QFX5100 as a L3 router + L2 switch performed well for us in the past, I
don't see why it'd fall over in <1g traffic now.
You should be good to go.
On 3/24/2019 04:41 午前, Mehmet Akcin wrote:
Hey there,
I am trying to get my hands on some QFX5000s and I have a rather quick
question.
In the p
+1, exactly what we did. I also recommend implementing
per-upstream/region blackhole communities (so your users can choose who
to blackhole as they see fit.)
Often time, DDoS traffic comes from regions that do not intersect with
legitimate traffic.
On 2/4/2019 03:15 午前, Tom Hill wrote:
On 3
Replying to throw in my support behind continuing the experiment as well.
Assurance that my gear will NOT fall over under adversarial situations
is paramount, thank you for the research that you're doing to ensure that.
Ben, you may wish to re-evaluate how "rock solid" [1] your networking
tru
Hi nanog,
Choopa/reliablesite is announcing our IP space, and despite repeated
requests from us, they are refusing to withdraw the announcements.
Can someone with clue from this contact me? Does anyone know someone at
Choopa neteng?
Their abuse desk has so far proved useless.
What exactly does "limited trust" mean?
Are you worried they might sniff the data on the link, or?
If so, macsec is really your only remedy.
On 3/25/2017 07:00 PM, Pedro wrote:
Hello,
Sometimes i have situation that i have to extend my layer2 (access,
trunk mode) network to third parties wit
+1, could not have said it better.
On 10/15/2016 01:47 AM, Leo Bicknell wrote:
In a message written on Thu, Oct 13, 2016 at 05:48:18PM +, rar wrote:
The goal is to keep the single BGP router from being a single point of failure.
I don't really understand the failure analysis / uptime calcu
Hi folks,
Looking for a Korea Telecom / KT sales rep for access into Korea *from*
Hong Kong.
Leads so far have turned up empty over normal channels, anyone mind
sharing their contacts?
Thanks!
Hi guys,
Does anyone have any good Seabone / Telecom Italia Sparkle
representatives whose contacts they don't mind passing along?
Looking for service in Asia, particularly Singapore and Hong Kong markets.
Having absolutely no luck with the standard sales channels, no one has
gotten back to u
Hi guys,
We're after a good Singapore Telecom (AS7473) sales rep. After some IP
transit in the Singapore and Hong Kong markets.
Anyone have details that you wouldn't mind passing along?
Much appreciated!
DO's SG range is allocated out of a single /64 (I think?) and Google
basically asks for captcha on every single request over IPv6. :(
We're using it as a corporate vpn.
On 3/1/2016 01:49 AM, Keenan Tims wrote:
FWIW I have seen the captchas more often on IPv6 both from home and the office
than
>> I would kill for a 24-port 10GbE Juniper switch for ~$2,500. You
can't even get a 24-port 1GbE for that.
EX4200s are abundant for much less in Ebay (for the 24port 1g requirement).
In the 10G space though, indeed, Juniper is expensive.
On 1/30/2016 05:03 PM, Jonas Bjork wrote:
Dear Mr. Car
I'm not sure if these URLs are supposed to resolve `-`
On 1/1/2016 05:51 PM, mate csaba wrote:
On 01/01/2016 09:40 AM, Randy Bush wrote:
opinions?
yep. do not click on strange urls.
never. and disable flash! and activate firewall.
this one http://fun.nop.hu/cisco-asa.jpg
or this one http:
I recommend them for everything other than the quality of their remote
hands. They could do with some improvements in this department.
We have space at Cologix Dallas (within Infomart), and it's all fine. We
run our own ASN too though, so no idea on the bandwidth side of things.
On 12/15/2015
RIPE stats also takes a feed similarly.
On 12/9/2015 01:24 AM, Kurt Kraut via NANOG wrote:
Hi,
For the past couple of months I've been attempting to add new Autonomous
Systems to the RouteViews project and got no response. Talking to other AS
in my area, I wasn't able to find no new BGP operat
11:43 AM, Paul S. wrote:
It is worth noting that HE indeed provides the full view, it's the
other side that has an issue.
