Hey All
Quick question: do you allow/run routing protocols between your (isp-)
network and your customer?
If so: which protocols?
If not: what reasons do you tell the customer?
In particular I am interested to know about setups when they want to
announce the prefix/subnet you assigned them from your PA-space back to
you because they want to run redundant routers.
The setup would probably look like this:
Customer Subnet 10.0.0.0/27
/ \
| |
[customer router a] - <routing protocol x> - [customer router b]
| |
<routing protocol y> <routing protocol y>
| |
[isp router a] - <routing protocol z> - [isp router b]
| |
\ /
ISP Network 10.0.0.0/8
--
Best regards,
Roman Hochuli
Operations Manager
nexellent ag
Saegereistrasse 33
CH-8152 Glattbrugg
Phone: +41 44 872 20 00
Fax: +41 44 872 20 01
URL: www.nexellent.ch
X-NCC-RegID: ch.nexellent
Imagination is the one weapon in the war
against reality.
-- Jules de Gaultier
hi everone,
i've reopened the registration for SwiNOG #25 until tomorrow, november
2nd 12:00:00.
just in case some more people want to join...
after this date you may register on site (CHF 100.-)
greetings
-steven
hi all,
I'm looking for an open-source tool for ISP service management. It should allow documenting of all the physical network (ideally, also the datacenter environment), and associate physical and logical network instances with customer services and their contracts.
I looked at several tools, but they all are designed for Enterprise IT tasks, and none of them deals with subscribers and contracts:
http://www.opendcim.org/http://www.i-doit.org/
The NOC project seems to be promising, I should probably invest more time in learning it:
http://kb.nocproject.org/display/SITE/NOC
Your feedback will be appreciated.
Commercial systems would also be OK, as long as they fit the requirements and have open API.
thanks,
stan
Dear SwiNOGers,
The registration for SwiNOG #25 is open until 1st of November.
If you want to join after this date, the registration fee is CHF 100.- (can be paid on site).
The agenda for SwiNOG #25 is available here: http://www.swinog.ch/meetings/swinog25/agenda.asp
A special thank to our sponsors which helped us to make this event happen:
Cisco
Equinix & Ancotel
Registration: https://register.swinog.ch/
Have a nice weekend!
--
Best regards,
Roman Hochuli
SwiNOG Organisation
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi Folks,
if someone from Colt here is reading, please call me back on +41 78
810 39 88
I have an issue with one of my customers customers (sic) with a line
kloten/equinix. Need this resolved asap...
Thanks!
Silvan
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
iEYEARECAAYFAlCI08IACgkQC82WwYR1u2r4XwCgmc5B6K75+Ls9Zoz5cjY5tH2b
LHEAnAgYRBNbErkXsJu782xygpqAOMOv
=HTPK
-----END PGP SIGNATURE-----
Hello All
Does anybody by chance has a media converter laying around which would
be able to convert XFP to SFP+ or (even better) SFP+ to SFP+?
Pointers to a vendor with such a piece of hardware on stock are welcome
as well.
Please get in touch with me directly.
Thank guys. :)
--
Best regards,
Roman Hochuli
Operations Manager
nexellent ag
Saegereistrasse 33
CH-8152 Glattbrugg
Phone: +41 44 872 20 00
Fax: +41 44 872 20 01
URL: www.nexellent.ch
X-NCC-RegID: ch.nexellent
Imagination is the one weapon in the war
against reality.
-- Jules de Gaultier
Hi guys,
I want to say thank you to all you guys on the Mailinglist here that tried to help me ;) I managed to get everything together I need and I'm quite impressed how fast I can get help here if I am in a problem :)
so thanks! This Mailinglist is great!
LG
Silvan
Hello,
Last Wednesday the RIPE NCC launched the IP Analyser as a production service:
http://www.ripe.net/ripe/mail/archives/ncc-services-wg/2012-October/001884.…
The application gives an overview of all your allocations, assignments, free space and invalid assignments in a user friendly web interface. It can also give a suggestion when you want to assign a free block:
https://lirportal.ripe.net/ipanalyser/ (requires member login)
We also offer an API that serves the IP Analyser data in JSON or plain text format. With plain text, we are trying to mimic the "asused" format as much as possible, but with JSON, we're actually entering new waters.
The JSON structure we defined is based on our best guesses and limited user feedback during the beta period. Moving forward, I would like to know if it useful for you and contains all data you need for your IP address management. If there is data missing or it takes a lot of effort to derive certain data, please tell me. Furthermore, I want to know if there is any interest in XML format.
The documentation or the IP Analyser API is here:
http://www.ripe.net/data-tools/developer-documentation/the-lir-portal-ip-an…
In addition, there is a My Resources API which serves all your resource data in JSON and XML:
http://www.ripe.net/data-tools/developer-documentation/lir-portal-api-keys
Thanks for any feedback you may have!
