as702 looking glass?

2009-09-04 Thread Serg Shubenkov

Folks,

Does anyone know if Verizon (AS702) has a publicly accessable looking
glass?


-- 
Serg Shubenkov



Re: draft-iana-ipv4-examples

2009-09-04 Thread William Allen Simpson

Ron Bonica wrote:

In addition, some authors have used 128.66.0.0/16 (TEST-B) for example
purposes. There is no RFC that talks about this block, but my
understanding is that IANA/ARIN have marked it as reserved. If you
search the Internet you will find at least some number of examples and
firewall rule sets that use this block, but I have no good idea about
how widespread such usage is.


The only examples that I've found are firewall rule sets that block
many ranges now allocated.  Such as NANOG 2002 email:

http://www.merit.edu/mail.archives/nanog/2002-12/msg00127.html

It's no different from net 69 et alia.  A couple of larger examples,
widely propagated:

NoRouteIPs={127.0.0.0/8, 192.168.0.0/16, 172.16.0.0/12, 10.0.0.0/8,
0.0.0.0/7, 2.0.0.0/8, 5.0.0.0/8, 10.0.0.0/8, 23.0.0.0/8, 27.0.0.0/8,
31.0.0.0/8, 69.0.0.0/8, 70.0.0.0/7, 72.0.0.0/5, 82.0.0.0/7, 84.0.0.0/6,
88.0.0.0/5, 96.0.0.0/3, 127.0.0.0/8, 128.0.0.0/16, 128.66.0.0/16,
169.254.0.0/16, 172.16.0.0/12, 191.255.0.0/16, 192.0.0.0/19,
192.0.48.0/20, 192.0.64.0/18, 192.0.128.0/17}

block in log quick on external from 0.0.0.0/7 to any
block in log quick on external from 2.0.0.0/8 to any
block in log quick on external from 5.0.0.0/8 to any
block in log quick on external from 10.0.0.0/8 to any
block in log quick on external from 23.0.0.0/8 to any
block in log quick on external from 27.0.0.0/8 to any
block in log quick on external from 31.0.0.0/8 to any
block in log quick on external from 69.0.0.0/8 to any
block in log quick on external from 70.0.0.0/7 to any
block in log quick on external from 72.0.0.0/5 to any
block in log quick on external from 82.0.0.0/7 to any
block in log quick on external from 84.0.0.0/6 to any
block in log quick on external from 88.0.0.0/5 to any
block in log quick on external from 96.0.0.0/3 to any
block in log quick on external from 127.0.0.0/8 to any
block in log quick on external from 128.0.0.0/16 to any
block in log quick on external from 128.66.0.0/16 to any
block in log quick on external from 169.254.0.0/16 to any
block in log quick on external from 172.16.0.0/12 to any
block in log quick on external from 191.255.0.0/16 to any
block in log quick on external from 192.0.0.0/19 to any
block in log quick on external from 192.0.48.0/20 to any
block in log quick on external from 192.0.64.0/18 to any
block in log quick on external from 192.0.128.0/17 to any
block in log quick on external from 192.168.0.0/16 to any
block in log quick on external from 197.0.0.0/8 to any
block in log quick on external from 201.0.0.0/8 to any
block in log quick on external from 204.152.64.0/23 to any
block in log quick on external from 224.0.0.0/3 to any



What should we do about this block? Some of the potential answers
include documenting its role, marking it as reserved but deprecating its
use in examples, and returning it to the free pool immediately (with a
warning sign about possible filtering problems).


Return to the free pool immediately.  Allocate it to *IXen, who might
appreciate it being blocked from view by random outsiders.



Re: Single router for P/PE functions

2009-09-04 Thread Erik Schmersal
Hi dave,

Our setup was a dual ring with two devices common to both rings. It used a
full mesh of LSP's but the majority of traffic was L3VPN. There were some
VPLS connections as well, maybe a total of 30 VLAN's. LSP's were set up with
static path's the short way around the ring and a standby active secondary
path the long way around. Convergence time for a failure on either ring was
barely noticable. I am no longer with that organization so I can't get
access to the gear anymore :(

From my experience, you are probably just asking the EX4200 to do more than
it was made to do. That is a lot of CCC circuits to reallocate on the fly,
especially for a smaller device. You may me able to reduce convergence time
by making your LSP's static with a standby secondary so the path is
preconfigured when a failover occurs, the only problem with this is the
scalability gets poor quickly as you start to add devices.

