Re: ipv6 address management - documentation

2023-11-18 Thread JASON BOTHE via NANOG
Netbox for the win! You can not only use it for IPAM but for circuit inventory, 
designs, cross connects, rack layouts and automate from there. It serves as a 
true source of truth. I think you will be pleased.  

> On Nov 16, 2023, at 15:03, Aaron Gould  wrote:
> 
> For years I've used an MS Excel spreadsheet to manage my IPv4 addresses.  
> IPv6 is going to be maddening to manage in a spreadsheet.  What does everyone 
> use for their IPv6 address prefix management and documentation?  Are there 
> open source tools/apps for this?
> 
> --
> -Aaron
> 


Re: Acceptance of RPKI unknown in ROV

2023-10-19 Thread JASON BOTHE via NANOG
Assuming unknown encompasses no roa at all, im inclined to say most probably 
haven’t because that would break a lot of things because a lot of folks don’t 
have ROAs at all and some don’t seem to even have a plan around implementing 
them. 

J~

> On Oct 19, 2023, at 11:47, Owen DeLong via NANOG  wrote:
> 
> A question for network operators out there that implement ROV…
> 
> Is anyone rejecting RPKI unknown routes at this time?
> 
> I know that it’s popular to reject RPKI invalid (a ROA exists, but doesn’t 
> match the route), but I’m wondering if anyone  is currently or has any plans 
> to start rejecting routes which don’t have a matching ROA at all?
> 
> Thanks,
> 
> Owen
> 


Zayo woes

2023-09-18 Thread JASON BOTHE via NANOG
Does anyone know what’s happening at Zayo? Tickets are taking weeks and months 
to get resolved, much less get a tech assigned to them. 

The folks answering the noc phone are mere order takers and are only reading 
from a script, manager on duty/escalation lines go to voicemail. 

If anyone can help get to a human in the transport group, that would be great. 
I’ve given up all hope at this point. 

Appreciated. 

Jason 

Google peering assistance

2023-03-28 Thread JASON BOTHE via NANOG
Hello

If someone from Google peering is on, would you kindly contact me?

Thanks

Jason 


Re: Rogers Outage Canada

2022-07-09 Thread JASON BOTHE via NANOG
I see the point you’re trying to make but using the word retarded in this 
context is not only dumb in itself but offense. Please be more respectful on 
this list. 

Thanks



> On Jul 9, 2022, at 10:48, Keith Medcalf  wrote:
> 
> 
>> I can't either, but the reality right now seems to be that 911 calls are
>> failing for anyone on a Rogers cellphone.
> 
> This is par for the course.  These people chose to deal with Rogers despite 
> knowing the consequences.  It is like if you bought a Rogers Snowblower and 
> it did not work.  That would mean that people who bought the Rogers 
> Snowblower will not be using it to get rid of the snow that is preventing 
> them from leaving their house.
> 
> Mutatis mutandis when Rogers is down things that are Rogers dependent will 
> not work.
> 
> Some people are so retarded it is astonishing!
> 
> -- 
> (CAUTION) You are advised that if you attack my person or property, you will 
> be put down in accordance with the provisions of section 34 & 35 of the 
> Criminal Code respectively.  If you are brandishing (or in possession) of a 
> weapon then lethal force will be applied to your person in accordance with 
> the law.  This means that your misadventures may end in your death.  Consider 
> yourself cautioned and govern your actions appropriately.
> 
>> -Original Message-
>> From: NANOG  On Behalf Of
>> Eric Kuhnke
>> Sent: Friday, 8 July, 2022 13:34
>> To: jim deleskie 
>> Cc: NANOG list 
>> Subject: Re: Rogers Outage Canada
>> 
>> 
>> I have seen anecdotal reports that the mobile network is in a half broken
>> state that phones remain registered to, so a 911 call will attempt and
>> then fail.
>> 
>> 
>> This is unlike what would happen if you had a US/Canada cellphone with
>> battery power but no SIM card in it that would search for any available
>> network in RF range for a 911 call if needed.
>> 
>> 
>> On Fri, 8 Jul 2022 at 12:31, jim deleskie >  > wrote:
>> 
>> 
>>i cant see BGP taking out SS7.
>> 
>>-jim
>> 
>>On Fri, Jul 8, 2022 at 2:45 PM Snowmobile2004
>> mailto:greenjosh6...@gmail.com> > wrote:
>> 
>> 
>>According to Cloudflare Radar
>>  , Rogers
>> BGP announcements spiked massively to levels 536,777% higher than normal
>> (343,601 vs 64 normally) just minutes before the outage. I would not be
>> surprised if this happened to be the culprit.
>> 
>>Regards,
>>Josh Green
>> 
>>On Fri, Jul 8, 2022 at 2:19 PM Andrew Paolucci via NANOG
>> mailto:nanog@nanog.org> > wrote:
>> 
>> 
>>In the early hours of the morning around 2-3am my modem
>> got hit with a configuration update that caused a DHCP release that
>> wasn't renewed for about two hours, after rollback the connection was
>> fine for 3 hours before this network wide outage.
>> 
>> 
>>Maybe a failed night time update was attempted again
>> during office hours, I've heard daytime guys are still WFH and night
>> shift is in building.
>> 
>> 
>>I expect we'll never get a real explanation. Rogers is
>> notorious for withholding any type of helpful or technical information.
>> 
>> 
>>Sent from my inoperable Rogers Mobile via emergency eSIM.
>> 
>> 
>>Regards,
>> 
>>Andrew Paolucci
>> Original Message 
>>On Jul. 8, 2022, 1:48 p.m., Jay Hennigan < j...@west.net
>>  > wrote:
>> 
>> 
>>On 7/8/22 07:44, Robert DeVita wrote: > Does anyone
>> have information on a widespread Rogers outage in Canada. I > have
>> customers with multiple sites down. There's discussion on the Outages
>> mailing list. Seems widespread, affecting all services, mobile, voice,
>> Internet. No cause or ETR posted yet. -- Jay Hennigan - j...@west.net
>>   Network Engineering - CCIE #7880 503 897-8550 -
>> WB6RDV
>> 
>> 
>> 
>>--
>> 
>>Josh Green.
> 
> 
> 
> 


Re: Serious Juniper Hardware EoL Announcements

2022-06-14 Thread JASON BOTHE via NANOG
Saw this coming a mile away. With chips and technology progressing despite 
ability to manufacture, I’m certain many are going to do this. 

> On Jun 14, 2022, at 11:53, Raymond Burkholder  wrote:
> 
> On 2022-06-14 09:46, Saku Ytti wrote:
>> These EOLd are HMC devices, Micron EOLd HMC back in 2018, no one else made 
>> them.
>> MX304 is a very different device than MX80, MX104, MX204. Previously
>> these were single chip very BOM optimised devices. MX304 has YT on
>> each card, which also means half of the YT capacity is spent on
>> fabric. Whereas MX80, MX104 connect ports on fabric and wan side,
>> getting 200% bps compared to fabric model.
>> Of course BOM isn't a meaningful contributor to what customers generally pay.
> Holy acronym soup batman!
> 
> Could you help me with HMC, BOM, YT?
> 
> BOM means to me BillOfMaterials, but I'm not sure I have that correct.


Re: Ukraine request yikes

2022-03-01 Thread JASON BOTHE via NANOG
Not sure how I feel about this. My thoughts have always been to leave 
government out of Internet operations or otherwise they get comfortable and 
will want to make decisions that we may not be comfortable with. 

During wartime, I would think the desire would be to have them connected in 
order to have access to information and knowledge as necessary. If the idea is 
suppress Russia from performing bad actions, disconnecting their tld(s) will 
not solve this and is just a bad approach all around. 

J~

> On Mar 1, 2022, at 16:22, George Herbert  wrote:
> 
> I don’t hear anyone in the networks field supporting doing it.
> 
> It was a yikes that the request was made, but not looking at all likely to 
> happen IMHO.
> 
> -george  
> 
> Sent from my iPhone
> 
>>> On Mar 1, 2022, at 2:12 PM, Brian R  wrote:
>>> 
>> 
>> The problem with all this talk, especially with trusted international 
>> neutral organizations, is that once they bend they will never be trusted 
>> again.  Shutting off the routes, removing TLDs (or keeping them because of 
>> politics), etc will cause irreparable damage to these organizations.  Bowing 
>> to governments, politics, etc does not have a path back from future control.
>> This is a recommendation that will only hurt people (China, North Korea, 
>> [even the USA], etc all do this to control their people).  Governments will 
>> get around whatever the limitations are, it may take them time and resources 
>> but they will get around it.  Freedom of information is the only way to help 
>> people understand the reality of what is going on in the world (galaxy, 
>> universe, etc).
>> 
>> Brian
>> Technological solutions for Sociological problems 
>> 
>> From: NANOG  on behalf of 
>> Bryan Fields 
>> Sent: Tuesday, March 1, 2022 1:23 PM
>> To: nanog@nanog.org 
>> Subject: Re: Ukraine request yikes
>>  
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA256
>> 
>> 
>> On 3/1/22 4:08 PM, David Conrad wrote:
>> > See .SU.
>> >
>> > (SU was moved from allocated to "transitionally reserved” back when the
>> > USSR broke up. My recollection is that an agreement was reached by which
>> > .SU users would be migrated out to appropriate new ccTLDs, that is, the
>> > ccTLDs based on ISO codes created for former Soviet republics, and no new
>> > entries would be added to .SU. However, when ICANN tried to propose a plan
>> > to finalize removing .SU from the root (around 2006 or so), the operators
>> > of .SU reopened registrations and complained to the US Dept. of Commerce,
>> > who were overseeing ICANN performance of the IANA Functions contract.
>> > Eventually, the Russian government was able to convince ISO-3166/MA to move
>> > SU to “exceptionally reserved” (like UK, EU, and a number of others) and
>> > forward motion on removing .SU from the root essentially ceased.)
>> 
>> I know someone (non-Russian) using .su for a funny name ending in .su.  This
>> is non-political and caters only to an English speaking audience.  These were
>> registered in the last few years, so they are still open and taking the
>> registrations.
>> 
>> I would ask what of .ly used for various URL shorteners, and .kp or .cn?  All
>> these are representing evil countries too, why do they get a pass.  I'm
>> certain they would argue .us should be revoked for the same.
>> 
>> This would break connectivity, and that's a bad thing.
>> - -- 
>> Bryan Fields
>> 
>> 727-409-1194 - Voice
>> http://bryanfields.net
>> -BEGIN PGP SIGNATURE-
>> 
>> iQIzBAEBCAAdFiEEaESdNosUjpjcN/JhYTmgYVLGkUAFAmIejrUACgkQYTmgYVLG
>> kUA+QQ//Z9ovTSFqVEunql2guHAN3xWaNpCpuNJCGM68dJTBSWrPEY0zFXlmZG1k
>> 0TWrSrRSoWogiJmRvaOuFx6KxkaADqZaZq6OFaCw3jvyFGULw+auyuATGlhnUL8p
>> CV0AbovPUnoAef1qJdglFkqnfrGBxeBGsgRIM8tx2l/G+zq5MdMnCx9cM+JmmN1y
>> b+jrV4oekgXRZLAMI/sA9clMAXUmlgReRvit8YBccunkmMP8naQ92vj9dvVGZld0
>> hGguK2a7vFXpDiW5o0nFe5GRdGIqM0aWUz6p0qkB9JudkZkAyEqSpCePZky4LdAt
>> ebh9544PZu/vllQjv3L6vENlCURcifTIRSevcwfKZtos7UG4mJI1UQ51OLTRjB7a
>> nqYkVNJSQJ+dXZFLPoRHNUOu4+1MAyozpDeMJzMsr4a7Ru2lh0AOTiXxDaSRhOd+
>> 2s3rQigh/l6cP/x9iM7+f+rInHzPihHfjbwcxhyqd12EFxgTe3hvi9JlRSe18RYw
>> bnDKQg3xKp1eIk0sZMeLyIWDERjsMxIuEP9MuKHp+oTCrLq6MFSgUiFan7M5Pk2t
>> mwB3sbFuwkVzfmDbbnbelll30ukXQM3d7KVp2AHbsvI6hNs6zHZgRb7ZgGrR9Ep5
>> 6UlYqVqQOWtYNujNxYRgzemFI6lgJj8GHyDeh0wLRCP0aw/ATPg=
>> =KK8e
>> -END PGP SIGNATURE-


