Re: DOCSIS 3.0 & PPPoE/L2TP compatibility

2012-08-01 Thread iptech

Hey Michael,

Thanks for the feedback.

From the scenarios below, I think that option 3 would be more feasible, 
i.e BSoD L2VPN, via pw. Our max expected number of sessions would not 
exceed 10k, so probably not an hw limiting issue for us.


For option 4, we cannot accommodate this, as we are moving to ASR1K, 
which does not support PPTP, only L2TP.


I am reading through the DOCSIS L2VPN specification to understand the 
model better.


Thanks,

On 7/31/2012 9:03 PM, Michael Bowe wrote:

Hi iptech

As others have said, early Cisco CMTS could do full bridging and/or PPPoE
termination, but newer gear is typically L3 style only.

For wholesale, the cableco could do one of these :

* L2 solution : Change your customers to configured as DOCSIS BSoD L2VPN,
and deliver you one dot1q VLAN per customer. You can continue to use PPPoE
with this config (sessions landing directly on your LNS). Gotcha: don't know
about Arris, but Cisco caps you at 4K VLANs per chassis which means this
solution doesn't scale all that well.

* L2 solution : Change your customers to be setup as DOCSIS BSoD L2VPN, and
deliver you one MPLS pseudowire per customer. You can continue to use PPPoE
with this config (sessions landing directly on your LNS). Gotcha: don't know
about Arris, but Cisco caps you at 16K pw per chassis which means this
solution only provides moderate scaling. Also you have to somehow terminate
all these pw (which are "xconnect"s in Cisco-speak).

* L3 soution : change your customers to land on a dedicated bundle and VRF.
Apply policy based routing to force-forward all the CPE traffic up a VLAN to
you. If you want to be able to authenticate/count/shape then you probably
need to terminate this traffic as IPoE (Use a dedicated BNG, or maybe you
could try Cisco ISG). Cableco would provide the DHCP for the CM, you would
provide the DHCP for the CPE. CMTS would insert CM MAC as option 82 so you
know which CPE belongs to which CM/customer.

* L3 solution : last option is to do what they proposed. I would probably
still implement this with a dedicated bundle and VRF. But rather than having
to land the sessions as IPoE, you can now have them come in as PPTP. This
allows you to authenticate/count/shape via your LNS.

Hope that helps,
Michael.







Re: Fwd: Re: DOCSIS 3.0 & PPPoE/L2TP compatibility

2012-08-01 Thread iptech

Hi Scott,

Thanks for the feedback,

yes this is how I understand it also, however I find it strange that the 
Cisco platform designated as the future LNS will not accommodate the 
DOCSIS 3.0requirements - not much collaboration. There is no roadmap for 
introcducing PPTP on the ASR1K that I can see, so i will not be holding 
out for one.


I am veering towards using a L2 pw solution, but would be interested to 
hear what you have used in-house yourself to accommodate this change, 
care to share?


Thanks

On 7/31/2012 5:46 PM, Scott Helms wrote:












I've actually run into this specific problem and the issue your running
into is that at no time was PPPoE part of the DOCSIS specification.  It
was supported on several CMTSs  because the Cisco UBR shares much of its
OS with more mainline Cisco routers which support L2TP and a host of
other non-DOCSIS related protocols.  It was also widely supported on
some of the earliest CMTSs which were bridges instead of routers (then
you needed a separate box to be the LNS).  The real problem isn't a
change in DOCSIS version but that they choose a platform that doesn't
share a code base with a general purpose router. This could have been
happenstance or by design, but I can tell you your chances of getting
PPPoE to work at all on that platform (even for the cable operator) are
not high because the box will not operate as a bridge and there is no
(AFAIK) way to relay the PPP discover packets.

The D3 Arris is either a C4 or a C4C:
http://www.arrisi.com/products/product.asp?id=3

On 7/30/2012 8:33 AM, iptech wrote:

Hi,

We are a small ISP and have a setup in place with the local cable
company for terminating their users via L2TP for Internet access.
However they have just announced to us that they are moving to a
DOCSIS 3.0 compliant setup, and this standard no longer supports PPPoE
via L2TP, and can now only offer PPTP for terminating with us.

We have already begun replacing our Cisco 7206VXR LNS devices with
Cisco ASR 1Ks and as you will be aware the older 7206 can do both L2TP
and PPTP, whereas the ASR1k can do only L2TP. I do not have any
experience in the cable arena, but from what I have read in the DOCSIS
standards, each version has maintained backwards compatibility,
therefore I am very surprised our CableCo has claimed they cannot do
PPPoE/L2TP anymore.

The CMTS they are currently using is a Cisco, and now they are moving
to a new ARRIS CMTS. I have not been able to find any information on
this device and what it can do or not. With the ASR1K marked as the
natural upgrade path for LNS functions, therefore I cannot believe
that it is not fully compatible with DOCSIS 3.0.

From what I can tell the only way to accommodate the new CMTS PPTP
connections will be to terminate them on the legacy 7206VXR, which at
the end of the day is a backwards step. I would greatly appreciate if
anyone can give me any pointers and/or suggestions on this matter, so
I can understand it and move it forward.

FYI: The driver for the CMTS upgrades is to offer higher bandwidth
access speeds 15mb-20mb.

Thank you.













Re: Fwd: Re: DOCSIS 3.0 & PPPoE/L2TP compatibility

2012-08-01 Thread Scott Helms
We ended up using something like this to separate out the traffic at 
layer 2 for each ISP:


http://www.cablelabs.com/cablemodem/downloads/specs/CM-SP-L2VPN-I03-061222.pdf

Look at section 5.1.2 Multiple ISP L2VPNs

Basically the modems get DHCP & their config from the cable operator but 
the CPEs get DHCP (and IP connectivity) from the individual ISPs.


On 8/1/2012 10:17 AM, iptech wrote:

Hi Scott,

Thanks for the feedback,

yes this is how I understand it also, however I find it strange that 
the Cisco platform designated as the future LNS will not accommodate 
the DOCSIS 3.0requirements - not much collaboration. There is no 
roadmap for introcducing PPTP on the ASR1K that I can see, so i will 
not be holding out for one.