Erik


On Fri, Sep 4, 2009 at 8:39 AM, daveb sp...@zitomedia.net wrote:


 Hi, I saw your response on NANOG and have a couple questions for you if you
 don't mind.  I'm doing a similar design with MPLS (OSPF/RSVP) on EX4200s in
 a 10GE ring, mainly for 'ccc' circuits and IP connectivity.  The EX4200
 serves both the P and PE functions and some of my rings may be as large as
 30 devices.

 In my informal lab test with just 4 EXs in a ring, the convergence time
 (optomized with FRR, path protection and 50ms BDF) for 1 ccc circuit was
 300ms and with 200 ccc circuits it was several seconds, and 800 kills the
 box.  I can't imaging what it would be like with 20 or 30 device in the
 ring.

 I was just wondering if you've doen similar testing with the MX as far as
 scaling.  I'm assuming the EX4200 just isn't up to the task but I'm also
 concerned that ring topologies are problematic for re-routing LSPs.  I can
 test to find the optimum/maximum number of allowable ccc circuits with 4
 devices in the ring but I have no way or testing with 20 or 30 so I'm really
 trying to determine how much worse convergence is with more devices vs
 number of LSPs.

 Thanks,
 Dave Bernardi



 At 12:00 AM 9/4/2009, Erik Schmersal wrote:

  Not only can they, it's done quite frequently. I just completed a
  deployment of seven Juniper MX series routers in a dual ring
 configuration,
  all acting as combination P/PE devices for a state government WAN
 backbone.
  Works like a charm.
 
  Erik
 
 
  On Thu, Sep 3, 2009 at 10:20 AM, Serge Vautour sergevaut...@yahoo.ca
 wrote:
 
  Hello,
 
  I'm pretty confident that a router can be used to perform P  PE
  functions simultaneously. What about from a best practice perspective?
 Is
  this something that should be completely avoided? Why? We're
 considering
  doing this as a temporary workaround but we all know temporary usually
 lasts
  a long time. I'd like to know what kind of mess awaits if we let this
 one
  go.
 
  Thanks,
  Serge
 
 
 
 
  __
  Yahoo! Canada Toolbar: Search from anywhere on the web, and bookmark
 your
  favourite sites. Download it now
  http://ca.toolbar.yahoo.com.
 
 
 
 





RE: Single router for P/PE functions

2009-09-04 Thread Uri Joskovitch
Hi All

Any one is using PWE solutions?

Any good/bad experience with this technology?

Thanks

Uri



Re: Single router for P/PE functions

2009-09-04 Thread Serge Vautour
We're trying to save on Transport links. Instead of multi-homing each PE to 2 
Ps, we're considering building a ring: P-PE-PE-PE-P. This ring follows the 
transport ring. Each link would be engineering to make sure it can handle all 
of the traffic from all 3PEs in case of a failure. As the network grows, we 
could get individual transport links from PE-P.

Apart from bandwidth, I was curious if there were other problems I related to 
doing this that I wasn't thinking of. Thanks for all the replies. Much 
appreciated.

Serge





From: William McCall william.mcc...@gmail.com
To: Serge Vautour se...@nbnet.nb.ca
Cc: nanog@nanog.org
Sent: Friday, September 4, 2009 1:07:40 AM
Subject: Re: Single router for P/PE functions

Kinda depends on what you're doing exactly, but like Erik said, it certainly 
possible and depending on your particular needs, it might not be much of an 
issue at all.

Can you describe your scenario a bit more?

--WM


On Thu, Sep 3, 2009 at 10:20 AM, Serge Vautour sergevaut...@yahoo.ca wrote:

Hello,

I'm pretty confident that a router can be used to perform P  PE functions 
simultaneously. What about from a best practice perspective? Is this 
something that should be completely avoided? Why? We're considering doing 
this as a temporary workaround but we all know temporary usually lasts a long 
time. I'd like to know what kind of mess awaits if we let this one go.

Thanks,
Serge




  __
Yahoo! Canada Toolbar: Search from anywhere on the web, and bookmark your 
favourite sites. Download it now
http://ca.toolbar.yahoo.com.




-- 
William McCall, CCIE #25044



  __
Ask a question on any topic and get answers from real people. Go to Yahoo! 
Answers and share what you know at http://ca.answers.yahoo.com


Re: Single router for P/PE functions

2009-09-04 Thread Alex H. Ryu


What if there is a problem from software, filter, mis-configuration from
one of the routers ?
It will affect whole ring network, not just that problem router.

