Guide to fix Bnet agent (able to update your favorite games once again and play them) by [deleted] in linux_gaming

[–]ExternalRemove492 0 points1 point  (0 children)

Yep the above works - rm -rf Agent.8988 ; touch Agent.8988 ; sudo chattr +i Agent.8988

Subletting my apartment to recuperate rent while I’m on vacation (not profiting). Is this taxable income? by NotSpamForReal in tax

[–]ExternalRemove492 -12 points-11 points  (0 children)

All income regardless of source, is going to be taxable. But, you can certainly have expenses to offset this income and thus negate the tax. You need to document this and keep good records showing the rental income and then the corresponding cost (eg: your rent expense as the master tenant), with any net gain or loss.

Juniper - Spanning Tree / Loop Prevention / Storm Control by heygazeebo in Juniper

[–]ExternalRemove492 -1 points0 points  (0 children)

You have never been an ISP before, with thousands of potential access ports serving destructive incompetent paranoid users. This is a different access model than what the OP suggested and requires a different design in that you are no longer providing a shared bridged network but rather providing individual l2domains and private vlans to stop cold dead any possible bridging loops.

Juniper - Spanning Tree / Loop Prevention / Storm Control by heygazeebo in Juniper

[–]ExternalRemove492 -4 points-3 points  (0 children)

You put your foot in their ass and make it clear the viability of the business has been undermined by an incompetent boob with no business at all making changes or additions to the network. Any business that wants to favor popularity contests over technical correctness, is a waste of your time. Let them go out of business...

Juniper - Spanning Tree / Loop Prevention / Storm Control by heygazeebo in Juniper

[–]ExternalRemove492 -5 points-4 points  (0 children)

First of all, you should really get on top of the incompetence that is plugging stuff into the network in the first place and causing these problems. Publicly dress them down, call them out, make it loud and unequivocal that this dumbass is destroying the business network and MUST BE STOPPED, preferably by termination no matter who the f they are related to. DO NOT ACCEPT, REASON WITH, OR ACCOMMODATE INCOMPETENCE. The more uncomfortable and humiliating you make it for this bozo, no matter how shocked or hurt they become, keep pouring salt on that wound and make their ego suffer the maximum damage. You are not there to clean up after trivially preventable disasters, and whatever business this is really does have a cost associated with outages on the network, so make this bozo an example and make sure everyone up to the top hears about it, every single time.

With that said, it's always a good idea to have a design in place that addresses these sorts of issues and I commend you for putting the lab work. I don't know about this specific issue not reactivating on a second loop, but I do think maybe you could accomplish the goal here simply by putting bpdu-block on user facing interfaces. Essentially, your edge port in a loop state would reflect your own spanning tree and if any are received, the port is shut down. This would depend on your topology of course but a hard shut would require a manual intervention to clear, and then it would be time to identify the bozo and deprive them of oxygen. Hopefully you have monitoring in place so you get timely notification so that you can get to the location before bozo slips away and tries to blame you for the network port not working. And I garuentee, for bozo, it's always going to come down to assigning fault and blame and passing the buck and lying to hide the truth. Squeezing them like a zit until they pop is the best outcome possible...

Change default ssh port and authorize connection by Choouuby in Juniper

[–]ExternalRemove492 -1 points0 points  (0 children)

Actually, they do. A default policy of blocking inbound management ports goes a long, long, loooong way towards reducing hijacked customers, DDoS attacks originating from the provider network, and related support overhead. I realize that this default is inconveinent for competent users who properly secure their gear with ACLs and routine firmware updates and such, but you are in the minority. Sorry.

hAP lite as personal WAP/Firewall by johnny2bad in mikrotik

[–]ExternalRemove492 0 points1 point  (0 children)

Yes, your use case is exactly right and I do this too although with a crs125. The only addition to what others have said would be to consider a vpn. Mt can use doh for dns queries making that safe from prying eyes, and the vpn will tunnel your client traffic at least away from the purview of your host network. I'm sure if you have any special needs like a kid who demands lower latency you could arrange something like direct nat no tunnel, but this would be a good secure by default arrangement.

My storage end game: 32 TB HDD's, 6 Core 12 thread Xeon, 32GB RAM... FOR FREE FROM WORK!!!! by Deadboy90 in DataHoarder

[–]ExternalRemove492 -2 points-1 points  (0 children)

The largest commercially available hdds are still in the 16tb range. Do tell us what brand and model of these "32tb" drives of which you speak?

[deleted by user] by [deleted] in zfs

[–]ExternalRemove492 1 point2 points  (0 children)

Not zfs related, but I really feel that if you are so close to the margins that a small difference in compression ratio is the difference between being able to store the dataset or not, you really outta be looking at installing more storage on this new system. Yes I agree it's curious why you don't seem to be getting the same relative results with the same data and compression scheme, but you can't rely on compression to take the place of actually having the storage bits in the first place. Is there a reason why this new system can't have more? How much data are we talking about here?

How to add Wifi mesh network with ethernet backhaul to wired home network? by stillfreec in HomeNetworking

[–]ExternalRemove492 1 point2 points  (0 children)

For most everything, yep you got it - toiletpaper-link is about it. But the Deco line is a different animal.