I am veering towards using a L2 pw solution, but would be interested 
to hear what you have used in-house yourself to accommodate this 
change, care to share?


Thanks

On 7/31/2012 5:46 PM, Scott Helms wrote:












I've actually run into this specific problem and the issue your running
into is that at no time was PPPoE part of the DOCSIS specification.  It
was supported on several CMTSs  because the Cisco UBR shares much of its
OS with more mainline Cisco routers which support L2TP and a host of
other non-DOCSIS related protocols.  It was also widely supported on
some of the earliest CMTSs which were bridges instead of routers (then
you needed a separate box to be the LNS).  The real problem isn't a
change in DOCSIS version but that they choose a platform that doesn't
share a code base with a general purpose router. This could have been
happenstance or by design, but I can tell you your chances of getting
PPPoE to work at all on that platform (even for the cable operator) are
not high because the box will not operate as a bridge and there is no
(AFAIK) way to relay the PPP discover packets.

The D3 Arris is either a C4 or a C4C:
http://www.arrisi.com/products/product.asp?id=3

On 7/30/2012 8:33 AM, iptech wrote:

Hi,

We are a small ISP and have a setup in place with the local cable
company for terminating their users via L2TP for Internet access.
However they have just announced to us that they are moving to a
DOCSIS 3.0 compliant setup, and this standard no longer supports PPPoE
via L2TP, and can now only offer PPTP for terminating with us.

We have already begun replacing our Cisco 7206VXR LNS devices with
Cisco ASR 1Ks and as you will be aware the older 7206 can do both L2TP
and PPTP, whereas the ASR1k can do only L2TP. I do not have any
experience in the cable arena, but from what I have read in the DOCSIS
standards, each version has maintained backwards compatibility,
therefore I am very surprised our CableCo has claimed they cannot do
PPPoE/L2TP anymore.

The CMTS they are currently using is a Cisco, and now they are moving
to a new ARRIS CMTS. I have not been able to find any information on
this device and what it can do or not. With the ASR1K marked as the
natural upgrade path for LNS functions, therefore I cannot believe
that it is not fully compatible with DOCSIS 3.0.

From what I can tell the only way to accommodate the new CMTS PPTP
connections will be to terminate them on the legacy 7206VXR, which at
the end of the day is a backwards step. I would greatly appreciate if
anyone can give me any pointers and/or suggestions on this matter, so
I can understand it and move it forward.

FYI: The driver for the CMTS upgrades is to offer higher bandwidth
access speeds 15mb-20mb.

Thank you.














--
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000

http://twitter.com/kscotthelms





Re: [c-nsp] DOCSIS 3.0 & PPPoE/L2TP compatibility

2012-08-01 Thread iptech

Ray,

Yes PITA indeed.

Our 7200 are G2, but we were still planning on moving away from them.

I presume you guys are staying on the 7200s meantime, to accomodate the 
PPTP requirement?


Thanks,

On 7/31/2012 10:35 PM, Ray Burkholder wrote:

As far as I can tell, and from my conversations with the guys at Cablevision, 
there isn't anything underhanded.  The ARRIS gear simply doesn't do PPPOE 
stuff.  They've looked at various scenarios, and PPTP seems to be the winner.

Their Cisco CMTS gear was EOL'd a long time ago, and I don't think there is/was 
a migration path  for handling recent DOCSIS and speeds.  So they side stepped 
it.  Their ARRIS box is a single chassis with a redundant cards in it.  With 
DOCSIS 3, they get better speeds and stuff out of it.

I havn't seen the numbers, but I gather it will handily handle all the traffic 
for all the ISP's.

It does become a PITA for us as ISP's,  as we have  to convert all our 
subscribers over to PPTP.

What are you doing with your old 7200's?  Are they G2's?

Ray.


-Original Message-
From: cisco-nsp-boun...@puck.nether.net [mailto:cisco-nsp-
boun...@puck.nether.net] On Behalf Of iptech
Sent: Tuesday, July 31, 2012 12:28
To: Brian Mengel
Cc: cisco-...@puck.nether.net
Subject: Re: [c-nsp] DOCSIS 3.0 & PPPoE/L2TP compatibility

Thanks Brian,

I am struggling with this one, as I suspect the cableco are skipping
round a problem with their in house setup, and trying to make me bend to
get it working, which I am reluctant to do, as its a big step backwards
for us.

They are moving from a Cisco CMTS to a Arris, therefore it is highly
possible this will be a new box. What they have told me is that their
CMTS setup will now be L3 as opposed to L2. The reasons behind this are
not clear.

Appreciate any pointers on this one.

Thanks v much.

On 7/31/2012 11:54 AM, Brian Mengel wrote:

We run a mix of Cisco and Arris CMTS in our network and have found
both to share the same feature set (at least for the features we
need).  If there is a problem with L2TP its not going to be the result
of the DOCSIS 3.0 upgrade but rather an issue with the Arris CMTS.  I
would recommend getting a technical contact at Arris from your partner
MSO and explaining your situation to them and seeing what they can
provide as a resolution.  Its possible that the Arris outright doesn't
support L2TP, but I suspect there may be other things going on.

On Sat, Jul 28, 2012 at 6:48 PM, iptech  wrote:

Hi,

No takers?

Would really appreciate some feedback/pointers.

Thank you.


On 7/27/2012 2:57 PM, iptech wrote:

Hi,

We are a small ISP and have a setup in place with the local cable

company

for terminating their users via L2TP for Internet access. However they

have

just announced to us that they are moving to a DOCSIS 3.0 compliant

setup,

and this standard no longer supports PPPoE via L2TP, and can now only

offer

PPTP for terminating with us.

We have already begun replacing our Cisco 7206VXR LNS devices with

Cisco

ASR 1Ks and as you will be aware the older 7206 can do both L2TP and

PPTP,

whereas the ASR1k can do only L2TP.