Also if there is routing protocol bounce because of link flapping, it
will be propagate through the ring forever.

Alex

Serge Vautour wrote:
 We're trying to save on Transport links. Instead of multi-homing each PE to 2 
 Ps, we're considering building a ring: P-PE-PE-PE-P. This ring follows the 
 transport ring. Each link would be engineering to make sure it can handle all 
 of the traffic from all 3PEs in case of a failure. As the network grows, we 
 could get individual transport links from PE-P.

 Apart from bandwidth, I was curious if there were other problems I related to 
 doing this that I wasn't thinking of. Thanks for all the replies. Much 
 appreciated.

 Serge




 
 From: William McCall william.mcc...@gmail.com
 To: Serge Vautour se...@nbnet.nb.ca
 Cc: nanog@nanog.org
 Sent: Friday, September 4, 2009 1:07:40 AM
 Subject: Re: Single router for P/PE functions

 Kinda depends on what you're doing exactly, but like Erik said, it certainly 
 possible and depending on your particular needs, it might not be much of an 
 issue at all.

 Can you describe your scenario a bit more?

 --WM


 On Thu, Sep 3, 2009 at 10:20 AM, Serge Vautour sergevaut...@yahoo.ca wrote:

   
 Hello,

 
 I'm pretty confident that a router can be used to perform P  PE functions 
 simultaneously. What about from a best practice perspective? Is this 
 something that should be completely avoided? Why? We're considering doing 
 this as a temporary workaround but we all know temporary usually lasts a 
 long time. I'd like to know what kind of mess awaits if we let this one go.
   
 Thanks,
   
 Serge




 
  __
 Yahoo! Canada Toolbar: Search from anywhere on the web, and bookmark your 
 favourite sites. Download it now
   
 http://ca.toolbar.yahoo.com.


 


   




Route table prefix monitoring

2009-09-04 Thread Olsen, Jason
Howdy all,

 

I've done a bit of digging through the Google machine and the MarkMail
archive of NANOG (Which is a great resource I cannot plug enough -
http://nanog.markmail.org) and have a few vague answers, but would like
some deeper thought so I'm putting this out to the list.

 

We recently had an event where, unbeknownst to us, a circuit went down
and a /16 prefix inside our core routing table was withdrawn as a
consequence of adjacency disappearing with that downed circuit (the fact
that it went down without us knowing is being worked already).  This
caused a severe breakage for a legacy system that hasn't been touched in
years, and tribal knowledge couldn't explain why we were seeing that
legacy system going to a subnet that nobody knew anything about (again,
documentation is something that's being worked already as a consequence
of this).

 

What I'm left thinking is that it would have been great if we'd had a
snapshot of our core routing table as it stood hours or even days prior
to this event occurring, so that I could compare it with our current
broken state, so the team could have seen that subnet in the core
table and what the next hop was for the prefix.  Are there any tools
that people are using to track when/what prefixes are added/withdrawn
from their routing tables, or to pull the routing table as a whole at
regular intervals for storage/comparison purposes?  It looks like
there's a plugin for NAGIOS, but I'm looking for suggestions on any
other tools (commercial, open source, home grown) that we might take a
look at.  For reference, we are running Cisco as well as Juniper kit.

 

Feel free to drop me your thoughts off-list.

 

Thank you for any insight ahead of time,

 

-Jason Feren Olsen



Weekly Routing Table Report

2009-09-04 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to bgp-st...@lists.apnic.net

For historical data, please see http://thyme.apnic.net.

If you have any comments please contact Philip Smith p...@cisco.com.

Routing Table Report   04:00 +10GMT Sat 05 Sep, 2009

Report Website: http://thyme.apnic.net
Detailed Analysis:  http://thyme.apnic.net/current/

Analysis Summary


BGP routing table entries examined:  294331
Prefixes after maximum aggregation:  139398
Deaggregation factor:  2.11
Unique aggregates announced to Internet: 147041
Total ASes present in the Internet Routing Table: 32126
Prefixes per ASN:  9.16
Origin-only ASes present in the Internet Routing Table:   27940
Origin ASes announcing only one prefix:   13641
Transit ASes present in the Internet Routing Table:4186
Transit-only ASes present in the Internet Routing Table:104
Average AS path length visible in the Internet Routing Table:   3.6
Max AS path length visible:  24
Max AS path prepend of ASN (12026)   22
Prefixes from unregistered ASNs in the Routing Table:   407
Unregistered ASNs in the Routing Table: 114
Number of 32-bit ASNs allocated by the RIRs:260
Prefixes from 32-bit ASNs in the Routing Table: 105
Special use prefixes present in the Routing Table:0
Prefixes being announced from unallocated address space:319
Number of addresses announced to Internet:   2101706432
Equivalent to 125 /8s, 69 /16s and 126 /24s
Percentage of available address space announced:   56.7
Percentage of allocated address space announced:   64.9
Percentage of available address space allocated:   87.3
Percentage of address space in use by end-sites:   78.8
Total number of prefixes smaller than registry allocations:  140659