(Since HE isn't really a tier 1, their transit relationships with
Telia and other carriers "save" them)
Cogent -> HE dies with unreachable on the fi
It is worth noting that HE indeed provides the full view, it's the other
side that has an issue.
(Since HE isn't really a tier 1, their transit relationships with Telia
and other carriers "save" them)
Cogent -> HE dies with unreachable on the first hop though, and that's
an issue for Cogent
Tom,
Could you expand further on this?
On 11/25/2015 07:29 AM, Tom Hill wrote:
And in relation to Brocade: I'd feel very uncomfortable throwing any
*new* money at MLXe, CER or CES. Strategy for those families seems to
have fallen off of a cliff.
Hi,
Can someone from the moderator team take a look?
This has been going on for a while.
Their products seem to be named 'MPC' or 'ASR,' reminds me of J and C
respectively.
Very unique way of naming things, I must say.
On 10/15/2015 06:08 AM, rdrake wrote:
Does anyone have experience running Packetfront hardware in a
production network? We've looked at a few and they seem to be p
Anyone in a network administrator position struggling with IPv6 (and not
willing to fix that out of their own initiative) has no business running
any network.
You should hire better staff.
On 10/13/2015 06:56 PM, Max Tulyev wrote:
On our network, we had to spent times more money in people tha
+1, this is the only sensible advice here.
NSPs actually do seem to care about not letting things like these happen.
On 2015/09/29 01:24 PM, Hank Nussbacher wrote:
At 23:11 28/09/2015 -0400, Josh Luthman wrote:
Start announcing their prefixes?
Contact the upstreams of AS20115 - Cogent, Leve
Seeing as the 'traditional' ways to launch big DDoS attacks are illegal,
and you're after a 'legit' company to offer this...
Yeah, I don't think you'll get too far.
You'll either have to roll your own testsuite on a lan environment, or ...
On 29/7/2015 3:31 AM, Dovid Bender wrote:
We are look
Rather than a peer, it might be an okay idea to try out peering at NYIIX
(and if the funds permit to get transport, AMS-IX/DE-CIX).
You'll quickly find that peering is *very* useful in Europe, if you have
any EU bound traffic at all.
On 7/17/2015 午後 04:06, Colin Johnston wrote:
good isp's /
I let IIJ know too, hopefully they'll filter it soon.
On 7/17/2015 午後 03:30, Jürgen Jaritsch wrote:
Hi,
we also sent them an mail, but their MX is not reachable for us :(
best regards
Jürgen Jaritsch
Head of Network & Infrastructure
ANEXIA Internetdienstleistungs GmbH
Telefon: +43-5-0556-3
Problem in this space is, none of the products offered are genuinely
affordable.
When your route optimization software costs more monthly than yet
another link to yet another tier one provider... `-`
On 5/16/2015 午前 12:27, Rafael Possamai wrote:
Internap also has a product called MIRO, altho
Hi guys,
We're shortly going to be getting some 10G SANs, and I was wondering
what people were using as SAN switches for 10G SANs.
It is my understanding that low buffer sizes make most 'normal' 10G
ethernet switches unsuitable for the job.
We're pretty much an exclusive Juniper shop, but a
David Barroso's (Spotify) SDN Internet Router [0] comes to mind.
0 - https://github.com/dbarrosop/sir
On 4/2/2015 午後 07:47, Baldur Norddahl wrote:
Filtering countries is a bad idea, but it is probably possible to create
filters so 99% of your actual traffic is handled by a relatively small
subs
:
On 2 Apr 2015, at 08:40, Paul S. wrote:
Do you have data on '100% of the traffic' being bad?
as a example anything in 163data.com.cn is bad
Colin
I happen to have a large Chinese clientbase, and this is not the case on my
network.
On 4/2/2015 午後 04:35, Colin Johnston wrote:
Do you have data on '100% of the traffic' being bad?