I do not have any experience in the cable arena, but from what I have

read

in the DOCSIS standards, each version has maintained backwards
compatibility, therefore I am very surprised our CableCo has claimed

they

cannot do PPPoE/L2TP anymore.

The CMTS they are currently using is a Cisco, and now they are moving to

a

new ARRIS CMTS. I have not been able to find any information on this

device

and what it can do or not.

With the ASR1K marked as the natural upgrade path for LNS functions,
therefore I cannot believe that it is not fully compatible with DOCSIS 3.0.

  From what I can tell the only way to accommodate the new CMTS PPTP
connections will be to terminate them on the legacy 7206VXR, which at

the

end of the day is a backwards step.

I would greatly appreciate if anyone can give me any pointers and/or
suggestions on this matter, so I can understand it and move it forward.

FYI: The driver for the CMTS upgrades is to offer higher bandwidth

access

speeds 15mb-20mb.

Thank you.

___
cisco-nsp mailing list  cisco-...@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-...@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-...@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.







Re: [c-nsp] DOCSIS 3.0 & PPPoE/L2TP compatibility

2012-08-01 Thread Scott Helms
I did PPPoE for open access on cable networks starting back in DOCSIS 
1.0 and that (and PPTP for that matter) is a dead end IMO.  Get to 
BSoD/TLS which is a CableLabs (the guys who write and test the DOCSIS 
spec) standard and will be supported on all of the D3 chassis no matter 
if its Arris, Cisco, Motorola, or Casa.


The guys at the cable company could have gone with a Cisco 10k or a 
7225(smaller systems only) and I believe both of those still support 
being a LNS for PPPoE, but again Cisco is really the only one and good 
luck getting any help from their TAC on setting it up.


On 8/1/2012 10:57 AM, iptech wrote:

Ray,

Yes PITA indeed.

Our 7200 are G2, but we were still planning on moving away from them.

I presume you guys are staying on the 7200s meantime, to accomodate 
the PPTP requirement?


Thanks,

On 7/31/2012 10:35 PM, Ray Burkholder wrote:
As far as I can tell, and from my conversations with the guys at 
Cablevision, there isn't anything underhanded.  The ARRIS gear simply 
doesn't do PPPOE stuff. They've looked at various scenarios, and PPTP 
seems to be the winner.


Their Cisco CMTS gear was EOL'd a long time ago, and I don't think 
there is/was a migration path  for handling recent DOCSIS and 
speeds.  So they side stepped it.  Their ARRIS box is a single 
chassis with a redundant cards in it.  With DOCSIS 3, they get better 
speeds and stuff out of it.


I havn't seen the numbers, but I gather it will handily handle all 
the traffic for all the ISP's.


It does become a PITA for us as ISP's,  as we have  to convert all 
our subscribers over to PPTP.


What are you doing with your old 7200's?  Are they G2's?

Ray.


-Original Message-
From: cisco-nsp-boun...@puck.nether.net [mailto:cisco-nsp-
boun...@puck.nether.net] On Behalf Of iptech
Sent: Tuesday, July 31, 2012 12:28
To: Brian Mengel
Cc: cisco-...@puck.nether.net
Subject: Re: [c-nsp] DOCSIS 3.0 & PPPoE/L2TP compatibility

Thanks Brian,

I am struggling with this one, as I suspect the cableco are skipping
round a problem with their in house setup, and trying to make me 
bend to

get it working, which I am reluctant to do, as its a big step backwards
for us.

They are moving from a Cisco CMTS to a Arris, therefore it is highly
possible this will be a new box. What they have told me is that their
CMTS setup will now be L3 as opposed to L2. The reasons behind this are
not clear.

Appreciate any pointers on this one.

Thanks v much.

On 7/31/2012 11:54 AM, Brian Mengel wrote:

We run a mix of Cisco and Arris CMTS in our network and have found
both to share the same feature set (at least for the features we
need).  If there is a problem with L2TP its not going to be the result
of the DOCSIS 3.0 upgrade but rather an issue with the Arris CMTS.  I
would recommend getting a technical contact at Arris from your partner
MSO and explaining your situation to them and seeing what they can
provide as a resolution.  Its possible that the Arris outright doesn't
support L2TP, but I suspect there may be other things going on.

On Sat, Jul 28, 2012 at 6:48 PM, iptech  wrote:

Hi,

No takers?

Would really appreciate some feedback/pointers.

Thank you.


On 7/27/2012 2:57 PM, iptech wrote:

Hi,

We are a small ISP and have a setup in place with the local cable

company
for terminating their users via L2TP for Internet access. However 
they

have

just announced to us that they are moving to a DOCSIS 3.0 compliant

setup,
and this standard no longer supports PPPoE via L2TP, and can now 
only

offer

PPTP for terminating with us.

We have already begun replacing our Cisco 7206VXR LNS devices with

Cisco

ASR 1Ks and as you will be aware the older 7206 can do both L2TP and

PPTP,

whereas the ASR1k can do only L2TP.

I do not have any experience in the cable arena, but from what I 
have

read

in the DOCSIS standards, each version has maintained backwards
compatibility, therefore I am very surprised our CableCo has claimed

they

cannot do PPPoE/L2TP anymore.

The CMTS they are currently using is a Cisco, and now they are 
moving to

a

new ARRIS CMTS. I have not been able to find any information on this

device

and what it can do or not.

With the ASR1K marked as the natural upgrade path for LNS functions,
therefore I cannot believe that it is not fully compatible with 
DOCSIS 3.0.


  From what I can tell the only way to accommodate the new CMTS PPTP
connections will be to terminate them on the legacy 7206VXR, 
which at

the

end of the day is a backwards step.

I would greatly appreciate if anyone can give me any pointers and/or
suggestions on this matter, so I can understand it and move it 
forward.


FYI: The driver for the CMTS upgrades is to offer higher bandwidth

access

speeds 15mb-20mb.

Thank you.

___
cisco-nsp mailing list  cisco-...@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___

UCSF Network Admin??

