There are more options when you're not just using someone else's datacenter.
-
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com
Midwest-IX
http://www.midwest-ix.com
- Original Message -
From: "Bevan Slattery"
To: "Mike Hammett"
Cc: "North American Net
* bedard.p...@gmail.com (Phil Bedard) [Sat 13 Feb 2016, 01:40 CET]:
I was going to ask the same thing, since even for settlement free
peering between large content providers and eyeball networks there
are written agreements in place. I would have no clue on the volume
percentage but it's not g
I was going to ask the same thing, since even for settlement free peering
between large content providers and eyeball networks there are written
agreements in place. I would have no clue on the volume percentage but it's
not going to be near 99%.
Phil
From: Livingood, Jason
Sent: Friday,
In a past life we worked with our supplier to create physically separate
sub-enclosures.1/2 and 1/3. Able to build in a separate and secure cable path
for interconnects to the meet-me-room and connection to power supplies.
Can be done and I think there are now rack suppliers that do this as sta
Mistake prevention is the key. Neatness counts.
Label everything - cubicle, equipment, cables using high quality labels that
won’t fall off. Use a meaningful labeling scheme. Label both sides of the
equipment with letters large enough for everyone to read. Color coding is nice
until you have
That moment when you hit send and remember a couple things…
Of course labeling of the cables.
Maybe colored wire loom for fiber and DACs in the vertical spaces to go along
with the previously mentioned color scheme?
-
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.
I am finding a bunch of covers for the front. I do wish they stuck out more
than an inch (like two).
http://www.middleatlantic.com/~/media/middleatlantic/documents/techdocs/s_sf%20series%20security%20covers_96-035/96_035s_sf.ashx
It looks like these guys stick out 1.5”. That may be workable…
Hi Martin,
well, not only as-set and route.
Assuming only legitimate owner of inetnum and aut-num have passwords for
mntner from that objects can modify their RIPE DB objects and can create
routes.
So to create a route object, you have to have access for inetnum and
aut-num objects (that can be
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
The posting is sent to APOPS, NANOG, AfNOG, AusNOG, SANOG, PacNOG,
SAFNOG, PaNOG, SdNOG, BJNOG, CaribNOG and the RIPE Routing WG.
Daily listings are sent to bgp-st...@lists
- Original Message -
> From: "Mike Hammett"
>
> If you have multiple entities in a shared space, how can you mitigate the
> chances of someone doing something (assuming accidentally) to disrupt your
> operations? I'm thinking accidentally unplug the wrong power cord, patch cord,
> etc. Ac
How does it look when you examine it by not the count of sessions or links
but by the volume of overall data? I wonder if it may change a little like
50% of the volume of traffic is covered by a handshake. (I made 50% up -
could be any percentage.)
Jason
PS - My email address has changed and I’m
We've been using Statseeker for some time now. It costs but it's been well
worth the investment as a monitoring solution with the ability to parse
incoming syslog messages and generate alerts.
David Casey, CCNP
Network Engineer 3
Presbyterian Healthcare Services
Albuquerque, New Mexico
Office:
How does it look when you examine it by not the count of sessions or links
but by the volume of overall data? I wonder if it may change a little like
50% of the volume of traffic is covered by a handshake. (I made 50% up -
could be any percentage.)
Jason
>On 2/10/16, 6:34 PM, "NANOG on behalf o
> On 11 Feb 2016, at 21:51, Frank Bulk wrote:
>
> Is anyone aware of software, or perhaps a service, that will take SNMP
> traps, properly parse them, and perform the appropriate call outs based on
> certain content, after waiting 5 or 10 minutes for any alarms that don't
> clear?
Where I curre
Some examples from where I work:
- Open space, but your own cabinet. We have open areas where there are rows of
half and full cabinets where customers can rent space. That cabinet space is
theirs, but they’re in the open and anyone can get to the physical cabinet.
While in general the cabinets
Hi,
First, understand how it's done, then maybe you can think of something.
https://blog.exodusintel.com/2016/02/10/firewall-hacking/
If you are stopping IKE with ACL's, you probably need to address NAT-T as
well (udp:4500).
But if you are doing that, you probably don't need IKE active at the ASA
16 matches
Mail list logo