RE: Estimated LTE Data Utilization in Failover Scenario

2019-08-01 Thread Kenny Taylor
We did some testing with VZ and Sprint earlier this year.  Sprint provided 
rates around 20-25 mbit down and 2-3 mbit up *if* it was an area with decent 
coverage and the connection was on band 41.  Much lower rates on band 25/26.  
We noticed that their regular unlimited hotspot plans perform well up until the 
50 GB mark.  The evening after we'd hit the 50 GB mark, throttling kicked in 
and pinned the connection down to about 128 kbit, regardless of cellular 
network congestion.  VZ seems to throttle the connections after hitting the 25 
GB mark, but it's gradual and appears to be more deprioritization than shaping.

We tried VZ in a couple of rural areas and quickly discovered that there wasn't 
enough bandwidth to those particular towers.  We could pull 20 mbit down 
regularly around 6:00 am, then by lunch time we'd get less than 1 mbt down.  We 
deployed an ISR router with LTE NIM and a linux box running iperf hourly to do 
that testing.  Don't base your rate estimate on afterhours testing, and I'd 
echo the other comments that the cellular network will get slammed during an 
outage/disaster scenario and will undershoot your estimates.

Worth noting, I can pull 45-60 mbit on my T-Mobile phone all day long.  Does 
anyone have experience using T-Mobile plans for LTE backup?

Kenny

-Original Message-
From: NANOG  On Behalf Of Paul Amaral via NANOG
Sent: Wednesday, July 31, 2019 9:54 AM
To: 'Shaun Dombrosky' ; nanog@nanog.org
Subject: RE: Estimated LTE Data Utilization in Failover Scenario

In my experience with LTE is that it's never enough. We have bank branches with 
20Mbs metro lines and on rare occasion when that circuit drops 4G LTE will 
provide you with 10mbs at best also note that latency is much higher which can 
mess with ipsec/VOIP etc. I don't think you can pick how much bandwidth you 
will get with 4G LTE. From the testing I have done with VZ 4G I get 10mbs down 
and 2/3 up with a -65 RSSI. It's still better to have LTE for a backup then not 
to have it. 

I have used cradlepoint and now switched to cisco ISR . I find the 
crandlepoint to be not as reliable as the cisco ISR. The cradlepoint will get 
extremely hot, go down for no reason and has poor signal compared to the ISR 
 with LTE.  I would stay away from the cradlepoint and find a Cisco LTE 
solution. 

Again like I said a backup of any kind even if not sufficient in bandwidth is 
better than nothing.



Paul

From: NANOG  On Behalf Of Shaun Dombrosky
Sent: Tuesday, July 30, 2019 12:06 PM
To: 'nanog@nanog.org' 
Subject: Estimated LTE Data Utilization in Failover Scenario

Good Morning,

First time NANOG poster, apologies if I breach etiquette.

Does anyone have any first-hand data on how much data a small-medium business 
(SMB) can expect to consume in a failover scenario over a 4G/LTE connection?  
Retail, under 50 head count, using PoS, maybe cloud accounting software, 
general internet activity, 8 hour time period.  Wonder if anyone is using a 
Cradlepoint or SD-WAN solution that could pull a few quick numbers from a 
dashboard for me.  I haven't had much luck in my searches.

Appreciate any info anyone can provide.

Thanks,

Shaun Dombrosky
Data Network Engineer



E: mailto:sdombro...@blackfoot.com
https://nam02.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.blackfoot.com%2Fdata=02%7C01%7Ckenny.taylor%40kccd.edu%7C050595db295d4f2a5a7b08d715e17881%7C52a30add642a46f8a4e2c61db3eb8742%7C0%7C0%7C637001930443436642sdata=tgXlzwo19vLsM%2BfARvbKCoWxFK1o7JRjmUzz84pLQYE%3Dreserved=0
 

