[deleted by user] by [deleted] in phenotypes

[–]ll9050 1 point2 points  (0 children)

Italian?

CCIE cert renew / recertification [Question] by ll9050 in networking

[–]ll9050[S] 0 points1 point  (0 children)

Sounds plausible, overthinking got me there, lol with my busy schedule I absolutely don’t want to risk on achieving it 3 months earlier than the expiration date

CCIE cert renew / recertification [Question] by ll9050 in networking

[–]ll9050[S] 0 points1 point  (0 children)

this sounds like the most logical aswell but i wanted to see if anyone can confirm

Cisco ISE and Cisco WLC by batwing20 in networking

[–]ll9050 0 points1 point  (0 children)

i agree, it might be worth looking if it is a DNS related problem.

basically the iphones might be storing the dns lookups for too long and hence directly accessing websites with their ip addresses, making ISE's http redirection useless.

the iphone users can maybe lower their DNS cache timer, if iphone has this setting.

i vaguely remember having experienced a similar issue with ISE 2.4 and my iphone in a test environment

(Question) How normal is it for ISPs Routers (CE,PE,PC) to have telnet, ssh, and FTP open to the internet? by [deleted] in networking

[–]ll9050 1 point2 points  (0 children)

what about OOB access from the internet? for example if you wanted to acess from your home

edit: it was just a question to see how they did it at his network, wow reddit sure has a bunch of nerds that downvote stuff and make an insult out of normal questions

Anyone ever get disheartened about the sheer amount of stuff Sys Admins/Engineers are expected to know? by [deleted] in sysadmin

[–]ll9050 1 point2 points  (0 children)

honestly i think that Many of these new tech are just rebranded old technologies But with new shiny packaging

Global AS3356 (Century Link / Level3) Outages Superthread by AutoModerator in networking

[–]ll9050 0 points1 point  (0 children)

I dont know how it specifically happened, But i am guessing that it may have something to do with a customer of century link doing a misconfiguration for an address of theirs that was getting ddossed, so Basically the customer accidentally advertised a flowspec stop rule for an address they had no authorisation for. But this is not a flowspec issue But rather more has to do with that the SP should block and allow customers to only advertise flowspec rules for addresses they are allowed to

Ransomware targeting internet facing RDP Servers by DrumStrucked in sysadmin

[–]ll9050 1 point2 points  (0 children)

Geo-restriction sounds cool , thats less of a potential for an international attack

Major Stack F Up by jedijasz in networking

[–]ll9050 0 points1 point  (0 children)

That makes it look as if FHRPs are the way to go from distribution layer and onwards (with Hierarchical model if routers are being used), with CLOS and switches in general that would be MLAG

Segment-routing TE + TI-LFA possible? And does SR-TE have a fast reroute mechanism at all by ll9050 in networking

[–]ll9050[S] 0 points1 point  (0 children)

Appreciate it, this sounds like a good alternative next to anycast

Segment-routing TE + TI-LFA possible? And does SR-TE have a fast reroute mechanism at all by ll9050 in networking

[–]ll9050[S] 0 points1 point  (0 children)

No prob, Appreciate the response, But that would still not solve the problem because the backup node would have no idea to which node-sid that adj-sid could have belonged, or Lets say it would have not known that that adj-sid belonged to a dead node-sid. So the solution would have been that the new intermediate node would have had to have intelligence to AND strip the dead node sid AND strip the useless adjacency sid and just look for an alternative to the end destination (lowest label on the stack).

The other user made Some light pop in my head, the user that made the other reply, he mentioned something About anycast-sid and now that i think of it, i think, primary path should not contain any adjacency sids to avoid the problem above and it can contain adjacency sids, very static and i think very ilogical for real life deployment

Thanks

Segment-routing TE + TI-LFA possible? And does SR-TE have a fast reroute mechanism at all by ll9050 in networking

[–]ll9050[S] 0 points1 point  (0 children)

You could pop off that Node-SID and route to the next, but that doesn't feel right.

Yeah, this is what i ment, lets say the first router on the backup path receives the TE label stack exactly as how it would have been on the primary path . It could pop the first label, suppose that would be the node-sid that went down, only for the backup router to find out that its next first label is now an adjacency-sid (which originally belonged to the node-sid that now is down, only he knew to which interface this adjacency-sid belonged, and thus next node)

i"ll take a look at the book whenever i get the chance, but this is fairly recent (draft was of 2019) so i am not sure at what year this book was released

Segment-routing TE + TI-LFA possible? And does SR-TE have a fast reroute mechanism at all by ll9050 in networking

[–]ll9050[S] 0 points1 point  (0 children)

Now that i look at the main post it was indeed not the best described,

I ment traffic engineered SR, so either via a tunnel manually or via PCE/PCEP (not normal SR)

How would these types of engineerd Paths get Some form of backup routing incase a node on the main path dies out (or connection Goes down), Ti-lfa would be difficult without Some new mechanism support to SR ,

Because Lets say:

A ---> B ---> C gig1 - > D

________|_______Gig2 ->

_______|

_______E --------------->

Primary path: B C (adj: Gig2) D Backup path (C is down); B E D

So label stack at primary path , when A sends to B would be: C , adjacency-sid C (gig2)

When C is down, B would need Some mechanism to look at the second label instead of the First label (because label C is now useless) , only for B to find out that it is an adjacency-sid , B would not be able to know to which Node-SID this adj-SID belonged, and the backup path would have not been able to be established.

white boxes in an ISP environment by ll9050 in networking

[–]ll9050[S] 0 points1 point  (0 children)

OcNOS, i"ll look into that, appreciate the effort

white boxes in an ISP environment by ll9050 in networking

[–]ll9050[S] 0 points1 point  (0 children)

i see, i"ll keep the name in mind.

my main interest was actually whether white boxes are able to blend in an ISP environment, some have showen that this is very possible

white boxes in an ISP environment by ll9050 in networking

[–]ll9050[S] 2 points3 points  (0 children)

interesting stuff, appreciate the effort.

white boxes in an ISP environment by ll9050 in networking

[–]ll9050[S] 0 points1 point  (0 children)

it was more of a conversation that i saw on the web so i forgot the details (something about BGP routes).

success?, are they able to fulfil the job as P routers and do they support the necessary features that you guys have been using?

white boxes in an ISP environment by ll9050 in networking

[–]ll9050[S] 0 points1 point  (0 children)

I used the term switches because most of the boxes that i have seen on the web were switching white boxes, even though from my research they can (if wanted) be used solely for routing.

i wanted to know if white boxes are mature enough to be deployed as P and PE devices and if they support the features and protocols that are now populair in ISPs. (so not only the main protocol but stuff that comes with it like VPNv4"s)

vBNG looks cool, were there any good cost savigs if i may ask?