2012-08-01 Thread Robert Glover
Hello,

Is there anyone with clue from UCSF on-list?  Or if someone knows how to
put me in contact with them, that would be great.

We are not able to query their DNS servers from our network.  We've got
users not able to access anything UCSF due to this.

Thus far, their response has been to manually put DNS entries into our
users hosts file, not actually fix the real issue.

Thanks,
-Robert



Re: UCSF Network Admin??

2012-08-01 Thread Henry Stryker


On 08/01/12 10:51 , Robert Glover wrote:
> We are not able to query their DNS servers from our network.  We've got
> users not able to access anything UCSF due to this.


I am querying them OK.  I am in US AZ.  I am also able to reach
manana.garlic.com.

[hyperion]/usr/local# dig www.ucsf.edu @ucsfns2.ucsf.edu
www.ucsf.edu.   3600IN  A   64.54.132.50
ucsf.edu.   3600IN  NS  ucsfns1.ucsf.edu.
ucsf.edu.   3600IN  NS  adns2.Berkeley.edu.
ucsf.edu.   3600IN  NS  adns1.Berkeley.edu.
ucsf.edu.   3600IN  NS  ucsfns2.ucsf.edu.
adns1.Berkeley.edu. 172800  IN  A   128.32.136.3
adns1.Berkeley.edu. 3600IN  2607:f140::fffe::3
adns2.Berkeley.edu. 172800  IN  A   128.32.136.14
adns2.Berkeley.edu. 3600IN  2607:f140::fffe::e
ucsfns1.ucsf.edu.   3600IN  A   128.218.254.10
ucsfns2.ucsf.edu.   3600IN  A   128.218.254.40
;; Query time: 41 msec
;; SERVER: 128.218.254.40#53(128.218.254.40)
;; WHEN: Wed Aug  1 11:02:46 2012
;; MSG SIZE  rcvd: 270



Re: UCSF Network Admin??

2012-08-01 Thread Grant Ridder
Ditto on that from TWTC in Milwaukee, WI.

# dig www.ucsf.edu @ucsfns2.ucsf.edu

; <<>> DiG 9.8.1-P1 <<>> www.ucsf.edu @ucsfns2.ucsf.edu
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49793
;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 4, ADDITIONAL: 6
;; WARNING: recursion requested but not available

;; QUESTION SECTION:
;www.ucsf.edu.  IN  A

;; ANSWER SECTION:
www.ucsf.edu.   3600IN  A   64.54.132.50

;; AUTHORITY SECTION:
ucsf.edu.   3600IN  NS  adns1.Berkeley.edu.
ucsf.edu.   3600IN  NS  ucsfns2.ucsf.edu.
ucsf.edu.   3600IN  NS  adns2.Berkeley.edu.
ucsf.edu.   3600IN  NS  ucsfns1.ucsf.edu.

;; ADDITIONAL SECTION:
adns1.Berkeley.edu. 172800  IN  A   128.32.136.3
adns1.Berkeley.edu. 3600IN  2607:f140::fffe::3
adns2.Berkeley.edu. 172800  IN  A   128.32.136.14
adns2.Berkeley.edu. 3600IN  2607:f140::fffe::e
ucsfns1.ucsf.edu.   3600IN  A   128.218.254.10
ucsfns2.ucsf.edu.   3600IN  A   128.218.254.40

;; Query time: 63 msec
;; SERVER: 128.218.254.40#53(128.218.254.40)
;; WHEN: Wed Aug  1 13:48:51 2012
;; MSG SIZE  rcvd: 259

On Wed, Aug 1, 2012 at 1:07 PM, Henry Stryker  wrote:

>
>
> On 08/01/12 10:51 , Robert Glover wrote:
> > We are not able to query their DNS servers from our network.  We've got
> > users not able to access anything UCSF due to this.
>
>
> I am querying them OK.  I am in US AZ.  I am also able to reach
> manana.garlic.com.
>
> [hyperion]/usr/local# dig www.ucsf.edu @ucsfns2.ucsf.edu
> www.ucsf.edu.   3600IN  A   64.54.132.50
> ucsf.edu.   3600IN  NS  ucsfns1.ucsf.edu.
> ucsf.edu.   3600IN  NS  adns2.Berkeley.edu.
> ucsf.edu.   3600IN  NS  adns1.Berkeley.edu.
> ucsf.edu.   3600IN  NS  ucsfns2.ucsf.edu.
> adns1.Berkeley.edu. 172800  IN  A   128.32.136.3
> adns1.Berkeley.edu. 3600IN  2607:f140::fffe::3
> adns2.Berkeley.edu. 172800  IN  A   128.32.136.14
> adns2.Berkeley.edu. 3600IN  2607:f140::fffe::e
> ucsfns1.ucsf.edu.   3600IN  A   128.218.254.10
> ucsfns2.ucsf.edu.   3600IN  A   128.218.254.40
> ;; Query time: 41 msec
> ;; SERVER: 128.218.254.40#53(128.218.254.40)
> ;; WHEN: Wed Aug  1 11:02:46 2012
> ;; MSG SIZE  rcvd: 270
>
>


dnsmadeeasy.com

2012-08-01 Thread Matt Ryanczak
Looking for experiences regarding their DNS hosting services. Anyone
have a story to share? Off-list replies would be great.

thanks,

~matt



Re: Fwd: Re: DOCSIS 3.0 & PPPoE/L2TP compatibility

2012-08-01 Thread Brian Mengel
One thing to be mindful of is that BSoD support may not be prevelant
in the installed modem base of your MSO.  Replacing those modems would
be costly for someone.

