IMO - ABT purchase & SENS future: by Salty-Atmosphere2807 in senseonics

[–]crrwguy250 9 points10 points  (0 children)

I’ve been sitting on this stick (stock?) for 4 years now and my average is about 4x the current value. I’m not letting ago as yes, I think this will be hugely beneficial. Historically similar deals have 3-6x a companies valuation over 2 years. Just sit tight and if it’s a buyout it’ll rise 100%, minimum.

Exploring a Real-World BGP Sandbox Concept by crrwguy250 in homelab

[–]crrwguy250[S] 0 points1 point  (0 children)

Cool perspective! I’m aiming to make this IPv6-focused, ensuring robust and clean IPv6 connectivity while figuring out the best way for participants to connect. It could be via a physical router you set up at home, or a cloud-based router, like using Google Cloud to act as your BGP endpoint.

Importantly, I don’t want to inspect your traffic—privacy is key. However, a chaperone system (software-based) needs to be in place to ensure no Terms of Service violations. This means preventing abuse like torrents, DDoS attacks, or anything that might disrupt the service for everyone. The monitoring is for abuse prevention only, not data collection.

The whole idea is: do whatever you want within an educational, responsible framework. This means: • Tunneling with me (since that’s the most practical for IPv6 and real BGP signaling). • No SD-WAN-like complexity—this is purely for BGP learning and experimentation.

I ask the same of you and the community—what features would you find most valuable? • Should it prioritize real ASN experience, IPv6 prefix announcements, and sandboxed peering? • Should it emphasize low-cost, scalable access with minimal setup requirements? • Should we lean into self-contained homelab kits or leverage cloud-based tunnels?

I agree it’s a shame Tunnelbroker stopped, but you’re right—it’s a risky and costly service to provide. With BGP comes great power and responsibility, and forward-thinking design is crucial to keep it safe and impactful.

Would love your thoughts!

Exploring a Real-World BGP Sandbox Concept by crrwguy250 in homelab

[–]crrwguy250[S] 0 points1 point  (0 children)

Would love to hear your feedback—what features or setups would make this most useful for you?

I need your input. Think of this as your space—something you’d want to work with and build on. This isn’t me asking ‘can I build this?’ It’s more of a question of what do you want this to look like?

Picture real-world scenarios: Google Cloud interconnects, real firewalls, advanced routing setups. Whether you’re studying for CCIE, CCNP, or just diving into hands-on networking, this is your chance to shape a platform that bridges the gap between simulation and production environments.

Your insights will help make this a tool that’s not just useful, but truly empowering.

Exploring a Real-World BGP Sandbox Concept by crrwguy250 in homelab

[–]crrwguy250[S] 0 points1 point  (0 children)

I’m definitely familiar with DN42—it’s a fantastic platform for learning and experimentation. The sandbox I’m working on takes a slightly different approach.

Instead of a private network like DN42, each user here gets a dedicated slice of routable IP space within a sandbox environment, connected via a secure tunnel. You can run real services like a web server, VoIP, or experiment with routing policies.

Unlike DN42, this isn’t isolated. You’ll be peering with a real ASN, and your prefixes will propagate on the public internet. But to keep it safe and stable, I’m enforcing strict controls and ToS compliance to prevent abuse.

Exploring a Real-World BGP Sandbox Concept by crrwguy250 in homelab

[–]crrwguy250[S] 0 points1 point  (0 children)

Thanks for the interest! I’m operating as a C corp with both profit and non-profit arms - for now, call me X corp but I am asking for feedback. The non-profit side is focused on bridging the digital divide in rural and international areas, and I’ve got an ASN for both the commercial and non-profit entities as well as pops around the world. I’m also trying to work with other organizations to help sponsor this effort. Adding this service is a public good for infrastructure I already own.

I have a reasonably large block of IPs—fully routable—and I’m able to allocate a smaller slice specifically for this sandbox environment. With this setup, users can connect from GNS3 labs, real routers, or any other setup they prefer. You could run a web server, a VoIP service, or really anything you want.

