hi NOGers

If anyone from Rogers is on, could you please contact me offline? 

Thanks

J~



Re: Massive Price Increase for X-conns at Telehouse Chelsea, NYC

2018-09-17 Thread JASON BOTHE via NANOG
Correct. Behold the ‘active riser’. We started doing this years ago in our R&E 
network after we were being nickeled and dimes to cross floors between our own 
cages we leased from the same colo. 


> On Sep 17, 2018, at 15:23, Ben Cannon  wrote:
> 
> fs.com has got this ready to go.  Less than that.
> 
>> On Sep 17, 2018, at 12:54 PM, Joe Maimon  wrote:
>> 
>> 
>> 
>> Ethan O'Toole wrote:
 If it’s in an interduct by itself, how much would the square footage per
 month occupied by the average cross connect be worth?
>>> 
>>> These big datacenter companies are REITs. Similar to self-storage units and 
>>> apartment buildings, they exist to extract as much money as possible from 
>>> the users. Nothing more or nothing less. The price relief only comes when 
>>> the market is grossly overbuilt and if there is actual competition.
>>> 
>>>   - Ethan O'Toole
>>> 
>>> 
>> For a positive side effect, xcon pricing should bring greater demand to dwdm 
>> solutions, what would you recommend for an affordable 1u turnkey buy a pair 
>> and get >10<30 1g/10g maybe a couple of 40 even a 100g (and mon/expansion)?
>> 
>> 
>> Joe
> 


Bell Canada IP transit - NID required?

2018-09-08 Thread JASON BOTHE via NANOG


All,

Just curious if anyone uses Bell Canada for IP transit in a colo environment 
and whether or not you were able to obtain a traditional cross-connect without 
having Bell place a managed CPE device in your cage. I can’t seem to find 
anyone intelligent enough to tell my any different other than “it’s never been 
done before” and “we need remote testing capabilities.”

J~

NTT engineer in the wings?

2018-07-15 Thread JASON BOTHE via NANOG


If there is someone listening from NTT engineering, would you kindly write 
back? 

The IP NOC is unable to locate anyone because it’s Sunday so I thought I might 
try here. 

Thanks!

J~