On Wed, Aug 1, 2012 at 10:17 AM, iptech  wrote:
> Hi Scott,
>
> Thanks for the feedback,
>
> yes this is how I understand it also, however I find it strange that the
> Cisco platform designated as the future LNS will not accommodate the DOCSIS
> 3.0requirements - not much collaboration. There is no roadmap for
> introcducing PPTP on the ASR1K that I can see, so i will not be holding out
> for one.
>
> I am veering towards using a L2 pw solution, but would be interested to hear
> what you have used in-house yourself to accommodate this change, care to
> share?
>
> Thanks
>
>
> On 7/31/2012 5:46 PM, Scott Helms wrote:
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> I've actually run into this specific problem and the issue your running
>> into is that at no time was PPPoE part of the DOCSIS specification.  It
>> was supported on several CMTSs  because the Cisco UBR shares much of its
>> OS with more mainline Cisco routers which support L2TP and a host of
>> other non-DOCSIS related protocols.  It was also widely supported on
>> some of the earliest CMTSs which were bridges instead of routers (then
>> you needed a separate box to be the LNS).  The real problem isn't a
>> change in DOCSIS version but that they choose a platform that doesn't
>> share a code base with a general purpose router. This could have been
>> happenstance or by design, but I can tell you your chances of getting
>> PPPoE to work at all on that platform (even for the cable operator) are
>> not high because the box will not operate as a bridge and there is no
>> (AFAIK) way to relay the PPP discover packets.
>>
>> The D3 Arris is either a C4 or a C4C:
>> http://www.arrisi.com/products/product.asp?id=3
>>
>> On 7/30/2012 8:33 AM, iptech wrote:
>>>
>>> Hi,
>>>
>>> We are a small ISP and have a setup in place with the local cable
>>> company for terminating their users via L2TP for Internet access.
>>> However they have just announced to us that they are moving to a
>>> DOCSIS 3.0 compliant setup, and this standard no longer supports PPPoE
>>> via L2TP, and can now only offer PPTP for terminating with us.
>>>
>>> We have already begun replacing our Cisco 7206VXR LNS devices with
>>> Cisco ASR 1Ks and as you will be aware the older 7206 can do both L2TP
>>> and PPTP, whereas the ASR1k can do only L2TP. I do not have any
>>> experience in the cable arena, but from what I have read in the DOCSIS
>>> standards, each version has maintained backwards compatibility,
>>> therefore I am very surprised our CableCo has claimed they cannot do
>>> PPPoE/L2TP anymore.
>>>
>>> The CMTS they are currently using is a Cisco, and now they are moving
>>> to a new ARRIS CMTS. I have not been able to find any information on
>>> this device and what it can do or not. With the ASR1K marked as the
>>> natural upgrade path for LNS functions, therefore I cannot believe
>>> that it is not fully compatible with DOCSIS 3.0.
>>>
>>> From what I can tell the only way to accommodate the new CMTS PPTP
>>> connections will be to terminate them on the legacy 7206VXR, which at
>>> the end of the day is a backwards step. I would greatly appreciate if
>>> anyone can give me any pointers and/or suggestions on this matter, so
>>> I can understand it and move it forward.
>>>
>>> FYI: The driver for the CMTS upgrades is to offer higher bandwidth
>>> access speeds 15mb-20mb.
>>>
>>> Thank you.
>>>
>>>
>>>
>>>
>>>
>>
>>
>
>



Fyi...

2012-08-01 Thread Robert Mathews (OSIA)

It it is of interest... 

https://www.change.org/petitions/from-educause-higher-ed-wireless-networking-admin-group

All the best.
--
/
* Dr. Robert Mathews, D.Phil.
* Distinguished Senior Research Scholar
* National Security Affairs & U.S Industrial Preparedness
* Office of Scientific Inquiry and Applications
* University of Hawai'i
* E.mail: mathews at hawaii dot edu/


Re: UCSF Network Admin??

2012-08-01 Thread Mark Andrews

In message <50196c8e.60...@garlic.com>, Robert Glover writes:
> Hello,
> 
> Is there anyone with clue from UCSF on-list?  Or if someone knows how to
> put me in contact with them, that would be great.
> 
> We are not able to query their DNS servers from our network.  We've got
> users not able to access anything UCSF due to this.
> 
> Thus far, their response has been to manually put DNS entries into our
> users hosts file, not actually fix the real issue.

Please, please don't misuse "DNS entries".  Host files DO NOT and
NEVER HAVE taken "DNS entries".  The contain hostname/address
mappings but they are not and never bave been DNS entries.

> Thanks,
> -Robert
> 
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org



Re: UCSF Network Admin??

2012-08-01 Thread Robert Glover
On 08/01/2012 10:51 AM, Robert Glover wrote:
> Hello,
> 
> Is there anyone with clue from UCSF on-list?  Or if someone knows how to
> put me in contact with them, that would be great.
> 
> We are not able to query their DNS servers from our network.  We've got
> users not able to access anything UCSF due to this.
> 
> Thus far, their response has been to manually put DNS entries into our
> users hosts file, not actually fix the real issue.
> 
> Thanks,
> -Robert
> 

I should have been a little more forthcoming with information.

We are having issues with getting responses from these servers:

NSMEDCTR1.UCSFMEDICALCENTER.ORG
NSMEDCTR2.UCSFMEDICALCENTER.ORG

Which are authoritative for "ucsfmedctr.org" and "ucsfmedicalcenter.org".

We ARE able to resolve ucsf.edu and things associated with that entity,
just NOT the medical center.

Thanks,
-Robert



cost of misconfigurations

2012-08-01 Thread Murat Yuksel
Hi all,

I am looking for literature on the (monetary) costs of misconfigurations in an 
operational ISP network. Are there any such studies I can benefit from?

In a larger context, are there any thorough studies exploring the cost of 
building and running a large ISP network?

Best,

-Murat

Murat Yuksel
Associate Professor
Graduate Director
Department of Computer Science and Engineering
University of Nevada, Reno
1664 N. Virginia Street, MS 171, Reno, NV 89557.
Phone: +1 (775) 327 2246, Fax: +1 (775) 784 1877
E-mail: yuk...@cse.unr.edu
Web: http://www.cse.unr.edu/~yuksem




Re: cost of misconfigurations

2012-08-01 Thread Diogo Montagner
Hi Murat,

I never saw any literature about this topic. But I think it is not too
difficult to calculate (or estimate).

