> I am sorry, their NOC is located in Belgium.
Well, there is operational staff all across Europe. If that is enough to
keep the network up - I don't know. There are other issue playing in as
well on what can be kept up. Notice that the message sent out is that the
volunteer NOC will shutd
I am sorry, their NOC is located in Belgium.
Thank you.
Ryouichi Yatabe
On Fri, 14 Jun 2002 07:52:44 +0200
Kurt Erik Lindqvist <[EMAIL PROTECTED]> wrote:
>
>
> > I heard that NOC of KPQWEST in Frankfurt would cease operation at 1400
> > hour (local time) today.
> >
>
>
> There has never b
> I heard that NOC of KPQWEST in Frankfurt would cease operation at 1400
> hour (local time) today.
>
There has never been a KQ NOC in Frankfurt.
- kurtis -
## On 2002-06-14 04:08 +0100 Chrisy Luke typed:
CL>
CL> ?$BLpEDIt?(B wrote (on Jun 14):
CL> > I heard that NOC of KPQWEST in Frankfurt would cease operation at 1400
CL> > hour (local time) today.
CL> >
CL> > Is there any additional information about this?
CL>
CL> http://live.ebone.com/ is proba
?$BLpEDIt?(B wrote (on Jun 14):
> I heard that NOC of KPQWEST in Frankfurt would cease operation at 1400
> hour (local time) today.
>
> Is there any additional information about this?
http://live.ebone.com/ is probably about as much info as you can get unless
you know someone there. Ebone is pa
Hi All:
I heard that NOC of KPQWEST in Frankfurt would cease operation at 1400
hour (local time) today.
Is there any additional information about this?
Thanks
Ryouichi Yatabe
On Thu, 13 Jun 2002, Daniska Tomas wrote:
> mikael: which exact gbic did you use?
The Finisar FTR1619-55.
My experiense is that buying directly from the manufacturer is taking a
chance, it's much cheaper, but you get great variance in quality and you
should really do testing on the gbics, or
Thus spake "Richard A Steenbergen" <[EMAIL PROTECTED]>
> On Thu, Jun 13, 2002 at 02:34:29PM -0500, Stephen Sprunk wrote:
> > The choice of RC4 was unfortunate given the above problem,
> > but the coming switch to AES should fix that.
>
> Most existing wireless APs cannot keep up with 802.11b doin
[EMAIL PROTECTED] ("Daniska Tomas") writes:
> a brief summary of responses up to now:
in response to my earlier reply on this topic, i was also pointed at
http://www.nbase-xyplex.com/products.html
which indeed shows how to do 65Km regen points. pretty cool other stuff too.
On Thu, Jun 13, 2002 at 02:34:29PM -0500, Stephen Sprunk wrote:
>
> WEP's only real failure was the failure to specify keying; vendors (and
> users) with less security experience interpreted this to mean static
> keys were sufficient.
>
> The choice of RC4 was unfortunate given the above problem
Thus spake "Hyska, Jason [JJCUS]" <[EMAIL PROTECTED]>
> I am well aware of the many security vulnerabilities that exist
> on wireless networks as well as the inadequacies of WEP.
WEP's only real failure was the failure to specify keying; vendors (and users)
with less security experience interpre
Title: LEAP Security Vulnerabilities??
If
you're serious enough about security to find 128 WEP inadequate, I would think
you would be doing some sort of VPN or other SSL solution anyway, making WEP
redundant. Or am I missing something?
Best,
-Al
Rowland
-Original Message-From:
Hi,
Is there a network status page for level 3? Their website seems a bit
off today.
Thanks much,
Jane
begin:vcard
n:Pawlukiewicz;Jane
tel;cell:703 517-2591
tel;fax:703 289-5814
tel;work:703 289-5307
x-mozilla-html:FALSE
org:Booz Allen Hamilton;Visit us on the Internet: http://boozallen.com";
### On Wed, 12 Jun 2002 18:37:07 -0400 (EDT), jeffrey arnold
### <[EMAIL PROTECTED]> casually decided to expound upon <[EMAIL PROTECTED]>
### the following thoughts about "Re: What's wrong with provisioning
### tools?":
ja> On Wed, 12 Jun 2002, Stephen Griffin wrote:
ja>
ja> :: I would be reall
Andy,
At a larger ISP, you typically need a couple folks for peering.
