, 2008, at 10:28 AM, Gabor Ivanszky wrote:
Hi Wil,
could you give me a pointer how ttcp could be used router to router?
cheers,
Gabor
Wil Schultz wrote:
A couple of tools I use from time to time are iperf and ttcp. I'll
run iperf on some host and either run ttcp to it from a router or
A couple of tools I use from time to time are iperf and ttcp. I'll run
iperf on some host and either run ttcp to it from a router or iperf to
another host. You can also run ttcp router to router.
-wil
On Mar 10, 2008, at 8:51 AM, Joe Shen wrote:
we do not just want to analyze e2e perform
387.4 58.6
14. sjck-dmzdc-gw2-
gig1-1.cisco.com
9
8.6% 5.4 5.4 4.9 6.2 0.3
15. ???
-wil
On Aug 8, 2007, at 11:32 AM, Wil Schultz wrote:
9.
tbr2
9.
tbr2.sffca.ip.att.net
0.0% 6.8 5.5 4.7 6.8 0.4
10.
gbr5.sffca.ip.att.net
I was at 365 today, the folks that worked there had not heard this.
Sounds like a hoax to me since PG&E has already admitted they had
several problems.
-wil
On Jul 24, 2007, at 4:54 PM, joe mcguckin wrote:
I don't know if this is true, but it's more exciting reading than
blaming it on a
Sorry of this is off topic:
So at my workplace we have a fairly fast moving newsletter machine
that people sign up for.
Rules are followed as in: Mail isn't sent unless people request it,
an address is removed upon subscription cancel, and addresses are
removed after the 3rd bounce.
Life
Almost ALL?
Any company, or any person for that matter, that relies on their
Internet connectivity for their lively hood should be multihomed.
-wil
On Mar 16, 2007, at 4:42 PM, Mike Hammett wrote:
Almost ALL providers should be multihomed.
--Mike
-Original Message-
From: [EMAIL
I have a Qwest DS3 that I monitor through an InterNAP link, both in
Northern California, no alerts here!
-Wil
Janet Sullivan wrote:
Anyone seeing Qwest issues in the Western US?
KDE has a "Visio-like" tool called kivio
It was pretty much useless last I looked, but looks like it has some
potential. Think I heard that you would be able to use the visio format
at some point too, probably not yet though.
http://www.koffice.org/kivio/
I've used dia a bit, seems reasonabl
Apparently not, this looks more like it:
Time window: Feb 05 2006 22:56:57 - Feb 07 2006 16:58:10
Flows analysed: 202925 matched: 202925, Bytes read: 10028280
Sys: 0.500s flows/second: 405167.7 Wall: 1.293s flows/second: 156923.1
Just a few more than 11
-Wil
Got my hands on the box today, looks like it is Skype. Below is a
support article from their site:
http://support.skype.com/index.php?_a=knowledgebase&_j=questiondetails&_i=148
Bill Nash wrote:
You may find it far simpler to just ask the person who owns the
sources that those packets are. While this may not be politically
feasible (insert network and privacy policies here), given the amount
of VPN traffic that's encapsulated in UDP, that may be anything. The
proble
Here is another pattern, sourced off of one the destinations:
2006-02-06 10:37:17.3920.000 UDP 10.XX.XX.99:1204 ->
BB.BB.BB.BB:159891 68 1
2006-02-06 10:50:39.4740.000 UDP 10.XX.XX.99:1204 ->
BB.BB.BB.BB:159891 69 1
2006-02-06 11:03:11.2800
After setting up netflow this morning I have a of recurring flow that
seems bothersome to me. I have an internal host (10.X.X.99) that
continually attempts to hit various external hosts (AA, BB, CC, etc...)
on seemingly random ports but always sources port udp.1204. In about 2
hours this host
Thanks for all of the responses!
So the goal is to be able to monitor flows real time as well as
historically, set up triggers when specific criteria is met, and nice
graphs are always a definate plus. Site consists of 4 6509's with a 95th
percentile of about 120MBits, along with about 30 oth
I'm planning to set up NetFlow in my environment within the next few
weeks, so far two suites that look promising to me are "flow-tools" and
"SiLK". Anyone have any input on which would be better to use (or maybe
some other product)?
-Wil
They can be bonded via MLPPP or IMA, as stated previously. Also they can
be load-balanced via EIGRP.
What are you using to test your bandwidth (IPerf is pretty handy)? I'm
kinda assuming that the T1's are point to point, how far apart are the
offices?
-Wil
Matt Bazan wrote:
Can someone sh
The domain in question is a .com
I've spoken with our current registrar and they cannot assist since it
isn't in their database, so I'm dealing with the registrar that the
domain shows at this point. I've asked her to make sure that no changes
would be made until this is resolved, she seemed
Hey all, probably not the best place to ask this but thought that I
would give it a shot.
At my company I manage 30 or so domain names through various registrars,
they existed before I came on board. Today I received an email from a
person claiming ownership of one of our valuable ones, valu
Partially back up, I can resolve everthing here... They tell me that
it's not quite over yet.
-Wil
Wil Schultz wrote:
Well, that would explain it, make me feel better that they took
themselves out as well:
-bash-2.05b$ dig qwest.com
; <<>> DiG 9.3.1 <<>>
Well, that would explain it, make me feel better that they took
themselves out as well:
-bash-2.05b$ dig qwest.com
; <<>> DiG 9.3.1 <<>> qwest.com
;; global options: printcmd
;; connection timed out; no servers could be reached
-Wil
william(at)elan.net wrote:
Apparently they have lost two authoritive servers. ETA is unknown.
-Wil
And here i was expecting .ZIP file from the FBI and CIA telling me that
I need to full out a "survey" :)
-Wil
Martin Hannigan wrote:
Here is some more interesting information. I'm not positive this is
Sober.Z related but it's walking like and talking like a duck.
First I see the below DNS
like it's... Sending SPAM?!?!
This I didn't expect at all, here is a trace from one of the known
infected users:
###
###########
Wil Schultz wrote:
FYI: I've set some traps
e are the only two logs I have at this point. And I don't recall any
other Sober searching for an email server.
-Wil
Wil Schultz wrote:
Wouldn't it be fun if it contained the WMF exploit in some form?
So, I'm planning on using swatch to monitor DNS requests for the known
affec
Wouldn't it be fun if it contained the WMF exploit in some form?
So, I'm planning on using swatch to monitor DNS requests for the known
affected domains. What is everyone else planning to do?
-Wil
26 matches
Mail list logo