Radke, Justin jra...@canbytel.com wrote:
2. Do you have an actual localhost zone that issues 127.0.0.1?
Yes. I think this is best practice though it isn't required by RFC 6303
and isn't set up by default in BIND like the empty reverse DNS zones.
3. Do you block 512 Bytes DNS requests?
512
This is an important book - well worth your time, and, more importantly,
accessible to non-specialists (such as BDMs):
http://www.amazon.com/Spam-Nation-Organized-Cybercrime--Epidemic-ebook/dp/B00L5QGBL0/
http://www.amazon.com/Spam-Nation-Organized-Cybercrime--Epidemic/dp/1402295618/
It's
Hello,
TheWorldMainBusinessRule says: Don't work with morons!!! Never. In any
way. Even if it seems for the first look they give you prices and offers
times better than normal people. Just don't even think.
:)
On 17.11.14 20:11, Jérôme Nicolle wrote:
Hello,
I'm having a discussion with
If they really wanted to lock you in, they would have triangular modules
instead of square...
Or I suppose the vendors like to be able to shop around for modules, before
they relabel and sell them to you at a 10x markup.
They want the ability to buy off the shelf components when they manufacture.
They just don't want you to have the same privilege when you purchase. Your
switches and routers are made of a bunch of OEM components with some custom
programmed ASICS and some secret sauce. If they used non
On Mon, Nov 17, 2014, at 07:02 PM, Jérôme Nicolle wrote:
It's probably fine in a pure DC environment with few locations and only
one SFP+ type, but it's rapidly a total mess when you have to manage 40
channels for 3 module types over dozens of locations AND the added
manufacturer specific
Hello,
I provide broadband connectivity to mostly residential users. Over the
past few years, instances of DDoS against the network - specfically
targeting end users - has been on the rise, and today I can qualify many
of these as simple acts of revenge where someone will engage a dos
We need to come up with some sort of international Abuse Reduction and
Reporting Engagement Suite of Tools as a Service.
M.
Original Message
From: Mike
Sent: Tuesday, November 18, 2014 19:59
To: nanog@nanog.org
Subject: abuse reporting tools
Hello,
I provide broadband connectivity to
On 11/18/2014 8:11 PM, Michael Brown wrote:
We need to come up with some sort of international Abuse Reduction and
Reporting Engagement Suite of Tools as a Service.
M.
I've been considering a post for a couple of weeks but decided most of
my complaints were petty. I've been getting lots of
Some folks might disagree with this, but if it's an important service that
I have running on a network, I will block a series of garbage AS's (closer
to /8 the better) at the firewall (not at the edge) and that reduces the
headaches by 50%. This isn't practical at the edge, but for system
Just wait for GigE-everywhere.
I am almost sure that these new Gig-to-the-toaster residential installs have
very little rate filtering (or abuse response); let's hope that
oversubscription solves the issue handily as it has traditionally.
/kc
On Tue, Nov 18, 2014 at 08:19:01PM -0600, Rafael
Hi,
When youre doing overlay networking, i.e., you have tunnels from one
virtual machine in a DC to another in another DC, then can i consider a
tunnel between the two virtual machines as a physical link that exists in
a regular network?
I am wondering on what possibly can be the difference
Anybody? Makes it a pain to perform surgical spam blocking when this
happens :)
suresh@samwise 01:52:24 ~ $ telnet rwhois.level3.net 4321
Trying 209.244.1.179...
^C
--
Suresh Ramasubramanian (ops.li...@gmail.com)
13 matches
Mail list logo