A misconfiguration will, at least, impact on two points: network
outage and re-work. For the network outage, you have to use the SLAs
to calculate the cost (how much you lost from the customers' revenue)
due to that outage. On the other hand, there is the time efforts spent
to fix the misconfiguration. Under the fix, it could be removing the
misconfig and applying a new one correct. Or just fixing the misconfig
targeting the correct config. This re-work will translate in time, and
time can be translated in money spent.

Regards

On 8/2/12, Murat Yuksel  wrote:
> Hi all,
>
> I am looking for literature on the (monetary) costs of misconfigurations in
> an operational ISP network. Are there any such studies I can benefit from?
>
> In a larger context, are there any thorough studies exploring the cost of
> building and running a large ISP network?
>
> Best,
>
> -Murat
> 
> Murat Yuksel
> Associate Professor
> Graduate Director
> Department of Computer Science and Engineering
> University of Nevada, Reno
> 1664 N. Virginia Street, MS 171, Reno, NV 89557.
> Phone: +1 (775) 327 2246, Fax: +1 (775) 784 1877
> E-mail: yuk...@cse.unr.edu
> Web: http://www.cse.unr.edu/~yuksem
> 
>
>

-- 
Sent from my mobile device

./diogo -montagner
JNCIE-SP 0x41A



Re: cost of misconfigurations

2012-08-01 Thread Darius Jahandarie
On Wed, Aug 1, 2012 at 8:08 PM, Diogo Montagner
 wrote:
> A misconfiguration will, at least, impact on two points: network
> outage and re-work. For the network outage, you have to use the SLAs
> to calculate the cost (how much you lost from the customers' revenue)
> due to that outage. On the other hand, there is the time efforts spent
> to fix the misconfiguration. Under the fix, it could be removing the
> misconfig and applying a new one correct. Or just fixing the misconfig
> targeting the correct config. This re-work will translate in time, and
> time can be translated in money spent.

Isn't the largest cost omitted (or at least glossed over) here?
Namely, lost customers due to the outage. That's why people have SLAs
and rework the network at all -- to avoid that cost.


-- 
Darius Jahandarie



Re: cost of misconfigurations

2012-08-01 Thread Randy Bush
> I am looking for literature on the (monetary) costs of
> misconfigurations in an operational ISP network. Are there any such
> studies I can benefit from?

jgs, who should know, says 42 quatloos

randy



Re: cost of misconfigurations

2012-08-01 Thread Diogo Montagner
Hi Darius,

You are right. The lost of a customer due to those things. However, I
would classify this as an unknown situation (in terms of risk
analisys) because the others I mentioned are possible to calculate and
estimate (they are known). But it is very hard to estimate if a
customer will cancel the contract because 1 or n network outages. In
theory, if the customer SLA is not being met consecutively, there is a
potential probability he will cancel the contract.

Regards

On 8/2/12, Darius Jahandarie  wrote:
> On Wed, Aug 1, 2012 at 8:08 PM, Diogo Montagner
>  wrote:
>> A misconfiguration will, at least, impact on two points: network
>> outage and re-work. For the network outage, you have to use the SLAs
>> to calculate the cost (how much you lost from the customers' revenue)
>> due to that outage. On the other hand, there is the time efforts spent
>> to fix the misconfiguration. Under the fix, it could be removing the
>> misconfig and applying a new one correct. Or just fixing the misconfig
>> targeting the correct config. This re-work will translate in time, and
>> time can be translated in money spent.
>
> Isn't the largest cost omitted (or at least glossed over) here?
> Namely, lost customers due to the outage. That's why people have SLAs
> and rework the network at all -- to avoid that cost.
>
>
> --
> Darius Jahandarie
>

-- 
Sent from my mobile device

./diogo -montagner
JNCIE-SP 0x41A



Re: UCSF Network Admin??

2012-08-01 Thread Henry Stryker


On 08/01/12 16:22 , Robert Glover wrote:
> We are having issues with getting responses from these servers:
> 
> NSMEDCTR1.UCSFMEDICALCENTER.ORG
> NSMEDCTR2.UCSFMEDICALCENTER.ORG
> 
> Which are authoritative for "ucsfmedctr.org" and "ucsfmedicalcenter.org".


Those servers respond to my queries from here in AZ:

# dig www.ucsfmedicalcenter.org @nsmedctr2.ucsfmedicalcenter.org
www.ucsfmedicalcenter.org. 86400 IN CNAME   webmcb06.ucsfmedicalcenter.org.
webmcb06.ucsfmedicalcenter.org. 86400 IN A  64.54.46.99
;; Query time: 41 msec
;; SERVER: 64.54.50.50#53(64.54.50.50)
;; WHEN: Wed Aug  1 17:36:36 2012
;; MSG SIZE  rcvd: 93

# dig www.ucsfmedicalcenter.org @nsmedctr1.ucsfmedicalcenter.org
www.ucsfmedicalcenter.org. 86400 IN CNAME   webmcb06.ucsfmedicalcenter.org.
webmcb06.ucsfmedicalcenter.org. 86400 IN A  64.54.46.99
;; Query time: 54 msec
;; SERVER: 64.54.42.50#53(64.54.42.50)
;; WHEN: Wed Aug  1 17:37:41 2012
;; MSG SIZE  rcvd: 93



Re: UCSF Network Admin??