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:70157
Total APNIC prefixes after maximum aggregation:   24968
APNIC Deaggregation factor:2.81
Prefixes being announced from the APNIC address blocks:   69597
Unique aggregates announced from the APNIC address blocks:31670
APNIC Region origin ASes present in the Internet Routing Table:3774
APNIC Prefixes per ASN:   18.44
APNIC Region origin ASes announcing only one prefix:   1035
APNIC Region transit ASes present in the Internet Routing Table:580
Average APNIC Region AS path length visible:3.6
Max APNIC Region AS path length visible: 16
Number of APNIC addresses announced to Internet:  493030848
Equivalent to 29 /8s, 99 /16s and 13 /24s
Percentage of available APNIC address space announced: 84.0

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911, 45056-46079
APNIC Address Blocks43/8,  58/8,  59/8,  60/8,  61/8, 110/8, 111/8,
   112/8, 113/8, 114/8, 115/8, 116/8, 117/8, 118/8,
   119/8, 120/8, 121/8, 122/8, 123/8, 124/8, 125/8,
   126/8, 175/8, 180/8, 182/8, 183/8, 202/8, 203/8,
   210/8, 211/8, 218/8, 219/8, 220/8, 221/8, 222/8,
  

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:124764
Total ARIN prefixes after maximum aggregation:66482
ARIN Deaggregation factor: 1.88
Prefixes being announced from the ARIN address blocks:   125341
Unique aggregates announced from the ARIN address blocks: 52721
ARIN Region origin ASes present in the Internet Routing Table:13211
ARIN Prefixes per ASN: 9.49
ARIN Region origin ASes announcing only one prefix:5107
ARIN Region transit ASes present in the Internet Routing Table:1297
Average ARIN Region AS path length visible: 3.3
Max ARIN Region AS path length visible:  24
Number of ARIN addresses announced to Internet:  1013346368
Equivalent to 60 /8s, 102 /16s and 112 /24s
Percentage of available ARIN address space announced:  88.8

ARIN AS Blocks 1-1876, 1902-2042, 2044-2046, 

Re: as702 looking glass?

2009-09-04 Thread R. Scott Evans
On Fri, 4 Sep 2009 13:38:56 +0400 (MSD), Serg Shubenkov wrote
 Folks,
 
 Does anyone know if Verizon (AS702) has a publicly accessable looking
 glass?
 
 -- 
 Serg Shubenkov

it's been 2 years since I last inquired, but the answer then was:

Date: Fri, 17 Aug 2007 17:37:09 + (GMT)
From: hel...@verizonbusiness.com
Subject: (2007081704481) BGP routes

Hi there,
I am afraid we do not have a public looking glass...



OT: 2009 Infrastructure Security Survey

2009-09-04 Thread Danny McPherson


Folks,
We're in the process of collecting feedback for this years
infrastructure security report, the fifth edition of the
report.

The 2008 Infrastructure Security Survey is up and available for
input.  You can register to complete the survey at this URL:

https://www.tcb.net/survey/index.php?sid=98557lang=en

I've again added many questions this time from past participants
of the survey, this should be evidenced throughout.  Feedback
collection will end as soon as we've reached the desired number
of respondents (ideally, 70+).

We hope to make the results available by November 2009 at the
latest.  Also, please recall that NO personally (or organizationally)
identifiable information will be shared in any manner.

The 2008 edition of the survey is available here:

http://www.tcb.net/ISR2008_US.pdf

Or on the Arbor web site (reg required):

http://www.arbornetworks.com/report

Thanks in advance for your participation!