- One or more peering coordinators (one is more normal) to interface with
their counterparts. These folks generally need both network engineering and
contract administration tools. If they have one skill set, but not the
othe
Title: LEAP Security Vulnerabilities??
I am well aware of the many security vulnerabilities that exist on wireless networks as well as the inadequacies of WEP. I was curious if anyone has had any experiences with Cisco's LEAP authentication protocol? I have scoured the net for reviews or do
Dwight,
Contact Peter Jansen, ([EMAIL PROTECTED]). He is *clearly* "The Man" when
it comes to peering, and I'm certain that he'd be more than glad to answer
all of your questions.
--
Original Message
From: "Dwight Ernest"<[EMAIL PROTECTED]>
Subject
On Wed, 12 Jun 2002, Stephen Griffin wrote:
> In the referenced message, David Daley said:
>
> > 4) There isn't anything to track non sanctioned changes to the network
> > (i.e.: hacker induced re-configurations)
>
> I would be really surprised if anything other than mom-and-pop shops
> didn't
On Thu, Jun 13, 2002 at 02:38:12AM -0700, Stephen Stuart wrote:
> RAToolkit's peval uses rpsl-p.merit.edu as its source of data, and,
> amusingly, returns data for the macro "AS33," even though the RADB
> seems to have no AS33 aut-num object. Go figure.
peval uses the !gas query to return the pr
Judging from recent events in chapter 11 filings and general BGP
weirdnesses I'd say there was already a game in progress! :)
Steve
On Thu, 13 Jun 2002, James Smith wrote:
> > -Original Message-
> > From: Daniska Tomas [mailto:[EMAIL PROTECTED]]
> > Sent: Thursday, June 13, 2002 10:37
Title: RE: What's wrong with provisioning tools?
> -Original Message-
> From: Daniska Tomas [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, June 13, 2002 10:37 AM
> To: [EMAIL PROTECTED]
> Subject: RE: What's wrong with provisioning tools?
>
> i was more interested in something emulating
bob,
i was more interested in something emulating a vt100 that one could eventually plug to
a console port and chat with the box...
from someone's post sooner in this thread it seemed that someone is using it out
there...
i like the idea of "talking" with the box while let's say driving a car.
Title: Message
by the
way - those speech-synthesis terminals were a just joke or is anyone really
using them? :))
--
Tomas Daniska
systems engineer
Tronet Computer Networks
Plynarenska 5, 829 75 Bratislava,
Slovakia
tel: +421 2 58224111, fax: +421 2
58224199
A transistor protected b
to correct: imcnetworks don't specify, transmode does 3r oeo regeneration
--
Tomas Daniska
systems engineer
Tronet Computer Networks
Plynarenska 5, 829 75 Bratislava, Slovakia
tel: +421 2 58224111, fax: +421 2 58224199
A transistor protected by a fast-acting fuse will protect the fuse by blo
a brief summary of responses up to now:
- there are several vendors making some kind of sx-to-zx gbe converters (they call it
gbe extenders), which gives an equivalent of a device with a zx gbic. these vendors
include jdsu, luxn, extreme etc.
- two companies were found making gbe optical rege
NB: this is neither an endorsement for or against generating policy
from databases.
> Could somebody that has done this comment on how complicated this is to
> set up? What steps were involved?
Taking "this" to mean "filter on policy learned from databases,"
following is a Tcl fragment wrappe
Even with large providers, if you peer with them, you generally know the
peering coordinator by name.
In some cases, you know their assistant by email. :)
Deepak Jain
AiNET
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Andy Dills
Sent: Wednesday, Ju
On Wed, 12 Jun 2002, Daniel Senie wrote:
> I had similar experiences with @Home. Could not get them to pull a record.
> Couldn't even get to someone with enough clue to know what the RADB was,
> for that matter.
>
> Ultimately, whomever ARIN (or other RIR) says owns a netblock has to have
>
28 matches
Mail list logo