2012-08-01 Thread Brian Henson
also responds here in Ohio on TW

On Wed, Aug 1, 2012 at 8:44 PM, Henry Stryker  wrote:

>
>
> On 08/01/12 16:22 , Robert Glover wrote:
> > We are having issues with getting responses from these servers:
> >
> > NSMEDCTR1.UCSFMEDICALCENTER.ORG
> > NSMEDCTR2.UCSFMEDICALCENTER.ORG
> >
> > Which are authoritative for "ucsfmedctr.org" and "ucsfmedicalcenter.org
> ".
>
>
> Those servers respond to my queries from here in AZ:
>
> # dig www.ucsfmedicalcenter.org @nsmedctr2.ucsfmedicalcenter.org
> www.ucsfmedicalcenter.org. 86400 IN CNAME
> webmcb06.ucsfmedicalcenter.org.
> webmcb06.ucsfmedicalcenter.org. 86400 IN A  64.54.46.99
> ;; Query time: 41 msec
> ;; SERVER: 64.54.50.50#53(64.54.50.50)
> ;; WHEN: Wed Aug  1 17:36:36 2012
> ;; MSG SIZE  rcvd: 93
>
> # dig www.ucsfmedicalcenter.org @nsmedctr1.ucsfmedicalcenter.org
> www.ucsfmedicalcenter.org. 86400 IN CNAME
> webmcb06.ucsfmedicalcenter.org.
> webmcb06.ucsfmedicalcenter.org. 86400 IN A  64.54.46.99
> ;; Query time: 54 msec
> ;; SERVER: 64.54.42.50#53(64.54.42.50)
> ;; WHEN: Wed Aug  1 17:37:41 2012
> ;; MSG SIZE  rcvd: 93
>
>


Re: cost of misconfigurations

2012-08-01 Thread Jimmy Hess
On 8/1/12, Diogo Montagner  wrote:

I think it's more complicated than that,  the cost of misconfiguration
is almost inseparable
in some cases from the cost of configuration in general.;  not all
misconfigs are equal, so you might want to concentrate on a specific
kind of misconfiguration, or a specific misconfig impact "E.g. an
erroneous filter is applied, causing routes to be accepted from an EGP
peer without restriction". Esp. with misconfigurations that might not
have an immediately discovered impact,  business impact beyond  cost
to discover and resolve may not be apparent,  which depend on details
of themisconfig,  such as how trivial or 'obvious'  the error
should be,  how consistent the problems it causes.

At least if you concetrate on a certain specific type of misconfig and
specific impact,  you can have a basis for comparison  and
approximation,  for just that type though.


The "fix" to some types of misconfigs might sometimes be to update the
design documentation, so the "misconfig" is no longer a
misconfiguration;so then you can start asking about  how you
define "misconfig" in the first place,  and  the costs of  having
erroneous or missing documentation.

Which is hard,  because the "costs" of updating documentation and
finding errors, less than best/optimal practices,  or improvements
possible in configurations, are effected by long term  "costs"  or
loss of efficiencies resulting  from  failing to correct
documentation,  and  failing  to  review and improve  arguably
suboptimal configurations.


  Some misconfigs or  suboptimal configs are discovered by review or
other measures before there is any operational impact.  Some
misconfigs are "safe"  or  "harmless" by coincidence,  but can cause
issues later when the network is expanded farther  according to design
that does not anticipate the misconfig,  so the cost there is
increased risk.

Not all possible misconfigurations of a network cause an outage, some
misconfigurations are actually design errors,  not operator errors;
not all network issues are outages,  some configuration errors are
just things like

 "Some entries in an access-list  that are dead-weight, e.g. can never
be reached, or is not necessary";  and the impact of this error is
wasted memory resources,  or  increased complexity /  more unnecessary
stuff for humans to look at.

(The entry might not have been dead-weight when originally added.)
Correcting the  deadweight  ACL entry situation then is an improvement
in efficiency.

Not all misconfigurations are detected, either,  possibly,  sometimes
even misconfigs that caused issues.

An example of a misconfiguration that would occur frequently in some
kinds of environments and might not break an uptime SLA,  would be
suboptimal performance,   less cost-effectiveness  (E.g. early
upgrade required due to an unrecognized misconfiguration).

Or configuration deadweight utilizing so much memory, that hardware
upgrades become needed.   On some networks, there might not be a
formal SLA, and the end user might not notice or take issue with it.

Loss of fault resilience  (E.g.  failover path won't work);  no SLA is
violated if the
fault tolerance wasn't required by the SLA,  and the configuration
error might go undetected
for years if there was not  regular failover testing performed.

It might be corrected before there is an issue...  then the cost of
"Increased risk" during the period,  in which the misconfig  wasn't
service-effecting   could be quite nebulous.

> I never saw any literature about this topic. But I think it is not too
> difficult to calculate (or estimate).
[snip]
> A misconfiguration will, at least, impact on two points: network
> outage and re-work. For the network outage, you have to use the SLAs
> to calculate the cost (how much you lost from the customers' revenue)
> due to that outage. On the other hand, there is the time efforts spent
> to fix the misconfiguration. Under the fix, it could be removing the
[snip]

--
-JH



Re: cost of misconfigurations

2012-08-01 Thread George Herbert
On Wed, Aug 1, 2012 at 5:32 PM, Diogo Montagner
 wrote:
> Hi Darius,
>
> You are right. The lost of a customer due to those things. However, I
> would classify this as an unknown situation (in terms of risk
> analisys) because the others I mentioned are possible to calculate and
> estimate (they are known). But it is very hard to estimate if a
> customer will cancel the contract because 1 or n network outages. In
> theory, if the customer SLA is not being met consecutively, there is a
> potential probability he will cancel the contract.
>
> Regards

On the end customer side, I've done a bunch of reliability / risk cost
assessments for various customers over the years.  It's never easy.

For an ISP... customers are fairly locked in, but for big networks and
customers, especially multihoming customers, business goes where they
want it.

SLA costs are easy.  Predicting the final financial impact is hard.


-- 
-george william herbert
george.herb...@gmail.com



Re: Update from the NANOG Communications Committee regarding recent off-topic posts

2012-08-01 Thread Scott Noel-Hemming

On 07/30/2012 10:57 AM, Steven Noble wrote:

The fix for this issue is trivial. Every new signup should require a sponsor or 
a deposit of funds into a new member fund. Once a member has made a relevant 
post regarding a NANOG related item their funds are returned.

If someone spams they forfeit the money and it is used to help defray the costs 
of attending NANOG for the 99%.

If the poster has been sponsored by a current member, said member is flogged in 
public at the next meeting.

...runs

Sent from my iPhone

On Jul 30, 2012, at 10:42 AM, "Patrick W. Gilmore"  wrote:


I'm sorry Panashe is upset by this rule.  Interestingly, "Your search - Panashe 
Flack nanog - did not match any documents."  So my guess is that a post from that 
account has not happened before, meaning the post was moderated yet still made it through.