I happen to have a large Chinese clientbase, and this is not the case on
my network.
On 4/2/2015 午後 04:35, Colin Johnston wrote:
or ignore/block russia and north korea and china network blocks
takes away 5% of network ranges for memory head
Same here. These Indosat guys can't seem to catch a break =/
On 3/26/2015 午後 11:43, Peter Rocca wrote:
We just received a similar alert from bgpmon - part of 108.168.0.0/17 is being
advertised as /20's - although we're still listed as the origin. We are 40788.
108.168.64.0/20 4795 4795 4761 9
+1, I've had good luck with this as well.
My experiences pretty much mirror yours, NOC says no, had to ask my SE
to take care of it.
Didn't have any issues after.
On 3/23/2015 午後 11:55, Ca By wrote:
On Sun, Mar 23, 2014 at 3:43 AM, Justin M. Streiner
wrote:
On Mon, 23 Mar 2015, Ca By wrote:
On 3/18/2015 午後 02:44, Mark Tinka wrote:
On 18/Mar/15 07:31, Paul S. wrote:
All 6 of my upstreams (Most of them tier 1s, except Internap which is
a tier 3?) have cooperated just fine in blocking problematic IPs if
needed in emergencies.
In the data plane for the link facing you, or through
All 6 of my upstreams (Most of them tier 1s, except Internap which is a
tier 3?) have cooperated just fine in blocking problematic IPs if needed
in emergencies.
I did not have to argue.
On 3/18/2015 午後 02:26, Mark Tinka wrote:
On 18/Mar/15 04:13, Roland Dobbins wrote:
Also, asking your u
As a current Cogent customer, my experience on the service side of
things is similar.
Very responsive (I called on a Sunday and had someone with good enough
clue + router access pick up instantly.)
NOC is competent, and my sales guys (I've had two so far) are not pushy
at all. I don't have a
isn't pnap a direct vz customer either way? I know it's in the DFW blend
which we have, not sure about NY.
It shouldn't be out of their ability to complain.
On 2/4/2015 午後 01:35, Christopher Morrow wrote:
On Tue, Feb 3, 2015 at 11:02 PM, Charles Gagnon wrote:
Anyone from VZ FiOS network on t
That's the problem though.
Everyone has presentations for the most part, very few actual tools that
end users can just use exist.
On 1/28/2015 午後 08:02, Robert Bays wrote:
On Jan 27, 2015, at 8:31 AM, Jim Shankland wrote:
My expertise, such as it ever was, is a bit stale at this point, and
Anyone aware of any dpdk enabled solutions in the software routing space
that doesn't cost an arm and a leg?
vMX certainly does.
On 1/27/2015 午後 04:33, Pavel Odintsov wrote:
Hello!
Looks like somebody want to build Linux soft router!) Nice idea for
routing 10-30 GBps. I route about 5+ Gbps in
Like Mike mentioned, the feature list in RouterOS is nothing short of
impressive -- problem is that pretty much everything in there is
inherently buggy.
That and one hell of a painful syntax-schema to work with too.
On 1/27/2015 午前 10:57, Tony Wicks wrote:
And the solution to this issue is -
There's the Cisco xRV too, should be decent for playing around with.
On 1/12/2015 午前 12:08, Dave Bell wrote:
Maybe try the Cisco CSR1000v. In the trial mode it won't give you a
decent throughput, but should have all features enabled.
On 11 January 2015 at 15:02, Ammar Zuberi wrote:
I’m stuck
Very true.
Last year's Atrato outages in NY come to mind on this one.
On 1/11/2015 午後 01:51, Roland Dobbins wrote:
On Jan 11, 2015, at 11:37 AM, Paul S. wrote:
Obviously, concerns are different if you're an enterprise that's a DDoS magnet
-- but for general service pr
ur network. Hibernia
Networks blocks them for us.
