TimeWarner (Spectrum) Voice contact

2018-01-25 Thread Andy Ringsmuth
Anyone have a contact at TimeWarner (aka Spectrum) Voice services that you 
could pass along to me?

MUCH appreciated!



Andy Ringsmuth
a...@newslink.com
News Link – Manager Technology, Travel & Facilities
2201 Winthrop Rd., Lincoln, NE 68502-4158
(402) 475-6397(402) 304-0083 cellular



[NANOG-announce] NANOG 72 agenda update and Hackathon

2018-01-25 Thread Ryan Woolley via NANOG-announce
This message has been wrapped due to the DMARC policy setting to
prevent NANOG subscribers from being unsubscribed due to bounces.
--- Begin Message ---
NANOG Community,

The program committee has updated the NANOG 72 agenda, which is available
at: https://www.cvent.com/d/1tqlzk/16K

In addition to the previously announced programming, we will have a keynote
by Scott Bradner on the history of the internet, John Curran will speak on
ARIN's IRR Roadmap, and we'll have a panel of IETF Area Directors
discussing their ongoing efforts.

Over 500 attendees have registered to date.  Registration is available at:
https://www.cvent.com/d/1tqlzk

Seats are still available for the Hackathon on Sunday; separate
registration is required at: https://www.cvent.com/d/1tqlzk/4K

Regards,

Ryan Woolley
NANOG Program Committee
--- End Message ---
___
NANOG-announce mailing list
nanog-annou...@nanog.org
https://mailman.nanog.org/mailman/listinfo/nanog-announce

Reminer: FCC seeks comments on 2017 hurricane season respons

2018-01-25 Thread Sean Donelan


Just a reminder, the Federal Communications Committee is still collecting 
comments on the 2017 hurricane season.


https://apps.fcc.gov/edocs_public/attachmatch/DA-17-1180A1.pdf

PUBLIC SAFETY AND HOMELAND SECURITY BUREAU SEEKS COMMENT ON
RESPONSE EFFORTS UNDERTAKEN DURING 2017 HURRICANE SEASON
PS Docket No. 17-344
Comments Due: January 22, 2018
Reply Comments Due: February 21, 2018

The Public Safety and Homeland Security Bureau (PSHSB or Bureau) of the 
Federal Communications Commission (FCC or Commission) seeks comment on the 
resiliency of the communications infrastructure, the effectiveness of 
emergency communications, and government and industry responses to the 
2017 hurricane season. 
[...]


evil ipv6 bit?

2018-01-25 Thread Baldur Norddahl

Hello

After some apparently unrelated changes, one of my routers stopped 
routing traffic to a few IPv6 destinations. After a lot of 
experimentation, including rebooting (did not help), I found this:


archive.ubuntu.com: 2001:67c:1360:8001::17

"ping6 vrf internet 2001:67c:1360:8001::17" from the router shell works.

ping6/traceroute from a customer connection has the packet dropped by 
the router. Traceroute gets nothing back at all.


2001:67c:1360:7fff:: is ok. Does not reply to ping because I just made 
up that address. But I get a valid traceroute all the way to the 
destination.
Anything between 2001:67c:1360:8000:: and 
2001:67c:1360::::: is dropped.


My route table looks like this:

albertslund-edge1#show ipv6 forwarding route vrf internet 
2001:67c:1360:8001::17

IPv6 Routing Table:
Headers: Dest: Destination, Gw: Gateway, Pri: Priority;
Codes  : K: kernel, I1: isis-l1, SFN: sf-nat64, R: ripng, AF: aftr, B: bgp,
 D: direct, I2: isis-l2, SLN: sl-nat64, O: ospfv3, D6: dhcp, P: 
ppp,
 S: static, N: nd, V: vrrp, A: address, M: multicast, UI: 
user-ipaddr,

 GW-FWD: PS-BUSI,GW-UE: PS-USER,LDP-A: LDP-AREA, UN: user-network,
 US: user-special;
Dest  OwnerMetric
  Interface   Pri  Gw
2001:67c:1360::/48B 0
  xgei-0/0/0/6200  :::185.24.168.254
::/0  B 0
  xgei-0/0/0/6200  :::185.24.168.254

Notice how this is a /48 route and one bit at the /49 level changes how 
it is routed. That is not right.