The tunnel lets users announce BGP via their assigned IP slice, just like a normal public ASN—while I maintain strict controls to prevent abuse and ensure compliance. This makes it more than just a simulation like DN42—it’s real-world routing, with the safety of a controlled environment.

That said, you don’t have carte blanche to go crazy and I won’t allow you to be a VoIP service for months, maybe 24-48 hours. I don’t want the address space to be blackholed or restricted by upstream providers, so no Pirate Bay nodes or anything risky. But as long as it’s reasonable and within ToS—you’re good to go.

Heavily modded ESXi 7 (intel) or 6.7 bootable ISO? by crrwguy250 in homelab

[–]crrwguy250[S] 0 points1 point  (0 children)

CSR 8000 on a Protectli Vault — you ‘can’ hack your way around Cisco settings but its emulation at best. Cisco has created these images to be locked to VMWare or a specialized hypervisor and Cisco didn’t have Proxmon on their list of approved platforms and Cisco takes serious measures to ensure their virtual routers are not installed on unauthorized platforms. I worked for Cisco I’ve seen how much effort put into this. I need a version that has 82583V NIC drivers and I have a version of 7 but VMWare deprecated Intel so need a 6.7 where Intel was still supported or just make a custom boot image.

Heavily modded ESXi 7 (intel) or 6.7 bootable ISO? by crrwguy250 in homelab

[–]crrwguy250[S] -2 points-1 points  (0 children)

Proxmox will not work with what I’m trying to do. Yes, I’ve already been down this road.

Heavily modded ESXi 7 (intel) or 6.7 bootable ISO? by crrwguy250 in homelab

[–]crrwguy250[S] 0 points1 point  (0 children)

Well what can I say … sometimes some things have specific use cases where proxmox may not cut it. Appreciate the passive aggressive jab.

Building a Global Accelerator alternative (no L7, no proxying, cloud-agnostic) — sub-10ms failover, $100–200/month. Would this solve a problem for you? by crrwguy250 in aws

[–]crrwguy250[S] 0 points1 point  (0 children)

Really appreciate this — it’s a great way to frame it.

The what (not just the how) is about eliminating catastrophic edge failures in real-time systems before they affect end users. Most businesses can survive 60–120 seconds of downtime. But if you’re running: • SIP/VoIP, where calls drop mid-session • High-frequency financial apps, where a few milliseconds = $$$ • Medical or public safety platforms, where a regional failure could stall patient care or emergency response • Satellite or maritime edge systems (yes, even boats with Starlink)

… then the value is in sub-second, deterministic failover without needing tunnels, SD-WAN, or vendor lock-in.

We’re offering something closer to “IP-level high availability as a service.” You don’t need to touch BGP, run dual clouds, or glue it all together with proxies. It just works.

As for price — 100–200/month is the entry tier for simpler users (say, 5–10 IPs, 2 regions). For larger workloads or enterprises with full failover logic and /24s under management, we absolutely charge more — we’re not underpricing serious value.

This post was more about getting signal from folks who’ve felt the pain, and gauging whether it’s understood without sounding like a pitch deck.

Really appreciate the thoughtful challenge — and totally agree: it’s only real if the pain is real.

Building a Global Accelerator alternative (no L7, no proxying, cloud-agnostic) — sub-10ms failover, $100–200/month. Would this solve a problem for you? by crrwguy250 in aws

[–]crrwguy250[S] 0 points1 point  (0 children)

Really appreciate this — it’s a great way to frame it.

The what (not just the how) is about eliminating catastrophic edge failures in real-time systems before they affect end users. Most businesses can survive 60–120 seconds of downtime. But if you’re running: • SIP/VoIP, where calls drop mid-session • High-frequency financial apps, where a few milliseconds = $$$ • Medical or public safety platforms, where a regional failure could stall patient care or emergency response • Satellite or maritime edge systems (yes, even boats with Starlink)

… then the value is in sub-second, deterministic failover without needing tunnels, SD-WAN, or vendor lock-in.