Ammar
On 11 Jan 2015, at 8:37 am, Paul S. wrote:
While it indeed is true that attacks up to 600 gbit/s (If OVH and CloudFlare's
data is to be believed) have been known to happen in the wild, it's very
unlikely that you need to mitigate anyth
While it indeed is true that attacks up to 600 gbit/s (If OVH and
CloudFlare's data is to be believed) have been known to happen in the
wild, it's very unlikely that you need to mitigate anything close.
The average attack is usually around the 10g mark (That too barely) --
so even solutions th
Tons of such companies exist; BlackLotus/Staminus/Prolexic/Voxility to
name a few within the US.
Service provided is usually based on proprietary algorithms that may or
may not do what you want it to do, though.
On 12/11/2014 10:39 AM, Javier J wrote:
What about DDOS protection as a service?
Just been using the .net version of our company domain for
router/interface IPs.
Also own the AS.com/net and .as though, primarily to not get
squatted on.
On 12/10/2014 午前 09:30, Keefe John wrote:
I've been seeing more and more carriers(and even small ISPs) using
as.net as their domain f
Share them anyway? Juniper's certs have enough demand as well :)
On 12/5/2014 午前 05:13, Eric Litvin wrote:
have some juniper but not cisco.
On Thu, Dec 4, 2014 at 12:08 PM, Bacon Zombie wrote:
Anybody got codes valid for December?
On 14 Nov 2014 18:07, "Wakefield, Thad M."
wrote:
Since th
Do these people never check what exactly they end up originating
outbound due to a config change, if that's really the case?
On 11/30/2014 午後 11:24, Pierfrancesco Caci wrote:
"Simon" == Simon Leinen writes:
Simon> Some suspicious paths I'm seeing right now:
Simon> 133439 5
S
No problem here in Los Angeles either, but seeing a lone route through
Atrato only.
flags destination gateway lpref med aspath origin
*>194.71.107.0/24 <> 100 0 3491 5580 39138 22351 2.207
51040 i
* 194.71.107.0/24 <> 100 0 174 5580 39138
WANguard from andrisoft has worked well on this for us.
It supports flow telemetry and mirrored ports both (We use flows
strictly), and does what it says it does.
No complaints.
On 11/21/2014 午後 12:00, Robert Duffy wrote:
I've been using NTOP for couple of years. I'm mostly looking for some
There's another option called the Noction IRP.
I've been told that it's a cheaper FCP replacement.
On 11/17/2014 午前 12:42, Phil Bedard wrote:
Didn't Avaya completely drop the old Route Science line at this point?
Internap still sells their FCP appliance which does similar things and of
course
Agree, cuustomer service is really not upto par these days.
All my other carriers do better from that standpoint, but the network
performance isn't all that bad.
Just pray that nothing breaks...
On 11/13/2014 午前 08:22, Christopher Nielsen wrote:
We had circuits with Abovenet in San Jose and
GNS3, while unofficial, is what I'd recommend for that.
On 11/11/2014 午後 11:59, Colton Conor wrote:
Does CBT or any of these other subscription based learning courses include
a Cisco IOS simulator so we don't have to buy a Cisco lab or equipment?
On Sun, Nov 2, 2014 at 7:36 PM, Scott Morris wr
Hey,
If anyone from the routing / peering team of Internode / iiNet happens
to frequent this list, could you reach me off-list?
I've been having routing problems with my peering session to you for a
few months already, and haven't been able to get a response off the
helpdesk.
Thanks, and s
I'd be doubtful if anyone will feel like offering a /23 with OOB as
justification these days, sadly.
Good luck nonetheless.
On 11/10/2014 午後 11:00, Ruairi Carroll wrote:
Hey,
VPN setup is not really a viable option (for us) in this scenario.
Honestly, I'd prefer to just call it done already a
I've used the first one, and hacked on the second.
WANGuard, when deployed properly, works amazingly well.
ddosmon is only useful if you have netflow v5 flows (or sflow that can
get converted to nfv5), but also works well when coupled with exabgp /
openbgpd.
I added some per ip limiting / ex
Does it actually persist to your destination?
