Hi folks we have a point and have a 63km between point A to point B. We
have a sigle fiber ( only one fiber) and use a fiberstore sfp+ 10GB dibi
1270/1330 module to connect these sites. All attenuation are okI don¹t have
any trouble on fiber .
I have received this signal on my sfp+:
Receiver
Stephen Satchell schreef op 26-3-2015 om 12:24:
On 03/25/2015 07:31 PM, Aaron C. de Bruyn wrote:
After getting a few helpful users on the phone to run some quick
tests, we found port 22 was blocked.
It's been a while since I did this, but you can select an additional
port to accept SSH
Stephen Satchell l...@satchell.net writes:
It's been a while since I did this, but you can select an additional
port to accept SSH connections.
That's easy:
jens@screen:~$ grep Port /etc/ssh/sshd_config
Port 22
Port 443
Picking the right port to use is an exercise, though, that will
On 03/25/2015 07:31 PM, Aaron C. de Bruyn wrote:
After getting a few helpful users on the phone to run some quick
tests, we found port 22 was blocked.
It's been a while since I did this, but you can select an additional
port to accept SSH connections. A Google search indicates you can
specify
Meraki Access Points are interesting devices.
I have found they cause issues with Linux firewalls if the merakis are not
configured correctly.
Meraki Access Points do content inspections which I have found can cause
produce symptoms similar to yours, although I have not experienced what you
Wouldn't it be a BCP to set no-export from the Noction device too?
On 3/26/2015 6:20 PM, Nick Rose wrote:
Several people asked me off list for more details, here is what I have
regarding it.
This morning a tier2 isp that connects to our network made an error in their
router configuration
This should be resolved from AS18978. If you experience anything else please
let me know and I will get it addressed immediately.
Regards,
Nick Rose
CTO @ Enzu Inc.
-Original Message-
From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Randy
Sent: Thursday, March 26, 2015 12:14 PM
Someone with Frontier contacted me off-list and assured me they don't
block port 22, and that it could have been related to port scans,
infected PCs, etc... They are looking in to it.
Apologies for the noise and for being a prat. ;)
-A
On Wed, Mar 25, 2015 at 7:31 PM, Aaron C. de Bruyn
Anyone from godaddy on here or have contact details for them? We are
having a routing issue to them.
Tim, please contact me offlist.
Anne
Anne P. Mitchell, Esq.
CEO/President
ISIPP SuretyMail Email Reputation, Accreditation Certification
Your mail system + SuretyMail accreditation =
On 03/26/2015 9:00 am, Peter Rocca wrote:
+1
The summary below aligns with our analysis as well.
We've reached out to AS18978 to determine the status of the leak but
at this time we're not seeing any operational impact.
+2, after the morning coffee sunk in and helpful off list replies I can
Thu, Mar 26, 2015 at 03:38:55PM -0700, Mike wrote:
I have a customer however that uses our web mail system now secured
with ssl. I myself and many others use it and get the green lock. But,
whenever any station at the customer tries using it, they get a broken
lock and 'your connection is
Several people asked me off list for more details, here is what I have
regarding it.
This morning a tier2 isp that connects to our network made an error in their
router configuration causing the route leakage. The issue has been addressed
and we will be performing a full post mortem to ensure
On 27 Mar 2015, at 5:38, Mike wrote:
How is this possible? Can anyone comment on these devices and tell me
what might be going on here?
It's been compromised and its being used for MITM? Or has some sort of
TLS inspection capability built in which is essentially MITM, and which
is
You might want to look at some of the documentation on that device.
Looks like it might be doing some proxy stuff.
Regards,
-Joe
On Thu, Mar 26, 2015 at 5:38 PM, Mike mike-na...@tiedyenetworks.com wrote:
Hi,
I have a very odd problem.
We've recently gotten a 'real' ssl certificate
Hi,
I have a very odd problem.
We've recently gotten a 'real' ssl certificate from godaddy to
cover our domain (*.domain.com) and have installed it in several places
where needed for email (imap/starttls and etc) and web. This works
great, seems ok according to various online TLS
On Thu, Mar 26, 2015 at 10:08 AM, Randy a...@djlab.com wrote:
On Thursday March 26th 2015 at 12:18 UTC (and on-going) we are seeing more
specifics on one of our prefixes. Anyone else seeing similar or is it just
us?
is your AS in the path below? (what is your AS so folk can check for
your
On 03/26/2015 7:27 am, Christopher Morrow wrote:
is your AS in the path below? (what is your AS so folk can check for
your prefixes/customer-prefixes and attempt to help?)
Sorry, we're 29889.
Hi Randy,
Assuming that your prefix is 198.98.180.0/22 (AS29889 - FSNET-1 - Fast
Serv Networks, LLC) none of the mentioned more specifics are currently
seen from the RIPE NCC's RIS network, see the Looking Glass widget:
https://stat.ripe.net/198.98.180.0/23#tabId=routing
Hi List,
this morning our BGPmon system picked up many new more specific
announcements by a variety of Origin ASns, the interesting part is that
the majority of them were classified as BGP Man In The middle attacks
(MITM).
A typical alert would look like:
All, I have reached out to Aaron privately for details, but we do not block
port 22 traffic unless it is in direct response to an attack or related item.
Please let me know directly if you have any specific questions.
Thanks,
-Jeff
On Mar 26, 2015, at 7:09 AM, Livingood, Jason
We are AS 10326 130.215.0.0/16 and I just received a BGPmon alert as
well:
130.215.160.0/20 4795 4795 4761 9304 40633 18978 4436 10326
130.215.176.0/20 4795 4795 4761 9304 40633 18978 4436 10326
On Thu, Mar 26, 2015 at 10:45:09AM -0400, Christopher Morrow wrote:
On Thu, Mar 26, 2015 at 10:43
+1
The summary below aligns with our analysis as well.
We've reached out to AS18978 to determine the status of the leak but at this
time we're not seeing any operational impact.
-Original Message-
From: Andree Toonk [mailto:andree+na...@toonk.nl]
Sent: March-26-15 11:54 AM
To: Peter
On Thu, Mar 26, 2015 at 10:38 AM, Randy a...@djlab.com wrote:
On 03/26/2015 7:27 am, Christopher Morrow wrote:
is your AS in the path below? (what is your AS so folk can check for
your prefixes/customer-prefixes and attempt to help?)
Sorry, we're 29889.
ok, and it looks like the path you
On Thursday March 26th 2015 at 12:18 UTC (and on-going) we are seeing
more specifics on one of our prefixes. Anyone else seeing similar or
is it just us?
198.98.180.0/23 4795 4795 4761 9304 40633 18978 4436 29889
198.98.182.0/23 4795 4795 4761 9304 40633 18978 4436 29889
--
Randy
We just received a similar alert from bgpmon - part of 108.168.0.0/17 is being
advertised as /20's - although we're still listed as the origin. We are 40788.
108.168.64.0/20 4795 4795 4761 9304 40633 18978 6939 40788
108.168.80.0/20 4795 4795 4761 9304 40633 18978 6939 40788
108.168.96.0/20
All,
Info gathered off-list indicates this may be a couple of issues in our
case - possible routing leak by 18978 (check your tables!) and more
specifics on our prefixes from 4795 that we couldn't see before the leak
hence the apparent hijack.
--
~Randy
26 matches
Mail list logo