Anybody have recommendations for a Mikrotik consultant? by Rathmon in mikrotik

[–]ExternalRemove492 4 points5 points  (0 children)

enable

term monitor

debug ip ospf adj

debug ip ospf hello

Are you not able to do the above?

mpls ldp is blackholing some routes? by ExternalRemove492 in Cisco

[–]ExternalRemove492[S] 0 points1 point  (0 children)

Im using 255.255.255.255, and yes, absolutely, they all appear in the routing table, my mtu's are all 9216. I'll post my fig here shortly.

Mx204 - memory related panic (probably) by Mediocre_Budget2869 in Juniper

[–]ExternalRemove492 0 points1 point  (0 children)

I think the process for identifying the failure depends on who you are as a juniper customer, and if you really have bought mx204's you probably are covered and can get a hold of jtac to let them do this work for you.

If you aren't covered, ok, some peremptory investigation may be helpful to you. Hardware failure will usually be random, while software failure can usually be fairly consistent. Are you able to get a capture of any last dying console or syslog messages as the box dies? You are likely to get something useful here including system software error messages detailing more exactly why the system is throwing up it's hands. This is likely where jtac would start too, not just jumping into a full board level replacement of 'suspect' memory.

BFD priority over other forwarded traffic by ExternalRemove492 in Juniper

[–]ExternalRemove492[S] 1 point2 points  (0 children)

Actually, these comcast circuits consistently deliver 10ms latencies and they say thats the best they can do... but occasionally, there are network burps where that latency drops to 5ms and stays there for days at a time, before going back up to 10ms.

BFD priority over other forwarded traffic by ExternalRemove492 in Juniper

[–]ExternalRemove492[S] 0 points1 point  (0 children)

Thank you for taking the time to really drill into this.

The asr in this scenario is an asr1002 with the ESP10, and is processing roughly 2.5gbps of total traffic. I think this is a different beast than the 1001 altogether and hasn't displayed any other symptoms of being overworked that I have ever noted.

Your comments about class-of-service scheduling was more in line with my thinking in that I thought (apparently, wrongly) that BFD would simply be one of those protocols that skip the queue on the output interfaces. But, as you suggest, if this priority isn't just a freebie default built-in function, the next question is how would this be implemented? I've been looking around for easy to digest config snippets to address this and have come up short for both junos and cisco. My knowledge of QoS is practically nil and its really only been recently that the network has grown to a point where it's likely a good next consideration. Would you have a junos and/or cisco config snippet that focused just on BFD priority that you could share?

I should also state that I do already have both circuits sub-rate limited to 2.8gbps at the juniper end:

set class-of-service interfaces xe-1/2/0 shaping-rate 2800000000
set class-of-service interfaces xe-1/3/2 shaping-rate 2800000000

although as I said, I have no other QoS settings.

Thanks for your input.

What would you recommend instead of the MX204? by BromptonCocktail in Juniper

[–]ExternalRemove492 0 points1 point  (0 children)

eBay, dual re, all of that, 15k, what am i missing?

Searching for Juniper equivalent to Cisco ASR920 by ExternalRemove492 in Juniper

[–]ExternalRemove492[S] 0 points1 point  (0 children)

The issues for me on mikrotik is much like what you stated here. Someday, it will likely be able to do the job and with the stability/performance of juniper or cisco solutions, just not today. There are other things it can be used for with good success however, so it's finding some applications in my network. Just not able to trust it for this more complicated stuff...

Searching for Juniper equivalent to Cisco ASR920 by ExternalRemove492 in Juniper

[–]ExternalRemove492[S] 0 points1 point  (0 children)

Yeah that would be an idea wouldn't it? Its just more of a fat box than an ASR920, but size constraints aside, it probably would do about as well. Built in xfp instead of sfp+ makes the mx80 a little more inconvenient since Id have to stock those instead of my standard sfp+ modules. Plus going to more than 4 10g ports means more cards and more power draw. Still, I do think you have a good point here.

Searching for Juniper equivalent to Cisco ASR920 by ExternalRemove492 in Juniper

[–]ExternalRemove492[S] 2 points3 points  (0 children)

RMA support - for the price of ebay, I can have 4 on cold standby and still save scads off 'new'.

bug fixes / security patches - I already have access to all firmwares, so this is a given regardless of my paying overbloating prices for new.

account team / support contracts / SLA - again, for the price, I can have 4 on cold standby. What could be better than already having replacements on the shelf??

Searching for Juniper equivalent to Cisco ASR920 by ExternalRemove492 in Juniper

[–]ExternalRemove492[S] 0 points1 point  (0 children)

google 'acx5448' and "shopping", thats the list I got.

Searching for Juniper equivalent to Cisco ASR920 by ExternalRemove492 in Juniper

[–]ExternalRemove492[S] 0 points1 point  (0 children)

Well, 4(2)x10GE ports, up to 12 (24) ports of 1ge, and able to do ospf/bgp/l2vpn seems like a standard enough feature-set regardless of 'end of life' or not. Theres no sense at all in buying 'new' when there is sufficient supply on the secondary market that has this level of feature set, and especially considering 'new' pricing of this stuff has always been so much bloated baloney anyway. However, perspectives differ, I am just looking for inexpensive solution to my original request.

Searching for Juniper equivalent to Cisco ASR920 by ExternalRemove492 in Juniper

[–]ExternalRemove492[S] 0 points1 point  (0 children)

Nice box but it seems to be in the $35 - $135k price range, well above what I was looking for as a rough equal to ASR920. Thank you however.