Loss in transit paths is simply ICMP de-prioritization unless it's
losing packets all the way to the last hop.
On 10/23/2014 午後 01:18, Javier J wrote:
Anyone else notice this?
Or is this an AWS issue in APAC that hasn't been reported yet?
AU-NY(
I've been using /36s per location, but hm -- great question.
How easy is it to get a larger allocation anyway? In RIPE, i.e: you just
ask and get a /29 with no questions asked.
On 10/9/2014 午後 11:31, Faisal Imtiaz wrote:
Selection of a default prefix is easy. Here are the steps.
4. Keeping
I'm allocating /64s in /56 boundaries per customer.
Allows me to give the client more should they need it without fuss.
On 10/9/2014 午前 10:18, Erik Sundberg wrote:
I am planning out our IPv6 deployment right now and I am trying to figure out
our default allocation for customer LAN blocks. So w
First time I'm seeing it, and I've been a Cogent client for quite a while.
Have you tried getting in touch with their NOC yet? They're one of the
most responsive in the industry.
On 10/3/2014 午前 01:03, ryanL wrote:
hi. relatively new cogent customer. is what i've stated in my subject line
kin
Later,
I think it requires 5.7G of free space on the device -- but the download
is not that big.
On 9/18/2014 午前 11:04, JoeSox wrote:
Grant,
Do you have a reference? Someone just told me it is more around 5GB.
--
Later, Joe
On Wed, Sep 17, 2014 at 10:31 AM, Grant Ridder
wrote:
For those
It would appear you've done your part in trying to reach out (and
subsequently failed), so the next step to go is dropping all traffic
from it.
Nothing wrong with trying to protect your own customer from people who
cannot be bothered to do their own due diligence.
On 8/11/2014 午前 12:19, Gabr
On 8/6/2014 午後 09:13, Vincent Bernat wrote:
❦ 6 août 2014 20:54 +0900, "Paul S." :
Correct me if I'm wrong, but doesn't OSPF require the AFL license
anyway to be 'legitly' ran?
OSPF does not need a feature license on those models (it is needed on
EX2200). AF
a case oppened in jtac
to try solve it
Sent from my iPhone
On 06/08/2014, at 07:15, Sebastian Wiesinger
wrote:
* Paul S. [2014-08-02 05:18]:
Hi folks,
We're considering the EX4300 to run routing (l3) for a few
hypervisors of ours that are connected via l2.
Primarily interested due to t
Appears to be loading just fine from here in Sg.
On Jul 31, 2014 11:21 PM, "Mike A" wrote:
> On Thu, Jul 31, 2014 at 02:38:13PM +, Drew Weaver wrote:
> > We've been seeing some issues with getting to Ebay this morning, only a
> very select few of their GSLB sites in DNS seem to be responding
When exactly did we sign up for a discreet math course `-`
On 7/21/2014 午後 09:31, Michael Conlen wrote:
On Jul 18, 2014, at 2:32 PM, Jay Ashworth wrote:
- Original Message -
From: "Owen DeLong"
But the part that will really bend your mind is when you realize that
there is no such th
I believe so, that was just a generalized answer.
On 7/20/2014 午後 11:12, Christopher Morrow wrote:
isn't the offering just a whiteboxed verisgn/prolexic equivalent though?
On Sat, Jul 19, 2014 at 3:51 AM, Paul S. wrote:
This is done by performing some sort of filtering / acling,
CF is willing to offer network drops over GRE / XCs too and filter
everything apparently if the price is right.
It is a custom service, though.
On 7/20/2014 午後 11:32, Ameen Pishdadi wrote:
Equinix doesn't provide Ddos protection , cloud flare is able to mitigate
attacks by spreading out the
This is done by performing some sort of filtering / acling, be it
proactive or reactive on the traffic before it's handed off to you.
How exactly EQX' solution is engineered is a question best left for
their sales engineers or similar people to answer, though.