Re: Carrier Options in Hong Kong

2021-12-17 Thread JASON BOTHE via NANOG
PCCW / HKT are the main networks for eyeball  HKT ASs feed into AS3491 which is 
the international arm, PCCW global if you will. 

> On Dec 17, 2021, at 14:05, nanoguser99 via NANOG  wrote:
> 
> 
> Looking glass pings from Lumen to my gear behind PCCW = 1ms, immediate 
> handoff.   Looking glass pings from Lumen -> Google (216.239.38.120), 
> immediate handoff.  Some CDNs\cloud are 30 ms away, like you said Tokyo or 
> Singapore.
> 
> My main concern is the eyeball networks.  Is PCCW the main carrier for the 
> eyeball networks there or do they all peer in country for the most part. 
> 
> Sent with ProtonMail Secure Email.
> 
> ‐‐‐ Original Message ‐‐‐
>> On Friday, December 17th, 2021 at 7:12 PM, Eric Dugas 
>>  wrote:
>> I am in no way an expert in APAC but all of the IP carriers I have in NA are 
>> present in HK: Cogent, Tata, Telia, Zayo.
>> 
>> My guess is a good portion of the interconnections with other IP carriers, 
>> CDNs and such will be either in Singapore or Tokyo.
>> 
>>> On Fri, Dec 17, 2021 at 1:56 PM nanoguser99 via NANOG  
>>> wrote:
>>> Nanog,
>>> 
>>> Currently my organization uses PCCW which we pay through the nose for and 
>>> I'm looking to cut them. This was put in place before me. I was informed 
>>> that PCCW is "the carrier" in Hong Kong but based on my analysis I'm not 
>>> sure that's the case. My analysis of carriers such as Lumen and Cogent put 
>>> them on par with PCCW. Pings to random IPs in HK are reasonable fast on all 
>>> of them, same with pings to cloud providers. Access to mainland is not a 
>>> hard requirement but just to check they all had 300+ ms latency to known 
>>> IPs in Shanghai and Tanjin.
>>> 
>>> I know some regions such as Korea or Dubai are monopolized where the wrong 
>>> carrier takes you on a far away path to get a few blocks down the street. 
>>> 
>>> I don't need anything special, just general DIA and good access to eyeballs 
>>> and internet. I just wanted to see people's opinions here as APAC 
>>> connectivity can be tricky.
>>> 
>>> - Nanoguser99
>>> 
>>> Sent with ProtonMail Secure Email.
>>> 
> 


Re: Carrier Options in Hong Kong

2021-12-17 Thread JASON BOTHE via NANOG
Colt is a good option if you’re seeking wavelengths. For transit we use a mix 
of the other carriers, pccw included but we go through the wholesale side and 
not hkt which is the domestic arm of pccw and they are ridiculously expensive.  

> On Dec 17, 2021, at 13:13, Eric Dugas via NANOG  wrote:
> 
> 
> I am in no way an expert in APAC but all of the IP carriers I have in NA are 
> present in HK: Cogent, Tata, Telia, Zayo.
> 
> My guess is a good portion of the interconnections with other IP carriers, 
> CDNs and such will be either in Singapore or Tokyo.
> 
>> On Fri, Dec 17, 2021 at 1:56 PM nanoguser99 via NANOG  
>> wrote:
>> Nanog,
>> 
>> Currently my organization uses PCCW which we pay through the nose for and 
>> I'm looking to cut them.  This was put in place before me.  I was informed 
>> that PCCW is "the carrier" in Hong Kong but based on my analysis I'm not 
>> sure that's the case.  My analysis of carriers such as Lumen and Cogent put 
>> them on par with PCCW.  Pings to random IPs in HK are reasonable fast on all 
>> of them, same with pings to cloud providers.   Access to mainland is not a 
>> hard requirement but just to check they all had 300+ ms latency to known IPs 
>> in Shanghai and Tanjin.
>> 
>> I know some regions such as Korea or Dubai are monopolized where the wrong 
>> carrier takes you on a far away path to get a few blocks down the street.  
>> 
>> I don't need anything special, just general DIA and good access to eyeballs 
>> and internet.  I just wanted to see people's opinions here as APAC 
>> connectivity can be tricky.
>> 
>> - Nanoguser99
>> 
>> Sent with ProtonMail Secure Email.
>> 


Re: Main electric transmission towers collapsed--New Orleans at 11% Internet connectivity

2021-08-30 Thread JASON BOTHE via NANOG
My concern is what will happen with ILA sites that traverse through the Orleans 
parish and others that are going to be without electricity for many weeks to 
come. Eight transmission circuits went into cascading failure last eve. While 
not all physically damaged, it will time to assess and begin a controlled 
restoration to balance. In the meantime, fuel will deplete at remote sites 
causing them to fail. A lot of capacity that serves the south central and 
southwestern US traverses through Louisiana. 

J~

> On Aug 30, 2021, at 10:13, Sean Donelan  wrote:
> 
> Unlike other utilities, I have not seen any outage reports directly from the 
> major telecommunications companies serving Louisiana and New Orleans.
> 
> 
> 9-1-1 out of service in three parishes (Orleans, Jefferson, St. Tammany).
> 
> 100% of power is out in 4 parishes, over 80% power out in 14 parishes.
> 
> Many anedoctal reports of cell and telecommunications outages in southeastern 
> Louisiana.
> 
> Netblocks reports 89% network connectivity outage in New Orleans. 
> IODA.CADA.ORG reports 66% network connectivity outage in Louisiana.
> BGP route annoucements is stable, which likely indicates major backbones are 
> not damaged (or they don't have backbone infrastructure in the region).
> 
> 
> The major wireless providers have announced they are waiving the usual 
> overage and billing charges for zip codes affected by Hurricane Ida.  No 
> direct outage details from telecommunications and cable providers yet.
> 
> FCC activated DIRS over the weekend, so we should be seeing the initial FCC 
> report late Monday afternoon.


juniper qfx5120-ym - curvature - infinera optic issues

2021-05-10 Thread JASON BOTHE via NANOG
NANOG Fam

This is a rather interesting issue to see if anyone has ran across this with a 
Curvature branded 10 or 100G LR optic in a Juniper QFX facing an Infinera wave. 

What we’ve noticed is migrating from MX 204 to a new QFX 5120-YM that has an 
Infinera as the handoff, the circuit just bounces constantly. Disabling ALS 
will steady the light but the interface will continue to bounce. 

What does work is migrating an interface that happens to hang off an ADVA R7; 
no problem. Circuit even works in a hybrid mode where one side is adva and the 
other is Infinera, as long as the Infinera side is connected to an MX :-) 

Anyhow, curious to know if anyone else has experienced anything similar. Our 
next step is to test tomorrow with OEM optics and see if the trouble follows. 

J~ 




Re: ASE - 100 Gig Wave

2021-03-18 Thread JASON BOTHE via NANOG
I doubt that. You’ve been at it for months with requests all over the world. It 
was only a matter of time before someone said something. 

> On Mar 18, 2021, at 10:34, Rod Beck  wrote:
> 
> 
> And by the way, it would not be making these requests if there was not a 
> severe capacity shortage in the Pacific. I don't like telegraph what I am 
> doing, Shane. 
> 
> From: NANOG  on 
> behalf of Rod Beck 
> Sent: Thursday, March 18, 2021 4:27 PM
> To: sro...@ronan-online.com ; NANOG Operators' Group 
> 
> Cc: Shane Ronan 
> Subject: Re: ASE - 100 Gig Wave
>  
> Actually, that language was intended to prohibit soliciting business and not 
> asking for help. I have some hard words to describe like Shane Ronan, but I 
> will forbear. 
> 
> I suggest you cease and desist before this gets ugly. Obviously you are 
> underemployed. 
> 
> Get some work to do. 
> 
> Best, 
> 
> -R. 
> 
> 
> 
> From: sro...@ronan-online.com 
> Sent: Thursday, March 18, 2021 4:24 PM
> To: Rod Beck ; NANOG Operators' Group 
> 
> Cc: Shane Ronan 
> Subject: Re: ASE - 100 Gig Wave
>  
> Please review the Mailing List policies which specifically prohibit 
> commercial discussions on the list. I would ask the list moderators to chime 
> in here please
> 
> Shane
> 
>>> On Mar 18, 2021, at 11:14 AM, Rod Beck  
>>> wrote:
>>> 
>> 
>> People post requests all the time. You are free to block me. And I know the 
>> majority of uses disagree with you. 
>> 
>> From: Shane Ronan 
>> Sent: Thursday, March 18, 2021 4:11 PM
>> To: Rod Beck 
>> Cc: nanog@nanog.org 
>> Subject: Re: ASE - 100 Gig Wave
>>  
>> NANOG is not a service for receiving details on cable paths for commercial 
>> purposes. Please find somewhere else to collect this information.
>> 
>> On Thu, Mar 18, 2021 at 10:54 AM Rod Beck  
>> wrote:
>> This cable is tapped out and I need a 100 gig wave from Hong Kong to 
>> Singapore. 3 year term. 
>> 
>> Roderick Beck
>> Global Network Capacity Procurement
>> United Cable Company
>> www.unitedcablecompany.com
>> https://unitedcablecompany.com/video/
>> New York City & Budapest
>> rod.b...@unitedcablecompany.com
>> Budapest: 36-70-605-5144
>> NJ: 908-452-8183 
>> 
>> 
>> 


Re: Cross country latency on 3356?

