Re: [AusNOG] Anyone put their hand up?

2021-06-08 Thread Binh Lam
Senior Network Engineer > ___ > ⇒ New Zealand Office: 0508 387 669/+(64) 4 918 0160 extn 118 > ⇒ Australian Office: 1300 054 331/+(61) 7 5522 9726 extn 118 > ⇒ Website: www.DTSanz.com > > > On 9/06/2021 4:54 pm, Binh Lam wrote: > > All, > >

Re: [AusNOG] Anyone put their hand up?

2021-06-08 Thread Binh Lam
All, For junos.. check the output of "show ddos-protection protocols statistics terse" will give you some hints what happened.. It appears ttl, ndpv6 hit via ix? On Wed, 9 Jun 2021, 2:48 pm Luke Iggleden, wrote: > Hi All, > > I too would like to see what the traffic was that hit our Junipers

Re: [AusNOG] Ausbog presentations

2019-09-29 Thread Binh Lam
e.apnic.net/48/assets/files/APIC778/Hardening-Your-Transit-Network.pdf ** tweet from APNIC: #BGP tips and tricks to stop acquisition of bad #routing outcomes from your transit and #peers: Binh Lam from @NTTICT explores at #apnic48 Technical Session 3. Watch live: youtube.com/watch?v=qEb5Vq

Re: [AusNOG] google potential route hijacked.

2018-11-13 Thread Binh Lam
. https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/ On Tue, Nov 13, 2018 at 3:16 PM Binh Lam wrote: > Dear AusNOG.. > > The latest News about route hijacked, again raises the concerns about > pot

Re: [AusNOG] google potential route hijacked.

2018-11-12 Thread Binh Lam
On Tue, Nov 13, 2018 at 3:34 PM Aftab Siddiqui wrote: > Hi Binh, > Thanks for sharing this. The most likely issue is NO prefix filtering at > China Telecom end. Mainone (AS37282) leaked probably everything they > learned from IXPN (Lagos IXP) Route Server to its direct peer AS4809 (China >

[AusNOG] google potential route hijacked.

2018-11-12 Thread Binh Lam
Dear AusNOG.. The latest News about route hijacked, again raises the concerns about potential route hijacked, it can happen anytime to anyone.. https://www.itnews.com.au/news/route-leak-sends-google-cloud-traffic-to-russia-515489 how to prevent it? looking at the prefix was hijacked... whois