FW: Spamming and ssh attack from a customers

2011-01-06 Thread Tarig Yassin
Depends on your acceptable use policy and terms of service. If they won't or aren't able to respond effectively, I would say that (depdning on the who and what of your customer), shutting down the port may be a viable next step. Hi mike In our case, the AUP gives us the right to do so,

Router only speaks IGP in BGP network

2010-12-23 Thread Tarig Yassin
Dear all In my network, I have a router in a middle only speaks OSPF. is there any solution (without redistribute BGP into OSPF) for this kind of problem? thanks -- Tarig Y. Adam CTO - SUIN www.suin.edu.sd

RE: Router only speaks IGP in BGP network

2010-12-23 Thread Tarig Yassin
provide. cheers On Thu, Dec 23, 2010 at 1:18 PM, Tarig Yassin tariq198...@hotmail.com wrote: Dear all In my network, I have a router in a middle only speaks OSPF. is there any solution (without redistribute BGP into OSPF) for this kind of problem? thanks -- Tarig Y. Adam CTO

Appliance Vs Software based routers

2010-07-25 Thread Tarig Yassin
Dear all Greetings I'm wondering why the software based router is not preferable in business even if they have high featured Processers, and high capcity of memory. What is the main deferent between Appliance router and Software based routers? thank you all in adavance. --

Who controlls the Internet?

2010-07-25 Thread Tarig Yassin
Deal all I want to show you some obstacles that some countries face them every day. For example when users from Sudan trying to access some web site they will get a *Forbidden Access Error* message. And some messages say: you are forbidden to access this web site because your IP

RE: Who controlls the Internet?

2010-07-25 Thread Tarig Yassin
And why not the ICCAN take this reponsibity as an International organization not USA government? From: tariq198...@hotmail.com To: nanog@nanog.org Subject: Who controlls the Internet? Date: Sun, 25 Jul 2010 20:24:27 +0300 Deal all I want to show you some obstacles that some

RE: Who controlls the Internet?

2010-07-25 Thread Tarig Yassin
From: patr...@ianai.net Subject: Re: Who controlls the Internet? Date: Sun, 25 Jul 2010 13:55:56 -0400 To: nanog@nanog.org On Jul 25, 2010, at 13:24, Tarig Yassin tariq198...@hotmail.com wrote: I want to show you some obstacles that some countries face them every day

Network Documentation

2010-06-29 Thread Tarig Yassin
Hello every one I am curious as to how others are documenting their network; both visually and configurations. Is there any a software offers a database with web-based front end that can document in a very details. thanks -- Tarig Y. Adam CTO - SUIN www.suin.edu.sd

RE: Reverse DNS Question

2010-04-20 Thread Tarig Yassin
Dear janes as I know many services use reverse lookup as a sender authentication technique. e.g. Email server using this technique to reduce spams.( if the ip adress of sending smtp server has no reverse lookup it's messages will be considered spam). regards, Date: Tue, 20 Apr 2010 16:08:04

RE: DNS TXT field usage ?

2010-03-29 Thread Tarig Yassin
Hi Jul Dkim , SPF ,and Domainkey are sender authentication methods for email system. Which use Public Key Cryptography. The mail server apends signiture to every outgoing message using private key. the recepient mail server to verify needs the public key which placed in the sender DNS

[NANOG] NREN Network Design

2010-02-01 Thread Tarig Yassin Adam
; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} - Eng. Tarig Yassin Adam Sudanese Universities' Information Network (SUIN) T: +249925659149 E: ta...@sustech.edu