Banner image

Network Operations

All articles

The Secrets of De-Peering

The Secrets of De-Peering

Author image
Uta Meier-Hahn

10 min read

There are many resources available to learn about Internet peering. But when it comes to de-peering, networkers are mostly left with their gut feeling.

Article tags:

0 Likes are disabled for this article.
2
SHA2017: Hackers' Camping, RIPE Topics

SHA2017: Hackers' Camping, RIPE Topics

Author image
Vesna Manojlovic

9 min read

Today begins the newest edition of four-yearly Dutch summer camping conferences for and by hackers: SHA2017. Since there is an overlap between topics and participants within the RIPE community, this is an invitation to the talks and workshops that might interest you.

Article tags:

0 Likes are disabled for this article.
0
Botnets: As We See Them in 2017

Botnets: As We See Them in 2017

Author image
Alireza Vaziri

8 min read

Year after year, botnets make impressive progress over counter-attack methods. Botmasters have deployed encryption and P2P connectivity to bots and we are always a step behind.

Article tags:

0 Likes are disabled for this article.
0
On the Operators' Perspective on Security Misconfigurations ㄧ The Survey

On the Operators' Perspective on Security Misconfigurations ㄧ The Survey

Author image
Constanze Dietrich

4 min read

We want to fully understand the issue of security misconfigurations. We have some preliminary findings. But we need your help: Please, participate in our anonymous survey on security misconfigurations.

Article tags:

0 Likes are disabled for this article.
0
RFC 8195 "Use of BGP Large Communities" was Published!

RFC 8195 "Use of BGP Large Communities" was Published!

Author image
Job Snijders

1 min read

RFC 8195 presents examples and inspiration for the operational application of BGP Large Communities.

Article tags:

0 Likes are disabled for this article.
0
Heads-up: RFC 8212 on Default EBGP Route Handling Behaviour

Heads-up: RFC 8212 on Default EBGP Route Handling Behaviour

Author image
Job Snijders

4 min read

"External BGP (EBGP) Route Propagation Behavior without Policies” was published as RFC 8112 . What does this mean for network operators and vendors?

Article tags:

0 Likes are disabled for this article.
0
Local Packet Filtering with IPv6

Local Packet Filtering with IPv6

Author image
Enno Rey

8 min read

Recently my organisation discussed IPv6 filter rules for NIC-level firewalls (in a virtualised data center) with a customer. I’d like to take this opportunity to lay out potential approaches for local packet filtering of IPv6, which might somewhat depend on the address configuration strategy you ch…

Article tags:

5 Likes are disabled for this article.
0
Simplifying IPv6 Addressing for Customers - Part 1

Simplifying IPv6 Addressing for Customers - Part 2

Author image
Jordi Palet Martinez

10 min read

One of the main issues when an ISP is planning to deliver IPv6 services is to decide how to address the customers. In this second part we describe choices for numbering the WAN and customer LANs.

Article tags:

0 Likes are disabled for this article.
8
ris-peers-time-series-pct.png

BGP Even-More Specifics in 2017

Author image
Stephen Strowes

8 min read

Since October 2014, we have been advertising two IPv4 /25s and two IPv4 /28s, to better understand how far they propagate across the network. In this article, we review how things have (or have not) changed over the years.

Article tags:

1 Likes are disabled for this article.
1
Simplifying IPv6 Addressing for Customers - Part 1

Simplifying IPv6 Addressing for Customers - Part 1

Author image
Jordi Palet Martinez

8 min read

One of the main issues when an ISP is planning to deliver IPv6 services is to decide how to address the customers.

Article tags:

2 Likes are disabled for this article.
5

Showing 889 article(s)