2021-02-16 Thread JASON BOTHE via NANOG
Lots of amp sites down here currently and with travel impossible and severely 
limited, they’re struggling to restore. It’s not a good situation currently. 

> On Feb 16, 2021, at 14:18, David Hubbard  
> wrote:
> 
> 
> Curious if anyone is seeing issues with 3356 cross country, particularly 
> Orlando-LA?  I have to assume they’re having issues in Texas, so perhaps too 
> much capacity has been lost and it’s overloading what is functioning?
>  
> David


Re: Texas internet connectivity declining due to blackouts

2021-02-16 Thread JASON BOTHE via NANOG
The professor has it right. Before the state privatized the grid and made 
ERCOT, we never had these problems. Every few years, these private companies 
complain they need a rate hike because they need a grant to ‘beef up’ the 
infrastructure and it’s granted although we seem to keep having this issue. I’m 
certain history will continue to repeat itself. 

> On Feb 16, 2021, at 06:32, John Sage  wrote:
> 
> On 2/16/21 4:22 AM, John Sage wrote:
>>> On 2/15/21 10:02 PM, Mark Tinka wrote:
>>> 
>>> 
 On 2/16/21 07:49, Matthew Petach wrote:
>>> 
 
 Isn't that a result of ERCOT stubbornly refusing to interconnect with the 
 rest of the national grid, out of an irrational fear of coming under 
 federal regulation?
>> Yes. This has been widely documented in numerous articles, both very 
>> recently and previously.
> 
> As one example only, of many:
> 
> "What went wrong with the Texas power grid?"
> 
> Marcy de Luna, Amanda Drane, Houston Chronicle
> 
> Feb. 15, 2021
> Updated: Feb. 15, 2021 9:23 p.m.
> 
> "Dan Woodfin, ERCOT’s senior director of system operations, said the rolling 
> blackouts are taking more power offline for longer periods than ever before. 
> An estimated 34,000 megawatts of power generation — more than a third of the 
> system’s total generating capacity — had been knocked offline by the extreme 
> winter weather amid soaring demand as residents crank up heating systems."
> 
> . . .
> 
> "Ed Hirs, an energy fellow in the Department of Economics at the University 
> of Houston, blamed the failures on the state’s deregulated power system, 
> which doesn’t provide power generators with the returns needed to invest in 
> maintaining and improving power plants.
> 
> “The ERCOT grid has collapsed in exactly the same manner as the old Soviet 
> Union,” said Hirs. “It limped along on underinvestment and neglect until it 
> finally broke under predictable circumstances."
> 
> https://www.houstonchronicle.com/business/energy/article/Wholesale-power-prices-spiking-across-Texas-15951684.php
>  
> 
> 
> - John
> __


Re: Amazon peering

2021-01-11 Thread JASON BOTHE via NANOG
Yes sir. I’ve now had a couple of fine folks respond and have got it sorted. 
Thanks to everyone for the quick responses. 

J~

> On Jan 11, 2021, at 13:10, Rob Duffy  wrote:
> 
> 
> We submitted a request recently and received a response a week later, stating 
> the request was being processed by their automated system.  The automated 
> system takes 10 - 12 days to set up the session. 
> 
>> On Mon, 11 Jan 2021 at 18:14, JASON BOTHE via NANOG  wrote:
>> Hi all
>> 
>> Just curious if anyone has recently requested Amazon peering and if they’ve 
>> gotten a timely response. I know historically it was months and months but I 
>> thought I had read where they had turned over a new leaf and were responding 
>> promptly. I have a pending request but it was done over the holidays so 
>> hoping it’s just in a small backlog :-) 
>> 
>> Thanks 
>> 
>> J~


Amazon peering

2021-01-11 Thread JASON BOTHE via NANOG
Hi all

Just curious if anyone has recently requested Amazon peering and if they’ve 
gotten a timely response. I know historically it was months and months but I 
thought I had read where they had turned over a new leaf and were responding 
promptly. I have a pending request but it was done over the holidays so hoping 
it’s just in a small backlog :-) 

Thanks 

J~

Re: Centurylink having a bad morning?

2020-08-30 Thread JASON BOTHE via NANOG
If you have to have connectivity to them, you could always just instruct them 
not to announce your routes beyond their AS; paid peering, and announce through 
more reliable ASs such as 2914 and 1299. Many people do this. Otherwise, cut 
ties with them and save yourself the headaches. 


> On Aug 30, 2020, at 12:09, Baldur Norddahl  wrote:
> 
> 
> An outage is what it is. I am not worried about outages. We have multiple 
> transits to deal with that.
> 
> It is the keep announcing prefixes after withdrawal from peers and customers 
> that is the huge problem here. That is killing all the effort and money I put 
> into having redundancy. It is sabotage of my network after I cut the ties. I 
> do not want to be a customer at an outlet who has a system that will do that. 
> Luckily we do not currently have a contract and now they will have to 
> convince me it is safe for me to make a contract with them. If that is 
> impossible I guess I won't be getting a contract with them.
> 
> But I disagree in that it would be impossible. They need to make a good 
> report telling exactly what went wrong and how they changed the design, so 
> something like this can not happen again. The basic design of BGP is such 
> that this should not happen easily if at all. They did something unwise. Did 
> they make a route reflector based on a database or something?
> 
> Regards,
> 
> Baldur
> 
>> On Sun, Aug 30, 2020 at 5:13 PM Mike Bolitho  wrote:
>> Exactly. And asking that they somehow prove this won't happen again is 
>> impossible.
>> 
>> - Mike Bolitho
>> 
>>> On Sun, Aug 30, 2020, 8:10 AM Drew Weaver  wrote:
>>> I’m not defending them but I am sure it isn’t intentional.
>>> 
>>>  
>>> 
>>> From: NANOG  On Behalf Of 
>>> Baldur Norddahl
>>> Sent: Sunday, August 30, 2020 9:28 AM
>>> To: nanog@nanog.org
>>> Subject: Re: Centurylink having a bad morning?
>>> 
>>>  
>>> 
>>> How is that acceptable behaviour? I shall remember never to make a contract 
>>> with these guys until they can prove that they won't advertise my prefixes 
>>> after I pull them. Under any circumstances. 
>>> 
>>>  
>>> 
>>> søn. 30. aug. 2020 15.14 skrev Joseph Jenkins :
>>> 
>>> Finally got through on their support line and spoke to level1. The only 
>>> thing the tech could say was it was an issue with BGP route reflectors and 
>>> it started about 3am(pacific). They were still trying to isolate the issue. 
>>> I've tried failing over my circuits and no go, the traffic just dies as L3 
>>> won't stop advertising my routes.
>>> 
>>>  
>>> 
>>> On Sun, Aug 30, 2020 at 5:21 AM Drew Weaver via NANOG  
>>> wrote:
>>> 
>>> Hello,
>>> 
>>>  
>>> 
>>> Woke up this morning to a bunch of reports of issues with connectivity had 
>>> to shut down some Level3/CTL connections to get it to return to normal.
>>> 
>>>  
>>> 
>>> As of right now their support portal won’t load: 
>>> https://www.centurylink.com/business/login/
>>> 
>>>  
>>> 
>>> Just wondering what others are seeing.
>>> 
>>>  


Corero

2020-08-10 Thread JASON BOTHE via NANOG
Folks

Anyone on using Corero?  Thoughts around it? 

Thanks

J~


Re: NTT IP Transit

2020-06-27 Thread JASON BOTHE via NANOG
Contact Jane Divis in NTT GIN
425-753-9318

> On Jun 27, 2020, at 07:40, James Braunegg  wrote:
> 
> 
> Dear Nanog
>  
> I am looking for some NTT IP transit delivered in LA for our network AS38880, 
> if you know a NTT sales rep could you please either pass on this email to 
> them, and or provide me their contact details !
>  
> Thanks in advance
>  
> Kindest Regards
>  
> James Braunegg
> 
> 1300 769 972 / 0488 997 207
> ja...@micron21.com
> www.micron21.com/
> 
> 
> 
> Follow us on Twitter for important service and system updates.
> This message is intended for the addressee named above. It may contain 
> privileged or confidential information. If you are not the intended recipient 
> of this message you must not use, copy, distribute or disclose it to anyone 
> other than the addressee. If you have received this message in error please 
> return the message to the sender by replying to it and then delete the 
> message from your computer.
>  
>  


ACX5448

2020-06-05 Thread JASON BOTHE via NANOG
Hi all

Just curious if anyone on is using the ACX5448 and what their thoughts are on 
it. 

Thanks

J~



IS-IS IPAM platform

2020-04-13 Thread JASON BOTHE via NANOG
Does anyone have any recommendations for a database or IPAM platform that can 
house IS-IS addressing?  Can’t seem to find anything out there. 

Thanks

J~

Re: FCC and FTC Demand Cut-Off Robercallers of Coronavirus Scams

2020-04-03 Thread JASON BOTHE via NANOG
I just need my phone to have a warm transfer button with or without supervision 
to Lenny https://toao.net/595-lenny

> On Apr 3, 2020, at 18:40, Grimes, Greg  wrote:
> 
> 
> I was thinking the EXACT same thing!!
> 
> --
> Greg Grimes
> Senior Network Analyst 
> Information Technology Services 
> Mississippi State University 
> 662-325-9311(w)
> 
> From: NANOG  on behalf of Clayton Zekelman 
> 
> Sent: Friday, April 3, 2020 6:21:43 PM
> To: Sean Donelan ; nanog@nanog.org 
> Subject: Re: FCC and FTC Demand Cut-Off Robercallers of Coronavirus Scams
>  
> 
> Finally, but why did it take a pandemic to get them to do this?
> 
> At 07:14 PM 03/04/2020, Sean Donelan wrote:
> 
> >A sternly worded, finger-wagging press release.
> >
> >
> >https://secure-web.cisco.com/1LWeqrXLGvJdEBzB1uFe8kj9AI4aQYKo58pr0a7HHabjzZjlUFhbYW9sw_3phNW8RRZcfh4T01zhFWJzwlT5koYKFBC0X9DhlUbUeWJCpcaJDWoGiw4jEvVGWiHMyWhb-DgXaHwKqs4DEaqsgXzJvXllUvcmj0hqGdV7dPWOJjhFPMUEnjT8Grl3W7MQ7A5v1nC1W9_K01pTSV8PsbPRjlTzYrA20dcqjx74JJSmlZDRnMsoPxJoZcH2jQ00PAsRaeGGdnA4EE5KwbCYlUu4M0UhYHkKmOkfjSJjZyBfAALCJQveH8qYnTfkSoI5OzVKm1aapZq23qJsbv8OReeHk8w/https%3A%2F%2Fwww.fcc.gov%2Fdocument%2Ffcc-ftc-demand-gateway-providers-cut-covid-19-robocall-scammers
> >
> >[...]
> >The FCC¢s Enforcement Bureau and FTC¢s Bureau of 
> >Consumer Protection wrote to three gateway 
> >providers that are facilitating these scam 
> >COVID-19-related robocalls: SIPJoin of Suffolk, 
> >Virginia; Connexum of Orange, California; and 
> >VoIP Terminator/BLMarketing of Lake Mary, 
> >Florida. The companies have been identified by 
> >the Traceback Group, a consortium of phone 
> >companies that help officials track down suspect 
> >calls, managed by the trade association 
> >USTelecom. The Commissions also wrote to 
> >USTelecom to ask its members to begin blocking
> >calls from these providers if the flood of 
> >robocalls is  not cut off within 48 hours.
> 
> -- 
> 
> Clayton Zekelman
> Managed Network Systems Inc. (MNSi)
> 3363 Tecumseh Rd. E
> Windsor, Ontario
> N8W 1H4
> 
> tel. 519-985-8410
> fax. 519-985-8409
> 
> 


Re: NTT/AS2914 enabled RPKI OV 'invalid = reject' EBGP policies

2020-03-25 Thread JASON BOTHE via NANOG
Excellent work. I’m curious to know how many of the big ASs are participating 
to date. If you or anyone on the list knows if this is published please let me 
know. 