Stay connected with Blackfoot:

https://nam02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.facebook.com%2FGoBlackfoot%2F%3Futm_source%3DOutlook%26utm_medium%3DSig%26utm_data=02%7C01%7Ckenny.taylor%40kccd.edu%7C050595db295d4f2a5a7b08d715e17881%7C52a30add642a46f8a4e2c61db3eb8742%7C0%7C0%7C637001930443436642sdata=NDMAwdmN2tJPpXVEP48AN%2FUIay6%2BLWX%2BylH7%2F6mGfFg%3Dreserved=0
name=2017EmpSig_content=Social
https://nam02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fblackfoot-telecommunications-group%2F%3Futm_soudata=02%7C01%7Ckenny.taylor%40kccd.edu%7C050595db295d4f2a5a7b08d715e17881%7C52a30add642a46f8a4e2c61db3eb8742%7C0%7C0%7C637001930443436642sdata=5FjSw1FNGThb8e03fPirzemq6qcSOm352jR%2BDbdkXWE%3Dreserved=0
rce=Outlook_medium=Sig_name=2017EmpSig_content=Social  http://ww 
w.twitter.com/GoBlackfoot/?utm_source=Outlook_medium=Sig_name=2017Em
pSig_content=Social  
https://nam02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.youtube.com%2FBlackfootTelecom%3Futm_sourcedata=02%7C01%7Ckenny.taylor%40kccd.edu%7C050595db295d4f2a5a7b08d715e17881%7C52a30add642a46f8a4e2c61db3eb8742%7C0%7C0%7C637001930443436642sdata=n3m14erZyEBF2Sl6%2BHYzPO5sDGjDnXkHsX0h0hiKSUE%3Dreserved=0
=Outlook_medium=Sig_name=2017EmpSig_content=Social


This e-mail and any files transmitted with it are confidential and are
intended solely for the use of the individual or entity to which they are
addressed.  If you are 

Traffic visibility tools

2019-07-24 Thread Kenny Taylor
Good morning,

I hate to pull away from the 44/8 fire (KJ6BSQ here, and former AMPRnet user), 
but I'd like to get some advice from the community on traffic visibility tools..

We use a pair of appliances called Exinda for traffic shaping and visibility.  
The current appliances are end-of-support and the replacements are hugely 
expensive after GFI acquired Exinda.  Traffic shaping is less of a concern now, 
as circuit speeds have caught up with our users, but visibility is still a big 
need.  Those boxes do two things very well:  1) identification of FQDNs using 
SSL cert inspection on HTTPS traffic and 2) categorization of the traffic (i.e. 
Netflix, Youtube, etc.).  We have Netflow monitoring using PRTG, but seeing 
something like 'ec2-34-214-76-39.us-west-2.compute.amazonaws.com' in Netflow 
logs isn't very useful.

We're looking for something that could sit either inline or hang off a SPAN 
port, handle 5-10 Gbit of traffic, do the SSL cert FQDN identification, and 
preferably group results by site/subnet/category.  What would you guys 
recommend?

Thanks,

Kenny Taylor
WAN Engineer
Kern Community College District



RE: Whats going on at Cogent

2018-10-25 Thread Kenny Taylor
I wasn't familiar with it, so thanks for sharing!  The Google search for 'he 
cogent cake' was entertaining.  Hard to believe that conflict is going on 9+ 
years..

Kenny


-Original Message-
From: NANOG  On Behalf Of Owen DeLong
Sent: Wednesday, October 24, 2018 2:54 PM
To: nanog list 
Subject: Re: Whats going on at Cogent

Mainly I wasn’t expounding because I’m surprised to learn that there’s anyone 
on this list unfamiliar with it.

Didn’t want to bore people.

I tended to speak my mind while I worked for HE, I’m certainly not going to 
stop as a result of no longer working there. ;-)

Owen


> On Oct 24, 2018, at 04:51 , John Peach  wrote:
> 
> On 10/23/2018 08:47 PM, Ross Tajvar wrote:
>> Sorry all. I misread Owen's email. I'm not trying to air his private 
>> business to the list.
> 
> There is no secret - a quick search on the terms HE, Cogent and peering (and 
> possibly cake) will give you the answer. Presumably Owen is not expounding 
> because he used to work for HE.
> 
>> On Tue, Oct 23, 2018, 8:20 PM Brad Knowles > > wrote:
>>On Oct 23, 2018, at 10:32 AM, Ross Tajvar >> wrote:
>> > I am also interested in hearing about this. I think it's relevant
>>to the current thread.
>>Speaking only for myself, there are companies where I have done
>>short-term contracts, and where I am definitely not interested in
>>any further employment opportunities with them.  OTOH, I am totally
>>happy to continue to be a customer of theirs.
>>Further discussion of that sort of thing would not be appropriate
>>here.  If Josh is in the same boat with HE, I totally understand.
>>For the Network Time Foundation (and related projects), I think
>>we've been pretty happy as a customer of HE, but then we're just a
>>small customer of theirs.
>>-- Brad Knowles > >
>>Please forgive any typos.  I'm fighting a failing keyboard on my
>>laptop, in addition to having a broken finger.
> 
> 
> 
> 
> -- 
> John
> PGP Public Key: 412934AC



RE: Oct. 3, 2018 EAS Presidential Alert test

2018-10-03 Thread Kenny Taylor
We received it on T-Mobile and MetroPCS as well.