-danny



Re: Route table prefix monitoring

2009-09-04 Thread Matthew Walster
2009/9/4 Olsen, Jason jol...@devry.com:
 Are there any tools
 that people are using to track when/what prefixes are added/withdrawn
 from their routing tables,

Could you use something like BGPMon?

http://bgpmon.com/

Matthew Walster



Re: Route table prefix monitoring

2009-09-04 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Fri, Sep 4, 2009 at 1:48 PM, Matthew Walstermatt...@walster.org wrote:

 2009/9/4 Olsen, Jason jol...@devry.com:
 Are there any tools
 that people are using to track when/what prefixes are added/withdrawn
 from their routing tables,

 Could you use something like BGPMon?

 http://bgpmon.com/


There's also:

MyASN:
http://www.ripe.net/info/faq/projects/myasn.html

PHAS:
http://phas.netsec.colostate.edu/stat.html

- - ferg


-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.5.3 (Build 5003)

wj8DBQFKoX+Oq1pz9mNUZTMRAto+AJ9hn3ZlScq2Tv3TLUCAJCCzPWqmEwCcDImX
lsmccRqdMpbWeoT6wkukuO8=
=Mtdy
-END PGP SIGNATURE-

-- 
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawgster(at)gmail.com
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: Route table prefix monitoring

2009-09-04 Thread Christopher Morrow
On Fri, Sep 4, 2009 at 4:59 PM, Paul Fergusonfergdawgs...@gmail.com wrote:

 On Fri, Sep 4, 2009 at 1:48 PM, Matthew Walstermatt...@walster.org wrote:

 2009/9/4 Olsen, Jason jol...@devry.com:
 Are there any tools
 that people are using to track when/what prefixes are added/withdrawn
 from their routing tables,

 Could you use something like BGPMon?

 http://bgpmon.com/


 There's also:

 MyASN:
 http://www.ripe.net/info/faq/projects/myasn.html

 PHAS:
 http://phas.netsec.colostate.edu/stat.html

I think the OP wanted something for 'internal route monitoring' ...
since he's from DeVry I suspect it's to monitor things on DeVry's
internal WAN which probably don't show in the global table.

That said, you COULD have rancid (or abuse rancid) pull rib-dumps each
'period' and index those into something that alerted on large diff's
(or alerted if some critical bits were missing).  Or have a quagga box
peer with some number of internal devices, log update messages, alert
on withdrawal of critical bits.

-chris
(I don't know of any COTS tools that do this, sorry)



Re: Route table prefix monitoring

2009-09-04 Thread Andree Toonk
Hi Jason, 

.-- My secret spy satellite informs me that at Fri, 04 Sep 2009, Olsen, Jason 
wrote:

 What I'm left thinking is that it would have been great if we'd had a
 snapshot of our core routing table as it stood hours or even days prior
 to this event occurring, so that I could compare it with our current
 broken state, so the team could have seen that subnet in the core
 table and what the next hop was for the prefix.  Are there any tools
 that people are using to track when/what prefixes are added/withdrawn
 from their routing tables, or to pull the routing table as a whole at
 regular intervals for storage/comparison purposes?  

As already mentioned BGPmon.net can probably do what you're looking for. 
It will sent you a notification in cases of interesting path changes, possible 
hijacks, 
new adjacencies and new prefixes.  It will also notify you when 'many' peers 
see a
withdrawal of your prefix. This last feature might be useful for you.

I'm currently also testing a new feature that basically compares yesterday's 
routing 
table with todays table. If there are any 'interesting' changes they will be 
emailed to you.
You can think of this as a rancid for routing tables changes. 
I can include you in testing if you want to.

All of this does assume that your prefixes are globally visible though.

Cheers,
 Andree



RE: Route table prefix monitoring

2009-09-04 Thread Fouant, Stefan
 -Original Message-
 From: Christopher Morrow [mailto:morrowc.li...@gmail.com]
 Sent: Friday, September 04, 2009 5:07 PM
 To: Paul Ferguson
 Cc: nanog@nanog.org
 Subject: Re: Route table prefix monitoring
 
 On Fri, Sep 4, 2009 at 4:59 PM, Paul Fergusonfergdawgs...@gmail.com
 wrote:
 
  On Fri, Sep 4, 2009 at 1:48 PM, Matthew Walstermatt...@walster.org
 wrote:
 
  2009/9/4 Olsen, Jason jol...@devry.com:
  Are there any tools
  that people are using to track when/what prefixes are
 added/withdrawn
  from their routing tables,
 
  Could you use something like BGPMon?
 
  http://bgpmon.com/
 
 
  There's also:
 
  MyASN:
  http://www.ripe.net/info/faq/projects/myasn.html
 
  PHAS:
  http://phas.netsec.colostate.edu/stat.html
 
 I think the OP wanted something for 'internal route monitoring' ...
 since he's from DeVry I suspect it's to monitor things on DeVry's
 internal WAN which probably don't show in the global table.
 