On 7/19/2014 午後 04:44, Abuse Con
I believe you'll find that all of this gets a lot easier if you try to
understand how layer 3 routing itself works instead of asking sparodic
questions one at a time.
I recommend picking up a layer 3 routing book for the platform of your
choice and going through the basics.
On 7/19/2014 午後 0
On 7/19/2014 午前 03:35, William Herrin wrote:
On Fri, Jul 18, 2014 at 2:05 PM, Rob Seastrom wrote:
Michael Thomas writes:
On 7/17/14, 2:15 PM, valdis.kletni...@vt.edu wrote:
/me makes popcorn and waits for 4K displays to drop under US$1K and
watch the network providers completely lose their s
On 7/15/2014 午後 12:51, Brett Glass wrote:
But regardless of the financial arrangements, such a connection
doesn't require an ASN or BGP. In fact, it doesn't even require a
registered IP address at either end! A simple Ethernet connection (or
a leased line of any kind, in fact; it could just as
Unless said tf2 server happens to be hosted within UU's own network, I'd
imagine the blame would go to whichever party in the transit path
refused to upgrade their commitments.
On 7/11/2014 午前 10:21, Jim Popovitch wrote:
On Thu, Jul 10, 2014 at 9:12 PM, Miles Fidelman
wrote:
Randy Bush wrote
+1, blanket banning is probably not the best way to go.
On 6/28/2014 午前 05:40, Jon Lewis wrote:
On Fri, 27 Jun 2014, Adam Greene wrote:
We're evaluating whether to add BGP feeds from these two sources in
attempt
to minimize exposure to DoS.
The Team Cymru BOGON list (
http://www.team-cymru.
Oh lord...
On 6/19/2014 午前 12:42, Nick Hilliard wrote:
The Internet is down. Didn't you hear?
Nick
On 18/06/2014 16:40, Niels Bakker wrote:
I'm sorry, this is NANOG, not your local helpdesk.
HTH, HAND,
-- Niels.
* efba...@gmail.com (Everett F Batey II Gi) [Wed 18 Jun 2014, 17:34 CES
Two 'established' options are,
0. Noction IRP (As mentioned)
1. Internap FCP
Everyone appears to either be using one of these, or have gone full custom.
On 6/4/2014 午後 10:52, Tassos Chatzithomaoglou wrote:
I'm having a look at real-time traffic engineering/management solutions that
include vi
True, excellent point as well.
Multiple openvpn/ipsec entry points on a internal network is probably
the best way to go.
On 6/2/2014 午後 09:33, Jeroen Massar wrote:
On 2014-06-02 14:23, Paul S. wrote:
[..]
On most ATEN chip based BMC boards from Supermicro, it includes a UI to
iptables that
On 6/2/2014 午後 09:19, Andrew Latham wrote:
I use OpenVPN to access an Admin/sandboxed network with insecure portals,
wiki, and ipmi.
On Jun 2, 2014 7:13 AM, "Randy Bush" wrote:
so how to folk protect yet access ipmi? it is pretty vulnerable, so 99%
of the time i want it blocked off. but that
You can't really have your cake, and eat it too.
If this is a deal breaker for anyone, getting it in writing within the
contract should be the most basic of steps to undertake. Asking
beforehand will also actually let you know who will and won't do this,
thus avoid surprises like these altoget
As precaution, you should always deny ipv6 unicast on v4 sessions, and
vice versa.
On 5/3/2014 午後 03:01, Eugeniu Patrascu wrote:
On Fri, May 2, 2014 at 10:44 PM, Deepak Jain wrote:
Between peering routers on a dual-stacked network, is it considered best
practices to have two BGP sessions (on
There are many actually doing this, to be honest.
From the top of my head, in the greater Dallas area, 54540 comes to mind.
http://bgp.he.net/AS54540#_asinfo
For large ASNs like these, aggregation would really help the table size.
That said, working on reducing our own as well.
On 4/29/2014 1
Am I the only one who thinks this 'clench' is rather absurd especially
right after one company pretty much got 1/4th of all remaining address
space when there's such an insane crunch looming?