I tried adding a /128 static route but that does not do anything. The 
packet is still dropped.


I just now discovered this:

google.com: 2a00:1450:400e:807::200e

That address works fine. But then I changed that one bit in the address: 
2a00:1450:400e:8807::200e and voila, the router drops the packet.


Now I am stumbled. What could the 49th bit in the destination IPv6 
address field in a packet mean to the router, that would make it drop 
the packet?


Some extra information about the network: We are using MPLS with l3vpn 
(vrf) and l2vpn (vpls). The traffic is qinq tagged before being 
transported in a l2vpn towards the router in question. The l2vpn does 
not transport the outer vlan tag. The l2vpn is then terminated on a 
loopback cable. On the other end of that loopback cable we receive the 
traffic as ordinary qinq tagged without MPLS tagging. It is on this 
interface the router apparently drops the packet. It might conceivably 
also drop the packet on the way out of the l2vpn.


I have a similar setup, but instead of a loopback cable, the l2vpn is 
terminated on another MPLS switch, which then connects to a router of 
the same model. This setup does not have the problem.


The change I introduced was changing from an internal interface called 
"bvi" to the loopback cable. The bvi interface is a simulated loopback 
cable construct. We are dropping the bvi interface because it is very 
buggy. We did not have this problem with the bvi interface however.


The hardware is ZTE M6000-S V3.00.20(3.40.1).

Thanks,

Baldur



improving signal to noise ratio from centralized network syslogs

2018-01-25 Thread Joe Maimon

Hey All,

Centralized logging is a good thing. However, what happens is that every 
repetitive, annoying but not (usually) important thing fills up the log 
with reams of what you are not looking for.


Networks are a noisy place and silencing every logged condition is 
impractical and sometimes undesirable.


What I am interested in is an automated zoom-in zoom-out tool to mask 
the repetition of "normal" events and allow the unusual to stand out.


Add to that an ability to identify gaps in the background noise. (The 
dog that didnt bark)


What I am not interested in are solutions based upon preconfigured 
filters and definitions and built in analysis for supported 
(prepopulated definitions) platforms, this is all about pattern 
mining/masking and should be self discoverable. Ideally a command tool 
to generate static versions of the analysis coupled with a web platform 
(with zoom +- buttons)  for realtime.


I made a crude run of it with SLCT, using its generated patterns to grep 
-v, and that in and of itself was useful, but needs a bit of work. Also, 
its not quite real time.


Any ideas would be greatly appreciated.

Joe


Re: improving signal to noise ratio from centralized network syslogs

2018-01-25 Thread Michael Loftis
On Thu, Jan 25, 2018 at 8:11 PM Joe Maimon  wrote:

> Hey All,
>
> Centralized logging is a good thing. However, what happens is that every
> repetitive, annoying but not (usually) important thing fills up the log
> with reams of what you are not looking for.
>
> Networks are a noisy place and silencing every logged condition is
> impractical and sometimes undesirable.
>
> What I am interested in is an automated zoom-in zoom-out tool to mask
> the repetition of "normal" events and allow the unusual to stand out.
>
> Add to that an ability to identify gaps in the background noise. (The
> dog that didnt bark)
>
> What I am not interested in are solutions based upon preconfigured
> filters and definitions and built in analysis for supported
> (prepopulated definitions) platforms, this is all about pattern
> mining/masking and should be self discoverable. Ideally a command tool
> to generate static versions of the analysis coupled with a web platform
> (with zoom +- buttons)  for realtime.
>
> I made a crude run of it with SLCT, using its generated patterns to grep
> -v, and that in and of itself was useful, but needs a bit of work. Also,
> its not quite real time.
>
> Any ideas would be greatly appreciated.


Not cheap, but Splunk comes to mind.

>
>
> Joe
>
-- 

"Genius might be described as a supreme capacity for getting its possessors
into trouble of all kinds."
-- Samuel Butler