 That said, you COULD have rancid (or abuse rancid) pull rib-dumps each
 'period' and index those into something that alerted on large diff's
 (or alerted if some critical bits were missing).  Or have a quagga box
 peer with some number of internal devices, log update messages, alert
 on withdrawal of critical bits.
 
 -chris
 (I don't know of any COTS tools that do this, sorry)

Tools such as Arbor Peakflow SP have a lot of cool traffic and routing analysis 
bits for internal monitoring of this sort, but it might be a bit out of your 
price range.  Having said that, I second Chris's approach above utilizing some 
quagga box/low-end router (make sure you have enough memory!) and simply 
reflect routes from your production routers in conjunction with update message 
logging.

If you're looking for tools that perform analysis from an exterior 
point-of-view, there is also BGPlay which has some cool widgetry to see 
particular prefixes within a user-specific time interval.  Again it's using the 
operators route-servers so might not be of much value to you

http://bgplay.routeviews.org/bgplay/

Stefan Fouant 
Neustar, Inc. / Principal Engineer
46000 Center Oak Plaza Sterling, VA 20166
Office: +1.571.434.5656 ▫ Mobile: +1.202.210.2075 ▫ GPG ID: 0xB5E3803D ▫ 
stefan.fou...@neustar.biz



BGP Update Report

2009-09-04 Thread cidr-report
BGP Update Report
Interval: 27-Aug-09 -to- 03-Sep-09 (7 days)
Observation Point: BGP Peering with AS131072

TOP 20 Unstable Origin AS
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS9198   103193  5.5% 280.4 -- KAZTELECOM-AS Kazakhtelecom 
Corporate Sales Administration
 2 - AS30890   88214  4.7% 181.1 -- EVOLVA Evolva Telecom / iLink 
Telecom
 3 - AS33783   22610  1.2% 147.8 -- EEPAD
 4 - AS845214795  0.8%  14.7 -- TEDATA TEDATA
 5 - AS270814017  0.8% 128.6 -- Universidad de Guanajuato
 6 - AS35805   10774  0.6%  28.0 -- UTG-AS United Telecom AS
 7 - AS24863   10450  0.6%  11.1 -- LINKdotNET-AS
 8 - AS982910214  0.6%  10.2 -- BSNL-NIB National Internet 
Backbone
 9 - AS237009792  0.5%  27.3 -- BM-AS-ID PT. Broadband 
Multimedia, Tbk
10 - AS5668 9676  0.5%   9.4 -- AS-5668 - CenturyTel Internet 
Holdings, Inc.
11 - AS201159123  0.5%   6.2 -- CHARTER-NET-HKY-NC - Charter 
Communications
12 - AS3464 8771  0.5%  23.1 -- ASC-NET - Alabama Supercomputer 
Network
13 - AS250198719  0.5% 134.1 -- SAUDINETSTC-AS Autonomus System 
Number for SaudiNet
14 - AS8151 8514  0.5%   5.7 -- Uninet S.A. de C.V.
15 - AS4618 8080  0.4% 136.9 -- INET-TH-AS Internet Thailand 
Company Limited
16 - AS4323 7833  0.4%   3.8 -- TWTC - tw telecom holdings, inc.
17 - AS124797679  0.4%  16.1 -- UNI2-AS Uni2 Autonomous System
18 - AS4249 7546  0.4%  41.5 -- LILLY-AS - Eli Lilly and Company
19 - AS117697518  0.4% 375.9 -- MOBILENETICS-LA-GW1 - 
Mobilenetics Corporation
20 - AS5800 7170  0.4%  52.0 -- DNIC-ASBLK-05800-06055 - DoD 
Network Information Center


