I found I had to do this many years ago on some Cisco routers to get them to
load balance (per packet) across two links. Adding 0.0.0.0/0 routes across
both links just resulted in traffic routing across one link. Broke it into
two /1's per link and it worked perfectly.
On 24 September 2011
On Sunday 25 Sep 2011 04:09:22 Jimmy Hess wrote:
On Sat, Sep 24, 2011 at 8:33 PM, Cameron Byrne cb.li...@gmail.com
wrote:
Just an fyi for anyone who has a marketing person dreaming up a big
nxdomain
redirect business cases, the stats are actually very very poor... it
does
not make much
On Sep 25, 2011, at 3:37 AM, Tom Storey t...@snnap.net wrote:
I found I had to do this many years ago on some Cisco routers to get them to
load balance (per packet) across two links. Adding 0.0.0.0/0 routes across
both links just resulted in traffic routing across one link. Broke it into
two
Having run one of these in the past, when take-downs of CCs was still
semi-useful, my ethos on this is problematic, however, I am as of yet
undecided as to this one. An AS-based reputation system for all sorts of
badness:
http://bgpranking.circl.lu/
In my opinion, third-party security based
On 9/22/11 11:38 , Charles N Wyble wrote:
* On 09/22/2011 05:37 AM, Pierce Lynch wrote:** Andreas Echavez
[mailto:andreas at livejournalinc.com
https://mailman.nanog.org/mailman/listinfo/nanog] originally wrote:**
Ultimately, the network is as reliable as you build it. With** software,
it's
On 25/09/2011 12:39, Alexander Harrowell wrote:
I think a special mention should go to hardware vendors who adopt this
dreadful practice in network equipment. I recently encountered an
enterprise-grade WLAN router from vendor D that has the horrible habit
It is not libellous to associate a
On Sun, Sep 25, 2011 at 10:37 AM, Gadi Evron g...@linuxbox.org wrote:
In my opinion, third-party security based AS-reputation systems will
eventually become de-facto border filtering systems for ISPs, but that day
is still not here, as that is still socially unacceptable in our circles,
and
On Sun, Sep 25, 2011 at 5:37 PM, Nick Hilliard n...@foobar.org wrote:
On 25/09/2011 12:39, Alexander Harrowell wrote:
I think a special mention should go to hardware vendors who adopt this
dreadful practice in network equipment. I recently encountered an
enterprise-grade WLAN router from
On Sep 25, 2011, at 6:31 PM, nanog-requ...@nanog.org wrote:
Message: 9
Date: Sun, 25 Sep 2011 18:37:17 +0300
From: Gadi Evron g...@linuxbox.org
To: nanog@nanog.org
Subject: general badness AS-based reputation system
Message-ID: 4e7f4aad.8020...@linuxbox.org
Content-Type: text/plain;
On Sep 25, 2011, at 9:23 PM, Manish Karir wrote:
On Sep 25, 2011, at 6:31 PM, nanog-requ...@nanog.org wrote:
Message: 9
Date: Sun, 25 Sep 2011 18:37:17 +0300
From: Gadi Evron g...@linuxbox.org
To: nanog@nanog.org
Subject: general badness AS-based reputation system
Message-ID:
On Sep 25, 2011, at 11:31 PM, Tom Vest wrote:
On Sep 25, 2011, at 9:23 PM, Manish Karir wrote:
On Sep 25, 2011, at 6:31 PM, nanog-requ...@nanog.org wrote:
Message: 9
Date: Sun, 25 Sep 2011 18:37:17 +0300
From: Gadi Evron g...@linuxbox.org
To: nanog@nanog.org
Subject: general badness
I would probably limit this to simply identifying rogue prefixes [such as
those prefixes - and there are some - owned entirely by criminal spammers,
botnet CCs etc]
[let us not get into a discussion on listing criteria or what constitutes
criminal spam just now, there's a whole lot of such
12 matches
Mail list logo