Very well said Roland.
He cared greatly about this community and was always willing to help
others. I personally would not be where I am today without his effort
and caring.
Thank you Don, I will miss you greatly.
--John
On 7/23/20 5:22 PM, Dobbins, Roland wrote:
It is with a heavy heart t
Samplicator is a nifty tool.
--John
On 1/25/22 16:50, Compton, Rich A wrote:
Elastiflow is pretty cool. https://www.elastiflow.com or the old open
source version: https://github.com/robcowart/elastiflow
You can pretty much do the same thing with Elastic’s filebeat
(https://www.elastic.co/
Terrain has a lot to do with the service you can get. Twenty five miles
west of Denver are technically foothills but it is a lot of mountainous
terrain. No company wants to run any cable up there.
--John
On 5/24/22 09:48, Mitchell Tanenbaum via NANOG wrote:
I have two fixed wireless Internet
On 7/18/19 7:54 AM, Robert Webb wrote:
Thanks for the info on the standards portion.
The booster configuration has been setup in a test scenario where the
external antenna has been placed outside with line of site to the
tower, less than a tenth of a mile away, with the feed cable run down
Would be nice if we knew what the protocol was that communicated this
information down to the SFP and would also be nice if that was an open
protocol subject to review. UDP something? is my guess but ow do those
messages look?
I'm new to the MACsec idea but I would hope we could watch for such key
On 10/03/2014 03:23 PM, Keenan Tims wrote:
The question here is what is authorized and what is not. Was this to protect
their network from rogues, or protect revenue from captive customers.
I can't imagine that any 'AP-squashing' packets are ever authorized,
outside of a lab. The wireless spe
On 10/03/2014 04:26 PM, Hugo Slabbert wrote:
On Fri 2014-Oct-03 16:01:21 -0600, John Schiel
wrote:
On 10/03/2014 03:23 PM, Keenan Tims wrote:
The question here is what is authorized and what is not. Was this
to protect their network from rogues, or protect revenue from
captive customers
On 10/22/2014 10:43 AM, C. Jon Larsen wrote:
Hardly. The discussion so far has been weighted very heavily on the
side of Dana Carvey's "Grumpy Old Man"-style whining. "That's the way
it was and we liked it!".
The people that like systemd (like myself) have wisely learned that
the people that
On 10/22/2014 01:30 PM, valdis.kletni...@vt.edu wrote:
On Wed, 22 Oct 2014 13:13:29 -0600, John Schiel said:
i was beginning to wonder how secure systemd is also.
One of the 3 CIA pillars of security is "availability". And if
it's oh-dark-30, figuring out what symlink is
On 11/10/2014 02:05 PM, joel jaeggli wrote:
ftdi chipsets work on both mac and windows devices.
I'd be careful with FTDI chipsets, you want to make sure you get the
real chip. If they decide to move forward with bricking counterfeit
chips, you'll be wasting your $$.
--John
http://www.a
On 11/11/2014 05:54 PM, lobna gouda wrote:
Thanks all for your reply, lenovo seems decent almost all the pc ( lenovo and
hp) are decent with the 16G.somebody mentioned with 16g it is a bit slow; Keith
here is saying the 32G he had no issue. i intend to buy my own memory just to
save on the co
f.
--John
On 12 Nov 2014 20:35, "John Schiel" <mailto:jsch...@flowtools.net>> wrote:
On 11/11/2014 05:54 PM, lobna gouda wrote:
Thanks all for your reply, lenovo seems decent almost all the
pc ( lenovo and hp) are decent with the 16G.somebody mentioned
On 12/08/2014 11:53 AM, Tony McKay wrote:
Does anyone on list currently use Peakflow SP from Arbor with TMS, and is it
truly a carrier grade DDoS detection and mitigation platform? Anyone have any
experience with Plixir?
Peakflow SP with the TMS works quite well. Can be very fast once a
thre
On 12/15/2014 07:45 PM, Ray Van Dolson wrote:
One thing you might also want to consider are any calls you make to 911
whilst using a repeater.
I use a repeater supplied by T-Mobile and they made it very clear, and I
had to specifically acknowledge a statement, that using such a repeater
tak
I don't think it's your provider, check your hardware.
http://zszsit.blogspot.com.br/2012/10/ratelimit-callbacks-suppressed.html
(link provided by an associate)
--John
On 11/07/2015 02:33 AM, samaul carman wrote:
Hello I am writing to y'all in regards to based on my understanding that
does n
On 04/13/2015 03:29 PM, Rashed Alwarrag wrote:
Hi
Today we have a lot of customers report that their Cisco routers got a root
access and the IOS got erased , is there any known vulnerability in cisco
products thats they report in their Security alerts about this recently ?
is there any one f
On 04/13/2015 03:49 PM, Rashed Alwarrag wrote:
I will try to get those informations
If you follow Chris's suggestion, you might get faster resolution.
http://tools.cisco.com/security/center/publicationListing.x
--John
Thanks
On Tuesday, April 14, 2015, John Schiel <mai
I know this is a NANOG forum but curious how widespread usage of MACsec
might be. (https://1.ieee802.org/security/802-1ae/).Currently reading
the spec but wanted to pose some questions.
I'm seeing some pitfalls:
1) May not work over wireless LAN devices?
2) Needs a centralized key serve
ss of
a concern.
--jas
On 10/21/24 12:28 PM, Saku Ytti wrote:
On Mon, 21 Oct 2024 at 20:34, John Schiel wrote:
1) May not work over wireless LAN devices?
I guess it depends on wireless technology, but 802.11xyzzy comes with
an encryption solution already so isn't really a target o
What a community!!!
Thanks for all the responses.
--jas
On 10/23/24 9:27 AM, Bertilsson, Björn via NANOG wrote:
The biggest pitfall for telecom with MACSEC, is that PTP/SyncE and
MACSEC on the same physical interface simultaneously is mostly not
supported. Many claims that you can do both,
20 matches
Mail list logo