Thanks

J~

> On Mar 25, 2020, at 21:03, Michel Py  wrote:
> 
> Hi Job,
> 
>> Job Snijders wrote :
>> Exciting news! Today NTT's Global IP Network (AS 2914) enabled RPKI based 
>> BGP Origin Validation on virtually all
>> EBGP sessions, both customer and peering edge. This change positively 
>> impacts the Internet routing system.
> 
> Great, and thanks !
> I do have a question, the same one everyone has on their mind :
> How much whining / angry customers / calls / etc came out of it ?
> 
> 
> Why did you say anything instead of eventually blaming it on the coronavirus 
> ?  :P
> 
> 
> Michel.


Re: DNS Recursive Operators: Please enable QNAME minimization (RFC7816) for the enhanced privacy of your users

2020-03-11 Thread JASON BOTHE via NANOG
The enterprise as well. I’m certain many are blindly unaware as this could have 
negative impacts beyond traditional control. 

J~

> On Mar 11, 2020, at 20:43, Owen DeLong  wrote:
> 
> 
> 
>> On Mar 11, 2020, at 18:31 , Rubens Kuhl  wrote:
>> 
>> 
>> 
>>> On Tue, Mar 10, 2020 at 5:30 PM Owen DeLong  wrote:
>>> For anyone considering enabling DOH, I seriously recommend reviewing Paul 
>>> Vixie’s keynote at SCaLE 18x Saturday morning.
>>> 
>>> https://www.youtube.com/watch?v=artLJOwToVY
>>> 
>>> It contains a great deal of food for thought on a variety of forms of 
>>> giving control over to corporations over things you probably don’t really 
>>> want corporations controlling in your life.
>>> 
>> 
>> Depends on your threat model: ISPs, Big Tech companies, State-level actors, 
>> random hacker at the same Wi-Fi network. The problem with DoH is that 
>> software developer picks the threat model he or she thinks is most relevant, 
>> and applies to all use cases. 
>> 
>> Solution is to ask user what is the user threat model and apply it. DoH/DoT 
>> are not harmful per se, their indiscriminate usage is. 
>> 
>> 
>> Rubens
>> 
> 
> Yes and no…
> 
> DOH isn’t inherently bad, but every implementation of DOH that I am aware of 
> involves depriving the user of choice and/or control and also depriving 
> network operators of the ability to enforce the “my network, my rules” 
> concept.
> 
> While I realize some may argue that this is desirable in some instances, 
> understand that I’m not talking about the ISP level, but even within the 
> home. Parents should be able to enforce DNS policy on their children, for 
> example. DOH allows the average child to generally bypass any such 
> limitations. Worse, most parents are unlikely to even realize that this is 
> the case.
> 
> Owen
> 


NCS-55A1

2020-02-09 Thread Jason Bothe via NANOG
Hi All, Happy NANOG78!

Just curious if anyone knows how the MACSec behaves on the Cisco NCS-55A1, 
specifically the 24Q6H-S variant. I’m curious if you can still use MACSec 
individually on the 6xQSFP+/QSFP28 ports if I break them out as 10G.

Thanks!

J~




Re: China Network Diversity

2020-01-16 Thread JASON BOTHE via NANOG
I’ve had good luck with PCCW operating as my China liaison since we terminate a 
lot of circuits in Hong Kong and Singapore. It’s not cheap I’ll tell ya but 
they can get the info and deliver. 

J~

> On Jan 16, 2020, at 10:21, Gabe Cole  wrote:
> 
> 
> We are trying to design a physically diverse network in China and have been 
> challenged.  All of the major carriers say that they cannot provide us KMZs 
> or similar detailed route information.  Has anyone been able to crack this 
> code?
> 
> G. Gabriel Cole
> RTE Group, Inc.
> Strategic Consulting for Mission Critical Infrastructure
> 56 Woodridge Rd
> Wellesley, MA 02482
> US +1-617-303-8707
> fax +1-781-209-5577
> www.rtegroup.com
> g...@rtegroup.com
> skype:  ggabrielcole
> Twitter:  @DataCenterGuru
> Linked In:  http://www.linkedin.com/in/gabecole
> Blog:  http://datacenterguru.blogspot.com/
> 
> The information contained herein is confidential and proprietary to RTE 
> Group, Inc. It is intended for presentation to and permitted use solely by 
> those person(s) to whom it has been transmitted by RTE Group, Inc. and it is 
> transmitted to such person(s) solely for, conditional upon, and only to the 
> extent necessary for use by such person(s) as part of their business 
> relationship with RTE Group, Inc. or to further their respective 
> evaluation(s) of a potential business relationship with RTE Group, Inc., and 
> no other use, release, or reproduction of this information is permitted.
> 
> Sent via Superhuman
> 


Re: Geo locate change for IP ?

2020-01-08 Thread JASON BOTHE via NANOG
Thanks Patrick for the link. I like that all of them are together for ease of 
reference. Just did a quick scan and all looks well. I guess I’ll dig a little 
further internally. 

Thank you again. 

J~

> On Jan 8, 2020, at 13:00, Patrick Schultz  wrote:
> 
> Hey Jason,
> try the geo database providers first: 
> http://thebrotherswisp.com/index.php/geo-and-vpn/
> 
> -- 
> Patrick
> 
>> Am 08.01.2020 um 18:53 schrieb JASON BOTHE via NANOG:
>> Hi guys
>> 
>> Something odd has happened and I’m not sure how to sort. One of our public 
>> prefixes, 205.174.3.0/24 issued from ARIN has suddenly had its geo changed 
>> and now everyone accessing the internet from it is showing up as a UK IP, 
>> London specifically. We announce this and every other prefix we have out all 
>> of our peers globally and are pretty mystified on how this happened and how 
>> to resolve. Any help is appreciated. 
>> 
>> Thanks
>> 
>> Jason 



Geo locate change for IP ?

2020-01-08 Thread JASON BOTHE via NANOG
Hi guys

Something odd has happened and I’m not sure how to sort. One of our public 
prefixes, 205.174.3.0/24 issued from ARIN has suddenly had its geo changed and 
now everyone accessing the internet from it is showing up as a UK IP, London 
specifically. We announce this and every other prefix we have out all of our 
peers globally and are pretty mystified on how this happened and how to 
resolve. Any help is appreciated. 

Thanks

Jason 


Re: Dallas Dark Fiber

2019-12-17 Thread JASON BOTHE via NANOG
Zayo, Consolidated and Crown Castle are my go-tos. They have the biggest 
footprints in the DFW market. 

J~

> On Dec 17, 2019, at 14:20, Rod Beck  wrote:
> 
> 
> Hi, 
> 
> I want to understand the Dallas dark fiber market. Who are the major players? 
> Who has done recent builds (2010 onward)? Who has 864 strand cables for sale? 
> Who has dense coverage with good manhole access to buildings and utility 
> structures?
> 
> Thanks in advance. 
> 
> Regards, 
> 
> Roderick. 
> 
> Roderick Beck
> VP of Business Development
> United Cable Company
> www.unitedcablecompany.com
> New York City & Budapest
> rod.b...@unitedcablecompany.com
> 36-70-605-5144
> 
> 


Verizon help

2019-10-29 Thread JASON BOTHE via NANOG
Hi all 

Is there anyone on from Verizon that could contact me off list in regards to 
provisioning for 701? Being here at NANOG77 and sorting face to face is a 
bonus. 

Thanks

Jason 





Re: Chicago Equinix IX LAN oddity

2019-10-08 Thread JASON BOTHE via NANOG
Got it, thanks for that. I’ll have to give the big E a call and see how to sort 
this one out.  

J~

> On Oct 8, 2019, at 13:55, James Cornman  wrote:
> 
> 
> There was a subnet expansion/migration there earlier this year (maybe late 
> last year?)
> 
> We have an old and new address on our interface.. The 208.x is the new range 
> (aka bigger)
> 
>  ip address 206.223.119.124/24
>  ip address 208.115.136.124/23
> 
> -James
> 
>> On Tue, Oct 8, 2019 at 2:47 PM JASON BOTHE via NANOG  wrote:
>> Hi all
>> 
>> I realize this might not be the right list but I have a request to peer on 
>> the Chicago Equinix IX to a 206.223.119 IP but we and many others are on the 
>> 208.115.137 network. While I await a response from the peering partner, I’d 
>> curious to know if this is an error, perhaps there was a renumber at one 
>> time or I’m flat out just missing something. 
>> 
>> Cheers!
>> 
>> J~
> 
> 
> -- 
> James Cornman
> jcorn...@atlanticmetro.net
> 212.792.9950
> 
> Atlantic Metro Communications
> 4 Century Drive, Parsippany NJ  07054
> 
> Cloud Hosting • Colocation • Network Connectivity • Managed Services
> Follow us on Twitter: @atlanticmetro • Like us on Facebook
> www.atlanticmetro.net


Chicago Equinix IX LAN oddity

2019-10-08 Thread JASON BOTHE via NANOG
Hi all

I realize this might not be the right list but I have a request to peer on the 
Chicago Equinix IX to a 206.223.119 IP but we and many others are on the 
208.115.137 network. While I await a response from the peering partner, I’d 
curious to know if this is an error, perhaps there was a renumber at one time 
or I’m flat out just missing something. 

Cheers!

J~


Re: Spam due to new ARIN allocation

2019-09-05 Thread JASON BOTHE via NANOG
Oddly enough, I created a Z Org for legacy resources and got hit up on 
linked-in by IPv4 brokers as well as some spam from Cogent. 

Annoying. 