Regardless of how large / important they are, that is.
If anything, this is just gonna make things mor
If you built anything against the vulnerable library (esp static linked
stuff), you'll need to rebuild those too.
On 4/8/2014 午後 09:18, David Hubbard wrote:
Don't forget to restart every daemon that was using the old library as
well, or just reboot.
-Original Message-
From: Peter Krist
Of course it is, you don't even need to think about logic to answer that
one.
On 3/26/2014 午後 09:55, rw...@ropeguru.com wrote:
On Tue, 25 Mar 2014 23:28:04 -0500
Larry Sheldon wrote:
According to the Ace of Spades HQ blog:
IPv6 would allow every atom on the surface of the earth to have its
On 3/26/2014 午後 12:31, Cutler James R wrote:
Wow, what a lot of NANOG traffic about IPv6 readiness for SMTP!
Please explain my misunderstanding on the following:
1. IPv6 is a Routing Layer Protocol (with some associated helpers, like RA,
ND, DHCP-PD, and the like).
2. SMTP is an Application
I'd simply just recommend using the route views servers, you don't
really need the graphical representation.
On 3/24/2014 午前 02:46, Damien Burke wrote:
Hello,
Are there any tools similar to the routing tab at stat.ripe.net ?
To be more specific, I'm looking for the "BGP route visibility" feat
On 3/8/2014 午前 01:07, Jason Lixfeld wrote:
I don't need to use it much, but when I do, it's an ever-increasing royal pain
in the ass.
My current plight revolves around not being able to get full dumps of objects.
Certain mandatory fields in objects are 'filtered' and/or replaced with dummy
d
OP is actually the owner of it as per ARIN whois data.
-- Paul
On 3/6/2014 午後 09:41, Nick Hilliard wrote:
On 06/03/2014 12:14, bmann...@vacation.karoshi.com wrote:
On Wed, Mar 05, 2014 at 07:52:10AM -0500, Rob Seastrom wrote:
to secondary nameservers. Speaking of that...
;; ADDITIONAL SECTI
For all it's worth, it might be Cox ignoring TTLs and enforcing their
own update times instead.
Wait 24-48 hours, and it should probably fix it all up.
I'm not seeing anything majorly broken with your system except the SOA
EXPIRE being ridiculously large.
On 3/5/2014 午後 01:40, Mark Keymer wr
+1, which semi-large eyeball does Cogent NOT have capacity problems to?
On 2/28/2014 午前 11:55, Suresh Ramasubramanian wrote:
With cogent? Now you will be asking us if the Pope is really Catholic :)
On 28-Feb-2014 7:43 AM, "Aidan Scheller" wrote:
Hello,
We send periodic 10-15Mbps bursts of
Rancid with the git plugin can be used to attain pretty much the exact
same thing a lot more easily, if you're after an existing implementation
of it.
Cheers,
Paul
On 2/27/2014 午後 09:44, Harry Hoffman wrote:
Wow, this sounds fantastic! Have any code you can share?
Cheers,
Harry
On Feb 27,
Lantronix is pretty solid if it doesn't have issues with your hardware.
I have a bunch of older Dell boxes where turning on virtual media makes
them stall indefinitely on the boot prompt.
Though, for serial only stuff -- it should be pretty good.
On 2/22/2014 午前 12:39, Bryan Socha wrote:
We
Better yet, why is your ntp server even reachable off net?
Providing a public clock service needs a lot more configuration effort
than a simple, default one -- as just demonstrated.
(However, this is not to say that private servers should have management
queries enabled.)
On 2/17/2014 9:03
On Thu, Dec 3, 2009 at 5:07 PM, Ken Chase wrote:
> We all know that google is leveraging cross-referenceable information from all
> of its services for its profit/advantage ...
>
> /kc
> --
> Ken Chase - k...@heavycomputing.ca - +1 416 897 6284 - Toronto CANADA
> Heavy Computing - Clued bandwidth,
92 matches
Mail list logo