Cheers,
Alex
Hi all,
maybe some are not on that list but interessted in that area
Roger
-------- Original-Nachricht --------
Betreff: [VOIPSEC] Artemisa (an open-source VoIP honeypot) - Active
Attackers needed
Datum: Wed, 17 Oct 2012 16:22:06 -0300
Von: Artemisa Notifications <artemisa.notifications(a)gmail.com>
An: voipsec(a)voipsa.org
Dear VoIP enthusiasts and Community members,
We're writing in order to invite you all to participate in a research
open-source project, we've been working in since the beginning of this
year. This project is sponsored by the Science* and Technology Government
Department & Blas Pascal University, both organizations from Córdoba
province, Argentina.*
The link to the project: http://artemisa.sourceforge.net/ . Our work is
related to an open source honeypot, named Artemisa, for VoIP networks
deploying the SIP protocol. We'll really appreciate the participation of
anyone that has interest to play the *attacker's role*, if possible
concentrating in the VoIP service we are exposing. So as to let us capture
relevant information related with real attacks. As a result, we'll be able
to do an analysis of the efficiency of the platform. Furthermore, a
statistical analysis, of all the received attacks, will be performed.
*Target sip extensions:*
*1) **sip: <sip%3Aubp1(a)iptel.org>ubp1(a)iptel.org **or
**sip:<sip%3A229049(a)iptel.org>
229049(a)iptel.org** **(Public Free ext)*
*2)** **sip: <sip%3Aubp2(a)iptel.org>ubp2(a)iptel.org **or
**sip:<sip%3A229056(a)iptel.org>
229056(a)iptel.org** **(Public Free ext)*
*3)** **sip: <sip%3A2xxx(a)ubpsipserver.myvnc.com>2xxx(a)ubpsipserver.myvnc.com*
* **(SER)*
*4)** **sip: <sip%3Ametropolitan1(a)iptel.org>metropolitan1(a)iptel.org **or **
sip: <sip%3A229061(a)iptel.org>229061(a)iptel.org** **(Public Free ext)*
*5)** **sip: <sip%3Ametropolitan2(a)iptel.org>metropolitan2(a)iptel.org **or **
sip: <sip%3A229063(a)iptel.org>229063(a)iptel.org** **(Public Free ext)*
*6)** **sip: <sip%3A1xxx(a)asteriskserver.myvnc.com>
1xxx(a)asteriskserver.myvnc.com** **(Asterisk)*
*7)** **sip:2xxx@asteriskserver.myvnc.com:5061** **(SER)*
*8)** **sip: <sip%3A1xxx(a)asterisksipserver.myvnc.com>
1xxx(a)asterisksipserver.myvnc.com** **(Asterisk)*
We briefly give you a description of the honeypot:
Artemisa is a VoIP/SIP-specific honeypot software designed to connect
to a VoIP enterprise domain as a user-agent back-end in order to
detect malicious activity at an early stage. It registers mu tiple SIP
accounts, which do not represent real human subscribers, at one or
more VoIP service providers, and wait for incoming attacks. Besides,
Artemisa can play a role in the real-time adjustment of the security
policies of the enterprise domain where it is deployed (e.g. setting
rules in a firewall to ban IPs or in the VoIP PBX to ban caller-IDs).
Thanks for your time, hope you'll actively participate (attack!) the sip
extension presented above.
To contact us: artemisa.notifications(a)gmail.com
Best regards,
Exequiel Barrirero / Mauro Villarroel.-
_______________________________________________
Voipsec mailing list
Voipsec(a)voipsa.org
http://voipsa.org/mailman/listinfo/voipsec_voipsa.org
DENOG4
15th November 2012, Darmstadt, Germany
Dear DENOG friends,
only 4 short weeks until November 15, when your friendly DENOG team, our host DE-CIX and magellan netzwerke would like to invite you to this year's DENOG meeting, which will take place at the "Darmstadtium" in Darmstadt, Germany.
DENOG is an event you won't want to miss. The DENOG community, consisting of network operators, engineers, ISP technicians, researchers, and others with a main focus on the Internet, will be gathering for the fourth time. With a combination of lectures, presentations and panel discussions, the meeting will cover a wide range of current internet technologies and future trends.
There will also be plenty of time for socialising during the breaks and the informal GetTogether at the end of the meeting.
The complete agenda is now available at www.denog.de/agenda?lang=en
Registration is required for this event. If you would like to attend please register at: www.denog.de/reg?lang=en
Register now for only EUR 99 plus 19% VAT.
Best regards - and see you at DENOG4!
Your DENOG team
Further information is available online: www.denog.de/meetings/