> On Aug 4, 2019, at 09:29, Tim Burke  wrote:
> 
> Done, Sir. Thanks.
> 
> Tim Burke
> t...@burke.us
> 
>> On Sat, Aug 3, 2019, at 10:42 PM, John Curran wrote:
>> Tim -  
>> 
>> When you have moment, could you forward both of those Whois spam messages to 
>> complia...@arin.net ?
>> 
>> Thanks!
>> /John
>> 
>> John Curran
>> President and CEO
>> American Registry for Internet Numbers]
>> 
>> 
>>> On 2 Aug 2019, at 7:32 PM, Tim Burke  wrote:
>>> 
>>> We recently received a new ASN from ARIN - you know what that means... the 
>>> sales vultures come out to play!
>>> 
>>> So far, it has resulted in spam from Cogent (which is, of course, to be 
>>> expected), and now another company called "CapCon Networks" - 
>>> http://www.capconnetworks.com. As far as I am aware, this practice is 
>>> against ARIN's Terms of Use. Is it worth reporting to ARIN, or perhaps it's 
>>> worth creating a List of People To Never Do Business With™, complete with 
>>> these jokers, and other vultures that engage in similar tactics? 
>>> 
>>> Regards,
>>> Tim Burke
>>> t...@burke.us
> 


Re: UK, NL, & Asia LTE Providers for Opengear Console Servers

2019-07-31 Thread JASON BOTHE via NANOG
Are the Opengear boxes good gear? We currently have some boxes with a high 
failure rate and I’ve been on the hunt for something we can leverage globally 
that support LTE. 

J~ 

> On Jul 31, 2019, at 21:19, Mehmet Akcin  wrote:
> 
> Google Fi
> 
>> On Wed, Jul 31, 2019 at 18:35 Ryan Gelobter  wrote:
>> Anyone have recommendations for providers who I can use for LTE on Opengear 
>> console servers in the UK, Netherlands, and Singapore? 1 provider for all 3 
>> countries would be great but I'll take what I can get. Oddly when talking to 
>> Opengear they don't really have any great advice. We use Verizon SIM cards 
>> in the US with static IPs.
>> 
>> Thanks,
>> Ryan
> -- 
> Mehmet
> +1-424-298-1903


Re: Fiber providers - Englewood / Centennial Colorado

2019-07-18 Thread JASON BOTHE via NANOG
Thanks Mike

I hit up crown and they have some segments, just not quite enough. I’ll try 
Windstream and see what I can find. 

Thanks

J~

> On Jul 18, 2019, at 08:57, Mike Hammett  wrote:
> 
> Depending on what you're trying to do, you might find some bits and pieces 
> from Windstream, Crown Castle, UPN, and XO. They're all in that Englewood - 
> Centennial area in different ways with different capabilities.
> 
> 
> 
> -
> Mike Hammett
> Intelligent Computing Solutions
> 
> Midwest Internet Exchange
> 
> The Brothers WISP
> 
> From: "JASON BOTHE via NANOG" 
> To: nanog@nanog.org
> Sent: Wednesday, July 17, 2019 6:10:42 PM
> Subject: Fiber providers - Englewood / Centennial Colorado 
> 
> Hi all 
> 
> Just curious if you know of any fiber providers other than CL or Zayo in the 
> Englewood/Centennial area. Having a really tough time finding routes that 
> avoid the Solarium at Quebec / E Orchard as well as 910 15th St. Seems there 
> are so many single points of failure and collapsed routes that all lead to 
> these two locations to get diverse long haul. 
> 
> Many thanks. 
> 
> J~ 
> 


Fiber providers - Englewood / Centennial Colorado

2019-07-17 Thread JASON BOTHE via NANOG
Hi all 

Just curious if you know of any fiber providers other than CL or Zayo in the 
Englewood/Centennial area. Having a really tough time finding routes that avoid 
the Solarium at Quebec / E Orchard as well as 910 15th St. Seems there are so 
many single points of failure and collapsed routes that all lead to these two 
locations to get diverse long haul. 

Many thanks. 

J~ 


Re: CenturyLink/Level3 feedback

2019-06-05 Thread JASON BOTHE via NANOG
It’s taking over a year to get waves turned up in EU. I’m currently willing to 
wager on what comes up first, them or amazon peering (that’s taking just as 
long). After the merger, we have seen Level3 slide into the CL abyss becoming a 
pain to deal with. Pricing and ordering has been outsourced we’ve been told and 
decisions are no longer at a regional level. Frustrating at best. 

> On Jun 4, 2019, at 09:30, Mehmet Akcin  wrote:
> 
> hi there,
> 
> Just a general high-level question about Centurylink/Level3 post-merger, how 
> is your overall experience with CenturyLink? if you could be sitting with the 
> CEO of the company what is one thing you would ask him to fix?
> 
> please keep it high level and general. i intend to pass these to him and his 
> team in an upcoming meeting.
> 
> Mehmet



Re: Latency between Dallas and west coast

2019-01-31 Thread JASON BOTHE via NANOG
Hi Nathan

My current rtd from DA6 to SV1 is 38ms and from DRT Houston to LA1 is 30ms

Jason 

> On Feb 1, 2019, at 04:40, Nathanael Catangay Cariaga  
> wrote:
> 
> thank you all for the responses.  i guess i would have to discuss this with 
> our provider.
> 
>> On Fri, Feb 1, 2019, 1:39 AM Tom Beecher > NYC to LA is in the high 60ms range, so no, 200ms from Dallas to US west 
>> coast is not expected. 
>> 
>> 
>> 
>> 
>>> On Thu, Jan 31, 2019 at 12:14 PM Mark Tinka  wrote:
>>> 
>>> 
>>> On 31/Jan/19 18:53, Mike Hammett wrote:
>>> 
 It's 180 ms from Dallas to Djibouti, so no, that much latency to the west 
 coast of the US is not normal.
>>> 
>>> Or from Gaborone to Frankfurt, which is some 184ms.
>>> 
>>> Short of long re-route paths or congested, high packet loss links, I'd not 
>>> expect the latency between any 2 points in the U.S. to hit 200ms.
>>> 
>>> Mark.


Re: How to choose a transport(terrestrial/subsea)

2019-01-02 Thread Jason Bothe via NANOG
Correct. Its called a grooming clause and you can most certainly ensure you 
have language in your agreements with the vendor. Restrictions being it needs 
to be for wavelength or an IRU path which is custom anyhow. Also, KMZs or no 
business. Period. 

J~


> On 2, Jan 2019, at 2:14 PM, Tom Beecher  wrote:
> 
> You can mitigate some of that by getting contract language in place that says 
> a carrier must maintain the circuit on the specified and agreed pathway, and 
> if it's later discovered that it has been moved, you don't pay for the 
> circuit from the time it was moved until it is restored. 
> 
> It's a nice bit of leverage to make sure they *DO* pay attention when they 
> regroom to avoid surprises. :) 
> 
> On Wed, Jan 2, 2019 at 12:53 PM Mike Hammett  > wrote:
> It's easier when you use carriers that provide usable network maps on their 
> web site. Less guess work.
> 
> When I got a Windstream wave, I got a PDF that was the device CLLI and port 
> number of each device in the path A - Z. Obviously they could change it 
> without informing me of the new path, but I at least know at order it's 
> different and can ask for details when there are outages or latency changes 
> that indicate a change in path.
> 
> 
> 
> -
> Mike Hammett
> Intelligent Computing Solutions
> http://www.ics-il.com 
> 
> Midwest-IX
> http://www.midwest-ix.com 
> 
> From: "Steve Naslund" mailto:snasl...@medline.com>>
> To: nanog@nanog.org 
> Sent: Wednesday, January 2, 2019 11:33:43 AM
> Subject: RE: How to choose a transport(terrestrial/subsea)
> 
> All true but it is becoming increasingly difficult to determine if a provider 
> is using another providers infrastructure (all are at some level).  For 
> example, in the SIP world there are several national level carriers that are 
> using Level 3s core SIP network and if you were not aware of that you could 
> buy trunks from two of the largest SIP trunk providers in the US and actually 
> be running on the same network.  Carriers are also very often reliant on the 
> ILEC for fiber and last mile access.  Especially in non-metro areas getting 
> diverse last mile access could be impossible or have huge construction costs. 
>  It is pretty complicated to ensure that your carriers are really diverse and 
> much harder to ensure that they stay that way.  I have many examples of 
> carrier grooming their own primary and backup circuits onto the same L1 path 
> and not realize they have done so. 
> 
>  
> Contractual diversity is a great idea that does not work since the carriers 
> do not actually know what each other’s network looks like.  So let’s say that 
> Sprint and CenturyLink choose the same fiber carrier between areas, do you 
> think they would notify each other of that fact?  Do you think the fiber 
> carrier would tell them what another customer’s network looks like?  You can 
> tell Sprint to not use CenturyLink but there is no way to get both of them 
> not to use the same third party.  I suppose you could contractually tell a 
> carrier to avoid xxx cable but I would have little faith that they maintain 
> that over time.  I seriously doubt they review all existing contracts when 
> re-grooming their networks.
> 
>  
> Steven Naslund
> 
> Chicago IL
> 
>  
>  
> >I'm of the opinion that, if you need resiliency, you should order explicitly 
> >diverse circuits from a primary provider and then a secondary circuit from a 
> >second vendor.
> 
> > 
> 
> >Ultimately, If you want contractually-enforced physical diversity then the 
> >best options will be single-vendor solutions: Obviously you also want to 
> >avoid an unknown single-vendor single-point-of-failure, hence the >secondary 
> >provider. Having two vendors is usually a less than optimal solution since 
> >neither has visibility into the others' network to ensure the physical 
> >diversity required for a truly resilient service: what happens if >an 
> >undersea cable is cut, etc?
> 
> > 
> 
> >The cost of such solutions is often unpleasant to justify, mind.
> 
> > 
> 
> >~a
> 
> 



Re: Amazon Peering

2018-11-24 Thread JASON BOTHE via NANOG
This is a note I received on Oct18 when checking on a peering request submitted 
on Aug7.. 

“Apologies for the delays here. We have temporarily frozen IX peering as we 
revise some of our automation processes. I’m hopeful this will be unblocked by 
early November. Thank you for your continued patience.”

