Re: tcp md5 bgp attacks?

2018-08-15 Thread lobna gouda
Out of curiosity, are you asking for a specific research/project that you need some data for? GTSM is not a replacement for the ACL filtering the bgp speakers or the MD5 ( that is widely supported). If GTSM is not supported you can always predefine the TTL it in the session and manipulate

Re: What NMS do you use and why?

2018-08-15 Thread William Herrin
On Wed, Aug 15, 2018 at 9:49 AM, Colton Conor wrote: > We are looking for a new network monitoring system. Since there are so many > operators on this list, I would like to know which NMS do you use and why? > Is there one that you really like, and others that you hate? I still use a tool I

Craigslist

2018-08-15 Thread Michael Crapse
Cragslist is blocking our largest IP block, if someone from CL could contact me off list, that would be great.

Re: What NMS do you use and why?

2018-08-15 Thread Peter Harrison
As a small operator, we mainly use Icinga for the reasons Chuck mentioned. The API allows us to do updates based on configuration parameters we've created in a custom MySQL database. Peter Peter Harrison CTO, Colovore LLC On Wed, Aug 15, 2018 at 9:19 AM, Chuck Anderson wrote: > On Wed, Aug

Re: tcp md5 bgp attacks?

2018-08-15 Thread Randy Bush
> With regards to BGP, the MD5 thing was promulgated to counter what was > a largely theoretical threat. the rst attacks were a very serious problem. attacks were very real and very disruptive. gtsm et alia were a few years later. > We still see DDoS attacks against routers, of course. i am

Re: What NMS do you use and why?

2018-08-15 Thread Chuck Anderson
On Wed, Aug 15, 2018 at 08:49:12AM -0500, Colton Conor wrote: > We are looking for a new network monitoring system. Since there are so many > operators on this list, I would like to know which NMS do you use and why? > Is there one that you really like, and others that you hate? > > For free

Re: What NMS do you use and why?

2018-08-15 Thread Mel Beckman
I run OpenNMS currently, and the one problem I have is it's very peculiar -- one might say academic -- terminology and structure. It's not a point-and-click interface, despite being web-based. Instead, you must wrangle with pollers and responders and notifiers. Eventually I got my head around

Re: What NMS do you use and why?

2018-08-15 Thread Daniel Lacey
Take a look at opennms.org Scales very well. Lots of API hooks for integration with other data sources and applications. It is open source and they offer paid support services, one-time (e.g. setup and training) or on-going support contracts. On 8/15/18 7:49 AM, Colton Conor wrote: > We are

Re: What NMS do you use and why?

2018-08-15 Thread Jason Lixfeld
(resending with really, really the correct from:) Here’s a snapshot of what tends to work for me, along with my $0.02 of thoughts: - Observium handles polling, graphing and alerting for SNMP exposed objects on network devices, - I feel that a visual representation of the physical network

Re: What NMS do you use and why?

2018-08-15 Thread Chuck Anderson
On Wed, Aug 15, 2018 at 08:49:12AM -0500, Colton Conor wrote: > We are looking for a new network monitoring system. Since there are so many > operators on this list, I would like to know which NMS do you use and why? > Is there one that you really like, and others that you hate? > > For free

What NMS do you use and why?

2018-08-15 Thread Colton Conor
We are looking for a new network monitoring system. Since there are so many operators on this list, I would like to know which NMS do you use and why? Is there one that you really like, and others that you hate? For free options (opensouce), LibreNMS and NetXMS come highly recommended by many

Re: tcp md5 bgp attacks?

2018-08-15 Thread Fred Baker
Well, think about RST attacks, in which someone bombards a TCP connection with TCP RESET in the hopes of threading a needle and taking it down. It's not the end of the world - BGP restarts - but there is an outage. The simplest way to protect against that (and against having someone with a

RE: tcp md5 bgp attacks?

2018-08-15 Thread Lotia, Pratik M
Just to point out - Data about md5 attacks from various organizations will depend on a number of factors such as - Is BGP TTL Security check being done? Are anti-spoofing ACLs enabled? uRPF enabled? Strict or Loose? BGP Session over a separate interface (tunnel)? With Gratitude, Pratik Lotia