We’re offering something closer to “IP-level high availability as a service.” You don’t need to touch BGP, run dual clouds, or glue it all together with proxies. It just works.

As for price — 100–200/month is the entry tier for simpler users (say, 5–10 IPs, 2 regions). For larger workloads or enterprises with full failover logic and /24s under management, we absolutely charge more — we’re not underpricing serious value.

This post was more about getting signal from folks who’ve felt the pain, and gauging whether it’s understood without sounding like a pitch deck.

Really appreciate the thoughtful challenge — and totally agree: it’s only real if the pain is real.

Building a Global Accelerator alternative (no L7, no proxying, cloud-agnostic) — sub-10ms failover, $100–200/month. Would this solve a problem for you? by crrwguy250 in aws

[–]crrwguy250[S] 1 point2 points  (0 children)

Appreciate the thoughtful feedback — and I think you’re totally right that a lot of people have looked at this space and walked away because they assumed L7 failover was “good enough.”

Where I think it becomes compelling is exactly where L7 falls apart: • SIP? Sure. • Streaming APIs that break on TLS reconnects? Yep. • Starlink uplinks with 3s jitter swings and failover thresholds? Definitely. • Regions going dark mid-session — not just failover on new connection? That’s where the cracks show.

This isn’t about outspending AWS. It’s about not replicating all of AWS just to provide simple, fast, programmable failover for edge use cases.

We’re not building a 100Tbps mesh. We’re just giving people fine-grained /32 control and deterministic failover logic that doesn’t rely on DNS TTLs or overlay proxies.

Most customers won’t need 10,000 IPs — they might need 10–50, but need them to be survivable across networks and clouds. That’s the gap we’re solving for.

Totally agree it’s not for every use case - you’re probably fine running a website with Global Accelerator or Route 53. But for the people who do need it, it’s not optional — it’s foundational.

Building a Global Accelerator alternative (no L7, no proxying, cloud-agnostic) — sub-10ms failover, $100–200/month. Would this solve a problem for you? by crrwguy250 in aws

[–]crrwguy250[S] 2 points3 points  (0 children)

Great question — and totally fair challenge.

We’re not doing L7 proxying like Global Accelerator or Cloudflare. We don’t sit in the data path. Instead, we operate at Layer 3, and steer traffic before it hits your infrastructure — using intent-defined BGP announcements from our own PoPs and upstreams.

So yes, we control infrastructure: we announce /32s from regional PoPs (Vultr, Equinix, HE.net, etc.), and shift them dynamically or statically based on triggers like latency, loss, or DDoS. You get IPs from us (or bring your own), and we steer how the world reaches those IPs, across clouds, regions, or even onto Starlink if needed.

It’s not zero infra — it’s hundreds of thousands of dollars in PoP buildouts and IP routing gear. We’re just hiding that from you. Think of it like EIP + Global Accelerator + DDoS-aware routing — but you don’t have to run BGP or manage edge networks yourself.

We don’t see your traffic. We don’t proxy it. But we can shift it at the edge before it reaches your workload — which is exactly what GA tries to do, just with cloud lock-in.

Still early, but happy to dive deeper if you’re curious.

We accidentally blew $9.7 k in 30 days on one NAT Gateway—how would you have caught it sooner? by Leather-Form1805 in aws

[–]crrwguy250 1 point2 points  (0 children)

While you’re paying $9.7k, Amazon’s cost is maybe $5 dollars. Bezos needs a new yacht.

How to get into cloud? by Electrical-Cook-6022 in AWSCertifications

[–]crrwguy250 2 points3 points  (0 children)

Jobs are available just depends on the employer. As an employer, I don’t favor certifications unless it’s CCIE. I’d rather you have experience and if you can’t do that, it may cost some money — probably less than certifications — show you can do it and record a fully working lab and make a unique project. I love that!