> On Nov 24, 2018, at 10:59, Darin Steffl  wrote:
> 
> It seems wasteful for Amazon to connect to an IX but then ignore peering 
> requests for a year.
> 
> They have 40G of connectivity but are unresponsive. I'll try emailing all the 
> other contacts listed in peeringdb.
> 
> Thanks 
> 
>> On Sat, Nov 24, 2018, 10:38 AM Mike Hammett > I've e-mailed my contacts there a couple times on people's behalf. No 
>> response yet.
>> 
>> It seems like a lot of organizations need 1 more person in their peering 
>> departments.
>> 
>> 
>> 
>> -
>> Mike Hammett
>> Intelligent Computing Solutions
>> http://www.ics-il.com
>> 
>> Midwest-IX
>> http://www.midwest-ix.com
>> 
>> From: "Darin Steffl" 
>> To: "North American Network Operators' Group" 
>> Sent: Friday, November 23, 2018 10:21:51 PM
>> Subject: Amazon Peering
>> 
>> Hey all,
>> 
>> Does anyone have a direct contact to get a peering session established with 
>> Amazon at an IX? I sent a peering request Dec 2017 and two more times this 
>> Sept and Nov with no response.
>> 
>> I sent to peer...@amazon.com and received one automated response back so I 
>> know they received my email but nothing since.
>> 
>> 
>> 
>> -- 
>> Darin Steffl
>> Minnesota WiFi
>> www.mnwifi.com
>> 507-634-WiFi
>>  Like us on Facebook
>> 


Re: Zayo vs Coent

2018-11-09 Thread JASON BOTHE via NANOG
If you love yourself and your organization just peer with Zayo and not look 
back. 

> On Nov 9, 2018, at 14:19, Ca By  wrote:
> 
> Zayo will provide you all of the internet
> 
> Cogent will provide you with something that is not all internet, it is 
> missing HE and Google on ipv6. 
> 
>> On Fri, Nov 9, 2018 at 10:53 AM William Herrin  wrote:
>> Zayo is the former above.net. Worked well for me at previous $job.
>> Cogent is Cogent. Refer to the list archives for experiences with
>> Cogent.
>> 
>> Regards,
>> Bill Herrin
>> On Fri, Nov 9, 2018 at 10:19 AM Dovid Bender  wrote:
>> >
>> > Hi,
>> >
>> > We are in a facility where my only options are Cogent or Zayo. We plan on 
>> > getting a 10G connection for a web crawler using v4 only. Looking for 
>> > feedback on either or (keeping the politics out of it).
>> >
>> > TIA.
>> >
>> > Dovid
>> >
>> 
>> 
>> -- 
>> William Herrin  her...@dirtside.com  b...@herrin.us
>> Dirtside Systems . Web: 


Re: NANOG Security Track: Route Security

2018-09-30 Thread JASON BOTHE via NANOG
Agreed, especially if they’re an active member of the organization and doesn’t 
seem to be synonymous with NANOGs Charter.  

Jason 

On Sep 30, 2018, at 22:41, Brian Kantor  wrote:

>> To ensure unimpeded information sharing and discussion, the
>> Security Track will not be broadcast or recorded.
> 
> I fail to understand how making the presentations secret from all
> except those attending in person promotes information sharing.
> Could whoever made this seemingly contradictory decision explain
> the reasoning behind it?
>- Brian
> 


Rogers AS812 help

2018-09-26 Thread JASON BOTHE via NANOG
Hi NOGers

If anyone from Rogers is on, could you please contact me offline? 

Thanks

J~



Re: Massive Price Increase for X-conns at Telehouse Chelsea, NYC

2018-09-17 Thread JASON BOTHE via NANOG
Correct. Behold the ‘active riser’. We started doing this years ago in our R 
network after we were being nickeled and dimes to cross floors between our own 
cages we leased from the same colo. 


> On Sep 17, 2018, at 15:23, Ben Cannon  wrote:
> 
> fs.com has got this ready to go.  Less than that.
> 
>> On Sep 17, 2018, at 12:54 PM, Joe Maimon  wrote:
>> 
>> 
>> 
>> Ethan O'Toole wrote:
 If it’s in an interduct by itself, how much would the square footage per
 month occupied by the average cross connect be worth?
>>> 
>>> These big datacenter companies are REITs. Similar to self-storage units and 
>>> apartment buildings, they exist to extract as much money as possible from 
>>> the users. Nothing more or nothing less. The price relief only comes when 
>>> the market is grossly overbuilt and if there is actual competition.
>>> 
>>>   - Ethan O'Toole
>>> 
>>> 
>> For a positive side effect, xcon pricing should bring greater demand to dwdm 
>> solutions, what would you recommend for an affordable 1u turnkey buy a pair 
>> and get >10<30 1g/10g maybe a couple of 40 even a 100g (and mon/expansion)?
>> 
>> 
>> Joe
> 


Bell Canada IP transit - NID required?

2018-09-08 Thread JASON BOTHE via NANOG


All,

Just curious if anyone uses Bell Canada for IP transit in a colo environment 
and whether or not you were able to obtain a traditional cross-connect without 
having Bell place a managed CPE device in your cage. I can’t seem to find 
anyone intelligent enough to tell my any different other than “it’s never been 
done before” and “we need remote testing capabilities.”

J~

NTT engineer in the wings?

2018-07-15 Thread JASON BOTHE via NANOG


If there is someone listening from NTT engineering, would you kindly write 
back? 

The IP NOC is unable to locate anyone because it’s Sunday so I thought I might 
try here. 

Thanks!

J~



Re: WiFi Technical Book Recommendations

2018-05-15 Thread JASON BOTHE
Not quite a book in the paperback sense but George Stefanick’s site is worth 
having a look at. It’s full of good info. 

www.my80211.com

J~



> On May 15, 2018, at 02:16, Troy Martin  wrote:
> 
> A series of 4 books from CWNP.com offers a vendor neutral perspective on
> of the Wi-Fi protocol and best practices.
> 
> CWNA - “Wi-Fi 101”
> CWSP - Wi-Fi security deep dive
> CWDP - Wi-Fi design best practices 
> CWAP - Wi-Fi protocol analysis deep dive or “the one ring to rule them all”
> 
> Hope this helps!
> 
> Kindest regards,
> 
> --
> Troy Martin
> 
> 
>> On May 15, 2018, at 12:47 AM, Mario Eirea  wrote:
>> 
>> Salutations
>> 
>> Looking for recommendations on books with a deepdive of WiFi infrastructure, 
>> protocol layout, best practices, etc. Hopefully including the newest specs. 
>> Input would be greatly appreciated.
>> 
>> Thanks
>> -ME
>> 
>> Sent from Nine
>> 


Re: Cisco switch recommendations

2018-01-10 Thread JASON BOTHE
They work pretty well as do the new 9300s. They handle ldp nicely as well and 
are a tad bit shallower than the 3850 of that’s of benefit. 

Jason



> On Jan 10, 2018, at 17:06, Jorg Bielak  wrote:
> 
> I’m currently using Cisco WS-4948-10GE switches on some of my sites.
> Since I need more than two 10-Gig ports the Cisco 4948s have reached 
> end-of-life for me. 
> The current Cisco 4948 switches are doing my OSPF and BGP routing, as well as 
> some ACLs and actually work great for us….
> I’m looking to replace the current switches with Cisco 3850-12XS switches 
> (using the IP Services OS).
> Does anyone have experience with the Cisco 3850-12XS switches, in comparison 
> to the WS-4948-10GE switches? Or other recommendations?
> 
> Thanks
> JB


Geolocate data for allocated blocks

2017-12-19 Thread JASON BOTHE


I am seeking assistance in getting nets I’ve allocated (several months ago) to 
an office in another RIR region to properly update its geolocate data. In this 
particular case, I have a net in use in India, but currently reflects Houston 
as its address although the allocation indicates otherwise. Any databases I 
should contact or other info is appreciated.  

Cheers!

Jason 




Re: Private Link between TOR and CHI

2017-10-14 Thread JASON BOTHE
Zayo provides a very reasonable 10G wave service between the two locations. 

J~

Sent from my iPhone

> On Oct 14, 2017, at 14:26, Mike Hammett  wrote:
> 
> I would start with this page: 
> 
> http://www.151frontstreet.com/en_tenantdirectory.htm 
> 
> 
> or whatever datacenter you're in there. Chances are, any carrier listed in 
> 151 Front St. will also be in 350 E. Cermak. 
> 
> 
> 
> 
> - 
> Mike Hammett 
> Intelligent Computing Solutions 
> http://www.ics-il.com 
> 
> Midwest-IX 
> http://www.midwest-ix.com 
> 
> - Original Message -
> 
> From: "Ryan Gard"  
> To: nanog@nanog.org 
> Sent: Wednesday, October 11, 2017 2:04:40 PM 
> Subject: Private Link between TOR and CHI 
> 
> Trying to source some cost effective solutions or vendors that could 
> provide connectivity in this scenario. Essentially I'll be looking to 
> expand presence into Chicago, and as such, will need to source a third 
> party to provide connectivity from 151 Front Street in Toronto to 350 
> Cermak in Chicago. Specifically, we're looking to build a presence in 
> Chicago to pursue peering agreements with other providers at 350 Cermak. 
> 
> If you're aware of any providers that would be able to provide this 
> connectivity, that would be perfect. 
> 
> Thanks! 
> 
> -- 
> Ryan Gard 
> 


Re: IOS new versions and network load

2017-09-17 Thread JASON BOTHE
My best experience with Apple has been directly peering with them. Definitely 
handles the update issue without putting strain on transit links. Apple is very 
well connected.  

https://www.peeringdb.com/net/3554





Sent from my iPhone
> On Sep 17, 2017, at 21:50, Mel Beckman  wrote:
> 
> It is still there. MacMiniColo.
> 
> -mel beckman
> 
>> On Sep 17, 2017, at 7:48 PM, Mel Beckman  wrote:
>> 
>> There used to be a Mac mini "hotel" at Switch networks in Vegas. I think 
>> it's still there.
>> 
>> -mel 
>> 
 On Sep 17, 2017, at 4:44 PM, Jean-Francois Mezei 
  wrote:
 
 On 2017-09-17 19:37, Eduardo Schoedler wrote:
 
 Server is an app now, any MacOS can have it running.
>>> 
>>> But do carriers/ISPs really want to deal with a rack unfriendly Mac Mini
>>> or iMac at a carrier hotel?  If the Server App could run on Linux, or if
>>> OS-X could boot on standard servers, perhaps, it it seems to be a very
>>> bad fit in carrier/enterprise environments.
>>> 
 Implementation will be a little tricky, because you need your
 customers to look a record in your domain.
>>> 
>>> 
>>> I've tried reading some about it.
>>> The cache server app registers with Apple its existence and the IP
>>> address ranges it serves
>>> 
>>> When a client wants to download new IOS version, Apple checked and finds
>>> that the client's IP is served by the caching server whose "local" IP is
>>> a.b.c.d (akaL the inside NAT IP address). Tells client to get version of
>>> software from that IP address.
>>> 
>>> The DNS TXT records are used by the Caching Server to get the list of IP
>>> blocks it can serve.  (not needed in the target small office
>>> environments where everyone is on same subnet and the caching server can
>>> tell the apple serves the one subnet it seves).
>>> 


Re: Last Week's Canadian Fiber Cut

2017-08-15 Thread JASON BOTHE
Interesting enough, we did not lose connectivity to our offices in PEI, so I 
assume there is some diversity from that point in the Bell network.