-Original Message-
From: NANOG  On Behalf Of Andy Ringsmuth
Sent: Wednesday, October 3, 2018 11:53 AM
To: nanog@nanog.org
Subject: Oct. 3, 2018 EAS Presidential Alert test

Did anyone on AT or an iPhone receive the test today? I believe it was 
supposed to happen at 2:18 EDT, followed by one on broadcast radio at 2:20 EDT.

I’m in CDT, so 1:18 and 1:20 p.m. CDT.

Message was heard on my desk radio at 1:21:35 p.m. CDT but as of the sending of 
this at 1:52 p.m. CDT, nothing on phones. I have an office full of AT iPhones 
and not a single one of them alerted.

FEMA says https://www.fema.gov/emergency-alert-test

"Cell towers will broadcast the WEA test for approximately 30 minutes beginning 
at 2:18 p.m. EDT. During this time, WEA compatible cell phones that are 
switched on, within range of an active cell tower, and whose wireless provider 
participates in WEA should be capable of receiving the test message. Some cell 
phones will not receive the test message, and cell phones should only receive 
the message once."

My wife, with a Sprint iPhone, received the test.



Andy Ringsmuth
5609 Harding Drive
Lincoln, NE 68521-5831
(402) 304-0083
a...@andyring.com



RE: overages for power usage

2018-09-21 Thread Kenny Taylor
We would typically order a 20 or 30-amp 208v circuit per rack for a flat fee 
then install a metered PDU to make sure we didn’t overload it.  The flat fee 
per-circuit seems pretty standard in the US.  Using your own metered PDU would 
help predict the usage if you’re being billed by kWH.

Kenny

From: NANOG  On Behalf Of Baldur Norddahl
Sent: Thursday, September 20, 2018 11:34 PM
To: nanog@nanog.org
Subject: Re: overages for power usage

The fuses might match what you ordered. If you go over you might lose power due 
to a blown fuse.

When there is A and B power for redundancy, you need to make sure that one side 
can take the whole load without blowing any fuses. Otherwise you have no 
redundancy.

Regards

Baldur


fre. 21. sep. 2018 04.12 skrev Alan Hannan 
mailto:a...@routingloop.com>>:
What kind of typical overage costs have you seen when a customer/you use more 
than you've committed to?

I'm especially interested in datacenter power situations, where maybe you sign 
up for 5kw or 500kw and use more than that in a given month.  Is it billed at 
the same rate?  Is it billed at a higher rate?  What's the % increase of the 
higher rate versus the regular rate?

Thanks!


RE: OpenDNS CGNAT Issues

2018-09-12 Thread Kenny Taylor
For a truckload of gold, I’m pretty sure most of us would make that work ☺

Kenny

From: NANOG  On Behalf Of Owen 
DeLong
Sent: Tuesday, September 11, 2018 10:04 PM
To: Christopher Morrow 
Cc: nanog list 
Subject: Re: OpenDNS CGNAT Issues




On Sep 11, 2018, at 21:58 , Christopher Morrow 
mailto:morrowc.li...@gmail.com>> wrote:


On Tue, Sep 11, 2018 at 9:06 PM Jerry Cloe 
mailto:je...@jtcloe.net>> wrote:
OpenDNS, or anyone for that matter, should never see 100.64/10 ip's. If they 
do, something is wrong at the source, and OpenDNS wouldn't be able to reply 
anyway (or at least have the reply route back to the user).

maybeopendns peers directly with such an eyeball network? and in that case 
maybe they have an agreement to accept traffic from the 100.64 space?

They’d only be able to do one such agreement per routing environment.

Managing that would be _UGLY_ for the first one and __UGLY__ at scale for 
anything more than one.

It also pretty much eliminates potential for geographic diversity and anycast 
for a provider in a local geography.

Certainly not something I’d choose to do if I were OpenDNS unless someone 
arrived with a very large truck full of gold, diamonds, or other valuable hard 
assets.

Owen