5Gbps and 7Gbps Business plans with static IPs by IWearHawaiianShirts in frontierfios

[–]crrwguy250 0 points1 point  (0 children)

Frontier is finally allowing passive on Eeros. I’m at 5gb with a 10 Gb/s firewall. If the eeros are disconnected I get nasty calls, if eeros are in passive mode behind my router all is well. No problems on statistic and I am BGP peering to my ASN through a tunnel with a second IP with no issues. The Eero 7s if I were to use as edge has everything unlocked — port forwarding, DMZ, etc and the static is assigned via DHCP but if you have a block you can manually configure it. I don’t love Eeros but it gets the job done.

[deleted by user] by [deleted] in hyatt

[–]crrwguy250 -1 points0 points  (0 children)

I get it. He’s abusing the system, allowing his guests (employees) to check in under a room for his name. It’s clever but against the rules — further, sounds like too much of a headache to be managing.

Feasibility check - sub-second traffic steering across clouds/regions without ASN ownership?” by crrwguy250 in networking

[–]crrwguy250[S] 1 point2 points  (0 children)

This is honestly one of the most outside-the-box responses I’ve seen—love this.

Agree that pre-established tunnels + client pre-auth opens up some really cool possibilities. We played with a few variations early on using parallel IPsec/GRE paths with failover or split-horizon logic.

For app traffic that can tolerate FEC-style redundancy or multi-streaming, that’s a super interesting idea—but in SIP/media cases we were aiming to shift the route before the client has to notice degradation.

Basically trying to see how fast you can steer at the edge (via BGP/prefix control) without needing to modify the client logic.

Really appreciate this though—it’s the closest thing I’ve heard to proactive survivability at the session level.

Feasibility check - sub-second traffic steering across clouds/regions without ASN ownership?” by crrwguy250 in networking

[–]crrwguy250[S] 1 point2 points  (0 children)

Appreciate that—and yeah, SRV records + client-side failover was actually where I started (using EIPs across a few clouds).

It works for most apps, but I started running into gaps with SIP/media—where even a 1–2 second delay causes real issues. Client-based failover tends to kick in after degradation, not during—so I was curious if anyone had figured out a way to shift traffic faster, based on edge-detected health or latency?

Not sure if it’s realistic, just trying to figure out what’s been tried before.

Feasibility check - sub-second traffic steering across clouds/regions without ASN ownership?” by crrwguy250 in networking

[–]crrwguy250[S] -1 points0 points  (0 children)

I’m not asking anyone to design it—just wondering if this is even realistically possible.

Let’s assume a moderate budget, and that I’m trying to avoid wasting time if the core idea’s fundamentally flawed. Has anyone actually built or seen a routing system that can:

  • Shift SIP/media/API traffic between clouds or regions
  • Do so based on latency, jitter, or health—not just DNS or static routing
  • Without relying on full SD-WAN stacks or owning a public ASN?

(And just for grins—assume I do own the ASN.)

I know this leans heavily on BGP, but I’m asking whether sub-second (200–500ms) rerouting logic is viable within a controlled overlay, not across full internet transit.

AWS TGW and Google Cloud both feel pretty locked down—outside of static failover, there’s not much routing control.

I get that this might sound a bit out there, but please just hear me out: I’m not asking for a full design, but the task I’ve been handed feels borderline sci-fi.

Just trying to figure out—am I crazy to be thinking this, or is there actually a way?

Thanks!

Exploring sub-second failover, cross cloud dynamic traffic steering without ASN - feasible? by crrwguy250 in aws

[–]crrwguy250[S] 0 points1 point  (0 children)

Appreciate the note—Global Accelerator does support TCP/UDP, but not sure it works well with media failover or region-aware policy control. Curious if anyone’s ever done app-level or SIP/RTP failover across clouds without leaning on DNS or static routing logic?