J~

> On 15, Aug 2017, at 3:37 PM, Rod Beck  wrote:
> 
> Well Hibernia had those routes. I thought it would have been the 360 
> terrestrial cable and Hibernia's underwater cable from Halifax to their 
> Boston landing station.
> 
> 
> 
> From: NANOG  on behalf of Clinton Work 
> 
> Sent: Tuesday, August 15, 2017 10:07 PM
> To: nanog@nanog.org
> Subject: Re: Last Week's Canadian Fiber Cut
> 
> I can't speak for the Bell Aliant network, but I'm only aware of two
> diverse fiber routes out of Halifax, Nova Scotia.   Halifax -> New
> Brunswick -> Quebec City is the Canadian route and Halifax -> Boston is
> the diverse route.
> 
> On Tue, Aug 15, 2017, at 01:52 PM, Jared Mauch wrote:
>> Perhaps some transatlantic fallback?  It looks like the only cable out
>> there is the Greenland one.. guessing that’s not very competitive?  It
>> only gets you to Iceland it seems.
>> 
> 



PCCW contact

2017-07-18 Thread JASON BOTHE

Hey NANOGers, I'm hoping to find a contact for PCCW in Hong Kong to assist with 
a BGP announcement issue. Not having any luck through the front door. 

Thanks!

Jason


Sent from my iPhone

Re: Best practices for telcoflex -48VDC cabling & other power OSI layer 1

2016-07-18 Thread Jason Bothe
I'm happy to help. Feel free to contact me offline. 

Jason Bothe, Manager of Networking
Rice University
o  +1 713 348 5500
m +1 713 703 3552

Sent from mobile

> On Jul 18, 2016, at 11:57, Eric Kuhnke <eric.kuh...@gmail.com> wrote:
> 
> Pretty much this, hoping somebody out there might have developed
> photographic training materials based on the DC cabling & installation
> section of TP76300 with illustrated "Do it like this, don't do this"
> examples. Or would be willing to share photographic examples of their own
> work which is done in an exemplary way.
> 
> 
> 
> 
> On Mon, Jul 18, 2016 at 9:27 AM, Jameson, Daniel <
> daniel.jame...@tdstelecom.com> wrote:
> 
>> ATT TP76300, section 4 goes over installation best practices,  although it
>> doesn't cover Engineering guidelines.  It's adapted from the Telcordia  GR
>> - 1275 standard,  little easier to read.  Is there a specific question
>> you're looking to answer?
>> 
>> -Original Message-
>> From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Naslund, Steve
>> Sent: Monday, July 18, 2016 10:18 AM
>> To: nanog@nanog.org
>> Subject: RE: Best practices for telcoflex -48VDC cabling & other power OSI
>> layer 1
>> 
>> Not sure where to find it exactly but the Bellcore power wiring standard
>> is what is used for central office installations.  I think if you google
>> Bellcore standard you will find what you are looking for.
>> 
>> Steven Naslund
>> Chicago IL
>> 
>> -Original Message-
>> From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Eric Kuhnke
>> Sent: Monday, July 18, 2016 11:12 AM
>> To: nanog@nanog.org
>> Subject: Best practices for telcoflex -48VDC cabling & other power OSI
>> layer 1
>> 
>> Hey all,
>> 
>> 
>> I'm looking for a document or set of photos/presentation on best practices
>> for telcoflex/-48VDC power cabling installation. Labeling, routing,
>> organization and termination, etc. Or a recommendation on a printed book
>> that covers this topic.
>> 
>> Not necessarily fully oldschool "we're going to teach all the technicians
>> how to do the kansas city stitch" stuff, but the sort of thing that's
>> applicable in a modern colo/IP network environment.
> 


Re: -48DC electrical supply

2016-02-18 Thread Jason Bothe
Make sure you get wire rated for 90°C at a minimum.  Telcoflex or cobra wire is 
good. 

Jason Bothe, Manager of Networking
Rice University
o  +1 713 348 5500
m +1 713 703 3552

Sent from mobile

> On Feb 18, 2016, at 14:15, Daniel Corbe <dco...@hammerfiber.com> wrote:
> 
> Where do you guys get your supplies (wire, connectors, tools) for -48VDC 
> stuff?
> 
> 


Re: Cisco ASR9010 vs Juniper MX960

2016-02-18 Thread Jason Bothe
We have run into issues with GRES, and I think its an issue with the RE we 
have.  I don’t actually perform the tasks so it may or may not be as big of an 
issue as I initially stated.



Jason Bothe, Manager of Networking
Rice University
   o   +1 713 348 5500
   m  +1 713 703 3552
  ja...@rice.edu <mailto:a...@rice.edu>
> On 18, Feb 2016, at 7:59 AM, Josh Reynolds <j...@kyneticwifi.com> wrote:
> 
> With GRES, can't you simply set the master RE as backup, apply firmware, then 
> switch back to master and upgrade the backup RE?
> 
> On Feb 18, 2016 7:57 AM, "Jason Bothe" <ja...@rice.edu 
> <mailto:ja...@rice.edu>> wrote:
> We have both and they’re both great boxes, however it’s sort of embarrassing 
> that the ASR9k still can’t do virtualized routing, ie. logical-systems.  Not 
> sure if thats a deal breaker for you but just thought you’d like to beware.  
> We also find OS configurations on the Juniper much easier than the cumbersome 
>  XR OS that the Cisco runs.  The 9k does however get a huge win with the 
> ability to apply a ‘pie’ or software patch while staying in service vs 
> requiring a reload.   Either way, I don’t think you’ll go wrong.
> 
> 
> J~
> 
> 
> Jason Bothe, Manager of Networking
> Rice University
>o   +1 713 348 5500 
> <tel:%2B1%20713%20348%205500>
>m  +1 713 703 3552 
> <tel:%2B1%20713%20703%203552>
>   ja...@rice.edu <mailto:ja...@rice.edu> 
> <mailto:a...@rice.edu <mailto:a...@rice.edu>>
> > On 18, Feb 2016, at 7:45 AM, Colton Conor <colton.co...@gmail.com 
> > <mailto:colton.co...@gmail.com>> wrote:
> >
> > I would like opinions of the differences between these two platforms if
> > possible.
> >
> > I was going to buy a used Juniper MX960 Router MX960-PREMIUM2-AC-ECM with
> > 2 x RE-S-1800X4-16G  and 3 x SCBE-MX-S. Then I was going to load this up
> > with a couple of older DPCE-R-4XGE-XFP 4x10GE DPC Enhanced cards.
> >
> > Now Cisco has offered me a new ASR9010 with dual ASR9K Route Switch
> > Processor with 440G/slot Fabric and 6GB, and two 4X10GE / 16X1G Combo
> > Linecard, Packet Transport Optimized for about the same price as the used
> > Juniper. The only catch is the Cisco's support and warranty looks
> > very expensive per year, but that's hard to compare since a used Juniper
> > has zero support and warranty included.
> >
> >
> > If these were both brand new with support and warranty which would you
> > choose? If it were the used Juniper vs new Cisco which would you choose?
> >
> > I know Juniper makes newer MIC cards that probably better compete with
> > these Cisco cards, but that is not option due to price.
> >
> > New, Juniper wants to sell me a MX104 for the same price that I can get
> > this Cisco ASR9010. I think that is a no brainer to go with the ASR at that
> > point. I asked for new pricing on a MX240/480/960, but that was not even
> > close to the ASR9010 numbers.
> >
> > I can also buy two ASR 9001's for the same price and as the single ASR9010.
> >
> 



Re: Cisco ASR9010 vs Juniper MX960

2016-02-18 Thread Jason Bothe
We have both and they’re both great boxes, however it’s sort of embarrassing 
that the ASR9k still can’t do virtualized routing, ie. logical-systems.  Not 
sure if thats a deal breaker for you but just thought you’d like to beware.  We 
also find OS configurations on the Juniper much easier than the cumbersome  XR 
OS that the Cisco runs.  The 9k does however get a huge win with the ability to 
apply a ‘pie’ or software patch while staying in service vs requiring a reload. 
  Either way, I don’t think you’ll go wrong.


J~


Jason Bothe, Manager of Networking
Rice University
   o   +1 713 348 5500
   m  +1 713 703 3552
  ja...@rice.edu <mailto:a...@rice.edu>
> On 18, Feb 2016, at 7:45 AM, Colton Conor <colton.co...@gmail.com> wrote:
> 
> I would like opinions of the differences between these two platforms if
> possible.
> 
> I was going to buy a used Juniper MX960 Router MX960-PREMIUM2-AC-ECM with
> 2 x RE-S-1800X4-16G  and 3 x SCBE-MX-S. Then I was going to load this up
> with a couple of older DPCE-R-4XGE-XFP 4x10GE DPC Enhanced cards.
> 
> Now Cisco has offered me a new ASR9010 with dual ASR9K Route Switch
> Processor with 440G/slot Fabric and 6GB, and two 4X10GE / 16X1G Combo
> Linecard, Packet Transport Optimized for about the same price as the used
> Juniper. The only catch is the Cisco's support and warranty looks
> very expensive per year, but that's hard to compare since a used Juniper
> has zero support and warranty included.
> 
> 
> If these were both brand new with support and warranty which would you
> choose? If it were the used Juniper vs new Cisco which would you choose?
> 
> I know Juniper makes newer MIC cards that probably better compete with
> these Cisco cards, but that is not option due to price.
> 
> New, Juniper wants to sell me a MX104 for the same price that I can get
> this Cisco ASR9010. I think that is a no brainer to go with the ASR at that
> point. I asked for new pricing on a MX240/480/960, but that was not even
> close to the ASR9010 numbers.
> 
> I can also buy two ASR 9001's for the same price and as the single ASR9010.
> 



Re: Windows 10 Release

2015-07-28 Thread Jason Bothe
We have heard they will be available via 8075. 

Jason Bothe, Manager of Networking
Rice University

o   +1 713 348 5500
m  +1 713 703 3552
ja...@rice.edu

 On Jul 28, 2015, at 19:09, Erik Sundberg esundb...@nitelusa.com wrote:
 
 Does anyone know if Microsoft will be hosting the downloads from there ASN 
 8075 or from an CDN Provider like Akamai?
 
 
 
 -Original Message-
 From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Curtis Maurand
 Sent: Tuesday, July 28, 2015 6:43 PM
 To: Niels Bakker niels=na...@bakker.net; nanog@nanog.org
 Subject: Re: Windows 10 Release
 
 Microsoft tells me 3.2 GB for win 10 pro 64 bit.
 
 On July 28, 2015 6:04:04 PM EDT, Niels Bakker niels=na...@bakker.net wrote:
 * n...@flhsi.com (Nick Olsen) [Tue 28 Jul 2015, 22:46 CEST]:
 Being a 3-4GB download. Each device is moving more data than any Apple
 
 update ever did.
 
