u want from a Transit perspective
> and you would have the ability control flow of traffic between your
> edge routers
> and your Stateful Firewalls
>
> Hope This Helps
>
> Tom Smyth
>
>
>
>
> On Wed, 19 Dec 2018 at 01:52, Max Clark wrote:
> >
> > T
;
> I would rather build two servers, and have 2 BGP sessions/fullfeeds,
> each
> on one 10G link in order to provide redundancy.
>
> Best regards
> Arnaud
>
> Le 2018-12-19 00:17, Max Clark a écrit :
> > Hello,
> >
> > I've been presented with an opport
Hello,
I've been presented with an opportunity to greatly simplify upstream
networking within a datacenter. At this point I'm expecting to condense
down to two 10 Gbps full feed IPv4+IPv6 transit links plus a 10 Gbps link
to the peering fabric. Total 95th percentile transit averages in the 3-4
Gbp
yrun/bgplgsh display the motd?
Thanks,
Max
On Sat, Nov 13, 2010 at 10:25 AM, Andy Bradford
wrote:
> Thus said Max Clark on Sat, 13 Nov 2010 07:54:00 PST:
>
>> I've experimented with tcpserver from the ucspi package without
>> success. How do I give access to
Hello,
I am creating a public route server for our network. bgplgsh is the
ideal utility for what I need however I need to expose access to this
app via telnet. Newer versions of OpenBSD do not have a telnet daemon,
I've experimented with tcpserver from the ucspi package without
success. How do I
Hello,
- is it possible to add a motd to the bgplgsh?
- what's the "sanest" way to enable telnet access to the bgplgsh?
Thanks in advance,
Max
On 9/3/10 12:30 PM, Stuart Henderson wrote:
"bgpctl irrfilter" might do what you need. it runs offline,
pulls RPSL and generates filter files that you can list as an
"include" in bgpd.conf. currently it is hardcoded to fetch
from RADB.
you may or may not need to modify your RPSL to work with it.
Hello all,
We currently build and manage our prefix lists from IRRd sources
(RADB/ALTDB) using automated scripts on our Cisco routers. Can openbgpd
query an IRRd directly? How do I regularly update the prefix lists for
our peers?
Thanks,
Max
On 6/3/07, Jeroen Massar <[EMAIL PROTECTED]> wrote:
>
>
> And then the evil user simply drops a backdoor binary on one of the
> machines.
Sure there is only so much you can do. We have to give some level of trust
to the user, this of course has to be balanced by an appropriate level of
prudence o
Hi all,
I need to develop a secure way for our staff/outside contractors to be able
to securely connect (via SSH - rdesktop/vnc in the future) to our internal
and customer systems. We do need heterogeneous client system support (BSD,
Linux, Solaris, Windows, etc..?) with whatever solution is deplo
10 matches
Mail list logo