Has anyone done a data mining experiment to see how many posts a month are from 
"new" members?  My guess is it is a trivial percentage.

--
TTFN,
patrick


On Jul 30, 2012, at 13:35 , valdis.kletni...@vt.edu wrote:

On Mon, 30 Jul 2012 21:04:36 +0200, Panashe Flack said:

list for continued activity. And just for reference - have you guys
SEEN the "Linux Kernel Mailing List"? - it gets frequent spam posts
and yet is perfectly able to ignore the spam/irrelevant posts and
continue on its remit.

For those who don't drink from the Linux-Kernel firehose, it averages
1 or 2 spams per day - and anywhere from 500 to 700 postings a day.

As Linus Torvalds said, back when it was averaging 200 a day:

"Note that nobody reads every post in linux-kernel.   In fact, nobody who
expects to have time left over to actually do any real kernel work will
read even half.  Except Alan Cox, but he's actually not human, but about
a thousand gnomes working in under-ground caves in Swansea.  None of the
individual gnomes read all the postings either,  they just work together
really well."

The list managers do an incredible job of stopping spam - but even if
50 or 75 a day got through, they'd just be lost in the noise.   You're skipping
several hundred messages a day, skipping a few more isn't any different.



Would be an iPhone user to suggest such an idea. Thanks for not 
implementing this so us peons can learn a thing or two, too.


--
()  ascii ribbon campaign - against html e-mail
/\  www.asciiribbon.org   - against proprietary attachments




Re: Fyi...

2012-08-01 Thread steve pirk [egrep]
On Wed, Aug 1, 2012 at 12:50 PM, Robert Mathews (OSIA)
wrote:

>
> It it is of interest...
>
>
> https://www.change.org/petitions/from-educause-higher-ed-wireless-networking-admin-group


I was not aware of this limitation. Android and other Chrome devices do not
have issues like these. Wow.

--steve


Re: Fyi...

2012-08-01 Thread Robert Mathews (OSIA)


On 8/1/2012 10:32 PM, steve pirk [egrep] wrote:


> On Wed, Aug 1, 2012 at 12:50 PM, Robert Mathews (OSIA)
> mailto:math...@hawaii.edu>> wrote:
>
>
> It it is of interest...
>
> 
> https://www.change.org/petitions/from-educause-higher-ed-wireless-networking-admin-group
>
>
>
> I was not aware of this limitation. Android and other Chrome devices
> do not have issues like these. Wow.
>
> --steve

If this subject is of interest to you/your organization, you might
consider signing the petition.  Although this started as an academy
based effort, Lee Badman of Syracuse University as originator, welcomes
all parties who appreciates the impact of the problem - to sign on.

All the best
--
/
* Dr. Robert Mathews, D.Phil.
* Distinguished Senior Research Scholar
* National Security Affairs & U.S Industrial Preparedness
* Office of Scientific Inquiry and Applications
* University of Hawai'i
* E.mail: mathews at hawaii dot edu/


Re: cost of misconfigurations

2012-08-01 Thread Simon Knight
Quantifying the business costs would be very complex.

Here are some reports and research papers that may be a starting point:
[1] Juniper Networks, Inc., “What's Behind Network Downtime?,” pp.
1–12, May 2008.
[2] R. Mahajan, D. Wetherall, and T. Anderson, “Understanding BGP
misconfiguration,” Proceedings of the 2002 conference on Applications,
2002.
[3] A. Medem, R. Teixeira, N. Feamster, and M. Meulle, “Joint analysis
of network incidents and intradomain routing changes,” Network and
Service Management (CNSM), 2010 International Conference on, pp.
198–205, 2010.
[4] D. Turner, K. Levchenko, A. C. Snoeren, and S. Savage, “California
fault lines: understanding the causes and impact of network failures,”
presented at the SIGCOMM '10: Proceedings of the ACM SIGCOMM 2010
conference on SIGCOMM, 2010.
[5] Z. Yin, X. Ma, J. Zheng, Y. Zhou, L. N. Bairavasundaram, and S.
Pasupathy, “An empirical study on configuration errors in commercial
and open source systems,” presented at the SOSP '11: Proceedings of
the Twenty-Third ACM Symposium on Operating Systems Principles, 2011.
[6] Z. Kerravala, “As the Value of Enterprise Networks Escalates,
So
Does the Need for Configuration Management
,” cs.princeton.edu, 01-Jan.-2004. [Online]. Available:
https://www.cs.princeton.edu/courses/archive/fall10/cos561/papers/Yankee04.pdf.
[Accessed: 09-May-2012].
[7] W. Enck, P. McDaniel, S. Sen, and P. Sebos, “Configuration
management at massive scale: System design and experience,” USENIX
'07, Jun. 2007.
[8] R. D. Doverspike, K. K. Ramakrishnan, and C. Chase, “Structural
overview of ISP networks,” Guide to Reliable Internet Services and
Applications, pp. 19–93, 2010.


On 2 August 2012 10:46, George Herbert  wrote:
> On Wed, Aug 1, 2012 at 5:32 PM, Diogo Montagner
>  wrote:
>> Hi Darius,
>>
>> You are right. The lost of a customer due to those things. However, I
>> would classify this as an unknown situation (in terms of risk
>> analisys) because the others I mentioned are possible to calculate and
>> estimate (they are known). But it is very hard to estimate if a
>> customer will cancel the contract because 1 or n network outages. In
>> theory, if the customer SLA is not being met consecutively, there is a
>> potential probability he will cancel the contract.
>>
>> Regards
>
> On the end customer side, I've done a bunch of reliability / risk cost
> assessments for various customers over the years.  It's never easy.
>
> For an ISP... customers are fairly locked in, but for big networks and
> customers, especially multihoming customers, business goes where they
> want it.
>
> SLA costs are easy.  Predicting the final financial impact is hard.
>
>
> --
> -george william herbert
> george.herb...@gmail.com
>