 I'm not so sure of that.  The 10.9 install image clocked in at 4.9 GB,
 and the Mac App Store for 10.10 Yosemite says Size: 5.67 GB;
 http://www.microsoft.com/en-us/windows/features says 3GB download
 required in the small print at the bottom.
 
 
  -- Niels.
 
 --
 Sent from my Android device with K-9 Mail. Please excuse my brevity.
 
 
 
 CONFIDENTIALITY NOTICE: This e-mail transmission, and any documents, files or 
 previous e-mail messages attached to it may contain confidential information 
 that is legally privileged. If you are not the intended recipient, or a 
 person responsible for delivering it to the intended recipient, you are 
 hereby notified that any disclosure, copying, distribution or use of any of 
 the information contained in or attached to this transmission is STRICTLY 
 PROHIBITED. If you have received this transmission in error please notify the 
 sender immediately by replying to this e-mail. You must destroy the original 
 transmission and its attachments without reading or saving in any manner. 
 Thank you.


PeeringDB Admin

2015-06-01 Thread Jason Bothe
Could I please have a PeeringDB admin contact me off-list ?

Thanks!

Jason Bothe, Manager of Networking
Rice University
   o   +1 713 348 5500
   m  +1 713 703 3552
  ja...@rice.edu






Re: PeeringDB Admin

2015-06-01 Thread Jason Bothe
It’s working now, thanks!!  :D


Jason Bothe, Manager of Networking

   o   +1 713 348 5500
   m  +1 713 703 3552
  ja...@rice.edu




 On 1, Jun 2015, at 5:00 PM, Job Snijders j...@instituut.net wrote:
 
 On Mon, Jun 01, 2015 at 04:47:49PM -0500, Jason Bothe wrote:
 Could I please have a PeeringDB admin contact me off-list ?
 
 Done!
 
 Kind regards,
 
 Job
 



Re: (network)technologies used by NSA for data collection

2015-03-21 Thread Jason Bothe
They're Narus (Boeing now) STA 6400s most likely. They've been using these for 
a few years now. 

Jason Bothe, Manager of Networking
Rice University

o   +1 713 348 5500
m  +1 713 703 3552
ja...@rice.edu

 On Mar 21, 2015, at 21:05, Martin T m4rtn...@gmail.com wrote:
 
 Hi,
 
 I watched Citizenfour(imdb.com/title/tt4044364/) documentary and at
 41:12 Edward Snowden gives a brief overview of some of the leaked
 documents to journalists Glenn Greenwald and Ewen MacAskill. At 42:57
 Snowden mentions devices which are able to collect data at rate of
 1Tbps. This was in 2011. Screen-shots from the movie can be seen here:
 https://nsa.gov1.info/dni/2014/tumult.jpg Third slide looks like some
 sort of vendor product roadmap :)
 Just out of curiosity, what kind of equipment those might be? Is it
 realistic that NSA/DoD are able to produce their own hardware? Let
 alone custom silicon like Cisco or Juniper are. Or do they use off the
 self hardware.. In addition, it's relatively easy to install a passive
 fiber optical tap for a submarine cable, but how do you get
 information out of it? I mean all the different wavelengths(CWDM/DWDM)
 within the same cable, line rates(up to 100GigE), circuit switched and
 packet switched technologies which those devices should support.. In
 addition, how(bandwidth and network wise) to transport this data to
 data analysis and storage equipment if it collected far away from
 USA..
 Some of those questions or thoughts might be naive and stupid, but
 that's what crossed my mind when I watched the documentary. Maybe
 somebody, who has done more research in this field, could clarify.
 
 
 
 thanks,
 Martin
 


Re: (network)technologies used by NSA for data collection

2015-03-21 Thread Jason Bothe
Sorry. I got trigger happy. The STAs can read data Rey efficiently from 
multiple wavelengths or grey light simultaneously. 

Jason Bothe, Manager of Networking
Rice University

o   +1 713 348 5500
m  +1 713 703 3552
ja...@rice.edu

 On Mar 21, 2015, at 21:05, Martin T m4rtn...@gmail.com wrote:
 
 Hi,
 
 I watched Citizenfour(imdb.com/title/tt4044364/) documentary and at
 41:12 Edward Snowden gives a brief overview of some of the leaked
 documents to journalists Glenn Greenwald and Ewen MacAskill. At 42:57
 Snowden mentions devices which are able to collect data at rate of
 1Tbps. This was in 2011. Screen-shots from the movie can be seen here:
 https://nsa.gov1.info/dni/2014/tumult.jpg Third slide looks like some
 sort of vendor product roadmap :)
 Just out of curiosity, what kind of equipment those might be? Is it
 realistic that NSA/DoD are able to produce their own hardware? Let
 alone custom silicon like Cisco or Juniper are. Or do they use off the
 self hardware.. In addition, it's relatively easy to install a passive
 fiber optical tap for a submarine cable, but how do you get
 information out of it? I mean all the different wavelengths(CWDM/DWDM)
 within the same cable, line rates(up to 100GigE), circuit switched and
 packet switched technologies which those devices should support.. In
 addition, how(bandwidth and network wise) to transport this data to
 data analysis and storage equipment if it collected far away from
 USA..
 Some of those questions or thoughts might be naive and stupid, but
 that's what crossed my mind when I watched the documentary. Maybe
 somebody, who has done more research in this field, could clarify.
 
 
 
 thanks,
 Martin
 


Re: Juniper MX Sizing

2014-12-05 Thread Jason Bothe
Graham,

We use both the MX240 and MX480 (for 100G) 1800REs.  Very happy with this 
hardware.

Jason Bothe, Manager of Networking

   o   +1 713 348 5500
   m  +1 713 703 3552
  ja...@rice.edu




On 5, Dec 2014, at 10:59 AM, Graham Johnston johnst...@westmancom.com wrote:

 I am wondering if anyone can provide their real world experience about sizing 
 Juniper MX routers as it relates to BGP.  I am needing a device that has a 
 mix of layer 2 and 3 features, including MPLS, that will have a very low port 
 count requirement that will primarily be used at a remote POP site to connect 
 to the local IX as well as one or two full route transit providers.  The 
 MX104 has what I need from a physical standpoint and a data plane standpoint, 
 as well as power consumption figures.  My only concern is whether the REs 
 have enough horsepower to churn through the convergence calculations at a 
 rate that operators in this situation would find acceptable.  I realize that 
 'acceptable' is a moving target so I would happily accept feedback from 
 people using them as to how long it takes and their happiness with the 
 product.
 
 For those of you that deem the MX104 unacceptable in this kind of role and 
 moved up to the MX240, what RE did you elect to use?
 
 Thanks,
 Graham Johnston
 Network Planner
 Westman Communications Group
 204.717.2829
 johnst...@westmancom.commailto:johnst...@westmancom.com
 P think green; don't print this email.
 
 



Re: Low-numbered ASes being hijacked? [Re: BGP Update Report]

2014-11-30 Thread Jason Bothe
I’m not new here but the thread caught my eye, as I am one of the lower ASs 
being mentioned.  I guess there isn’t really anything one can do to prevent 
these things other than listening to route servers, etc.  I guess it’s all on 
what the upstream decides to allow-in and re-advertise.

Jason

Jason Bothe, Manager of Networking

   o   +1 713 348 5500
   m  +1 713 703 3552
  ja...@rice.edu




On 30, Nov 2014, at 2:37 PM, Jay Ashworth j...@baylink.com wrote:

 - Original Message -
 From: Joe Provo nanog-p...@rsuc.gweep.net
 
 On Mon, Dec 01, 2014 at 12:53:07AM +0900, Paul S. wrote:
 Do these people never check what exactly they end up originating
 outbound due to a config change, if that's really the case?
 
 Of course not because their neighbors are allowing it to
 pass; so as with all hijacks, deaggregation, and other
 unfiltered noise, the only care is traffic going in and
 out. QA (let alone automated sanity checks) are alien
 concepts to many, and well it works is the answer from
 some when contacted.
 
 That's sort of the BGP equivalent to BCP38 filtering, isn't it?
 
 Cheers,
 -- jra
 -- 
 Jay R. Ashworth  Baylink   
 j...@baylink.com
 Designer The Things I Think   RFC 2100
 Ashworth  Associates   http://www.bcp38.info  2000 Land Rover DII
 St Petersburg FL USA  BCP38: Ask For It By Name!   +1 727 647 1274
 



Re: Multi-homing with multiple ASNs

2014-11-23 Thread Jason Bothe
Agreed.  You could still recieve their routes and no/export your as but I 
wouldn't go beyond the firewall.  

Jason Bothe, Manager of Networking
Rice University

o   +1 713 348 5500
m  +1 713 703 3552
ja...@rice.edu

 On Nov 23, 2014, at 17:57, William Herrin b...@herrin.us wrote:
 
 On Fri, Nov 21, 2014 at 9:49 AM, Curtis L. Parish curtis.par...@mtsu.edu
 wrote:
 We advertise our ASN into the state network with more specific routes
 that we advertise via ISP2 via our ASN.This is done because the
 state (vendor managed) network runs stateful firewalls and we have
 to force other multi-home entities on the state network to use our
 state connection instead of ISP2.   Our network has been removed
 from the state firewall due to previous problems with asymmetric
 routing with our I2 circuit.
 
 Hi Curtis,
 
 As you've already noted, the presence of a stateful firewall beyond your
 BGP border is inimical to BGP multihoming. Traffic between two multihomed
 networks must never cross a stateful firewall that is outside both
 networks' borders. Practically speaking, there will asymmetry, path
 flapping, per-packet load balancing and other quirks at locations outside
 your control. The Internet DFZ is a chaotic system. Over time you won't be
 able to make the packets reliably transit the firewall.
 
 It sounds like this is a learning experience for both you and the folks at
 the state network. If you have a friendly relationship with them, now would
 be a good time to visit and talk about what are likely to be significant
 changes to their network architecture to make multihomed users feasible.
 Preferably with a the help of a local consultant who has BGP expertise.
 
 If that doesn't sound like it would be a productive conversation then I
 suggest you consider three different options:
 
 1. Return to the state network alone,
 
 2. Replace your state network connection with another commercial ISP,
 
 3. Add an additional commercial ISP for the sake of your Internet access
 needs, drop the BGP advertisements with the state network and then
 implement resources which should only transit the state network using IP
 addresses assigned by the state network rather than your BGP addresses.
 
 
 
 Here is a question.   I know that having one network advertised by
 multiple ASNs
 is unconventional and thus it will probably be harder to get help
 troubleshooting
 routing problems when they arise.Do you see a situation where our
 network
 might be caught in a loop or black hole due to asymmetric routing and
 conflicting advertisements?
 
 Yes. And frequently. You have this thing balanced on the head of a pin.
 
 Regards,
 Bill Herrin
 
 
 
 
 --
 William Herrin  her...@dirtside.com  b...@herrin.us
 Owner, Dirtside Systems . Web: http://www.dirtside.com/
 May I solve your unusual networking challenges?