Re: Colo Vending Machine

2012-02-17 Thread George Carey

> 
> The vending machine should use a card like an ATM/gift card, not accept cash. 
>  You should be able to "charge" the card with some cash via a web portal and 
> keep the card in the facility in your space.  If something is needed, one can 
> purchase it with the card.  If there is no money on the card, a person can 
> add cash to the card via a web portal somewhere.   Scenario:  remote hands 
> guy arrives on site, needs an SFP, card doesn't have enough money on it, 
> calls me, I can add the cash to the card, he can purchase the SFP and leave 
> the card in the space for the next time it is needed.
> 
> 

Actually pricing should be 8 bits, 16 bits, or maybe 32 bits for the really 
important stuff.

George


Re: Level 3 - "legacy" Wiltel/Looking Glass bandwidth

2009-07-02 Thread George Carey
As a Level 3 customer who had connectivity to some legacy Wiltel equipment I 
can also attest that service levels were pretty bad following that merger. 
We had a few memorable outages where escalations were necessary to get 
things resolved and folks familiar with the equipment were hard to find. In 
meeting with our account team we were able to get them to agree to roll us 
off the old gear which was really inadequate anyway for the purpose which 
happened to be an Option A MPLS NNI. It took them a long time to get that 
done but since then I would say that service levels have returned to the 
normal albeit somewhat less than desirable levels. 

We have had relatively few problems with our vanilla transit connections 
though. The same goes for some long haul that they inherited with the 
Broadwing acquisition. There were some glitches with some of the fiber 
grooming they did a while back but that seems to have passed. 

I also seem to be receiving less maintenance notifications overall from 
Level 3 as a general trend. Hope it continues. 



George 





Re: PPPoE vs. Bridged ADSL

2009-10-28 Thread George Carey
We like PPPoE on the edge because we can use RADIUS to apply policy to  
the subscribers for bandwidth management, class-of-service, SNPs, etc.  
You probably have some of these features via your DSLAM, but we found  
it easier to do via RADIUS with a web based GUI for our provisioning  
folks. So if we need to snip someone's Internet and leave voice or VPN  
packets alone due to an abuse issue for example, we can apply the  
policy that references the appropriate ACL.


George

smime.p7s
Description: S/MIME cryptographic signature


Re: impossible circuit

2008-08-10 Thread George Carey
A strange one indeed, especially if you have no connectivity to Sprint 
there.


Since your fix was layer 2 you might be onto something. And you have the 
time it happened, and as we all know - somebody changed somethin' even 
if they won't fess up.


I'm trying to think how you could cause something like that with a 
conventional DACS or one of the newer packet friendly types that might 
be more prone to a layer 2 bug since software is fairly new. Course it 
would make more sense if it was just crossed Ethernet rather than DS3 
frames but who knows. There are plenty of carriers putting them in 
(including us).


Shame it's not the kind of thing you can duplicate without being service 
affecting.


George


Jon Lewis wrote:
After all the messages recently about how to fix DNS, I was seriously 
tempted to title this messsage "And now, for something completely 
different", but impossible circuit is more descriptive.


Before you read further, I need everyone to put on their thinking WAY 
outside the box hats.  I've heard from enough people already that I'm 
nuts and what I'm seeing can't happen, so it must not be 
happening...even though we see the results of it happening.


I've got this private line DS3.  It connects cisco 7206 routers in 
Orlando (at our data center) and in Ocala (a colo rack in the Embarq CO).


According to the DLR, it's a real circuit, various portions of it ride 
varying sized OC circuits, and then it's handed off to us at each end 
the usual way (copper/coax) and plugged into PA-2T3 cards.


Last Tuesday, at about 2:30PM, "something bad happened."  We saw a 
serious jump in traffic to Ocala, and in particular we noticed one 
customer's connection (a group of load sharing T1s) was just totally 
full.  We quickly assumed it was a DDoS aimed at that customer, but 
looking at the traffic, we couldn't pinpoint anything that wasn't 
expected flows.


Then we noticed the really weird stuff.  Pings to anything in Ocala 
responded with multiple dupes and ttl exceeded messages from a Level3 
IP. Traceroutes to certain IPs in Ocala would get as far our Ocala 
router, then inexplicably hop onto Sprintlink's network, come back to us 
over our Level3 transit connection, get to Ocala, then hop over to 
Sprintlink again, repeating that loop as many times as max TTL would 
permit.  Pings from router to router crossing just the DS3 would work, 
but we'd see 10 duplicate packets for every 1 expected packet.  BTW, the 
cisco CLI hides dupes unless you turn on ip icmp debugging.


I've seen some sort of similar things (though contained within an AS) 
with MPLS and routing misconfigurations, but traffic jumping off our 
network (to a network to which we're not directly connected) was 
seemingly impossible.  We did all sorts of things to troubleshoot it 
(studied our router configs in rancid, temporarily shut every interface 
on the Ocala side other than the DS3, changed IOS versions, changed out 
the hardware, opened a ticket with cisco TAC) but then it occurred to 
me, that if traffic was actually jumping off our network and coming back 
in via Level3, I could see/block at least some of that using an ACL on 
our interface to Level3.  How do you explain it, when you ping the 
remote end of a DS3 interface with a single echo request packet and see 
5 copies of that echo request arrive at one of your transit provider 
interfaces?


