In Ciscoland, you do have to explicitly state that the default route is
eligible for URPF verification, otherwise you'll get unexpected traffic
drops.
ip verify unicast source reachable-via any allow-default
And yes, it's main purpose is for implementing source-based
remotely-triggered blackhole
Sad to hear about Bill. I also began my career at a small ISP in Houston
where we also had a T1 to SESQUINET, and Bill was already a legend to us
Jr. Sysadmins in town in 1995/96.
-Andrew
On Mon, Jan 27, 2020 at 2:36 PM Brett Watson wrote:
> I was saddened to see this yesterday, that Bill Mann
http://www.wispa.org/Directories/Find-a-WISP
On Mon, Sep 23, 2019 at 3:03 AM David Ratkay wrote:
> I have been looking to work at an ISP for a long time now. I live in
> Northern Indiana in the US and there seems to not be much opportunities to
> work for an ISP in this region. Any recommendati
You need to account for window size as well. You should also account for
the details of the specific implementation of the TCP stack you are dealing
with if you truly need a deterministic result.
On Wed, May 27, 2015 at 8:15 PM, Glen Kent wrote:
> Hi,
>
> I am looking at deterministic ways (perh
Smokeping (http://oss.oetiker.ch/smokeping/) can graph DNS response latency
via dig.
ThousandEyes (https://www.thousandeyes.com/) has some commercial options
for monitoring DNS server responsiveness, and zone performance from
different vantage points throughout the globe.
On Tue, May 19, 2015 a
5 matches
Mail list logo