TOP 20 Unstable Origin AS (Updates per announced prefix)
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS171361765  0.1%1765.0 -- SPANGROUP-UTI - Span 
Manufacturing Ltd.
 2 - AS44194 641  0.0% 641.0 -- FREIFUNK-BERLIN-AS Freifunk 
Berlin
 3 - AS42969 590  0.0% 590.0 -- G4SCASH G4S Cash Services (CZ), 
a.s.
 4 - AS26414 495  0.0% 495.0 -- LVCINT - LVC International, LLC
 5 - AS49517 889  0.1% 444.5 -- TEIKHOS-AS Teikhos
 6 - AS476401282  0.1% 427.3 -- TRICOMPAS Tricomp Sp. z. o. o.
 7 - AS8668 2718  0.1% 388.3 -- TELONE-AS TelOne Zimbabwe P/L
 8 - AS5050 6118  0.3% 382.4 -- PSC-EXT - Pittsburgh 
Supercomputing Center
 9 - AS303411141  0.1% 380.3 -- SCTA-ASN - South Central 
Telephone Association
10 - AS19398 754  0.0% 377.0 -- INDENET - Indenet.net
11 - AS117697518  0.4% 375.9 -- MOBILENETICS-LA-GW1 - 
Mobilenetics Corporation
12 - AS309695308  0.3% 353.9 -- TAN-NET TransAfrica Networks
13 - AS29544 690  0.0% 345.0 -- MAURITEL-AS
14 - AS17301 315  0.0% 315.0 -- FASTENAL - Fastenal Company
15 - AS42182 306  0.0% 306.0 -- KFMC-ASN AS Number for King 
Fahd Medical City
16 - AS400602533  0.1% 281.4 -- AAAWI - AAA Wireless, Inc.
17 - AS9198   103193  5.5% 280.4 -- KAZTELECOM-AS Kazakhtelecom 
Corporate Sales Administration
18 - AS47361 277  0.0% 277.0 -- SYSDESIGN-NET-AS System Design 
LLC
19 - AS350483181  0.2% 265.1 -- NETZONE-AS SC Power Netzone SRL
20 - AS432401050  0.1% 262.5 -- GLINNET GLINNET's AS Number


TOP 20 Unstable Prefixes
Rank Prefix Upds % Origin AS -- AS Name
 1 - 89.218.218.0/23   11017  0.6%   AS9198  -- KAZTELECOM-AS Kazakhtelecom 
Corporate Sales Administration
 2 - 89.218.220.0/23   11016  0.6%   AS9198  -- KAZTELECOM-AS Kazakhtelecom 
Corporate Sales Administration
 3 - 92.46.244.0/2311014  0.6%   AS9198  -- KAZTELECOM-AS Kazakhtelecom 
Corporate Sales Administration
 4 - 95.59.2.0/23  11002  0.6%   AS9198  -- KAZTELECOM-AS Kazakhtelecom 
Corporate Sales Administration
 5 - 95.59.8.0/23  11000  0.6%   AS9198  -- KAZTELECOM-AS Kazakhtelecom 
Corporate Sales Administration
 6 - 95.59.4.0/22  11000  0.6%   AS9198  -- KAZTELECOM-AS Kazakhtelecom 
Corporate Sales Administration
 7 - 95.59.3.0/24  10997  0.6%   AS9198  -- KAZTELECOM-AS Kazakhtelecom 
Corporate Sales Administration
 8 - 88.204.221.0/24   10723  0.6%   AS9198  -- KAZTELECOM-AS Kazakhtelecom 
Corporate Sales Administration
 9 - 95.59.1.0/24  10687  0.6%   AS9198  -- KAZTELECOM-AS Kazakhtelecom 
Corporate Sales Administration
10 - 72.23.246.0/24 6032  0.3%   AS5050  -- PSC-EXT - Pittsburgh 
Supercomputing Center
11 - 207.157.105.64/2   5239  0.3%   AS3464  -- ASC-NET - Alabama Supercomputer 
Network
12 - 84.1.45.0/24   5187  0.3%   AS41313 -- NOVATEL-AS Novatel Bulgaria
13 - 203.129.254.0/24   3948  0.2%   AS7633  -- 

The Cidr Report

2009-09-04 Thread cidr-report
This report has been generated at Fri Sep  4 21:11:40 2009 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
28-08-09301511  186429
29-08-09301248  186322
30-08-09301138  186464
31-08-09301665  186538
01-09-09301637  186574
02-09-09301706  184566
03-09-09301747  184730
04-09-09301651  184941


AS Summary
 32261  Number of ASes in routing system
 13742  Number of ASes announcing only one prefix
  4311  Largest number of prefixes announced by an AS
AS4323 : TWTC - tw telecom holdings, inc.
  89478400  Largest address span announced by an AS (/32s)
AS27064: DNIC-ASBLK-27032-27159 - DoD Network Information Center


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 04Sep09 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 301649   184909   11674038.7%   All ASes