Here's a typical traceroute with the first few hops (from my home 
internet connection) removed.  BTW, hop 9 is a customer router 
conveniently configured with no ip unreachables.


 7  andc-br-3-f2-0.atlantic.net (209.208.9.138)  47.951 ms  56.096 ms  
56.154 ms
 8  ocalflxa-br-1-s1-0.atlantic.net (209.208.112.98)  56.199 ms  56.320 
ms  56.196 ms

 9  * * *
10  sl-bb20-dc-6-0-0.sprintlink.net (144.232.8.174)  80.774 ms  81.030 
ms  81.821 ms
11  sl-st20-ash-10-0.sprintlink.net (144.232.20.152)  75.731 ms  75.902 
ms  77.128 ms
12  te-10-1-0.edge2.Washington4.level3.net (4.68.63.209)  46.548 ms  
53.200 ms  45.736 ms
13  vlan69.csw1.Washington1.Level3.net (4.68.17.62)  42.918 ms 
vlan79.csw2.Washington1.Level3.net (4.68.17.126)  55.438 ms 
vlan69.csw1.Washington1.Level3.net (4.68.17.62)  42.693 ms
14  ae-81-81.ebr1.Washington1.Level3.net (4.69.134.137)  48.935 ms 
ae-61-61.ebr1.Washington1.Level3.net (4.69.134.129)  49.317 ms 
ae-91-91.ebr1.Washington1.Level3.net (4.69.134.141)  48.865 ms
15  ae-2.ebr3.Atlanta2.Level3.net (4.69.132.85)  59.642 ms  56.278 ms  
56.671 ms
16  ae-61-60.ebr1.Atlanta2.Level3.net (4.69.138.2)  47.401 ms  62.980 
ms  62.640 ms
17  ae-1-8.bar1.Orlando1.Level3.net (4.69.137.149)  40.300 ms  40.101 
ms  42.690 ms
18  ae-6-6.car1.Orlando1.Level3.net (4.69.133.77)  40.959 ms  40.963 ms  
41.016 ms

19  unknown.Level3.net (63.209.98.66)  246.744 ms  240.826 ms  239.758 ms
20  andc-br-3-f2-0.atlantic.net (209.208.9.138)  39.725 ms  37.751 ms  
42.262 ms
21  ocalflxa-br-1-s1-0.atlantic.net (209.208.112.98)  43.524 ms  45.844 
ms  43.392 ms

22  * * *
23  sl-bb2

Re: PPP+RADIUS - routing subnets to end users - Framed-Route vs. Framed-IP-Netmask

2010-03-08 Thread George Carey
We've always considered the WAN and LAN to be different objects so our history 
is to prefer the method you think is 'better.' Seems this model has been around 
since the dialin days.

We also have customers with multiple routes so it seems a logical separation. 
Failover might be a bit more flexible too since you can control some parameters 
of the Framed Route.

I know some people use RFC1918 addresses for WAN which might be a factor (we do 
not).

Perhaps in some network strategies the lines between WAN and LAN may be a bit 
more blurred than ours.

George


On Mar 8, 2010, at 6:10 PM, Erik L wrote:

> Scenario: with the help of RADIUS, routing subnets to end users connecting 
> via PPP.
> 
> Discussion: pros/cons of using Framed-IP-Address+Framed-Route versus 
> Framed-IP-Address+Framed-IP-Netmask.
> 
> We're talking here in generic terms, so as far as the behaviour of the LNS or 
> access concentrator or whatever else is receiving the Access-Accept and 
> terminating the ppp session, we're assuming more or less sane behaviour, 
> roughly as follows. In the first alternative, the IP address on the ppp link 
> is outside the subnet indicated by Framed-Route and one or more subnets are 
> routed via the link; one such subnet per Framed-Route attrib. In the second 
> alternative, the one subnet routed is that which contains the 
> Framed-IP-Address and is as large as the Framed-IP-Netmask indicates. 
> 
> I'm arguing to a colleague that the first alternative is "better", non-/32 
> netmasks on a ppp link make no sense (since netmasks on point-to-point links 
> don't matter anyway), that the second alternative doesn't allow users to make 
> use of their allocated space as easily and effectively as the first 
> alternative, and that the second alternative is limited to routing one subnet 
> (though you might be able to mix Framed-IP-Netmask and Framed-Route 
> together?). 
> 
> Comments? How are others doing it and why?
> 
> Erik
> 



smime.p7s
Description: S/MIME cryptographic signature


Looking for XO routing engineer

2011-04-22 Thread George Carey
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Can someone from XO please contact me about this hijacked prefix:

72.44.152.0/24

I see it coming from AS35909 through AS2828.

No luck getting anyone on the phone.

Thanks

George Carey
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.11 (Darwin)

iEYEARECAAYFAk2x0jcACgkQJdlqYKAmD6FO2gCeJd6uToUghlKdjNd38JpAP2VZ
SnwAoLQbpi9ygjIkCPDCU6TrnPOFc98r
=OkTz
-END PGP SIGNATURE-