AS6389  4178  327 385192.2%   BELLSOUTH-NET-BLK -
   BellSouth.net Inc.
AS4323  4311 1761 255059.2%   TWTC - tw telecom holdings,
   inc.
AS4766  1836  544 129270.4%   KIXS-AS-KR Korea Telecom
AS17488 1553  291 126281.3%   HATHWAY-NET-AP Hathway IP Over
   Cable Internet
AS4755  1232  144 108888.3%   TATACOMM-AS TATA
   Communications formerly VSNL
   is Leading ISP
AS18566 1062   10 105299.1%   COVAD - Covad Communications
   Co.
AS22773 1095   70 102593.6%   ASN-CXA-ALL-CCI-22773-RDC -
   Cox Communications Inc.
AS8151  1477  563  91461.9%   Uninet S.A. de C.V.
AS10620 1009  134  87586.7%   TV Cable S.A.
AS18101  952   85  86791.1%   RIL-IDC Reliance Infocom Ltd
   Internet Data Centre,
AS19262 1043  236  80777.4%   VZGNI-TRANSIT - Verizon
   Internet Services Inc.
AS6478  1396  644  75253.9%   ATT-INTERNET3 - ATT WorldNet
   Services
AS8452   989  287  70271.0%   TEDATA TEDATA
AS3356  1220  592  62851.5%   LEVEL3 Level 3 Communications
AS1785  1736 1115  62135.8%   AS-PAETEC-NET - PaeTec
   Communications, Inc.
AS4804   686   68  61890.1%   MPX-AS Microplex PTY LTD
AS4808   767  213  55472.2%   CHINA169-BJ CNCGROUP IP
   network China169 Beijing
   Province Network
AS11492 1120  566  55449.5%   CABLEONE - CABLE ONE, INC.
AS7303   635   94  54185.2%   Telecom Argentina S.A.
AS9498   634  103  53183.8%   BBIL-AP BHARTI Airtel Ltd.
AS22047  542   16  52697.0%   VTR BANDA ANCHA S.A.
AS4134  1001  534  46746.7%   CHINANET-BACKBONE
   No.31,Jin-rong Street
AS17676  564  127  43777.5%   GIGAINFRA Softbank BB Corp.
AS7018  1497 1061  43629.1%   ATT-INTERNET4 - ATT WorldNet
   Services
AS7011  1015  590  42541.9%   FRONTIER-AND-CITIZENS -
   Frontier Communications of
   America, Inc.
AS4780   566  146  42074.2%   SEEDNET Digital United Inc.
AS5668   787  367  42053.4%   AS-5668 - CenturyTel Internet
   Holdings, Inc.
AS7545   841  429  41249.0%   TPG-INTERNET-AP TPG Internet
   Pty Ltd
AS4668   695  285  41059.0%   LGNET-AS-KR LG CNS
AS7738   419   29  39093.1%   Telecomunicacoes da Bahia S.A.

Total  36858114312542769.0%   Top 30 total


Possible Bogus Routes

24.245.128.0/17  AS11492 CABLEONE - CABLE ONE, INC.
41.223.92.0/22   AS36936 CELTEL-GABON Celtel Gabon Internet Service
41.223.176.0/22

Reach.com folks need email assistance?

2009-09-04 Thread Christopher Morrow
Perhaps someone from REACH NOC can send me a private email? It seems
your IRR POC email is non-functional.

-Chris

  - The following addresses had permanent fatal errors -
i...@net.reach.com

  - Transcript of session follows -
i...@net.reach.com... Deferred: postoffice.net.reach.com.: No route to host
Message could not be delivered for 3 days
Message will be deleted from queue

Final-Recipient: RFC822; i...@net.reach.com
Action: failed
Status: 4.4.7
Remote-MTA: DNS; postoffice.net.reach.com
Last-Attempt-Date: Sat, 5 Sep 2009 05:05:22 +0100



Re: Reach.com folks need email assistance?

2009-09-04 Thread Christopher Morrow
hey! sam from the reach noc reached out to me :) Thanks!

-chris

On Sat, Sep 5, 2009 at 12:14 AM, Christopher
Morrowmorrowc.li...@gmail.com wrote:
 Perhaps someone from REACH NOC can send me a private email? It seems
 your IRR POC email is non-functional.

 -Chris

  - The following addresses had permanent fatal errors -
 i...@net.reach.com

  - Transcript of session follows -
 i...@net.reach.com... Deferred: postoffice.net.reach.com.: No route to host
 Message could not be delivered for 3 days
 Message will be deleted from queue

 Final-Recipient: RFC822; i...@net.reach.com
 Action: failed
 Status: 4.4.7
 Remote-MTA: DNS; postoffice.net.reach.com
 Last-Attempt-Date: Sat, 5 Sep 2009 05:05:22 +0100